Loading ...

Play interactive tourEdit tour

Analysis Report ioir.png.dll

Overview

General Information

Sample Name:ioir.png.dll
Analysis ID:349160
MD5:d31c0491f522d6b9f2102109bd2420af
SHA1:dc1cccf0e43ec5a68326ae4faf1a8cbc5ac00708
SHA256:f7c79c0c3feb7c0032424f5f6a9bcdf78d1815ee53f807cc192c2c1f8f21270f
Tags:isfbv3ursnif

Most interesting Screenshot:

Detection

Ursnif
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Ursnif
Contains functionality to detect sleep reduction / modifications
Writes or reads registry keys via WMI
Writes registry values via WMI
Antivirus or Machine Learning detection for unpacked file
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to detect sandboxes (mouse cursor move detection)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to retrieve information about pressed keystrokes
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found potential string decryption / allocating functions
JA3 SSL client fingerprint seen in connection with other malware
May check if the current machine is a sandbox (GetTickCount - Sleep)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE file contains strange resources
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • loaddll32.exe (PID: 6480 cmdline: loaddll32.exe 'C:\Users\user\Desktop\ioir.png.dll' MD5: 99D621E00EFC0B8F396F38D5555EB078)
    • rundll32.exe (PID: 3848 cmdline: rundll32.exe 'C:\Users\user\Desktop\ioir.png.dll',#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 6308 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3848 -s 744 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • iexplore.exe (PID: 6588 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 6748 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6588 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
    • iexplore.exe (PID: 6952 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6588 CREDAT:17418 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000003.647244035.0000000005360000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
    00000000.00000003.648524337.0000000005360000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
      00000000.00000003.648667636.0000000005360000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
        00000000.00000003.648893530.0000000005360000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
          00000000.00000003.647868794.0000000005360000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
            Click to see the 31 entries

            Sigma Overview

            No Sigma rule has matched

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Multi AV Scanner detection for submitted fileShow sources
            Source: ioir.png.dllVirustotal: Detection: 42%Perma Link
            Source: ioir.png.dllReversingLabs: Detection: 41%
            Source: 0.2.loaddll32.exe.22d0174.3.unpackAvira: Label: TR/Kazy.4159236
            Source: 1.2.rundll32.exe.3540000.5.unpackAvira: Label: TR/Patched.Ren.Gen
            Source: 1.2.rundll32.exe.3530174.4.unpackAvira: Label: TR/Kazy.4159236
            Source: 0.2.loaddll32.exe.2430000.4.unpackAvira: Label: TR/Patched.Ren.Gen

            Compliance:

            barindex
            Uses 32bit PE filesShow sources
            Source: ioir.png.dllStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, DLL, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI
            Uses new MSVCR DllsShow sources
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll
            Uses secure TLS version for HTTPS connectionsShow sources
            Source: unknownHTTPS traffic detected: 45.133.216.103:443 -> 192.168.2.4:49744 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 45.133.216.103:443 -> 192.168.2.4:49745 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 45.133.216.103:443 -> 192.168.2.4:49777 version: TLS 1.2
            Binary contains paths to debug symbolsShow sources
            Source: Binary string: powrprof.pdbF source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000004.00000003.652704445.0000000004CEB000.00000004.00000001.sdmp
            Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: sfc_os.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000004.00000003.657234478.0000000005290000.00000004.00000040.sdmp
            Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000004.00000003.657226715.0000000005181000.00000004.00000001.sdmp
            Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000004.00000003.657234478.0000000005290000.00000004.00000040.sdmp
            Source: Binary string: wntdll.pdb source: WerFault.exe, 00000004.00000003.657226715.0000000005181000.00000004.00000001.sdmp
            Source: Binary string: shcore.pdb source: WerFault.exe, 00000004.00000003.657234478.0000000005290000.00000004.00000040.sdmp
            Source: Binary string: riched20.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000004.00000003.657226715.0000000005181000.00000004.00000001.sdmp
            Source: Binary string: fltLib.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: advapi32.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: sechost.pdb@ source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: shell32.pdb source: WerFault.exe, 00000004.00000003.657234478.0000000005290000.00000004.00000040.sdmp
            Source: Binary string: bcrypt.pdb. source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000004.00000003.657226715.0000000005181000.00000004.00000001.sdmp
            Source: Binary string: winspool.pdb$ source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: dnsapi.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000004.00000003.657226715.0000000005181000.00000004.00000001.sdmp
            Source: Binary string: wimm32.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: mpr.pdb source: WerFault.exe, 00000004.00000003.657234478.0000000005290000.00000004.00000040.sdmp
            Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000004.00000003.657226715.0000000005181000.00000004.00000001.sdmp
            Source: Binary string: oleaut32.pdb< source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: setupapi.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: usp10.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: winhttp.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: imagehlp.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: wUxTheme.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: dwmapi.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: shcore.pdbk source: WerFault.exe, 00000004.00000003.657234478.0000000005290000.00000004.00000040.sdmp
            Source: Binary string: profapi.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: setupapi.pdb( source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: ws2_32.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: winspool.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000004.00000003.657226715.0000000005181000.00000004.00000001.sdmp
            Source: Binary string: shell32.pdbk source: WerFault.exe, 00000004.00000003.657234478.0000000005290000.00000004.00000040.sdmp
            Source: Binary string: sechost.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: iphlpapi.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: nsi.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: propsys.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: cfgmgr32.pdbk source: WerFault.exe, 00000004.00000003.657234478.0000000005290000.00000004.00000040.sdmp
            Source: Binary string: ucrtbase.pdbk source: WerFault.exe, 00000004.00000003.657234478.0000000005290000.00000004.00000040.sdmp
            Source: Binary string: powrprof.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: msctf.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: version.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: ole32.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: AcLayers.pdb source: WerFault.exe, 00000004.00000003.657226715.0000000005181000.00000004.00000001.sdmp
            Source: Binary string: riched32.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000004.00000003.657234478.0000000005290000.00000004.00000040.sdmp
            Source: Binary string: wUxTheme.pdb$ source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: comctl32v582.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000004.00000003.657234478.0000000005290000.00000004.00000040.sdmp
            Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000004.00000003.657234478.0000000005290000.00000004.00000040.sdmp
            Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000004.00000003.657234478.0000000005290000.00000004.00000040.sdmp
            Source: Binary string: combase.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: rundll32.pdb source: WerFault.exe, 00000004.00000003.657226715.0000000005181000.00000004.00000001.sdmp
            Source: Binary string: oleaut32.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: sfc.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: version.pdb2 source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: msls31.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: apphelp.pdb source: WerFault.exe, 00000004.00000003.657226715.0000000005181000.00000004.00000001.sdmp
            Source: Binary string: wuser32.pdb source: WerFault.exe, 00000004.00000003.657226715.0000000005181000.00000004.00000001.sdmp
            Source: Binary string: comctl32.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00404FF4 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,
            Source: Joe Sandbox ViewJA3 fingerprint: 9e10692f1b7f78228b2d4e424db3a98c
            Source: msapplication.xml0.8.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x19bc77f4,0x01d6fbc9</date><accdate>0x19bc77f4,0x01d6fbc9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
            Source: msapplication.xml0.8.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x19bc77f4,0x01d6fbc9</date><accdate>0x19bc77f4,0x01d6fbc9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
            Source: msapplication.xml5.8.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x19c13ca7,0x01d6fbc9</date><accdate>0x19c13ca7,0x01d6fbc9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
            Source: msapplication.xml5.8.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x19c13ca7,0x01d6fbc9</date><accdate>0x19c13ca7,0x01d6fbc9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
            Source: msapplication.xml7.8.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x19c39f10,0x01d6fbc9</date><accdate>0x19c39f10,0x01d6fbc9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
            Source: msapplication.xml7.8.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x19c39f10,0x01d6fbc9</date><accdate>0x19c39f10,0x01d6fbc9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
            Source: unknownDNS traffic detected: queries for: topitophug.xyz
            Source: loaddll32.exe, 00000000.00000003.648524337.0000000005360000.00000004.00000040.sdmp, rundll32.exe, 00000001.00000002.678292603.0000000008010000.00000004.00000040.sdmpString found in binary or memory: http://%s=%s&file://&os=%u.%u_%u_%u_x%uindex.html;
            Source: msapplication.xml.8.drString found in binary or memory: http://www.amazon.com/
            Source: msapplication.xml1.8.drString found in binary or memory: http://www.google.com/
            Source: msapplication.xml2.8.drString found in binary or memory: http://www.live.com/
            Source: msapplication.xml3.8.drString found in binary or memory: http://www.nytimes.com/
            Source: msapplication.xml4.8.drString found in binary or memory: http://www.reddit.com/
            Source: msapplication.xml5.8.drString found in binary or memory: http://www.twitter.com/
            Source: msapplication.xml6.8.drString found in binary or memory: http://www.wikipedia.com/
            Source: msapplication.xml7.8.drString found in binary or memory: http://www.youtube.com/
            Source: loaddll32.exeString found in binary or memory: https://topitophug.xyz
            Source: loaddll32.exe, 00000000.00000002.1020935253.0000000005360000.00000004.00000040.sdmp, ~DFF728301785477207.TMP.8.drString found in binary or memory: https://topitophug.xyz/index.htm
            Source: {FC8A972A-67BB-11EB-90EB-ECF4BBEA1588}.dat.8.drString found in binary or memory: https://topitophug.xyz/index.htm/index.htm
            Source: {FC8A972A-67BB-11EB-90EB-ECF4BBEA1588}.dat.8.drString found in binary or memory: https://topitophug.xyz/index.htmRoot
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
            Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
            Source: unknownHTTPS traffic detected: 45.133.216.103:443 -> 192.168.2.4:49744 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 45.133.216.103:443 -> 192.168.2.4:49745 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 45.133.216.103:443 -> 192.168.2.4:49777 version: TLS 1.2

            Key, Mouse, Clipboard, Microphone and Screen Capturing:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000000.00000003.647244035.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648524337.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648667636.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648893530.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647868794.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648751901.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648917284.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648176949.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648860307.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647426858.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647623145.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.649011597.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647521163.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.649003327.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647703250.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1020935253.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.678292603.0000000008010000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648956787.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648265573.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648974202.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647795143.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647330409.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647948135.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648938200.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648374581.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648323443.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648615088.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648037894.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648828511.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648478035.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648792520.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648104820.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648425491.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648990980.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 3848, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 6480, type: MEMORY
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_0040682E OpenClipboard,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00420958 GetClipboardData,CopyEnhMetaFileA,GetEnhMetaFileHeader,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00420F9C GetObjectA,GetDC,CreateCompatibleDC,CreateBitmap,CreateCompatibleBitmap,GetDeviceCaps,GetDeviceCaps,SelectObject,GetDIBColorTable,GetDIBits,SelectObject,CreateDIBSection,GetDIBits,SelectObject,SelectPalette,RealizePalette,FillRect,SetTextColor,SetBkColor,SetDIBColorTable,PatBlt,CreateCompatibleDC,SelectObject,SelectPalette,RealizePalette,SetTextColor,SetBkColor,BitBlt,SelectPalette,SelectObject,DeleteDC,SelectPalette,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00452C8C GetKeyboardState,
            Source: C:\Windows\System32\loaddll32.exeWindow created: window name: CLIPBRDWNDCLASS
            Source: C:\Windows\SysWOW64\rundll32.exeWindow created: window name: CLIPBRDWNDCLASS

            E-Banking Fraud:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000000.00000003.647244035.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648524337.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648667636.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648893530.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647868794.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648751901.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648917284.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648176949.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648860307.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647426858.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647623145.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.649011597.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647521163.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.649003327.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647703250.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1020935253.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.678292603.0000000008010000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648956787.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648265573.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648974202.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647795143.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647330409.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647948135.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648938200.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648374581.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648323443.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648615088.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648037894.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648828511.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648478035.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648792520.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648104820.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648425491.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648990980.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 3848, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 6480, type: MEMORY

            System Summary:

            barindex
            Writes or reads registry keys via WMIShow sources
            Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetDWORDValue
            Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
            Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
            Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
            Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
            Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
            Writes registry values via WMIShow sources
            Source: C:\Windows\System32\loaddll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
            Source: C:\Windows\System32\loaddll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
            Source: C:\Windows\System32\loaddll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
            Source: C:\Windows\System32\loaddll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
            Source: C:\Windows\System32\loaddll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00455C08 NtdllDefWindowProc_A,GetCapture,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00442040 NtdllDefWindowProc_A,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_004427E8 IsIconic,SetActiveWindow,IsWindowEnabled,SetWindowPos,NtdllDefWindowProc_A,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00442898 IsIconic,SetActiveWindow,IsWindowEnabled,NtdllDefWindowProc_A,SetWindowPos,SetFocus,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00429150 NtdllDefWindowProc_A,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_0044B7E0 GetSubMenu,SaveDC,RestoreDC,GetWindowDC,SaveDC,RestoreDC,NtdllDefWindowProc_A,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_03552415 NtQueryVirtualMemory,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_035A1757 memcpy,memcpy,lstrcatW,CreateEventA,NtQueryInformationProcess,CloseHandle,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_035A4DF0 NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,RtlNtStatusToDosError,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_035A6101 RtlNtStatusToDosError,NtClose,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_035AAC53 RtlInitUnicodeString,NtClose,RtlNtStatusToDosError,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_0043C538
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_0044B7E0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_035521F4
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_03531768
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_03531D74
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_035AB8DC
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_035AC490
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 004060A8 appears 61 times
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 00403F1C appears 71 times
            Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3848 -s 744
            Source: ioir.png.dllStatic PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
            Source: ioir.png.dllStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, DLL, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI
            Source: classification engineClassification label: mal68.troj.evad.winDLL@9/19@2/1
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_0041DCB4 GetLastError,FormatMessageA,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00408632 GetDiskFreeSpaceA,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00413784 FindResourceA,
            Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{FC8A9728-67BB-11EB-90EB-ECF4BBEA1588}.datJump to behavior
            Source: C:\Windows\System32\loaddll32.exeMutant created: \Sessions\1\BaseNamedObjects\Local\1978EE24-ED7A-8F95-C655-46BAE5CC03A0
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3848
            Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WERF3C4.tmpJump to behavior
            Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
            Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
            Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : select * from win32_process
            Source: C:\Windows\System32\loaddll32.exeFile read: C:\Windows\win.iniJump to behavior
            Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\ioir.png.dll',#1
            Source: ioir.png.dllVirustotal: Detection: 42%
            Source: ioir.png.dllReversingLabs: Detection: 41%
            Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\ioir.png.dll'
            Source: unknownProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\ioir.png.dll',#1
            Source: unknownProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3848 -s 744
            Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
            Source: unknownProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6588 CREDAT:17410 /prefetch:2
            Source: unknownProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6588 CREDAT:17418 /prefetch:2
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\ioir.png.dll',#1
            Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6588 CREDAT:17410 /prefetch:2
            Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6588 CREDAT:17418 /prefetch:2
            Source: C:\Windows\System32\loaddll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{674B6698-EE92-11D0-AD71-00C04FD8FDFF}\InprocServer32
            Source: C:\Windows\System32\loaddll32.exeFile opened: C:\Windows\SysWOW64\RICHED32.DLL
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll
            Source: Binary string: powrprof.pdbF source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000004.00000003.652704445.0000000004CEB000.00000004.00000001.sdmp
            Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: sfc_os.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000004.00000003.657234478.0000000005290000.00000004.00000040.sdmp
            Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000004.00000003.657226715.0000000005181000.00000004.00000001.sdmp
            Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000004.00000003.657234478.0000000005290000.00000004.00000040.sdmp
            Source: Binary string: wntdll.pdb source: WerFault.exe, 00000004.00000003.657226715.0000000005181000.00000004.00000001.sdmp
            Source: Binary string: shcore.pdb source: WerFault.exe, 00000004.00000003.657234478.0000000005290000.00000004.00000040.sdmp
            Source: Binary string: riched20.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000004.00000003.657226715.0000000005181000.00000004.00000001.sdmp
            Source: Binary string: fltLib.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: advapi32.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: sechost.pdb@ source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: shell32.pdb source: WerFault.exe, 00000004.00000003.657234478.0000000005290000.00000004.00000040.sdmp
            Source: Binary string: bcrypt.pdb. source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000004.00000003.657226715.0000000005181000.00000004.00000001.sdmp
            Source: Binary string: winspool.pdb$ source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: dnsapi.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000004.00000003.657226715.0000000005181000.00000004.00000001.sdmp
            Source: Binary string: wimm32.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: mpr.pdb source: WerFault.exe, 00000004.00000003.657234478.0000000005290000.00000004.00000040.sdmp
            Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000004.00000003.657226715.0000000005181000.00000004.00000001.sdmp
            Source: Binary string: oleaut32.pdb< source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: setupapi.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: usp10.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: winhttp.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: imagehlp.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: wUxTheme.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: dwmapi.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: shcore.pdbk source: WerFault.exe, 00000004.00000003.657234478.0000000005290000.00000004.00000040.sdmp
            Source: Binary string: profapi.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: setupapi.pdb( source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: ws2_32.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: winspool.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000004.00000003.657226715.0000000005181000.00000004.00000001.sdmp
            Source: Binary string: shell32.pdbk source: WerFault.exe, 00000004.00000003.657234478.0000000005290000.00000004.00000040.sdmp
            Source: Binary string: sechost.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: iphlpapi.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: nsi.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: propsys.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: cfgmgr32.pdbk source: WerFault.exe, 00000004.00000003.657234478.0000000005290000.00000004.00000040.sdmp
            Source: Binary string: ucrtbase.pdbk source: WerFault.exe, 00000004.00000003.657234478.0000000005290000.00000004.00000040.sdmp
            Source: Binary string: powrprof.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: msctf.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: version.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: ole32.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: AcLayers.pdb source: WerFault.exe, 00000004.00000003.657226715.0000000005181000.00000004.00000001.sdmp
            Source: Binary string: riched32.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000004.00000003.657234478.0000000005290000.00000004.00000040.sdmp
            Source: Binary string: wUxTheme.pdb$ source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: comctl32v582.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000004.00000003.657234478.0000000005290000.00000004.00000040.sdmp
            Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000004.00000003.657234478.0000000005290000.00000004.00000040.sdmp
            Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000004.00000003.657234478.0000000005290000.00000004.00000040.sdmp
            Source: Binary string: combase.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: rundll32.pdb source: WerFault.exe, 00000004.00000003.657226715.0000000005181000.00000004.00000001.sdmp
            Source: Binary string: oleaut32.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: sfc.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: version.pdb2 source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: msls31.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: Binary string: apphelp.pdb source: WerFault.exe, 00000004.00000003.657226715.0000000005181000.00000004.00000001.sdmp
            Source: Binary string: wuser32.pdb source: WerFault.exe, 00000004.00000003.657226715.0000000005181000.00000004.00000001.sdmp
            Source: Binary string: comctl32.pdb source: WerFault.exe, 00000004.00000003.657239297.0000000005296000.00000004.00000040.sdmp
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00426E24 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_0045D200 push 0045D28Dh; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00444114 push 0044416Eh; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_0044C294 push 0044C2FFh; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_0042435C push 00424388h; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_004243AC push 004243D8h; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00424664 push 00424690h; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00410696 push 0041070Eh; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00410698 push 0041070Eh; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_0042675C push 00426794h; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00424760 push 0042478Ch; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00410710 push 004107B8h; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00424798 push 004247C4h; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_0041A7B2 push 0041A85Fh; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_0041A7B4 push 0041A85Fh; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_004107BA push 00410900h; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_0041A864 push 0041A8F4h; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_004108D4 push 00410900h; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_0041A8F6 push 0041ABFCh; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00430954 push 004309CAh; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00412A4C push ecx; mov dword ptr [esp], edx
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00406A60 push ecx; mov dword ptr [esp], eax
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00452A2C push ecx; mov dword ptr [esp], ecx
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00426A80 push 00426AACh; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_0041ABD0 push 0041ABFCh; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_0040CBD4 push ecx; mov dword ptr [esp], edx
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00436BB0 push 00436C25h; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00406C44 push 00406C70h; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00412C74 push ecx; mov dword ptr [esp], edx
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00406C7C push 00406CA8h; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00436C28 push 00436C81h; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00426C2C push 00426C58h; ret

            Hooking and other Techniques for Hiding and Protection:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000000.00000003.647244035.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648524337.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648667636.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648893530.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647868794.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648751901.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648917284.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648176949.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648860307.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647426858.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647623145.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.649011597.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647521163.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.649003327.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647703250.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1020935253.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.678292603.0000000008010000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648956787.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648265573.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648974202.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647795143.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647330409.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647948135.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648938200.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648374581.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648323443.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648615088.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648037894.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648828511.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648478035.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648792520.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648104820.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648425491.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648990980.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 3848, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 6480, type: MEMORY
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_004420C8 PostMessageA,PostMessageA,SendMessageA,GetProcAddress,GetLastError,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00458504 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_004427E8 IsIconic,SetActiveWindow,IsWindowEnabled,SetWindowPos,NtdllDefWindowProc_A,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00442898 IsIconic,SetActiveWindow,IsWindowEnabled,NtdllDefWindowProc_A,SetWindowPos,SetFocus,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_0043F0F0 SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_0045732C IsIconic,GetCapture,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00457BE0 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00423E14 IsIconic,GetWindowPlacement,GetWindowRect,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00426E24 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
            Source: C:\Windows\System32\loaddll32.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
            Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\loaddll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX

            Malware Analysis System Evasion:

            barindex
            Contains functionality to detect sleep reduction / modificationsShow sources
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00436AB0
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetCurrentThreadId,GetCursorPos,WaitForSingleObject,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00436AB0
            Source: C:\Windows\System32\loaddll32.exeLast function: Thread delayed
            Source: C:\Windows\System32\loaddll32.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00404FF4 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_0041E244 GetSystemInfo,
            Source: WerFault.exe, 00000004.00000002.668278273.0000000004EF0000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
            Source: WerFault.exe, 00000004.00000002.668258285.0000000004CF0000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
            Source: WerFault.exe, 00000004.00000002.668258285.0000000004CF0000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW)
            Source: WerFault.exe, 00000004.00000002.668278273.0000000004EF0000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
            Source: WerFault.exe, 00000004.00000002.668278273.0000000004EF0000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
            Source: WerFault.exe, 00000004.00000002.668278273.0000000004EF0000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPort
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_035A193B StrTrimA,lstrlen,wsprintfA,LdrInitializeThunk,LdrInitializeThunk,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00426E24 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,
            Source: C:\Windows\System32\loaddll32.exeMemory protected: page write copy | page execute | page execute read | page execute and read and write | page guard
            Source: loaddll32.exe, 00000000.00000002.1014171378.0000000000E40000.00000002.00000001.sdmpBinary or memory string: Program Manager
            Source: loaddll32.exe, 00000000.00000002.1014171378.0000000000E40000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: loaddll32.exe, 00000000.00000002.1014171378.0000000000E40000.00000002.00000001.sdmpBinary or memory string: Progman
            Source: loaddll32.exe, 00000000.00000002.1014171378.0000000000E40000.00000002.00000001.sdmpBinary or memory string: Progmanlock
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_035A212D cpuid
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,GetACP,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,GetSystemDefaultUILanguage,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_00409934 GetLocalTime,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 1_2_0045D200 GetVersion,
            Source: C:\Windows\System32\loaddll32.exeWMI Queries: IWbemServices::ExecQuery - root\securitycenter2 : select * from antispywareproduct

            Stealing of Sensitive Information:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000000.00000003.647244035.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648524337.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648667636.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648893530.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647868794.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648751901.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648917284.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648176949.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648860307.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647426858.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647623145.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.649011597.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647521163.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.649003327.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647703250.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1020935253.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.678292603.0000000008010000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648956787.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648265573.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648974202.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647795143.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647330409.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647948135.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648938200.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648374581.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648323443.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648615088.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648037894.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648828511.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648478035.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648792520.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648104820.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648425491.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648990980.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 3848, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 6480, type: MEMORY

            Remote Access Functionality:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000000.00000003.647244035.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648524337.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648667636.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648893530.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647868794.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648751901.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648917284.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648176949.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648860307.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647426858.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647623145.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.649011597.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647521163.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.649003327.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647703250.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1020935253.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.678292603.0000000008010000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648956787.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648265573.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648974202.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647795143.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647330409.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.647948135.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648938200.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648374581.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648323443.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648615088.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648037894.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648828511.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648478035.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648792520.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648104820.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648425491.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000003.648990980.0000000005360000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 3848, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: loaddll32.exe PID: 6480, type: MEMORY

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management Instrumentation211Application Shimming1Application Shimming1Disable or Modify Tools1Input Capture11System Time Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsNative API1Boot or Logon Initialization ScriptsProcess Injection2Deobfuscate/Decode Files or Information1LSASS MemoryFile and Directory Discovery2Remote Desktop ProtocolScreen Capture1Exfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information2Security Account ManagerSystem Information Discovery26SMB/Windows Admin SharesInput Capture11Automated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Software Packing1NTDSQuery Registry1Distributed Component Object ModelClipboard Data3Scheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptMasquerading1LSA SecretsSecurity Software Discovery141SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonVirtualization/Sandbox Evasion1Cached Domain CredentialsVirtualization/Sandbox Evasion1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection2DCSyncProcess Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobRundll321Proc FilesystemApplication Window Discovery11Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowRemote System Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 349160 Sample: ioir.png.dll Startdate: 05/02/2021 Architecture: WINDOWS Score: 68 24 Multi AV Scanner detection for submitted file 2->24 26 Yara detected  Ursnif 2->26 7 loaddll32.exe 1 2->7         started        10 iexplore.exe 1 76 2->10         started        process3 signatures4 28 Writes or reads registry keys via WMI 7->28 30 Writes registry values via WMI 7->30 12 rundll32.exe 7->12         started        15 iexplore.exe 26 10->15         started        18 iexplore.exe 22 10->18         started        process5 dnsIp6 32 Contains functionality to detect sleep reduction / modifications 12->32 20 WerFault.exe 23 9 12->20         started        22 topitophug.xyz 45.133.216.103, 443, 49744, 49745 CLOUDSOLUTIONSRU Russian Federation 15->22 signatures7 process8

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            ioir.png.dll42%VirustotalBrowse
            ioir.png.dll41%ReversingLabsWin32.Trojan.Graftor

            Dropped Files

            No Antivirus matches

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            0.2.loaddll32.exe.22d0174.3.unpack100%AviraTR/Kazy.4159236Download File
            0.2.loaddll32.exe.2790000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            1.2.rundll32.exe.3540000.5.unpack100%AviraTR/Patched.Ren.GenDownload File
            1.2.rundll32.exe.3550000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            0.2.loaddll32.exe.7a0000.0.unpack100%AviraHEUR/AGEN.1108767Download File
            1.2.rundll32.exe.3530174.4.unpack100%AviraTR/Kazy.4159236Download File
            1.2.rundll32.exe.400000.0.unpack100%AviraHEUR/AGEN.1108767Download File
            0.2.loaddll32.exe.2430000.4.unpack100%AviraTR/Patched.Ren.GenDownload File

            Domains

            No Antivirus matches

            URLs

            SourceDetectionScannerLabelLink
            http://www.wikipedia.com/0%URL Reputationsafe
            http://www.wikipedia.com/0%URL Reputationsafe
            http://www.wikipedia.com/0%URL Reputationsafe
            https://topitophug.xyz0%Avira URL Cloudsafe
            https://topitophug.xyz/index.htm/index.htm0%Avira URL Cloudsafe
            http://%s=%s&file://&os=%u.%u_%u_%u_x%uindex.html;0%Avira URL Cloudsafe
            https://topitophug.xyz/index.htm0%Avira URL Cloudsafe
            https://topitophug.xyz/index.htmRoot0%Avira URL Cloudsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            topitophug.xyz
            45.133.216.103
            truefalse
              unknown

              URLs from Memory and Binaries

              NameSourceMaliciousAntivirus DetectionReputation
              http://www.wikipedia.com/msapplication.xml6.8.drfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://www.amazon.com/msapplication.xml.8.drfalse
                high
                http://www.nytimes.com/msapplication.xml3.8.drfalse
                  high
                  http://www.live.com/msapplication.xml2.8.drfalse
                    high
                    https://topitophug.xyzloaddll32.exefalse
                    • Avira URL Cloud: safe
                    unknown
                    https://topitophug.xyz/index.htm/index.htm{FC8A972A-67BB-11EB-90EB-ECF4BBEA1588}.dat.8.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.reddit.com/msapplication.xml4.8.drfalse
                      high
                      http://www.twitter.com/msapplication.xml5.8.drfalse
                        high
                        http://%s=%s&file://&os=%u.%u_%u_%u_x%uindex.html;loaddll32.exe, 00000000.00000003.648524337.0000000005360000.00000004.00000040.sdmp, rundll32.exe, 00000001.00000002.678292603.0000000008010000.00000004.00000040.sdmpfalse
                        • Avira URL Cloud: safe
                        low
                        https://topitophug.xyz/index.htmloaddll32.exe, 00000000.00000002.1020935253.0000000005360000.00000004.00000040.sdmp, ~DFF728301785477207.TMP.8.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.youtube.com/msapplication.xml7.8.drfalse
                          high
                          https://topitophug.xyz/index.htmRoot{FC8A972A-67BB-11EB-90EB-ECF4BBEA1588}.dat.8.drfalse
                          • Avira URL Cloud: safe
                          unknown

                          Contacted IPs

                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs

                          Public

                          IPDomainCountryFlagASNASN NameMalicious
                          45.133.216.103
                          unknownRussian Federation
                          202933CLOUDSOLUTIONSRUfalse

                          General Information

                          Joe Sandbox Version:31.0.0 Emerald
                          Analysis ID:349160
                          Start date:05.02.2021
                          Start time:15:10:14
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 8m 38s
                          Hypervisor based Inspection enabled:false
                          Report type:light
                          Sample file name:ioir.png.dll
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:27
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal68.troj.evad.winDLL@9/19@2/1
                          EGA Information:Failed
                          HDC Information:
                          • Successful, ratio: 21.7% (good quality ratio 21.2%)
                          • Quality average: 80.7%
                          • Quality standard deviation: 22.7%
                          HCA Information:
                          • Successful, ratio: 52%
                          • Number of executed functions: 0
                          • Number of non-executed functions: 0
                          Cookbook Comments:
                          • Adjust boot time
                          • Enable AMSI
                          • Found application associated with file extension: .dll
                          Warnings:
                          Show All
                          • Exclude process from analysis (whitelisted): taskhostw.exe, BackgroundTransferHost.exe, WerFault.exe, ielowutil.exe, backgroundTaskHost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                          • Excluded IPs from analysis (whitelisted): 168.61.161.212, 52.147.198.201, 88.221.62.148, 13.64.90.137, 51.104.139.180, 92.122.213.194, 92.122.213.247, 152.199.19.161, 52.155.217.156, 20.54.26.129
                          • Excluded domains from analysis (whitelisted): displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, skypedataprdcolwus17.cloudapp.net, arc.msn.com.nsatc.net, ie9comview.vo.msecnd.net, db3p-ris-pf-prod-atm.trafficmanager.net, displaycatalog.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, skypedataprdcolcus17.cloudapp.net, a1449.dscg2.akamai.net, arc.msn.com, skypedataprdcoleus16.cloudapp.net, e11290.dspg.akamaiedge.net, iecvlist.microsoft.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, ris.api.iris.microsoft.com, go.microsoft.com, blobcollector.events.data.trafficmanager.net, go.microsoft.com.edgekey.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, cs9.wpc.v0cdn.net
                          • Report size getting too big, too many NtOpenKeyEx calls found.

                          Simulations

                          Behavior and APIs

                          TimeTypeDescription
                          15:11:11API Interceptor1x Sleep call for process: WerFault.exe modified

                          Joe Sandbox View / Context

                          IPs

                          No context

                          Domains

                          No context

                          ASN

                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          CLOUDSOLUTIONSRUfacts-02.21.docGet hashmaliciousBrowse
                          • 45.133.216.231
                          facts-02.21.docGet hashmaliciousBrowse
                          • 45.133.216.231
                          facts-02.21.docGet hashmaliciousBrowse
                          • 45.133.216.231
                          decree.01.21.docGet hashmaliciousBrowse
                          • 45.133.216.85
                          decree.01.21.docGet hashmaliciousBrowse
                          • 45.133.216.85
                          decree.01.21.docGet hashmaliciousBrowse
                          • 45.133.216.85
                          require 02.21.docGet hashmaliciousBrowse
                          • 45.133.216.231
                          require 02.21.docGet hashmaliciousBrowse
                          • 45.133.216.231
                          require 02.21.docGet hashmaliciousBrowse
                          • 45.133.216.231
                          files 02.21.docGet hashmaliciousBrowse
                          • 45.133.216.231
                          files 02.21.docGet hashmaliciousBrowse
                          • 45.133.216.231
                          files 02.21.docGet hashmaliciousBrowse
                          • 45.133.216.231
                          statistics_02.01.2021.docGet hashmaliciousBrowse
                          • 45.133.216.232
                          statistics_02.01.2021.docGet hashmaliciousBrowse
                          • 45.133.216.232
                          statistics_02.01.2021.docGet hashmaliciousBrowse
                          • 45.133.216.232
                          document,01.21.docGet hashmaliciousBrowse
                          • 45.133.216.55
                          document,01.21.docGet hashmaliciousBrowse
                          • 45.133.216.55
                          document,01.21.docGet hashmaliciousBrowse
                          • 45.133.216.55
                          particulars_01.21.docGet hashmaliciousBrowse
                          • 45.133.216.55
                          enjoin-01.26.2021.docGet hashmaliciousBrowse
                          • 45.133.216.55

                          JA3 Fingerprints

                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          9e10692f1b7f78228b2d4e424db3a98cumAuo1QklZ.dllGet hashmaliciousBrowse
                          • 45.133.216.103
                          PO_2856_from_Giancarlo_Distributing_Inc.htmGet hashmaliciousBrowse
                          • 45.133.216.103
                          B33383838558-857585.htmGet hashmaliciousBrowse
                          • 45.133.216.103
                          #U260e#Ufe0fmsg0100February_report_2021.HTMGet hashmaliciousBrowse
                          • 45.133.216.103
                          5aa085f0fa8592460e391052db9c94cd.exeGet hashmaliciousBrowse
                          • 45.133.216.103
                          ace80239facd926583cb2f9ceb84bb9c.exeGet hashmaliciousBrowse
                          • 45.133.216.103
                          wys-02-03-21 Statement_763108aGF5ZGVuag==.htmGet hashmaliciousBrowse
                          • 45.133.216.103
                          A6C8E866.xlsxGet hashmaliciousBrowse
                          • 45.133.216.103
                          Maersk_BL Draft_copy_Shipping_documents.htmlGet hashmaliciousBrowse
                          • 45.133.216.103
                          POrder.htmlGet hashmaliciousBrowse
                          • 45.133.216.103
                          CONSTANTINE.xlsxGet hashmaliciousBrowse
                          • 45.133.216.103
                          Document0098.htmlGet hashmaliciousBrowse
                          • 45.133.216.103
                          #U266b Audio_47720.wavv - - Copy.htmGet hashmaliciousBrowse
                          • 45.133.216.103
                          d0b443110cf5a7bd05759c00fee8fdad.exeGet hashmaliciousBrowse
                          • 45.133.216.103
                          univarusa-02-02-21 Statement_367096cmFuZHkuZnJpZWRsZXk=.htmGet hashmaliciousBrowse
                          • 45.133.216.103
                          univarsolutions-01-02-21 Statement_607376Y2lhcmFuLmJyYW5pZmY=.htmGet hashmaliciousBrowse
                          • 45.133.216.103
                          normaagu@herbalife.com.htmGet hashmaliciousBrowse
                          • 45.133.216.103
                          CSWWOe1Gnx.htmlGet hashmaliciousBrowse
                          • 45.133.216.103
                          ATROIGDFVX.htmGet hashmaliciousBrowse
                          • 45.133.216.103
                          VM859-7757.htmGet hashmaliciousBrowse
                          • 45.133.216.103

                          Dropped Files

                          No context

                          Created / dropped Files

                          C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_rundll32.exe_db99bffafeba5bc19edb8917aba4cdaba066d_82810a17_18f30ba1\Report.wer
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):13306
                          Entropy (8bit):3.7712108697295097
                          Encrypted:false
                          SSDEEP:192:Bdie0oX5aoHBUZMX4jed+GbfY/u7sXS274ItWcD:bioXEQBUZMX4jeQ/u7sXX4ItWcD
                          MD5:463C84121A048AD2BA765E6FCB8865BC
                          SHA1:0C05AC19A543BD8FFA7B1805665CE9355FCDA851
                          SHA-256:EE13D7B66DC61E8A56A3BAD31BB9886CB23AB1FB397A373B0F71777A7922142C
                          SHA-512:6C0684501DCACB2E3953AE3A54A8E819E4DFF9F9FDE6806D541CB4ACC4FAF3CB10716DE2C27B1D99F7E3D576A0A37D1705D7563BC56A4C9FF66F9C4BB075BBC3
                          Malicious:false
                          Reputation:low
                          Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.5.7.0.0.7.8.6.5.4.6.6.8.5.2.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.5.7.0.0.7.8.6.9.8.2.6.2.3.5.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.2.6.8.4.3.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.b.0.2.9.2.f.5.-.e.4.b.a.-.4.8.6.e.-.b.f.e.0.-.2.4.f.e.2.1.a.f.0.2.4.2.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.d.f.5.7.f.9.f.-.7.3.6.a.-.4.5.c.0.-.b.9.2.0.-.c.b.0.0.d.c.8.7.1.2.2.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.f.0.8.-.0.0.0.1.-.0.0.1.b.-.f.1.c.c.-.c.5.b.b.c.8.f.b.d.6.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.
                          C:\ProgramData\Microsoft\Windows\WER\Temp\WERF3C4.tmp.dmp
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:Mini DuMP crash report, 14 streams, Fri Feb 5 14:11:07 2021, 0x1205a4 type
                          Category:dropped
                          Size (bytes):48792
                          Entropy (8bit):2.1558382421313653
                          Encrypted:false
                          SSDEEP:192:iowXW8tpYtIAKw+OHRiMMC+n2V77O9T4teM9YaEsJI1iJnDmSBF:MXW8tpY7XdiMFb9w4teEYzsJVq8F
                          MD5:D538781FC8355DF6F2667C82DE023F70
                          SHA1:ED3A12ABADA87B9512C258D0BD73FA024E6B52E1
                          SHA-256:13118910E6B24D2D3244B76EC5543912ADC6D7FA9BABC45C849516608E31994E
                          SHA-512:8FBD9221B6BCD07BFE27E3304F89958027BE31C7B1E91C438608F4A4FD62BDBA04D77B2449EDA3B77240C479AFDE8937A743E92B339086E31F13BF10816D7612
                          Malicious:false
                          Reputation:low
                          Preview: MDMP....... ........Q.`...................U...........B.......!......GenuineIntelW...........T............Q.`.............................0..1...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
                          C:\ProgramData\Microsoft\Windows\WER\Temp\WERFA9B.tmp.WERInternalMetadata.xml
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):8330
                          Entropy (8bit):3.7035645163569257
                          Encrypted:false
                          SSDEEP:192:Rrl7r3GLNiaG6h6Ygd6cIMgmfTjSx+prw89b4b+sf5ejm:RrlsNir6h6Yq6ggmfTjS44b9f86
                          MD5:B7DA6E395939A41BFE50A321C6D323DC
                          SHA1:173E5842A3201431E9740B084F5DB43B30EDC59B
                          SHA-256:68CBCC78BF4202BC2F6A4D1EB517525F6186F5EF5E6403640D9DDEB4B5348011
                          SHA-512:F22C4A66A03EB697FE1B4A51A0F96EE1CDCE004BFAADB6C5285CEDAC0C4E435833FCD72F1F6293F30495E4BB9BB6928FA6284134A04E747500F02E27F966ACCA
                          Malicious:false
                          Reputation:low
                          Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.8.4.8.<./.P.i.d.>.......
                          C:\ProgramData\Microsoft\Windows\WER\Temp\WERFD2C.tmp.xml
                          Process:C:\Windows\SysWOW64\WerFault.exe
                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):4669
                          Entropy (8bit):4.500792046521803
                          Encrypted:false
                          SSDEEP:48:cvIwSD8zscJgtWI968WSC8B88fm8M4JCdsjZFT+q8/Oz44SrSkd:uITfa91SNvJ1/54DWkd
                          MD5:513D059A55EF614427FDC28717F581FB
                          SHA1:1A0F3336B77A7FF565C088BB040F5EE0C5674C6B
                          SHA-256:DA3C44AD49F98340DBF30FE2FD22514889BC0144D7369F132EF3A3A073F3228F
                          SHA-512:FB88AD7652000F59D2C891864E9F98525D7A9C99A199FE897467D5FCF83348E0E152FAB9A9374F0FEF06130E65A7B001B2AA876BDFFF0D01C0F3A4FBC33A4263
                          Malicious:false
                          Reputation:low
                          Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="848121" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                          C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{FC8A9728-67BB-11EB-90EB-ECF4BBEA1588}.dat
                          Process:C:\Program Files\internet explorer\iexplore.exe
                          File Type:Microsoft Word Document
                          Category:dropped
                          Size (bytes):41560
                          Entropy (8bit):1.9329562369765705
                          Encrypted:false
                          SSDEEP:384:rFskBUzInE8/7E2DQeoBUoIEABmPP3Gem:fE8jE2DQpBHIfBSPWem
                          MD5:59DFE51ACAC3DC82DE1F9E9FF0F1A687
                          SHA1:E94CBCF03C7EE483A5ABF8006763E8E558C0EE74
                          SHA-256:0A086E3BE77A657EFF1205D166F1659D38FA15A4390BBBAECCC6E77AF6D77F23
                          SHA-512:EBE4D91785442F032E4A2EAF15F9FE9A0ED63DC7F5D049416FF702EA42CF9D8450C7A07ADA9F68C7CEBDB940DA80202654B52AF5FA476E3006626070DDC573B9
                          Malicious:false
                          Reputation:low
                          Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{4C399E10-67BC-11EB-90EB-ECF4BBEA1588}.dat
                          Process:C:\Program Files\internet explorer\iexplore.exe
                          File Type:Microsoft Word Document
                          Category:dropped
                          Size (bytes):16984
                          Entropy (8bit):1.5754992114408473
                          Encrypted:false
                          SSDEEP:48:IwdGcprUGwpaaG4pQO7GrapbS0xrGQpB9sGHHpcksTGUpG:rDZsQa6OvBSYFjJ2kkA
                          MD5:9D4D9A4FF0756DA534B51497A1D1719B
                          SHA1:74AE037703FEAEB0DB156F7256EDEBB0058E4109
                          SHA-256:B89D970145E20B222A87A08B0CEC456D0308D5A0D74F8EB0B0FFCFB3A89571D6
                          SHA-512:D4DA58D8A400ECC64D0CA61FA284B8C7D3C344279927C8D6F42B20A0838B473E385FA619FE21CA4F69E98808A1946D1E476F129C93AAE13A4FB2FAB951117C85
                          Malicious:false
                          Reputation:low
                          Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{FC8A972A-67BB-11EB-90EB-ECF4BBEA1588}.dat
                          Process:C:\Program Files\internet explorer\iexplore.exe
                          File Type:Microsoft Word Document
                          Category:dropped
                          Size (bytes):26256
                          Entropy (8bit):1.6642506081018853
                          Encrypted:false
                          SSDEEP:48:IwrGcprq7GwpaGG4pQuGrapbSKrGQpBKGHHpcRsTGUp83GzYpmLEYGop2JnOGiXD:rxZmQ26gBSKFjR2RkW1MYY8ilaRA
                          MD5:7D46C19E4F6FB8B0F672D771F9DEBB3D
                          SHA1:F1EA00C6ABB0C8A54D29FA6CD334B395DD780497
                          SHA-256:35CE987AF57E0B56BE1D1EABDA3EDF343CEDDD15461AFD47E5B0B88C37BBCAE1
                          SHA-512:C41B0DB9B9AA6B1520F7ADCE787DE17ED503BD273E4BC44C2151ADD92DC3A9F6674FDA6E30743918724DC8AEED2A1A261753C709D035FA23DE926B87A39B5660
                          Malicious:false
                          Reputation:low
                          Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-17529550060\msapplication.xml
                          Process:C:\Program Files\internet explorer\iexplore.exe
                          File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                          Category:dropped
                          Size (bytes):656
                          Entropy (8bit):5.062751518107858
                          Encrypted:false
                          SSDEEP:12:TMHdNMNxOEn1nWimI002EtM3MHdNMNxOEn1nWimI00OYGVbkEtMb:2d6NxOG1SZHKd6NxOG1SZ7YLb
                          MD5:0CCC032CF24BAECD02966BFA35CFEC9A
                          SHA1:D3DC1764ED72EEA6BBEC006A37C6391178AC4F9D
                          SHA-256:CEC3931C2D9ABA751D0A659645012AA0EB397B6B68A1C1904A9D59037598B404
                          SHA-512:B7488364AE0E6782F8D657717FD2BBFB6BC33902DA489A9C9A4630028BEE616F09E03E2359CBC4E823560361A676A05FCA4195928C4A91B8E53EE4E6428FAE1C
                          Malicious:false
                          Reputation:low
                          Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x19c13ca7,0x01d6fbc9</date><accdate>0x19c13ca7,0x01d6fbc9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x19c13ca7,0x01d6fbc9</date><accdate>0x19c13ca7,0x01d6fbc9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig>..
                          C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18270793970\msapplication.xml
                          Process:C:\Program Files\internet explorer\iexplore.exe
                          File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                          Category:dropped
                          Size (bytes):653
                          Entropy (8bit):5.118031973224068
                          Encrypted:false
                          SSDEEP:12:TMHdNMNxe2kYCXYDzCXYWnWimI002EtM3MHdNMNxe2kYCXYDzCXYWnWimI00OYGv:2d6NxrZDtWSZHKd6NxrZDtWSZ7Yza7b
                          MD5:91823A87212DABC8ED12F03532097F23
                          SHA1:E45CBC26A1C8F98D1734D1570EADEE978F96781A
                          SHA-256:5081C81723D6ED587C4F09DB8A51E0C1DC773C3CF92E5AE340B9A8A0E5251A09
                          SHA-512:D2A1BFB277428BA930269A15D0BE73D99A0E7F3A37CD6F52D5274B30998EF3198F6E48623C8AFC0E9F937E820CA4564DB9BC6CF6B24E9BE8585B85736C708B2F
                          Malicious:false
                          Reputation:low
                          Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0x19b7b33d,0x01d6fbc9</date><accdate>0x19b7b33d,0x01d6fbc9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0x19b7b33d,0x01d6fbc9</date><accdate>0x19b7b33d,0x01d6fbc9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Amazon.url"/></tile></msapplication></browserconfig>..
                          C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-21706820\msapplication.xml
                          Process:C:\Program Files\internet explorer\iexplore.exe
                          File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                          Category:dropped
                          Size (bytes):662
                          Entropy (8bit):5.084621789248435
                          Encrypted:false
                          SSDEEP:12:TMHdNMNxvLn1nWimI002EtM3MHdNMNxvLnLU4nWimI00OYGmZEtMb:2d6Nxvj1SZHKd6NxvjTSZ7Yjb
                          MD5:19E534F010FE9794ABAA6FD8A5D7821C
                          SHA1:1CCC1A92A4636F9B06D0B28AC2CF2A7786BC6EB5
                          SHA-256:4FC3DF159DC956A9DADB427E743EBFB4A3466FB616E0C47A74326757615A9424
                          SHA-512:638DF1AC70867B83EC233B989790B6AD9F8B914696C53202DBF86A206FEBD00FE99AADACDBF5DA93B959907263C069DAFE26F6FDB9EBA0FFFD234228D46E4859
                          Malicious:false
                          Reputation:low
                          Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0x19c13ca7,0x01d6fbc9</date><accdate>0x19c13ca7,0x01d6fbc9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0x19c13ca7,0x01d6fbc9</date><accdate>0x19c39f10,0x01d6fbc9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Wikipedia.url"/></tile></msapplication></browserconfig>..
                          C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml
                          Process:C:\Program Files\internet explorer\iexplore.exe
                          File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                          Category:dropped
                          Size (bytes):647
                          Entropy (8bit):5.059389646415428
                          Encrypted:false
                          SSDEEP:12:TMHdNMNxiYlXgzlXPnWimI002EtM3MHdNMNxiYlXgzlXPnWimI00OYGd5EtMb:2d6Nx8xSZHKd6Nx8xSZ7YEjb
                          MD5:B6FA3DCE091C867063EF32063AE6B81A
                          SHA1:D3195C1E01BB1972530342F0D52B9BCBAA6E7B2F
                          SHA-256:DD68DE3424C37828039DADA7C67D4ECA2A8A3737CC0133B5B75E3D7555695B2A
                          SHA-512:770ECC43E6AC205086D783C4D188CB18AA3DA1330FF7B8D5D3517B5F0F6D704DB95C0670D09982F366357F7C69C471863416B9AC20E00FF8F1398544EA430A7C
                          Malicious:false
                          Reputation:low
                          Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0x19bedace,0x01d6fbc9</date><accdate>0x19bedace,0x01d6fbc9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0x19bedace,0x01d6fbc9</date><accdate>0x19bedace,0x01d6fbc9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Live.url"/></tile></msapplication></browserconfig>..
                          C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6757900\msapplication.xml
                          Process:C:\Program Files\internet explorer\iexplore.exe
                          File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                          Category:dropped
                          Size (bytes):656
                          Entropy (8bit):5.09564550749467
                          Encrypted:false
                          SSDEEP:12:TMHdNMNxhGwuURLU4nWimI002EtM3MHdNMNxhGwuURLU4nWimI00OYG8K075EtMb:2d6NxQETSZHKd6NxQETSZ7YrKajb
                          MD5:9094C1234D482B9A1915A49405753F96
                          SHA1:0C709B00AFD7AA6894765AFE0AF46DA00F5F3469
                          SHA-256:6894497DA11891747996D117ABE91AE6B019DDDAC013B35922D10D81724143A1
                          SHA-512:A9FB71A71B8F649D2684A74091FC1631EF6A463D9AEF74410009B8D1CABE8AF10A85499C63363F09200455ED31D47CA446D9B0CFA8497CCE88ECB224535C29C2
                          Malicious:false
                          Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x19c39f10,0x01d6fbc9</date><accdate>0x19c39f10,0x01d6fbc9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x19c39f10,0x01d6fbc9</date><accdate>0x19c39f10,0x01d6fbc9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig>..
                          C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8760897390\msapplication.xml
                          Process:C:\Program Files\internet explorer\iexplore.exe
                          File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                          Category:dropped
                          Size (bytes):653
                          Entropy (8bit):5.045598941850099
                          Encrypted:false
                          SSDEEP:12:TMHdNMNx0nYlXgzlXPnWimI002EtM3MHdNMNx0nYlXgzlXPnWimI00OYGxEtMb:2d6Nx07xSZHKd6Nx07xSZ7Ygb
                          MD5:01E3BA054B9DF29082673F4498AA3ACC
                          SHA1:A9484E7746BB7DB069286B2E1016079E091C11D9
                          SHA-256:6AE9E4CE2A51C5B2FB6A33D82BD12A2329F54131ECD6C139855E6B2E0A3CF394
                          SHA-512:B98579B114028226833747A26AEA6D0CD129F5B99F49B1069DF737D8C68D10D917C44ECC0816ECA7A70CFF6C50EC14A419418E4946BB0108A07681A8AC2F7228
                          Malicious:false
                          Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0x19bedace,0x01d6fbc9</date><accdate>0x19bedace,0x01d6fbc9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0x19bedace,0x01d6fbc9</date><accdate>0x19bedace,0x01d6fbc9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Reddit.url"/></tile></msapplication></browserconfig>..
                          C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml
                          Process:C:\Program Files\internet explorer\iexplore.exe
                          File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                          Category:dropped
                          Size (bytes):656
                          Entropy (8bit):5.084248903694253
                          Encrypted:false
                          SSDEEP:12:TMHdNMNxxYlXgzlXPnWimI002EtM3MHdNMNxxYlXgzlXPnWimI00OYG6Kq5EtMb:2d6NxRxSZHKd6NxRxSZ7Yhb
                          MD5:B01C83D16D93DCF4CC58D190AAB45BB3
                          SHA1:7472205652B35EE44052FD23EC5C329496D515D5
                          SHA-256:AF1B635295959D24E3048A6043B73E9C591B8A6EA0F7B9CD0C82BBE55D731B67
                          SHA-512:58B6C044FA1C54BC371CB6752324626B254EAF4D5A0379ECD27AB5C6EC7BC7C4487AD104F1104DA218BBDFEF6D1ECD3EAD062A8ACC14A79C82BB0DC9FAA2F6B9
                          Malicious:false
                          Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0x19bedace,0x01d6fbc9</date><accdate>0x19bedace,0x01d6fbc9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0x19bedace,0x01d6fbc9</date><accdate>0x19bedace,0x01d6fbc9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\NYTimes.url"/></tile></msapplication></browserconfig>..
                          C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20332743330\msapplication.xml
                          Process:C:\Program Files\internet explorer\iexplore.exe
                          File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                          Category:dropped
                          Size (bytes):659
                          Entropy (8bit):5.111048257686321
                          Encrypted:false
                          SSDEEP:12:TMHdNMNxcYob+Dzob+WnWimI002EtM3MHdNMNxcYob+Dzob+WnWimI00OYGVEtMb:2d6NxG+DS+WSZHKd6NxG+DS+WSZ7Ykb
                          MD5:62FB4B45E2A3F029386C247BB8A2BA84
                          SHA1:2D90B6B731A8D7F5D08B2E152955B202AC5C13E8
                          SHA-256:207C81BAAB28B99E67D162EFCA4D25FEC95D75DED2D73C399E325F3B47E1BF68
                          SHA-512:E443B7E77A6DA96944AC1235F3FB5D3907163258BBC56C25287EF1E3ACE5A759560FF9638362F5D2A846F00FF0C9CE7FA80F0C5C4FFB4D81F3E75A9F954BF1C7
                          Malicious:false
                          Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x19bc77f4,0x01d6fbc9</date><accdate>0x19bc77f4,0x01d6fbc9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x19bc77f4,0x01d6fbc9</date><accdate>0x19bc77f4,0x01d6fbc9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig>..
                          C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin8215062560\msapplication.xml
                          Process:C:\Program Files\internet explorer\iexplore.exe
                          File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                          Category:dropped
                          Size (bytes):653
                          Entropy (8bit):5.100493240268499
                          Encrypted:false
                          SSDEEP:12:TMHdNMNxfnYob+Dzob+WnWimI002EtM3MHdNMNxfnYob+Dzob+WnWimI00OYGe5t:2d6NxZ+DS+WSZHKd6NxZ+DS+WSZ7YLjb
                          MD5:096B29C7136E02A5D60FDB8C68E4FCD8
                          SHA1:B2E0EECDFC77383B8EBF414EC8EE9505B5D2CFD4
                          SHA-256:EB5DC9F9660BECE895A734CDE556A1F300193F3C12D88FE59E5E1B67DA85B902
                          SHA-512:4280346D4A6C326A34C456CB6ECE4FB6CFD98B6DA6E9F048ECB0C6B152B5FB40CD359A42B4146C42DD067CB9040BFAD04CF6158FBC1DDB1834FA6329D89511EE
                          Malicious:false
                          Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0x19bc77f4,0x01d6fbc9</date><accdate>0x19bc77f4,0x01d6fbc9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0x19bc77f4,0x01d6fbc9</date><accdate>0x19bc77f4,0x01d6fbc9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Google.url"/></tile></msapplication></browserconfig>..
                          C:\Users\user\AppData\Local\Temp\~DFD3E7BA36C3F7FAA9.TMP
                          Process:C:\Program Files\internet explorer\iexplore.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):13061
                          Entropy (8bit):0.4896474116676091
                          Encrypted:false
                          SSDEEP:24:c9lLh9lLh9lIn9lIn9loT9loT9lW8J+9ndGn:kBqoIUK8odGn
                          MD5:95F888571CBFF9AB4950C0CE17A96C51
                          SHA1:C78811B36C3C587978ABCE82849C01B3BA4E035E
                          SHA-256:1AA2855877AFCDB15C440ED93AA9F6D222BD012EE47DE695D6E1470D588D8408
                          SHA-512:FAEB37A77D46F91F1A81841D44E493D909C1115DFFF6C8ACD27BA3A4DDE62D199528DE13567C26CAC18B435B4597C488E9D5789E1A9AECEC36A8CE327AD436C4
                          Malicious:false
                          Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          C:\Users\user\AppData\Local\Temp\~DFE7AA1257DA4DC091.TMP
                          Process:C:\Program Files\internet explorer\iexplore.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):25657
                          Entropy (8bit):0.31361137561153196
                          Encrypted:false
                          SSDEEP:24:c9lLh9lLh9lIn9lIn9lRg9lRA9lTS9lTy9lSSd9lSSd9lw9X9lw9Q69l29jy:kBqoxKAuvScS+yU4
                          MD5:8D816B7B983F961ED3B9B509F017ED35
                          SHA1:47A27C40157765E957C7E28139AF670C88F3BBDD
                          SHA-256:50DB79CA883007EF294A69CC8D8E25B3DA50B81AFCD2F48531A3C0A2BF8E601F
                          SHA-512:614FE9933ADDE0CAFC6891729C2934A9184468E66210CBEEB640E517B3FC92D73E8A607A27B91FB45A8053F6DB7D29E3676163BFA856D2841DA6BD15B137A4A8
                          Malicious:false
                          Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          C:\Users\user\AppData\Local\Temp\~DFF728301785477207.TMP
                          Process:C:\Program Files\internet explorer\iexplore.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):38753
                          Entropy (8bit):0.37411054473392363
                          Encrypted:false
                          SSDEEP:24:c9lLh9lLh9lIn9lIn9lRg9lRA9lTS9lTy9lSSd9lSSd9lwR9lwx9l2v9l2v9l/LK:kBqoxKAuvScS+CkuHLILIJnHJndJnu
                          MD5:7AF44FCAD565F54FD92AD64011D18442
                          SHA1:8A1946FA2C4C286A6E25F63308DEF800CBC48041
                          SHA-256:563E1D0C449298884934CD1CD244848E193C0FC36A549FE29B8C9E05C922E507
                          SHA-512:D3587D34852E34A8501B485B7FE5541C842E2F10580ED02573A44303531CC18A16332F3B7FE60CFBAC55288B505B612C7AFAD7D9BDC5B46F5BE9FFE289C4BE7F
                          Malicious:false
                          Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                          Static File Info

                          General

                          File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                          Entropy (8bit):6.763543992410411
                          TrID:
                          • Win32 Dynamic Link Library (generic) (1002004/3) 97.97%
                          • Win32 Executable Delphi generic (14689/80) 1.44%
                          • Win16/32 Executable Delphi generic (2074/23) 0.20%
                          • Generic Win/DOS Executable (2004/3) 0.20%
                          • DOS Executable Generic (2002/1) 0.20%
                          File name:ioir.png.dll
                          File size:552448
                          MD5:d31c0491f522d6b9f2102109bd2420af
                          SHA1:dc1cccf0e43ec5a68326ae4faf1a8cbc5ac00708
                          SHA256:f7c79c0c3feb7c0032424f5f6a9bcdf78d1815ee53f807cc192c2c1f8f21270f
                          SHA512:48d659660654800da4eb3909a06572dfcf5f05ebdfb8629fafdfeab601673e3377d9a3a241f4bd36c3f4f912ac838dbc73926f734bfa8a76ec43fa726b28c3bd
                          SSDEEP:12288:XCY7z0vLfhyqJ0UYek/zLOmyK8rkApSc1jJFX:SWz09yqJ5Ye6PHuNScBJF
                          File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................

                          File Icon

                          Icon Hash:b99988fcd4f66e0f

                          Static PE Info

                          General

                          Entrypoint:0x46980c
                          Entrypoint Section:CODE
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, DLL, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI
                          DLL Characteristics:
                          Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:127ef7eee4def6f47e8e66d53f8ddc7c

                          Entrypoint Preview

                          Instruction
                          push ebp
                          mov ebp, esp
                          add esp, FFFFFFC4h
                          mov eax, 0046960Ch
                          call 00007FBA84DDB765h
                          xor ecx, ecx
                          mov dl, 01h
                          mov eax, dword ptr [00468FFCh]
                          call 00007FBA84E10F9Bh
                          mov dword ptr [0046CC30h], eax
                          mov eax, dword ptr [0046CC30h]
                          call 00007FBA84E152E4h
                          call 00007FBA84DD97E3h
                          mov eax, eax
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al

                          Data Directories

                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x6d0000x23e4.idata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x780000x13000.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x700000x7610.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                          Sections

                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          CODE0x10000x688400x68a00False0.523362828554data6.51070065198IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                          DATA0x6a0000x12d40x1400False0.433984375data4.02181905914IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                          BSS0x6c0000xc350x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                          .idata0x6d0000x23e40x2400False0.369357638889data5.03762629251IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                          .reloc0x700000x76100x7800False0.58466796875data6.61973320617IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                          .rsrc0x780000x130000x13000False0.732010690789data7.14558558427IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ

                          Resources

                          NameRVASizeTypeLanguageCountry
                          F10x78b680xd204dataEnglishUnited States
                          RT_CURSOR0x85d6c0x134data
                          RT_CURSOR0x85ea00x134data
                          RT_CURSOR0x85fd40x134data
                          RT_CURSOR0x861080x134data
                          RT_CURSOR0x8623c0x134data
                          RT_CURSOR0x863700x134data
                          RT_CURSOR0x864a40x134data
                          RT_BITMAP0x865d80x1d0data
                          RT_BITMAP0x867a80x1e4data
                          RT_BITMAP0x8698c0x1d0data
                          RT_BITMAP0x86b5c0x1d0data
                          RT_BITMAP0x86d2c0x1d0data
                          RT_BITMAP0x86efc0x1d0data
                          RT_BITMAP0x870cc0x1d0data
                          RT_BITMAP0x8729c0x1d0data
                          RT_BITMAP0x8746c0x1d0data
                          RT_BITMAP0x8763c0x1d0data
                          RT_BITMAP0x8780c0xe8GLS_BINARY_LSB_FIRST
                          RT_ICON0x878f40x2e8dBase IV DBT of @.DBF, block length 512, next free block index 40, next free block 49, next used block 48059RussianRussia
                          RT_DIALOG0x87bdc0x52data
                          RT_STRING0x87c300x224data
                          RT_STRING0x87e540x1ecdata
                          RT_STRING0x880400xecdata
                          RT_STRING0x8812c0x39cdata
                          RT_STRING0x884c80xecHitachi SH big-endian COFF object file, not stripped, 17664 sections, symbol offset=0x65007200, 83907328 symbols, optional header size 28672
                          RT_STRING0x885b40xf8data
                          RT_STRING0x886ac0x1a8data
                          RT_STRING0x888540x398data
                          RT_STRING0x88bec0x3e0data
                          RT_STRING0x88fcc0x3a8data
                          RT_STRING0x893740x418data
                          RT_STRING0x8978c0x234data
                          RT_STRING0x899c00xecdata
                          RT_STRING0x89aac0x1b4data
                          RT_STRING0x89c600x3e4data
                          RT_STRING0x8a0440x358data
                          RT_STRING0x8a39c0x2b4data
                          RT_RCDATA0x8a6500x10data
                          RT_RCDATA0x8a6600x288data
                          RT_RCDATA0x8a8e80x443Delphi compiled form 'TForm1'
                          RT_RCDATA0x8ad2c0xedDelphi compiled form 'TForm2'
                          RT_GROUP_CURSOR0x8ae1c0x14Lotus unknown worksheet or configuration, revision 0x1
                          RT_GROUP_CURSOR0x8ae300x14Lotus unknown worksheet or configuration, revision 0x1
                          RT_GROUP_CURSOR0x8ae440x14Lotus unknown worksheet or configuration, revision 0x1
                          RT_GROUP_CURSOR0x8ae580x14Lotus unknown worksheet or configuration, revision 0x1
                          RT_GROUP_CURSOR0x8ae6c0x14Lotus unknown worksheet or configuration, revision 0x1
                          RT_GROUP_CURSOR0x8ae800x14Lotus unknown worksheet or configuration, revision 0x1
                          RT_GROUP_CURSOR0x8ae940x14Lotus unknown worksheet or configuration, revision 0x1
                          RT_GROUP_ICON0x8aea80x14dataRussianRussia

                          Imports

                          DLLImport
                          kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetVersion, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle
                          user32.dllGetKeyboardType, LoadStringA, MessageBoxA, CharNextA
                          advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                          oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                          kernel32.dllTlsSetValue, TlsGetValue, TlsFree, TlsAlloc, LocalFree, LocalAlloc
                          advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                          kernel32.dlllstrcpyA, WriteFile, WaitForSingleObject, VirtualQuery, VirtualAlloc, Sleep, SizeofResource, SetThreadLocale, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResetEvent, ReadFile, MulDiv, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalUnlock, GlobalReAlloc, GlobalHandle, GlobalLock, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetVersionExA, GetVersion, GetTickCount, GetThreadLocale, GetSystemInfo, GetStringTypeExA, GetStdHandle, GetProfileStringA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentProcessId, GetCPInfo, GetACP, FreeResource, InterlockedExchange, FreeLibrary, FormatMessageA, FindResourceA, EnumCalendarInfoA, EnterCriticalSection, DeleteCriticalSection, CreateThread, CreateFileA, CreateEventA, CompareStringA, CloseHandle
                          version.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
                          gdi32.dllUnrealizeObject, StretchBlt, StartPage, StartDocA, SetWindowOrgEx, SetWindowExtEx, SetWinMetaFileBits, SetViewportOrgEx, SetViewportExtEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetMapMode, SetEnhMetaFileBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SetAbortProc, SelectPalette, SelectObject, SaveDC, RestoreDC, Rectangle, RectVisible, RealizePalette, PolyPolyline, PlayEnhMetaFile, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetPixel, GetPaletteEntries, GetObjectA, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, ExtTextOutA, ExtCreatePen, ExcludeClipRect, EndPage, EndDoc, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreatePenIndirect, CreatePalette, CreateICA, CreateHalftonePalette, CreateFontIndirectA, CreateDIBitmap, CreateDIBSection, CreateDCA, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileA, BitBlt
                          user32.dllCreateWindowExA, WindowFromPoint, WinHelpA, WaitMessage, ValidateRect, UpdateWindow, UnregisterClassA, UnionRect, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCursor, SetWindowsHookExA, SetWindowTextA, SetWindowPos, SetWindowPlacement, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetKeyboardState, SetForegroundWindow, SetFocus, SetCursor, SetClipboardData, SetClassLongA, SetCapture, SetActiveWindow, SendMessageA, ScrollWindowEx, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageA, OpenClipboard, OffsetRect, OemToCharA, MessageBoxA, MessageBeep, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageA, IsChild, IsCharAlphaNumericA, IsCharAlphaA, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongA, GetWindowDC, GetUpdateRect, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMessageTime, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDoubleClickTime, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameA, GetClassInfoA, GetCaretPos, GetCapture, GetActiveWindow, FrameRect, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EnumClipboardFormats, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, CloseClipboard, ClientToScreen, CheckMenuItem, CharUpperW, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerBuffA, CharLowerA, CharUpperBuffA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout
                          kernel32.dllSleep
                          oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
                          comctl32.dllImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_SetDragCursorImage, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Remove, ImageList_DrawEx, ImageList_Replace, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create
                          winspool.drvOpenPrinterA, EnumPrintersA, DocumentPropertiesA, ClosePrinter
                          kernel32.dllMulDiv

                          Possible Origin

                          Language of compilation systemCountry where language is spokenMap
                          EnglishUnited States
                          RussianRussia

                          Network Behavior

                          Network Port Distribution

                          TCP Packets

                          TimestampSource PortDest PortSource IPDest IP
                          Feb 5, 2021 15:11:09.010075092 CET49744443192.168.2.445.133.216.103
                          Feb 5, 2021 15:11:09.010190010 CET49745443192.168.2.445.133.216.103
                          Feb 5, 2021 15:11:09.075484037 CET4434974445.133.216.103192.168.2.4
                          Feb 5, 2021 15:11:09.075531006 CET4434974545.133.216.103192.168.2.4
                          Feb 5, 2021 15:11:09.075582981 CET49744443192.168.2.445.133.216.103
                          Feb 5, 2021 15:11:09.075659990 CET49745443192.168.2.445.133.216.103
                          Feb 5, 2021 15:11:09.082328081 CET49744443192.168.2.445.133.216.103
                          Feb 5, 2021 15:11:09.083014965 CET49745443192.168.2.445.133.216.103
                          Feb 5, 2021 15:11:09.147501945 CET4434974445.133.216.103192.168.2.4
                          Feb 5, 2021 15:11:09.147896051 CET4434974545.133.216.103192.168.2.4
                          Feb 5, 2021 15:11:09.150233984 CET4434974445.133.216.103192.168.2.4
                          Feb 5, 2021 15:11:09.150275946 CET4434974445.133.216.103192.168.2.4
                          Feb 5, 2021 15:11:09.150302887 CET4434974445.133.216.103192.168.2.4
                          Feb 5, 2021 15:11:09.150317907 CET49744443192.168.2.445.133.216.103
                          Feb 5, 2021 15:11:09.150355101 CET49744443192.168.2.445.133.216.103
                          Feb 5, 2021 15:11:09.150366068 CET49744443192.168.2.445.133.216.103
                          Feb 5, 2021 15:11:09.152689934 CET4434974545.133.216.103192.168.2.4
                          Feb 5, 2021 15:11:09.152740002 CET4434974545.133.216.103192.168.2.4
                          Feb 5, 2021 15:11:09.152777910 CET4434974545.133.216.103192.168.2.4
                          Feb 5, 2021 15:11:09.152812004 CET49745443192.168.2.445.133.216.103
                          Feb 5, 2021 15:11:09.152846098 CET49745443192.168.2.445.133.216.103
                          Feb 5, 2021 15:11:09.152849913 CET49745443192.168.2.445.133.216.103
                          Feb 5, 2021 15:11:09.181955099 CET49745443192.168.2.445.133.216.103
                          Feb 5, 2021 15:11:09.182029009 CET49744443192.168.2.445.133.216.103
                          Feb 5, 2021 15:11:09.247997999 CET4434974545.133.216.103192.168.2.4
                          Feb 5, 2021 15:11:09.248059034 CET4434974445.133.216.103192.168.2.4
                          Feb 5, 2021 15:11:09.248152971 CET49745443192.168.2.445.133.216.103
                          Feb 5, 2021 15:11:09.248842955 CET49745443192.168.2.445.133.216.103
                          Feb 5, 2021 15:11:09.248872042 CET49744443192.168.2.445.133.216.103
                          Feb 5, 2021 15:11:09.248944998 CET49745443192.168.2.445.133.216.103
                          Feb 5, 2021 15:11:09.314248085 CET4434974545.133.216.103192.168.2.4
                          Feb 5, 2021 15:12:09.146543026 CET4434974445.133.216.103192.168.2.4
                          Feb 5, 2021 15:12:09.146572113 CET4434974445.133.216.103192.168.2.4
                          Feb 5, 2021 15:12:09.146727085 CET49744443192.168.2.445.133.216.103
                          Feb 5, 2021 15:12:09.146775007 CET49744443192.168.2.445.133.216.103
                          Feb 5, 2021 15:13:09.593648911 CET4434974545.133.216.103192.168.2.4
                          Feb 5, 2021 15:13:09.593756914 CET49745443192.168.2.445.133.216.103
                          Feb 5, 2021 15:13:09.880130053 CET49744443192.168.2.445.133.216.103
                          Feb 5, 2021 15:13:09.880187988 CET49744443192.168.2.445.133.216.103
                          Feb 5, 2021 15:13:09.880901098 CET49745443192.168.2.445.133.216.103
                          Feb 5, 2021 15:13:09.991070032 CET4434974545.133.216.103192.168.2.4
                          Feb 5, 2021 15:13:21.885030985 CET49777443192.168.2.445.133.216.103
                          Feb 5, 2021 15:13:21.954657078 CET4434977745.133.216.103192.168.2.4
                          Feb 5, 2021 15:13:21.955271959 CET49777443192.168.2.445.133.216.103
                          Feb 5, 2021 15:13:21.959441900 CET49777443192.168.2.445.133.216.103
                          Feb 5, 2021 15:13:22.024964094 CET4434977745.133.216.103192.168.2.4
                          Feb 5, 2021 15:13:22.027736902 CET4434977745.133.216.103192.168.2.4
                          Feb 5, 2021 15:13:22.027772903 CET4434977745.133.216.103192.168.2.4
                          Feb 5, 2021 15:13:22.027786970 CET4434977745.133.216.103192.168.2.4
                          Feb 5, 2021 15:13:22.027903080 CET49777443192.168.2.445.133.216.103
                          Feb 5, 2021 15:13:22.044152975 CET49777443192.168.2.445.133.216.103
                          Feb 5, 2021 15:13:22.109941959 CET4434977745.133.216.103192.168.2.4
                          Feb 5, 2021 15:13:22.110074997 CET49777443192.168.2.445.133.216.103
                          Feb 5, 2021 15:13:22.111372948 CET49777443192.168.2.445.133.216.103
                          Feb 5, 2021 15:13:22.111480951 CET49777443192.168.2.445.133.216.103
                          Feb 5, 2021 15:13:22.176907063 CET4434977745.133.216.103192.168.2.4

                          UDP Packets

                          TimestampSource PortDest PortSource IPDest IP
                          Feb 5, 2021 15:10:57.127938032 CET6315353192.168.2.48.8.8.8
                          Feb 5, 2021 15:10:57.177488089 CET53631538.8.8.8192.168.2.4
                          Feb 5, 2021 15:10:58.288995981 CET5299153192.168.2.48.8.8.8
                          Feb 5, 2021 15:10:58.335963964 CET53529918.8.8.8192.168.2.4
                          Feb 5, 2021 15:10:59.215821028 CET5370053192.168.2.48.8.8.8
                          Feb 5, 2021 15:10:59.265412092 CET53537008.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:00.274355888 CET5172653192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:00.330168009 CET53517268.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:02.153189898 CET5679453192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:02.200150013 CET53567948.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:03.184634924 CET5653453192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:03.242126942 CET53565348.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:04.454282999 CET5662753192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:04.500952005 CET53566278.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:05.451766014 CET5662153192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:05.498395920 CET53566218.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:07.445197105 CET6311653192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:07.492767096 CET53631168.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:07.784857988 CET6407853192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:07.845151901 CET53640788.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:08.941991091 CET6480153192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:08.999475002 CET53648018.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:09.272541046 CET6172153192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:09.321039915 CET53617218.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:10.246723890 CET5125553192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:10.293646097 CET53512558.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:11.079930067 CET6152253192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:11.127470970 CET53615228.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:11.267817020 CET5233753192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:11.314388037 CET53523378.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:12.454510927 CET5504653192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:12.505116940 CET53550468.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:13.434499979 CET4961253192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:13.481628895 CET53496128.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:14.607250929 CET4928553192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:14.656871080 CET53492858.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:21.144412041 CET5060153192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:21.196465015 CET53506018.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:25.537904978 CET6087553192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:25.596429110 CET53608758.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:37.780924082 CET5644853192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:37.830451965 CET53564488.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:38.495282888 CET5917253192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:38.543936014 CET53591728.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:38.787137032 CET5644853192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:38.840082884 CET53564488.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:39.506083012 CET5917253192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:39.554653883 CET53591728.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:39.807240009 CET5644853192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:39.867321968 CET53564488.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:40.026734114 CET6242053192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:40.081789970 CET53624208.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:40.521188021 CET5917253192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:40.570120096 CET53591728.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:40.660974026 CET6057953192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:40.715950012 CET53605798.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:40.862476110 CET5018353192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:40.931441069 CET53501838.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:41.526072025 CET6153153192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:41.575651884 CET53615318.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:41.802392960 CET5644853192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:41.851960897 CET53564488.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:42.033946991 CET4922853192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:42.083383083 CET53492288.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:42.521174908 CET5917253192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:42.567806959 CET53591728.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:42.717406988 CET5979453192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:42.772543907 CET53597948.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:43.363240004 CET5591653192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:43.418147087 CET53559168.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:44.343419075 CET5275253192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:44.398530960 CET53527528.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:45.485378027 CET6054253192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:45.540724993 CET53605428.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:45.818109035 CET5644853192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:45.867546082 CET53564488.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:46.537005901 CET5917253192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:46.577455997 CET6068953192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:46.583584070 CET53591728.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:46.625001907 CET53606898.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:47.379790068 CET6420653192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:47.437128067 CET53642068.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:56.759221077 CET5090453192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:56.808696985 CET53509048.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:57.357604027 CET5752553192.168.2.48.8.8.8
                          Feb 5, 2021 15:11:57.406884909 CET53575258.8.8.8192.168.2.4
                          Feb 5, 2021 15:11:59.997220993 CET5381453192.168.2.48.8.8.8
                          Feb 5, 2021 15:12:00.055185080 CET53538148.8.8.8192.168.2.4
                          Feb 5, 2021 15:12:31.420690060 CET5341853192.168.2.48.8.8.8
                          Feb 5, 2021 15:12:31.467262983 CET53534188.8.8.8192.168.2.4
                          Feb 5, 2021 15:12:33.305716038 CET6283353192.168.2.48.8.8.8
                          Feb 5, 2021 15:12:33.354562998 CET53628338.8.8.8192.168.2.4
                          Feb 5, 2021 15:13:21.816430092 CET5926053192.168.2.48.8.8.8
                          Feb 5, 2021 15:13:21.874515057 CET53592608.8.8.8192.168.2.4
                          Feb 5, 2021 15:13:51.537769079 CET4994453192.168.2.48.8.8.8
                          Feb 5, 2021 15:13:51.597984076 CET53499448.8.8.8192.168.2.4
                          Feb 5, 2021 15:13:52.531815052 CET4994453192.168.2.48.8.8.8
                          Feb 5, 2021 15:13:52.583115101 CET53499448.8.8.8192.168.2.4
                          Feb 5, 2021 15:13:53.532160997 CET4994453192.168.2.48.8.8.8
                          Feb 5, 2021 15:13:53.582953930 CET53499448.8.8.8192.168.2.4
                          Feb 5, 2021 15:13:55.547427893 CET4994453192.168.2.48.8.8.8
                          Feb 5, 2021 15:13:55.607625961 CET53499448.8.8.8192.168.2.4
                          Feb 5, 2021 15:13:59.563509941 CET4994453192.168.2.48.8.8.8
                          Feb 5, 2021 15:13:59.612879992 CET53499448.8.8.8192.168.2.4

                          DNS Queries

                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                          Feb 5, 2021 15:11:08.941991091 CET192.168.2.48.8.8.80xd178Standard query (0)topitophug.xyzA (IP address)IN (0x0001)
                          Feb 5, 2021 15:13:21.816430092 CET192.168.2.48.8.8.80xf9ebStandard query (0)topitophug.xyzA (IP address)IN (0x0001)

                          DNS Answers

                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                          Feb 5, 2021 15:11:08.999475002 CET8.8.8.8192.168.2.40xd178No error (0)topitophug.xyz45.133.216.103A (IP address)IN (0x0001)
                          Feb 5, 2021 15:13:21.874515057 CET8.8.8.8192.168.2.40xf9ebNo error (0)topitophug.xyz45.133.216.103A (IP address)IN (0x0001)

                          HTTPS Packets

                          TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                          Feb 5, 2021 15:11:09.150275946 CET45.133.216.103443192.168.2.449744CN=topitophug.xyz CN=R3, O=Let's Encrypt, C=USCN=R3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Mon Jan 18 18:06:29 CET 2021 Wed Oct 07 21:21:40 CEST 2020Sun Apr 18 19:06:29 CEST 2021 Wed Sep 29 21:21:40 CEST 2021771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-16-23-24-65281,29-23-24,09e10692f1b7f78228b2d4e424db3a98c
                          CN=R3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Oct 07 21:21:40 CEST 2020Wed Sep 29 21:21:40 CEST 2021
                          Feb 5, 2021 15:11:09.152740002 CET45.133.216.103443192.168.2.449745CN=topitophug.xyz CN=R3, O=Let's Encrypt, C=USCN=R3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Mon Jan 18 18:06:29 CET 2021 Wed Oct 07 21:21:40 CEST 2020Sun Apr 18 19:06:29 CEST 2021 Wed Sep 29 21:21:40 CEST 2021771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-16-23-24-65281,29-23-24,09e10692f1b7f78228b2d4e424db3a98c
                          CN=R3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Oct 07 21:21:40 CEST 2020Wed Sep 29 21:21:40 CEST 2021
                          Feb 5, 2021 15:13:22.027772903 CET45.133.216.103443192.168.2.449777CN=topitophug.xyz CN=R3, O=Let's Encrypt, C=USCN=R3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Mon Jan 18 18:06:29 CET 2021 Wed Oct 07 21:21:40 CEST 2020Sun Apr 18 19:06:29 CEST 2021 Wed Sep 29 21:21:40 CEST 2021771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-16-23-24-65281,29-23-24,09e10692f1b7f78228b2d4e424db3a98c
                          CN=R3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Oct 07 21:21:40 CEST 2020Wed Sep 29 21:21:40 CEST 2021

                          Code Manipulations

                          Statistics

                          Behavior

                          Click to jump to process

                          System Behavior

                          General

                          Start time:15:11:01
                          Start date:05/02/2021
                          Path:C:\Windows\System32\loaddll32.exe
                          Wow64 process (32bit):true
                          Commandline:loaddll32.exe 'C:\Users\user\Desktop\ioir.png.dll'
                          Imagebase:0x90000
                          File size:121856 bytes
                          MD5 hash:99D621E00EFC0B8F396F38D5555EB078
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:Borland Delphi
                          Yara matches:
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.647244035.0000000005360000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.648524337.0000000005360000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.648667636.0000000005360000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.648893530.0000000005360000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.647868794.0000000005360000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.648751901.0000000005360000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.648917284.0000000005360000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.648176949.0000000005360000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.648860307.0000000005360000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.647426858.0000000005360000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.647623145.0000000005360000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.649011597.0000000005360000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.647521163.0000000005360000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.649003327.0000000005360000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.647703250.0000000005360000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000002.1020935253.0000000005360000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.648956787.0000000005360000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.648265573.0000000005360000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.648974202.0000000005360000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.647795143.0000000005360000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.647330409.0000000005360000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.647948135.0000000005360000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.648938200.0000000005360000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.648374581.0000000005360000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.648323443.0000000005360000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.648615088.0000000005360000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.648037894.0000000005360000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.648828511.0000000005360000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.648478035.0000000005360000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.648792520.0000000005360000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.648104820.0000000005360000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.648425491.0000000005360000.00000004.00000040.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.648990980.0000000005360000.00000004.00000040.sdmp, Author: Joe Security
                          Reputation:moderate

                          General

                          Start time:15:11:01
                          Start date:05/02/2021
                          Path:C:\Windows\SysWOW64\rundll32.exe
                          Wow64 process (32bit):true
                          Commandline:rundll32.exe 'C:\Users\user\Desktop\ioir.png.dll',#1
                          Imagebase:0xde0000
                          File size:61952 bytes
                          MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:Borland Delphi
                          Yara matches:
                          • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000002.678292603.0000000008010000.00000004.00000040.sdmp, Author: Joe Security
                          Reputation:high

                          General

                          Start time:15:11:03
                          Start date:05/02/2021
                          Path:C:\Windows\SysWOW64\WerFault.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3848 -s 744
                          Imagebase:0x11a0000
                          File size:434592 bytes
                          MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          General

                          Start time:15:11:06
                          Start date:05/02/2021
                          Path:C:\Program Files\internet explorer\iexplore.exe
                          Wow64 process (32bit):false
                          Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                          Imagebase:0x7ff7f1c20000
                          File size:823560 bytes
                          MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          General

                          Start time:15:11:07
                          Start date:05/02/2021
                          Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                          Wow64 process (32bit):true
                          Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6588 CREDAT:17410 /prefetch:2
                          Imagebase:0x10e0000
                          File size:822536 bytes
                          MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          General

                          Start time:15:13:20
                          Start date:05/02/2021
                          Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                          Wow64 process (32bit):true
                          Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6588 CREDAT:17418 /prefetch:2
                          Imagebase:0x10e0000
                          File size:822536 bytes
                          MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high

                          Disassembly

                          Code Analysis

                          Reset < >