Loading ...

Play interactive tourEdit tour

Analysis Report nT5pUwoJSS.dll

Overview

General Information

Sample Name:nT5pUwoJSS.dll
Analysis ID:412166
MD5:6fdbd25f7a84da80ee9d8577122c3291
SHA1:39a52cbc48be934cf953d4699e8a1ea5ff53a5bf
SHA256:4bf6e9d4067cb905631ddf7452ac571c4ed9800c7eb8fc7e51b688e1154f52e3
Tags:dllGoziISFBUrsnif
Infos:

Most interesting Screenshot:

Detection

Ursnif
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected Ursnif
Machine Learning detection for sample
Writes registry values via WMI
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
IP address seen in connection with other malware
One or more processes crash
PE file contains an invalid checksum
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Startup

  • System is w10x64
  • loaddll32.exe (PID: 6924 cmdline: loaddll32.exe 'C:\Users\user\Desktop\nT5pUwoJSS.dll' MD5: 542795ADF7CC08EFCF675D65310596E8)
    • cmd.exe (PID: 6936 cmdline: cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\nT5pUwoJSS.dll',#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 6960 cmdline: rundll32.exe 'C:\Users\user\Desktop\nT5pUwoJSS.dll',#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6948 cmdline: rundll32.exe C:\Users\user\Desktop\nT5pUwoJSS.dll,Eithernothing MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 6992 cmdline: rundll32.exe C:\Users\user\Desktop\nT5pUwoJSS.dll,Order MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
      • WerFault.exe (PID: 64 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6992 -s 892 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • rundll32.exe (PID: 7008 cmdline: rundll32.exe C:\Users\user\Desktop\nT5pUwoJSS.dll,Smileschool MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • iexplore.exe (PID: 5516 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 4556 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5516 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

Threatname: Ursnif

{"RSA Public Key": "KujE77ctKyR8x3/dODwZbEsxGmck+FW9384s5u0Kacw8y1gCN+8m2bfjJPovkn+Uzufcdfss+a43eI6oHR1KgWQmvEAO6LK8tJv+Wl7iCBPJP7eef8xKeXht/Mhk1PSj7mHnJ9lcqKMtTteEdSecVvMRtb/WSKVTFfHDva9My7AJ/NbXqHdzCG7znACswLxD", "c2_domain": ["outlook.com/login", "gmail.com", "worunekulo.club", "horunekulo.website"], "botnet": "8877", "server": "12", "serpent_key": "30218409ILPAJDUR", "sleep_time": "10", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "0", "DGA_count": "10"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000003.00000003.881584954.00000000050E8000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
    00000003.00000003.881638380.00000000050E8000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
      00000003.00000003.881444184.00000000050E8000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
        00000003.00000003.881614039.00000000050E8000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
          00000003.00000003.881537844.00000000050E8000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
            Click to see the 4 entries

            Sigma Overview

            No Sigma rule has matched

            Signature Overview

            Click to jump to signature section

            Show All Signature Results

            AV Detection:

            barindex
            Found malware configurationShow sources
            Source: 2.3.rundll32.exe.2c3a427.0.raw.unpackMalware Configuration Extractor: Ursnif {"RSA Public Key": "KujE77ctKyR8x3/dODwZbEsxGmck+FW9384s5u0Kacw8y1gCN+8m2bfjJPovkn+Uzufcdfss+a43eI6oHR1KgWQmvEAO6LK8tJv+Wl7iCBPJP7eef8xKeXht/Mhk1PSj7mHnJ9lcqKMtTteEdSecVvMRtb/WSKVTFfHDva9My7AJ/NbXqHdzCG7znACswLxD", "c2_domain": ["outlook.com/login", "gmail.com", "worunekulo.club", "horunekulo.website"], "botnet": "8877", "server": "12", "serpent_key": "30218409ILPAJDUR", "sleep_time": "10", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "0", "DGA_count": "10"}
            Multi AV Scanner detection for submitted fileShow sources
            Source: nT5pUwoJSS.dllReversingLabs: Detection: 21%
            Machine Learning detection for sampleShow sources
            Source: nT5pUwoJSS.dllJoe Sandbox ML: detected
            Source: nT5pUwoJSS.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll
            Source: Binary string: WinTypes.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: wkernel32.pdb source: WerFault.exe, 0000000E.00000003.877150274.00000000053A1000.00000004.00000001.sdmp
            Source: Binary string: shlwapi.pdb+ source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: sfc_os.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: bcrypt.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: ucrtbase.pdb source: WerFault.exe, 0000000E.00000003.877169719.00000000054B2000.00000004.00000040.sdmp
            Source: Binary string: CoreMessaging.pdb_ source: WerFault.exe, 0000000E.00000003.877259368.00000000054C3000.00000004.00000040.sdmp
            Source: Binary string: msvcrt.pdb source: WerFault.exe, 0000000E.00000003.877150274.00000000053A1000.00000004.00000001.sdmp
            Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 0000000E.00000003.877231767.00000000054B0000.00000004.00000040.sdmp
            Source: Binary string: wntdll.pdb source: WerFault.exe, 0000000E.00000003.871565860.00000000032AE000.00000004.00000001.sdmp
            Source: Binary string: shcore.pdb source: WerFault.exe, 0000000E.00000003.877239660.00000000054B5000.00000004.00000040.sdmp
            Source: Binary string: CoreMessaging.pdb source: WerFault.exe, 0000000E.00000003.877259368.00000000054C3000.00000004.00000040.sdmp
            Source: Binary string: wgdi32.pdb source: WerFault.exe, 0000000E.00000003.877150274.00000000053A1000.00000004.00000001.sdmp
            Source: Binary string: advapi32.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: fltLib.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: wsspicli.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: TextInputFramework.pdb4h source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: shell32.pdb source: WerFault.exe, 0000000E.00000003.877239660.00000000054B5000.00000004.00000040.sdmp
            Source: Binary string: msvcp_win.pdbk source: WerFault.exe, 0000000E.00000003.877169719.00000000054B2000.00000004.00000040.sdmp
            Source: Binary string: ntmarta.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: msvcp_win.pdb source: WerFault.exe, 0000000E.00000003.877169719.00000000054B2000.00000004.00000040.sdmp
            Source: Binary string: wkernelbase.pdb source: WerFault.exe, 0000000E.00000003.877150274.00000000053A1000.00000004.00000001.sdmp
            Source: Binary string: wimm32.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: CoreUIComponents.pdb source: WerFault.exe, 0000000E.00000003.877259368.00000000054C3000.00000004.00000040.sdmp
            Source: Binary string: shlwapi.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: mpr.pdb source: WerFault.exe, 0000000E.00000003.877231767.00000000054B0000.00000004.00000040.sdmp
            Source: Binary string: wwin32u.pdb source: WerFault.exe, 0000000E.00000003.877150274.00000000053A1000.00000004.00000001.sdmp
            Source: Binary string: setupapi.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: imagehlp.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: wUxTheme.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: dwmapi.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: c:\Tube-meet\585\straight\lift\38_Claim\Tail.pdb source: loaddll32.exe, 00000000.00000002.910074848.000000006D4C9000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.911410296.000000006D4C9000.00000002.00020000.sdmp, nT5pUwoJSS.dll
            Source: Binary string: shcore.pdbk source: WerFault.exe, 0000000E.00000003.877239660.00000000054B5000.00000004.00000040.sdmp
            Source: Binary string: profapi.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: winspool.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: wgdi32full.pdb source: WerFault.exe, 0000000E.00000003.877150274.00000000053A1000.00000004.00000001.sdmp
            Source: Binary string: shell32.pdbk source: WerFault.exe, 0000000E.00000003.877239660.00000000054B5000.00000004.00000040.sdmp
            Source: Binary string: sechost.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: iphlpapi.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: sfc.pdb4a source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: propsys.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: cfgmgr32.pdbk source: WerFault.exe, 0000000E.00000003.877239660.00000000054B5000.00000004.00000040.sdmp
            Source: Binary string: ucrtbase.pdbk source: WerFault.exe, 0000000E.00000003.877169719.00000000054B2000.00000004.00000040.sdmp
            Source: Binary string: powrprof.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: msctf.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: ole32.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: TextInputFramework.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: AcLayers.pdb source: WerFault.exe, 0000000E.00000003.877150274.00000000053A1000.00000004.00000001.sdmp
            Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 0000000E.00000003.877231767.00000000054B0000.00000004.00000040.sdmp
            Source: Binary string: cryptbase.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 0000000E.00000003.877239660.00000000054B5000.00000004.00000040.sdmp
            Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 0000000E.00000003.877231767.00000000054B0000.00000004.00000040.sdmp
            Source: Binary string: combase.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 0000000E.00000003.877231767.00000000054B0000.00000004.00000040.sdmp
            Source: Binary string: rundll32.pdb source: WerFault.exe, 0000000E.00000003.877150274.00000000053A1000.00000004.00000001.sdmp
            Source: Binary string: oleaut32.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: sfc.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: apphelp.pdb source: WerFault.exe, 0000000E.00000003.877150274.00000000053A1000.00000004.00000001.sdmp
            Source: Binary string: wuser32.pdb source: WerFault.exe, 0000000E.00000003.877150274.00000000053A1000.00000004.00000001.sdmp
            Source: Binary string: mpr.pdb7` source: WerFault.exe, 0000000E.00000003.877231767.00000000054B0000.00000004.00000040.sdmp
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02C84C3B RtlAllocateHeap,RtlAllocateHeap,RtlAllocateHeap,memset,CreateFileA,GetFileTime,FindCloseChangeNotification,StrRChrA,lstrcat,FindFirstFileA,FindFirstFileA,CompareFileTime,CompareFileTime,FindClose,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,StrChrA,memcpy,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,FindClose,HeapFree,HeapFree,
            Source: Joe Sandbox ViewIP Address: 40.97.153.146 40.97.153.146
            Source: global trafficHTTP traffic detected: GET /login/greed/KnH9H6Qjc_2F7/0e3_2F0_/2FRqQPyOKs18rFK5waVCGCI/jIBCBbgDdF/18TiURZdioL3eU4Wc/SUXArexakZ5d/R0lDxIGeIYj/c6FwtLcTr3EmEj/nbrTM1t_2BdTxREGmfFhs/_2BnTf5cT9dEAnPd/AFLbs3lARk22SMJ/POUz7dti2oyFXHE3_2/FgEVGs1vD/4LhoHpnAxyp/chUrsX.gfk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: outlook.comConnection: Keep-Alive
            Source: unknownDNS traffic detected: queries for: outlook.com
            Source: WerFault.exe, 0000000E.00000003.889153103.0000000005072000.00000004.00000001.sdmpString found in binary or memory: http://crl.microsoft
            Source: {4BD5DCDF-B312-11EB-90EB-ECF4BBEA1588}.dat.17.drString found in binary or memory: https://outlook.office365.com/login/greed/KnH9H6Qjc_2F7/0e3_2F0_/2FRqQPyOKs18rFK5waVCGCI/jIBCBbgDdF/
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
            Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
            Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
            Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756

            Key, Mouse, Clipboard, Microphone and Screen Capturing:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000003.00000003.881584954.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.881638380.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.881444184.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.881614039.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.881537844.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.881689753.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.881502007.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.881360850.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 6960, type: MEMORY
            Source: loaddll32.exe, 00000000.00000002.909557678.00000000012EB000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

            E-Banking Fraud:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000003.00000003.881584954.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.881638380.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.881444184.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.881614039.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.881537844.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.881689753.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.881502007.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.881360850.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 6960, type: MEMORY

            System Summary:

            barindex
            Writes registry values via WMIShow sources
            Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
            Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
            Source: C:\Windows\SysWOW64\rundll32.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4823A5 NtQueryVirtualMemory,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D4815F1 GetProcAddress,NtCreateSection,memset,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D481F14 NtMapViewOfSection,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D4823A5 NtQueryVirtualMemory,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02C81168 NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02C8B2F1 NtQueryVirtualMemory,
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D482184
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4B8960
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4C2153
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D482184
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02C8B0CC
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02C8696A
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02C81B6A
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D4B8960
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D4C2153
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6992 -s 892
            Source: nT5pUwoJSS.dllBinary or memory string: OriginalFilenameTail.dll0 vs nT5pUwoJSS.dll
            Source: nT5pUwoJSS.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
            Source: nT5pUwoJSS.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: classification engineClassification label: mal72.troj.winDLL@15/9@3/3
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02C87F56 CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,
            Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{4BD5DCDD-B312-11EB-90EB-ECF4BBEA1588}.datJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6992
            Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER8EB1.tmpJump to behavior
            Source: nT5pUwoJSS.dllStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
            Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\nT5pUwoJSS.dll,Eithernothing
            Source: nT5pUwoJSS.dllReversingLabs: Detection: 21%
            Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\nT5pUwoJSS.dll'
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\nT5pUwoJSS.dll',#1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\nT5pUwoJSS.dll,Eithernothing
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\nT5pUwoJSS.dll',#1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\nT5pUwoJSS.dll,Order
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\nT5pUwoJSS.dll,Smileschool
            Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6992 -s 892
            Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
            Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5516 CREDAT:17410 /prefetch:2
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\nT5pUwoJSS.dll',#1
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\nT5pUwoJSS.dll,Eithernothing
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\nT5pUwoJSS.dll,Order
            Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\nT5pUwoJSS.dll,Smileschool
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\nT5pUwoJSS.dll',#1
            Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5516 CREDAT:17410 /prefetch:2
            Source: C:\Windows\SysWOW64\rundll32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32
            Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
            Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
            Source: C:\Windows\SysWOW64\rundll32.exeAutomated click: OK
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll
            Source: nT5pUwoJSS.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
            Source: nT5pUwoJSS.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
            Source: nT5pUwoJSS.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
            Source: nT5pUwoJSS.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: nT5pUwoJSS.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
            Source: nT5pUwoJSS.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
            Source: nT5pUwoJSS.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: WinTypes.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: wkernel32.pdb source: WerFault.exe, 0000000E.00000003.877150274.00000000053A1000.00000004.00000001.sdmp
            Source: Binary string: shlwapi.pdb+ source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: sfc_os.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: bcrypt.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: ucrtbase.pdb source: WerFault.exe, 0000000E.00000003.877169719.00000000054B2000.00000004.00000040.sdmp
            Source: Binary string: CoreMessaging.pdb_ source: WerFault.exe, 0000000E.00000003.877259368.00000000054C3000.00000004.00000040.sdmp
            Source: Binary string: msvcrt.pdb source: WerFault.exe, 0000000E.00000003.877150274.00000000053A1000.00000004.00000001.sdmp
            Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 0000000E.00000003.877231767.00000000054B0000.00000004.00000040.sdmp
            Source: Binary string: wntdll.pdb source: WerFault.exe, 0000000E.00000003.871565860.00000000032AE000.00000004.00000001.sdmp
            Source: Binary string: shcore.pdb source: WerFault.exe, 0000000E.00000003.877239660.00000000054B5000.00000004.00000040.sdmp
            Source: Binary string: CoreMessaging.pdb source: WerFault.exe, 0000000E.00000003.877259368.00000000054C3000.00000004.00000040.sdmp
            Source: Binary string: wgdi32.pdb source: WerFault.exe, 0000000E.00000003.877150274.00000000053A1000.00000004.00000001.sdmp
            Source: Binary string: advapi32.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: fltLib.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: wsspicli.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: TextInputFramework.pdb4h source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: shell32.pdb source: WerFault.exe, 0000000E.00000003.877239660.00000000054B5000.00000004.00000040.sdmp
            Source: Binary string: msvcp_win.pdbk source: WerFault.exe, 0000000E.00000003.877169719.00000000054B2000.00000004.00000040.sdmp
            Source: Binary string: ntmarta.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: msvcp_win.pdb source: WerFault.exe, 0000000E.00000003.877169719.00000000054B2000.00000004.00000040.sdmp
            Source: Binary string: wkernelbase.pdb source: WerFault.exe, 0000000E.00000003.877150274.00000000053A1000.00000004.00000001.sdmp
            Source: Binary string: wimm32.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: CoreUIComponents.pdb source: WerFault.exe, 0000000E.00000003.877259368.00000000054C3000.00000004.00000040.sdmp
            Source: Binary string: shlwapi.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: mpr.pdb source: WerFault.exe, 0000000E.00000003.877231767.00000000054B0000.00000004.00000040.sdmp
            Source: Binary string: wwin32u.pdb source: WerFault.exe, 0000000E.00000003.877150274.00000000053A1000.00000004.00000001.sdmp
            Source: Binary string: setupapi.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: imagehlp.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: wUxTheme.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: dwmapi.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: c:\Tube-meet\585\straight\lift\38_Claim\Tail.pdb source: loaddll32.exe, 00000000.00000002.910074848.000000006D4C9000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.911410296.000000006D4C9000.00000002.00020000.sdmp, nT5pUwoJSS.dll
            Source: Binary string: shcore.pdbk source: WerFault.exe, 0000000E.00000003.877239660.00000000054B5000.00000004.00000040.sdmp
            Source: Binary string: profapi.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: winspool.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: wgdi32full.pdb source: WerFault.exe, 0000000E.00000003.877150274.00000000053A1000.00000004.00000001.sdmp
            Source: Binary string: shell32.pdbk source: WerFault.exe, 0000000E.00000003.877239660.00000000054B5000.00000004.00000040.sdmp
            Source: Binary string: sechost.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: iphlpapi.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: sfc.pdb4a source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: propsys.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: cfgmgr32.pdbk source: WerFault.exe, 0000000E.00000003.877239660.00000000054B5000.00000004.00000040.sdmp
            Source: Binary string: ucrtbase.pdbk source: WerFault.exe, 0000000E.00000003.877169719.00000000054B2000.00000004.00000040.sdmp
            Source: Binary string: powrprof.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: msctf.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: ole32.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: TextInputFramework.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: AcLayers.pdb source: WerFault.exe, 0000000E.00000003.877150274.00000000053A1000.00000004.00000001.sdmp
            Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 0000000E.00000003.877231767.00000000054B0000.00000004.00000040.sdmp
            Source: Binary string: cryptbase.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 0000000E.00000003.877239660.00000000054B5000.00000004.00000040.sdmp
            Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 0000000E.00000003.877231767.00000000054B0000.00000004.00000040.sdmp
            Source: Binary string: combase.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 0000000E.00000003.877231767.00000000054B0000.00000004.00000040.sdmp
            Source: Binary string: rundll32.pdb source: WerFault.exe, 0000000E.00000003.877150274.00000000053A1000.00000004.00000001.sdmp
            Source: Binary string: oleaut32.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: sfc.pdb source: WerFault.exe, 0000000E.00000003.877178241.00000000054B8000.00000004.00000040.sdmp
            Source: Binary string: apphelp.pdb source: WerFault.exe, 0000000E.00000003.877150274.00000000053A1000.00000004.00000001.sdmp
            Source: Binary string: wuser32.pdb source: WerFault.exe, 0000000E.00000003.877150274.00000000053A1000.00000004.00000001.sdmp
            Source: Binary string: mpr.pdb7` source: WerFault.exe, 0000000E.00000003.877231767.00000000054B0000.00000004.00000040.sdmp
            Source: nT5pUwoJSS.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: nT5pUwoJSS.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: nT5pUwoJSS.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: nT5pUwoJSS.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: nT5pUwoJSS.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4817FA LoadLibraryA,GetProcAddress,
            Source: nT5pUwoJSS.dllStatic PE information: real checksum: 0x84de2 should be: 0x84de4
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D482173 push ecx; ret
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D482120 push ecx; ret
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D492C15 push ebp; retf
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D494348 push ss; ret
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4C2761 push ecx; ret
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D49778D pushfd ; ret
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D492F9A push edi; retf
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D482173 push ecx; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D482120 push ecx; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02C8B0BB push ecx; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02C8AD00 push ecx; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D492C15 push ebp; retf
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D494348 push ss; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D4C2761 push ecx; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D49778D pushfd ; ret
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D492F9A push edi; retf
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_06B3F7B4 push 776EF672h; iretd

            Hooking and other Techniques for Hiding and Protection:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000003.00000003.881584954.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.881638380.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.881444184.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.881614039.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.881537844.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.881689753.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.881502007.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.881360850.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 6960, type: MEMORY
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Windows\System32\loaddll32.exeLast function: Thread delayed
            Source: C:\Windows\System32\loaddll32.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02C84C3B RtlAllocateHeap,RtlAllocateHeap,RtlAllocateHeap,memset,CreateFileA,GetFileTime,FindCloseChangeNotification,StrRChrA,lstrcat,FindFirstFileA,FindFirstFileA,CompareFileTime,CompareFileTime,FindClose,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,StrChrA,memcpy,FindNextFileA,FindClose,FindFirstFileA,CompareFileTime,FindClose,HeapFree,HeapFree,
            Source: WerFault.exe, 0000000E.00000002.892437315.0000000005110000.00000002.00000001.sdmpBinary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
            Source: WerFault.exe, 0000000E.00000003.889249389.0000000005046000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
            Source: WerFault.exe, 0000000E.00000002.892437315.0000000005110000.00000002.00000001.sdmpBinary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
            Source: WerFault.exe, 0000000E.00000002.892437315.0000000005110000.00000002.00000001.sdmpBinary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
            Source: WerFault.exe, 0000000E.00000002.892437315.0000000005110000.00000002.00000001.sdmpBinary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4C150C IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4817FA LoadLibraryA,GetProcAddress,
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4F5770 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4F56A6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4F52AD push dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D4F5770 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D4F56A6 mov eax, dword ptr fs:[00000030h]
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D4F52AD push dword ptr fs:[00000030h]
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4C150C IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4C636F _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D4C2F08 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D4C150C IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D4C636F _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_6D4C2F08 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\nT5pUwoJSS.dll',#1
            Source: loaddll32.exe, 00000000.00000002.909717516.0000000001870000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.910277829.0000000003140000.00000002.00000001.sdmpBinary or memory string: Program Manager
            Source: loaddll32.exe, 00000000.00000002.909717516.0000000001870000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.910277829.0000000003140000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
            Source: loaddll32.exe, 00000000.00000002.909717516.0000000001870000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.910277829.0000000003140000.00000002.00000001.sdmpBinary or memory string: Progman
            Source: loaddll32.exe, 00000000.00000002.909717516.0000000001870000.00000002.00000001.sdmp, rundll32.exe, 00000003.00000002.910277829.0000000003140000.00000002.00000001.sdmpBinary or memory string: Progmanlock
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02C82D6E cpuid
            Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoA,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D481237 SetThreadPriority,GetSystemTime,SwitchToThread,Sleep,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,GetLastError,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError,
            Source: C:\Windows\SysWOW64\rundll32.exeCode function: 3_2_02C82D6E RtlAllocateHeap,GetUserNameW,RtlAllocateHeap,GetUserNameW,HeapFree,GetComputerNameW,GetComputerNameW,RtlAllocateHeap,GetComputerNameW,HeapFree,
            Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_6D481CDD CreateEventA,GetVersion,GetCurrentProcessId,OpenProcess,GetLastError,

            Stealing of Sensitive Information:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000003.00000003.881584954.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.881638380.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.881444184.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.881614039.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.881537844.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.881689753.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.881502007.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.881360850.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 6960, type: MEMORY

            Remote Access Functionality:

            barindex
            Yara detected UrsnifShow sources
            Source: Yara matchFile source: 00000003.00000003.881584954.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.881638380.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.881444184.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.881614039.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.881537844.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.881689753.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.881502007.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000003.881360850.00000000050E8000.00000004.00000040.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: rundll32.exe PID: 6960, type: MEMORY

            Mitre Att&ck Matrix

            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management Instrumentation1Path InterceptionProcess Injection12Masquerading1Input Capture1System Time Discovery1Remote ServicesInput Capture1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsNative API1Boot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection12LSASS MemorySecurity Software Discovery11Remote Desktop ProtocolArchive Collected Data1Exfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Rundll321NTDSAccount Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol3SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing1LSA SecretsSystem Owner/User Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsRemote System Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncFile and Directory Discovery2Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemSystem Information Discovery23Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

            Behavior Graph

            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 412166 Sample: nT5pUwoJSS.dll Startdate: 12/05/2021 Architecture: WINDOWS Score: 72 33 Found malware configuration 2->33 35 Multi AV Scanner detection for submitted file 2->35 37 Yara detected  Ursnif 2->37 39 Machine Learning detection for sample 2->39 7 loaddll32.exe 1 2->7         started        9 iexplore.exe 1 50 2->9         started        process3 process4 11 rundll32.exe 7->11         started        14 rundll32.exe 7->14         started        16 cmd.exe 1 7->16         started        18 rundll32.exe 7->18         started        20 iexplore.exe 24 9->20         started        dnsIp5 41 Writes registry values via WMI 11->41 23 WerFault.exe 23 9 14->23         started        25 rundll32.exe 16->25         started        27 40.101.137.82, 443, 49758, 49759 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 20->27 29 outlook.com 40.97.153.146, 443, 49753, 49754 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 20->29 31 5 other IPs or domains 20->31 signatures6 process7

            Screenshots

            Thumbnails

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.

            windows-stand

            Antivirus, Machine Learning and Genetic Malware Detection

            Initial Sample

            SourceDetectionScannerLabelLink
            nT5pUwoJSS.dll21%ReversingLabsWin32.Trojan.Zusy
            nT5pUwoJSS.dll100%Joe Sandbox ML

            Dropped Files

            No Antivirus matches

            Unpacked PE Files

            SourceDetectionScannerLabelLinkDownload
            3.2.rundll32.exe.2c80000.1.unpack100%AviraHEUR/AGEN.1108168Download File

            Domains

            No Antivirus matches

            URLs

            SourceDetectionScannerLabelLink
            http://crl.microsoft0%URL Reputationsafe
            http://crl.microsoft0%URL Reputationsafe
            http://crl.microsoft0%URL Reputationsafe

            Domains and IPs

            Contacted Domains

            NameIPActiveMaliciousAntivirus DetectionReputation
            outlook.com
            40.97.153.146
            truefalse
              high
              HHN-efz.ms-acdc.office.com
              52.97.233.66
              truefalse
                high
                www.outlook.com
                unknown
                unknownfalse
                  high
                  outlook.office365.com
                  unknown
                  unknownfalse
                    high

                    Contacted URLs

                    NameMaliciousAntivirus DetectionReputation
                    http://outlook.com/login/greed/KnH9H6Qjc_2F7/0e3_2F0_/2FRqQPyOKs18rFK5waVCGCI/jIBCBbgDdF/18TiURZdioL3eU4Wc/SUXArexakZ5d/R0lDxIGeIYj/c6FwtLcTr3EmEj/nbrTM1t_2BdTxREGmfFhs/_2BnTf5cT9dEAnPd/AFLbs3lARk22SMJ/POUz7dti2oyFXHE3_2/FgEVGs1vD/4LhoHpnAxyp/chUrsX.gfkfalse
                      high

                      URLs from Memory and Binaries

                      NameSourceMaliciousAntivirus DetectionReputation
                      https://outlook.office365.com/login/greed/KnH9H6Qjc_2F7/0e3_2F0_/2FRqQPyOKs18rFK5waVCGCI/jIBCBbgDdF/{4BD5DCDF-B312-11EB-90EB-ECF4BBEA1588}.dat.17.drfalse
                        high
                        http://crl.microsoftWerFault.exe, 0000000E.00000003.889153103.0000000005072000.00000004.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown

                        Contacted IPs

                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs

                        Public

                        IPDomainCountryFlagASNASN NameMalicious
                        52.97.233.66
                        HHN-efz.ms-acdc.office.comUnited States
                        8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                        40.101.137.82
                        unknownUnited States
                        8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                        40.97.153.146
                        outlook.comUnited States
                        8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse

                        General Information

                        Joe Sandbox Version:32.0.0 Black Diamond
                        Analysis ID:412166
                        Start date:12.05.2021
                        Start time:13:05:21
                        Joe Sandbox Product:CloudBasic
                        Overall analysis duration:0h 7m 59s
                        Hypervisor based Inspection enabled:false
                        Report type:light
                        Sample file name:nT5pUwoJSS.dll
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                        Number of analysed new started processes analysed:19
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • HDC enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Detection:MAL
                        Classification:mal72.troj.winDLL@15/9@3/3
                        EGA Information:Failed
                        HDC Information:
                        • Successful, ratio: 11.1% (good quality ratio 10.5%)
                        • Quality average: 79.6%
                        • Quality standard deviation: 28.6%
                        HCA Information:
                        • Successful, ratio: 83%
                        • Number of executed functions: 0
                        • Number of non-executed functions: 0
                        Cookbook Comments:
                        • Adjust boot time
                        • Enable AMSI
                        • Found application associated with file extension: .dll
                        Warnings:
                        Show All
                        • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, WerFault.exe, ielowutil.exe, backgroundTaskHost.exe, WmiPrvSE.exe, svchost.exe
                        • Excluded IPs from analysis (whitelisted): 52.255.188.83, 40.88.32.150, 92.122.145.220, 2.20.143.16, 2.20.142.209, 104.42.151.234, 52.147.198.201, 168.61.161.212, 20.190.159.138, 20.190.159.132, 20.190.159.136, 40.126.31.141, 40.126.31.137, 20.190.159.134, 40.126.31.139, 40.126.31.143, 20.82.209.183, 104.43.193.48, 92.122.213.247, 92.122.213.194, 88.221.62.148
                        • Excluded domains from analysis (whitelisted): au.download.windowsupdate.com.edgesuite.net, store-images.s-microsoft.com-c.edgekey.net, a1449.dscg2.akamai.net, arc.msn.com, www.tm.a.prd.aadg.trafficmanager.net, e11290.dspg.akamaiedge.net, skypedataprdcoleus15.cloudapp.net, e12564.dspb.akamaiedge.net, go.microsoft.com, login.live.com, audownload.windowsupdate.nsatc.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, au-bg-shim.trafficmanager.net, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, ctldl.windowsupdate.com, skypedataprdcolcus17.cloudapp.net, a767.dscg3.akamai.net, login.msa.msidentity.com, skypedataprdcolcus15.cloudapp.net, skypedataprdcoleus16.cloudapp.net, skypedataprdcoleus17.cloudapp.net, dub2.current.a.prd.aadg.trafficmanager.net, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, go.microsoft.com.edgekey.net, skypedataprdcolwus16.cloudapp.net, www.tm.lg.prod.aadmsa.trafficmanager.net
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • VT rate limit hit for: /opt/package/joesandbox/database/analysis/412166/sample/nT5pUwoJSS.dll

                        Simulations

                        Behavior and APIs

                        TimeTypeDescription
                        13:07:40API Interceptor1x Sleep call for process: rundll32.exe modified
                        13:08:01API Interceptor1x Sleep call for process: WerFault.exe modified

                        Joe Sandbox View / Context

                        IPs

                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                        40.97.153.1465instructio.exeGet hashmaliciousBrowse
                          .exeGet hashmaliciousBrowse
                            61Documen.exeGet hashmaliciousBrowse
                              65document.exeGet hashmaliciousBrowse
                                29mail98@vip.son.exeGet hashmaliciousBrowse
                                  57document.exeGet hashmaliciousBrowse

                                    Domains

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    HHN-efz.ms-acdc.office.comkZcCqvNtWa.dllGet hashmaliciousBrowse
                                    • 52.98.171.226
                                    A5uTdwOwJ1.dllGet hashmaliciousBrowse
                                    • 40.101.138.210
                                    FuiZSHt8Hx.dllGet hashmaliciousBrowse
                                    • 52.98.151.242
                                    609a460e94791.tiff.dllGet hashmaliciousBrowse
                                    • 52.97.201.34
                                    iJdlvBxhYu.dllGet hashmaliciousBrowse
                                    • 52.97.150.2
                                    8OKQ6ogGRx.dllGet hashmaliciousBrowse
                                    • 40.101.138.2
                                    609110f2d14a6.dllGet hashmaliciousBrowse
                                    • 40.101.137.34
                                    New%20order%20contract.htmlGet hashmaliciousBrowse
                                    • 52.98.175.2
                                    outlook.comA1qhcbngFV.exeGet hashmaliciousBrowse
                                    • 104.47.54.36
                                    file.msg.exeGet hashmaliciousBrowse
                                    • 104.47.56.138
                                    Update-KB1484-x86.exeGet hashmaliciousBrowse
                                    • 104.47.57.138
                                    n6osajjc938.exeGet hashmaliciousBrowse
                                    • 104.47.54.36
                                    9b3d7f02.exeGet hashmaliciousBrowse
                                    • 104.47.54.36
                                    5zc9vbGBo3.exeGet hashmaliciousBrowse
                                    • 52.101.24.0
                                    InnAcjnAmG.exeGet hashmaliciousBrowse
                                    • 104.47.53.36
                                    8X93Tzvd7V.exeGet hashmaliciousBrowse
                                    • 52.101.24.0
                                    u8A8Qy5S7O.exeGet hashmaliciousBrowse
                                    • 104.47.53.36
                                    SecuriteInfo.com.Mal.GandCrypt-A.24654.exeGet hashmaliciousBrowse
                                    • 104.47.54.36
                                    SecuriteInfo.com.Mal.GandCrypt-A.5674.exeGet hashmaliciousBrowse
                                    • 104.47.54.36
                                    SecuriteInfo.com.W32.AIDetect.malware2.29567.exeGet hashmaliciousBrowse
                                    • 104.47.53.36

                                    ASN

                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    MICROSOFT-CORP-MSN-AS-BLOCKUSlnqNKSyWgz.exeGet hashmaliciousBrowse
                                    • 13.72.107.36
                                    1c60a1e9_by_Libranalysis.rtfGet hashmaliciousBrowse
                                    • 157.55.173.72
                                    DHL_988121.exeGet hashmaliciousBrowse
                                    • 104.43.200.50
                                    DHL_988121.exeGet hashmaliciousBrowse
                                    • 104.43.200.50
                                    A1qhcbngFV.exeGet hashmaliciousBrowse
                                    • 20.47.146.252
                                    FuiZSHt8Hx.dllGet hashmaliciousBrowse
                                    • 52.97.201.2
                                    609a460e94791.tiff.dllGet hashmaliciousBrowse
                                    • 40.101.12.82
                                    iIoO9qC8yj.exeGet hashmaliciousBrowse
                                    • 13.107.4.50
                                    qLi9sAxeSm.exeGet hashmaliciousBrowse
                                    • 204.95.99.243
                                    f1a5fbd3e946e8db1c18bd1d30d0f8b41a873cbb76769.exeGet hashmaliciousBrowse
                                    • 20.194.35.6
                                    tgix.exeGet hashmaliciousBrowse
                                    • 137.117.64.85
                                    Protiviti.htmGet hashmaliciousBrowse
                                    • 52.240.156.143
                                    hn80vhR3y1.exeGet hashmaliciousBrowse
                                    • 13.69.222.243
                                    file.msg.exeGet hashmaliciousBrowse
                                    • 104.47.56.161
                                    SCB_MT103_31951R2105050031_200505.PDF.exeGet hashmaliciousBrowse
                                    • 157.55.136.23
                                    Windows_Update.exeGet hashmaliciousBrowse
                                    • 20.52.178.148
                                    NcLDA3J4Kp.apkGet hashmaliciousBrowse
                                    • 204.79.197.200
                                    LIau1wwvy5.exeGet hashmaliciousBrowse
                                    • 20.43.33.61
                                    Update-KB1484-x86.exeGet hashmaliciousBrowse
                                    • 104.47.37.36
                                    iJdlvBxhYu.dllGet hashmaliciousBrowse
                                    • 52.97.201.82
                                    MICROSOFT-CORP-MSN-AS-BLOCKUSlnqNKSyWgz.exeGet hashmaliciousBrowse
                                    • 13.72.107.36
                                    1c60a1e9_by_Libranalysis.rtfGet hashmaliciousBrowse
                                    • 157.55.173.72
                                    DHL_988121.exeGet hashmaliciousBrowse
                                    • 104.43.200.50
                                    DHL_988121.exeGet hashmaliciousBrowse
                                    • 104.43.200.50
                                    A1qhcbngFV.exeGet hashmaliciousBrowse
                                    • 20.47.146.252
                                    FuiZSHt8Hx.dllGet hashmaliciousBrowse
                                    • 52.97.201.2
                                    609a460e94791.tiff.dllGet hashmaliciousBrowse
                                    • 40.101.12.82
                                    iIoO9qC8yj.exeGet hashmaliciousBrowse
                                    • 13.107.4.50
                                    qLi9sAxeSm.exeGet hashmaliciousBrowse
                                    • 204.95.99.243
                                    f1a5fbd3e946e8db1c18bd1d30d0f8b41a873cbb76769.exeGet hashmaliciousBrowse
                                    • 20.194.35.6
                                    tgix.exeGet hashmaliciousBrowse
                                    • 137.117.64.85
                                    Protiviti.htmGet hashmaliciousBrowse
                                    • 52.240.156.143
                                    hn80vhR3y1.exeGet hashmaliciousBrowse
                                    • 13.69.222.243
                                    file.msg.exeGet hashmaliciousBrowse
                                    • 104.47.56.161
                                    SCB_MT103_31951R2105050031_200505.PDF.exeGet hashmaliciousBrowse
                                    • 157.55.136.23
                                    Windows_Update.exeGet hashmaliciousBrowse
                                    • 20.52.178.148
                                    NcLDA3J4Kp.apkGet hashmaliciousBrowse
                                    • 204.79.197.200
                                    LIau1wwvy5.exeGet hashmaliciousBrowse
                                    • 20.43.33.61
                                    Update-KB1484-x86.exeGet hashmaliciousBrowse
                                    • 104.47.37.36
                                    iJdlvBxhYu.dllGet hashmaliciousBrowse
                                    • 52.97.201.82

                                    JA3 Fingerprints

                                    No context

                                    Dropped Files

                                    No context

                                    Created / dropped Files

                                    C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_rundll32.exe_4323c1d7a32576d87639b5d887c5a93fe7aab20_82810a17_002dad83\Report.wer
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):12274
                                    Entropy (8bit):3.760387811626687
                                    Encrypted:false
                                    SSDEEP:192:+5WBNis0oXZHNXwRjed+E/u7sOS274ItWco:Z7iqXJNXwRjeh/u7sOX4ItWco
                                    MD5:65B1A8F8223E4AB018A95B43305BB1C8
                                    SHA1:48B24682C2E0631A963EB2BEF63ABD6F50ECF4C5
                                    SHA-256:5C437229DCC881F3B4F37B7BB9B772AADD7AD70D95C1E89E9A451E8C94726565
                                    SHA-512:B8368FBD391A5E5076D6ECE48C7D72A54678CE7804E745C7F734AD7C0D5F9C950C261ACBAD104FCA66DA226B637B0947043A395E90F4CEE78AD4C4F2FC3B4F1A
                                    Malicious:false
                                    Reputation:low
                                    Preview: ..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.2.6.5.2.9.1.2.7.3.5.2.0.9.7.4.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.6.5.2.9.1.2.7.9.9.5.8.4.6.1.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.2.6.8.4.3.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.c.d.6.1.5.5.3.-.f.7.a.7.-.4.3.9.c.-.9.3.8.2.-.1.4.2.2.2.5.7.3.5.c.3.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.a.0.1.e.5.c.d.-.5.2.f.7.-.4.a.c.1.-.9.e.d.f.-.3.7.4.b.4.c.7.2.e.6.c.7.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.5.0.-.0.0.0.1.-.0.0.1.b.-.8.f.e.4.-.2.3.d.0.1.e.4.7.d.7.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.
                                    C:\ProgramData\Microsoft\Windows\WER\Temp\WER8EB1.tmp.dmp
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:Mini DuMP crash report, 15 streams, Wed May 12 11:07:55 2021, 0x1205a4 type
                                    Category:dropped
                                    Size (bytes):59358
                                    Entropy (8bit):1.9984891529039928
                                    Encrypted:false
                                    SSDEEP:192:fMcuApA1pdJOjc9qElfIpsp6Arg76Sn/kc/XOYAg04xG2OFY+GkxMHhrUlnaOuIq:zrA1pbOiPc7NN/r1xOY+GkxMHYaOuJp
                                    MD5:2DFACEB2A6B8E2DB10FA736DE4498EAC
                                    SHA1:59577B330853D4007FFD428C7A70100F6373F93E
                                    SHA-256:DF885B82793B6A37F202AD54154B6CDAC1F386C92701CF861E596B7AC12BAD52
                                    SHA-512:E48799E4955583C38E32D6BB69659B283872CA62DB27C401B8649FC3B6E5378CEBBEFDD65BF57CD53438DC72A10605644F1EB0FCE533D40726D15876ABB98A17
                                    Malicious:false
                                    Reputation:low
                                    Preview: MDMP....... ..........`...................U...........B......`.......GenuineIntelW...........T.......P......`.............................0..1...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................d.b.g.c.o.r.e...i.3.8.6.,.1.0...0...1.7.1.3.4...1.........................................................................................................
                                    C:\ProgramData\Microsoft\Windows\WER\Temp\WER9808.tmp.WERInternalMetadata.xml
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):8290
                                    Entropy (8bit):3.6921112436173114
                                    Encrypted:false
                                    SSDEEP:192:Rrl7r3GLNiRjB6dq6YTJ64LZLGgmfTkOS3A+pDB89ba6TsfSmkYm:RrlsNiVB6dq6Y964tagmfTkOS3qa64fs
                                    MD5:D2AE7D4FC19E3D3F00CB3BBA18716414
                                    SHA1:F27E57C80022F1AD378735B72957A6A4B05805E4
                                    SHA-256:A73833AD0DB5A85528DAD79B81C85DB2EC216A26CE6E5E54EE4EFAF76ACD3C37
                                    SHA-512:EF0D028A7827972648BC05A27D663712021B1B60ADA68BEE39322953D14959E472A79B7929F6DDFA7CCCD49BB5A064FCEB1EBF41BF1A4DA7FA042F844D27016D
                                    Malicious:false
                                    Reputation:low
                                    Preview: ..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.9.9.2.<./.P.i.d.>.......
                                    C:\ProgramData\Microsoft\Windows\WER\Temp\WER9A6B.tmp.xml
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):4629
                                    Entropy (8bit):4.450080143760217
                                    Encrypted:false
                                    SSDEEP:48:cvIwSD8zsLtJgtWI96UWSC8BZ78fm8M4JCds9FK+q8/5CA4SrSMd:uITfLH9NSN/4JgwDWMd
                                    MD5:3A363033BCDA509CC11610F8EAE185F1
                                    SHA1:78454D6E43EC4DA98F46B02EF181673BCD929E6E
                                    SHA-256:E9E57C10B891757381366073C1037A28BD36DB3DAB60F99BEE3D2690BC0107EB
                                    SHA-512:2EEE18A1B383B6EFD63A077EB19D6962376420E14767329925B1C99B8FE4E415A2482D67B9DF1D39FE3FF0744AF5407F6AA97304F6FF5B1CADDB7B3170EB834A
                                    Malicious:false
                                    Preview: <?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="986178" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                    C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{4BD5DCDD-B312-11EB-90EB-ECF4BBEA1588}.dat
                                    Process:C:\Program Files\internet explorer\iexplore.exe
                                    File Type:Microsoft Word Document
                                    Category:dropped
                                    Size (bytes):29272
                                    Entropy (8bit):1.7680840235180313
                                    Encrypted:false
                                    SSDEEP:192:rwZPZTw22TwzWTwttTwyifTwVJnzMTwLvd6vbBTwuYpB:rgxilQArz0
                                    MD5:F75591F98019D2A0608F3FB097EA2F15
                                    SHA1:4787CAEFE912FB167C6FEB9FE00EEC553BDEA5FC
                                    SHA-256:EB3FC9C41D9193ED4B8409124C88AF54D920E178F2CF2FBF466CA0CEA4C4A534
                                    SHA-512:8D9EF494C0885A2E3A489E923F8934839E91B90383DD56785E715EECC13F0170C3696DDFFF0200AEC840505CF2EF538A393BDD870573BBC676F7D75D9C781D80
                                    Malicious:false
                                    Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{4BD5DCDF-B312-11EB-90EB-ECF4BBEA1588}.dat
                                    Process:C:\Program Files\internet explorer\iexplore.exe
                                    File Type:Microsoft Word Document
                                    Category:dropped
                                    Size (bytes):27392
                                    Entropy (8bit):1.8524964337535361
                                    Encrypted:false
                                    SSDEEP:192:rHZUQs6Skhjl2pWAM0KIRKDDZBRIRKDDZNKD/A:r5d3L9cYVTCKD5CKDvKDo
                                    MD5:8B7FC14949EEB4934FD6671CDF794B2E
                                    SHA1:258C482B68B3B6141A58274D970E0B6207DB7ED9
                                    SHA-256:9EC0132700BAA61FE67AFAFF537B02FE5A31E856547FD0D7528964F4AC7EC3B6
                                    SHA-512:E29B09803C09DE623B3BB597AF7A4993B948AEE901871C459E6B2A5F024B15313688FBBAD3F181B042C39DBCDE1B9C3321DCDD67D6E696A60BA2854AC11F9C70
                                    Malicious:false
                                    Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
                                    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:modified
                                    Size (bytes):89
                                    Entropy (8bit):4.488012965147007
                                    Encrypted:false
                                    SSDEEP:3:oVXUXvcXSdH8JOGXnEXvcSeFUUCn:o9UXEXwqEXES
                                    MD5:174BE973E6B0C3BD797883F3212802DF
                                    SHA1:954D60C1360503B14A9E51AB3ACA4BDD2A5C0EB4
                                    SHA-256:C13A06C3F7825D7230CB567F756CDE4F8CADDE35A8FBED07F36E4688E0432EBA
                                    SHA-512:2E197883B6869C97B25DF329FFDB17A3AFAFEADF364613E0DB314B3CCFEC53E74658F36F66B605987E48B8BB53CD63B017242DC22228EC2121E56DA6A4434702
                                    Malicious:false
                                    Preview: [2021/05/12 13:07:54.927] Latest deploy version: ..[2021/05/12 13:07:54.974] 11.211.2 ..
                                    C:\Users\user\AppData\Local\Temp\~DF7EA0309EEFF1F973.TMP
                                    Process:C:\Program Files\internet explorer\iexplore.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):39681
                                    Entropy (8bit):0.5798862163096153
                                    Encrypted:false
                                    SSDEEP:192:kBqoxKAuqR+9DhAjxIRKDDZ3IRKDDZjIRKDDZo:kBqoxKAuqR+9DhAjxCKDdCKDRCKD2
                                    MD5:4B91B3F5A88EEBB6F58712D6DAC44382
                                    SHA1:3E64372F0900AD52FE1259E702A1F0C2DE8004B0
                                    SHA-256:E2BA9974330571C2AD06972236C49D39DABF23514931341E6CCD45518C3F1AF4
                                    SHA-512:DFE874DEB1728240E12D778A374C521AD84BD7FA013D222665EF5E2032540DDB3333CEF9B722C1FEADC4E8077980F9F915517590A628CBCB0F5B4788CB9EBCFB
                                    Malicious:false
                                    Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    C:\Users\user\AppData\Local\Temp\~DFA1436EB82669AF9C.TMP
                                    Process:C:\Program Files\internet explorer\iexplore.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):12933
                                    Entropy (8bit):0.4074938468026375
                                    Encrypted:false
                                    SSDEEP:24:c9lLh9lLh9lIn9lIn9loTwP9loTwP9lWTwkci:kBqoITwQTwuTwO
                                    MD5:A7BD0ABE7B8FC7B1D1EADEC39A42E343
                                    SHA1:83109B9245E2D070D04B32FA123C9D81EC10F66F
                                    SHA-256:51542B6CDC943EB6BE14D54417295C84A4FAF1FE953309D01F82ACAC05E59684
                                    SHA-512:B4B3E3AA2E56352062DDD43124FE1E1E8615C586546498A43346A6A8A27204601F55AA9405F90596767ECDFC2B2845AFE2A2F27CD04EE3953DFF71B1F4DBCE45
                                    Malicious:false
                                    Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                                    Static File Info

                                    General

                                    File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                    Entropy (8bit):6.324538219307157
                                    TrID:
                                    • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
                                    • Generic Win/DOS Executable (2004/3) 0.20%
                                    • DOS Executable Generic (2002/1) 0.20%
                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                    File name:nT5pUwoJSS.dll
                                    File size:478720
                                    MD5:6fdbd25f7a84da80ee9d8577122c3291
                                    SHA1:39a52cbc48be934cf953d4699e8a1ea5ff53a5bf
                                    SHA256:4bf6e9d4067cb905631ddf7452ac571c4ed9800c7eb8fc7e51b688e1154f52e3
                                    SHA512:935e43b18efb458f246523976f6b71655cf5c4465cddc86e5b91a9acc8e5d77f3bc3d2b0414d9e08114f286afd682cb9364193babaec4cd6b6ca871abf5b79de
                                    SSDEEP:12288:4Z31u8+a95+CA9lROexg8P7CbxXTTbWA:4Z31P9wr9lROog8W/
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........C...".J.".J.".J...J.".J.pwJ.".J4mrJ.".J.pqJ.".J.pgJ.".J.p`J.".J...J.".J.".J.#.J.pkJ.".J.pvJ.".J.ppJ.".J.puJ.".JRich.".J.......

                                    File Icon

                                    Icon Hash:74f0e4ecccdce0e4

                                    Static PE Info

                                    General

                                    Entrypoint:0x1041953
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x1000000
                                    Subsystem:windows gui
                                    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
                                    DLL Characteristics:DYNAMIC_BASE
                                    Time Stamp:0x608B79B0 [Fri Apr 30 03:29:52 2021 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:5
                                    OS Version Minor:0
                                    File Version Major:5
                                    File Version Minor:0
                                    Subsystem Version Major:5
                                    Subsystem Version Minor:0
                                    Import Hash:a2f0d616525ae6c643810961c7d4fdfe

                                    Entrypoint Preview

                                    Instruction
                                    mov edi, edi
                                    push ebp
                                    mov ebp, esp
                                    cmp dword ptr [ebp+0Ch], 01h
                                    jne 00007FC9209ACBD7h
                                    call 00007FC9209B153Ch
                                    push dword ptr [ebp+08h]
                                    mov ecx, dword ptr [ebp+10h]
                                    mov edx, dword ptr [ebp+0Ch]
                                    call 00007FC9209ACAC1h
                                    pop ecx
                                    pop ebp
                                    retn 000Ch
                                    mov edi, edi
                                    push ebp
                                    mov ebp, esp
                                    mov eax, dword ptr [ebp+08h]
                                    xor ecx, ecx
                                    cmp eax, dword ptr [01073618h+ecx*8]
                                    je 00007FC9209ACBE5h
                                    inc ecx
                                    cmp ecx, 2Dh
                                    jc 00007FC9209ACBC3h
                                    lea ecx, dword ptr [eax-13h]
                                    cmp ecx, 11h
                                    jnbe 00007FC9209ACBE0h
                                    push 0000000Dh
                                    pop eax
                                    pop ebp
                                    ret
                                    mov eax, dword ptr [0107361Ch+ecx*8]
                                    pop ebp
                                    ret
                                    add eax, FFFFFF44h
                                    push 0000000Eh
                                    pop ecx
                                    cmp ecx, eax
                                    sbb eax, eax
                                    and eax, ecx
                                    add eax, 08h
                                    pop ebp
                                    ret
                                    call 00007FC9209AE4A6h
                                    test eax, eax
                                    jne 00007FC9209ACBD8h
                                    mov eax, 01073780h
                                    ret
                                    add eax, 08h
                                    ret
                                    mov edi, edi
                                    push ebp
                                    mov ebp, esp
                                    mov eax, dword ptr [ebp+08h]
                                    mov dword ptr [0108B5ACh], eax
                                    pop ebp
                                    ret
                                    mov edi, edi
                                    push ebp
                                    mov ebp, esp
                                    push dword ptr [0108B5ACh]
                                    call 00007FC9209AE2A6h
                                    pop ecx
                                    test eax, eax
                                    je 00007FC9209ACBE1h
                                    push dword ptr [ebp+08h]
                                    call eax
                                    pop ecx
                                    test eax, eax
                                    je 00007FC9209ACBD7h
                                    xor eax, eax
                                    inc eax
                                    pop ebp
                                    ret
                                    xor eax, eax
                                    pop ebp
                                    ret
                                    mov edi, edi
                                    push esi
                                    push edi
                                    xor esi, esi
                                    mov edi, 0108B5B8h
                                    cmp dword ptr [0107378Ch+esi*8], 01h
                                    jne 00007FC9209ACBF0h
                                    lea eax, dword ptr [00000088h+esi*8]

                                    Rich Headers

                                    Programming Language:
                                    • [ C ] VS2008 build 21022
                                    • [LNK] VS2008 build 21022
                                    • [ C ] VS2005 build 50727
                                    • [ASM] VS2008 build 21022
                                    • [IMP] VS2005 build 50727
                                    • [RES] VS2008 build 21022
                                    • [C++] VS2008 build 21022
                                    • [IMP] VS2008 build 21022
                                    • [EXP] VS2008 build 21022

                                    Data Directories

                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x726300x6f.rdata
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x71e640x50.rdata
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x8d0000x3bc.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x8e0000x1544.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x491900x1c.rdata
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x70c080x40.rdata
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x490000x15c.rdata
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                    Sections

                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x10000x4732e0x47400False0.745877878289data6.57408998047IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                    .rdata0x490000x2969f0x29800False0.65666768637data5.42368765721IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .data0x730000x1917c0x1400False0.2435546875data3.63177828336IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                    .rsrc0x8d0000x3bc0x400False0.4091796875data3.09285651514IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x8e0000x25880x2600False0.456106085526data4.61056666922IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                    Resources

                                    NameRVASizeTypeLanguageCountry
                                    RT_VERSION0x8d0580x364dataEnglishUnited States

                                    Imports

                                    DLLImport
                                    KERNEL32.dllQueryPerformanceCounter, GetVolumeInformationW, GetSystemTime, GetModuleHandleW, GetVersionExW, OpenProcess, GetDateFormatW, FindResourceW, LockResource, GetLocalTime, HeapCreate, CreateFileW, HeapFree, HeapCompact, HeapAlloc, VirtualProtectEx, GetCurrentDirectoryW, SetConsoleCP, SetConsoleOutputCP, GetStringTypeW, GetStringTypeA, GetLocaleInfoA, LoadLibraryA, GetLastError, HeapReAlloc, RtlUnwind, GetCurrentThreadId, GetCommandLineA, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, HeapDestroy, VirtualFree, VirtualAlloc, Sleep, GetProcAddress, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, InterlockedDecrement, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, LCMapStringA, WideCharToMultiByte, MultiByteToWideChar, LCMapStringW, TerminateProcess, GetCurrentProcess, IsDebuggerPresent, RaiseException, HeapSize, SetHandleCount, GetFileType, GetStartupInfoA, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, InitializeCriticalSectionAndSpinCount
                                    ole32.dllCoCreateInstance, CoUninitialize, OleInitialize, OleUninitialize, CoInitialize
                                    WINSPOOL.DRVEnumPrintersW, GetPrinterDataW, GetPrinterW, DocumentPropertiesW, OpenPrinterW, ClosePrinter

                                    Exports

                                    NameOrdinalAddress
                                    Eithernothing10x103a020
                                    Order20x1039f40
                                    Smileschool30x1039b20

                                    Version Infos

                                    DescriptionData
                                    LegalCopyright Notice sister Corporation. All rights reserved
                                    InternalNameSlow
                                    FileVersion3.2.1.380
                                    CompanyNameNotice sister Corporation
                                    ProductNameNotice sister Soil read
                                    Observe38
                                    ProductVersion3.2.1
                                    FileDescriptionNotice sister Soil read Skinneed
                                    OriginalFilenameTail.dll
                                    Translation0x0409 0x04b0

                                    Possible Origin

                                    Language of compilation systemCountry where language is spokenMap
                                    EnglishUnited States

                                    Network Behavior

                                    Network Port Distribution

                                    TCP Packets

                                    TimestampSource PortDest PortSource IPDest IP
                                    May 12, 2021 13:07:56.524216890 CEST4975380192.168.2.440.97.153.146
                                    May 12, 2021 13:07:56.524513006 CEST4975480192.168.2.440.97.153.146
                                    May 12, 2021 13:07:56.652859926 CEST804975340.97.153.146192.168.2.4
                                    May 12, 2021 13:07:56.653002977 CEST4975380192.168.2.440.97.153.146
                                    May 12, 2021 13:07:56.653544903 CEST804975440.97.153.146192.168.2.4
                                    May 12, 2021 13:07:56.653630018 CEST4975480192.168.2.440.97.153.146
                                    May 12, 2021 13:07:56.654592991 CEST4975380192.168.2.440.97.153.146
                                    May 12, 2021 13:07:56.787769079 CEST804975340.97.153.146192.168.2.4
                                    May 12, 2021 13:07:56.788000107 CEST4975380192.168.2.440.97.153.146
                                    May 12, 2021 13:07:56.788275957 CEST4975380192.168.2.440.97.153.146
                                    May 12, 2021 13:07:56.807976961 CEST49755443192.168.2.440.97.153.146
                                    May 12, 2021 13:07:56.917027950 CEST804975340.97.153.146192.168.2.4
                                    May 12, 2021 13:07:56.939476013 CEST4434975540.97.153.146192.168.2.4
                                    May 12, 2021 13:07:56.939598083 CEST49755443192.168.2.440.97.153.146
                                    May 12, 2021 13:07:56.956787109 CEST49755443192.168.2.440.97.153.146
                                    May 12, 2021 13:07:57.088217020 CEST4434975540.97.153.146192.168.2.4
                                    May 12, 2021 13:07:57.088253975 CEST4434975540.97.153.146192.168.2.4
                                    May 12, 2021 13:07:57.088278055 CEST4434975540.97.153.146192.168.2.4
                                    May 12, 2021 13:07:57.088347912 CEST49755443192.168.2.440.97.153.146
                                    May 12, 2021 13:07:57.088407993 CEST49755443192.168.2.440.97.153.146
                                    May 12, 2021 13:07:57.135567904 CEST49755443192.168.2.440.97.153.146
                                    May 12, 2021 13:07:57.141473055 CEST49755443192.168.2.440.97.153.146
                                    May 12, 2021 13:07:57.267406940 CEST4434975540.97.153.146192.168.2.4
                                    May 12, 2021 13:07:57.267497063 CEST49755443192.168.2.440.97.153.146
                                    May 12, 2021 13:07:57.273684978 CEST4434975540.97.153.146192.168.2.4
                                    May 12, 2021 13:07:57.273825884 CEST49755443192.168.2.440.97.153.146
                                    May 12, 2021 13:07:57.274255991 CEST49755443192.168.2.440.97.153.146
                                    May 12, 2021 13:07:57.340895891 CEST49757443192.168.2.452.97.233.66
                                    May 12, 2021 13:07:57.341072083 CEST49756443192.168.2.452.97.233.66
                                    May 12, 2021 13:07:57.389771938 CEST4434975752.97.233.66192.168.2.4
                                    May 12, 2021 13:07:57.389811039 CEST4434975652.97.233.66192.168.2.4
                                    May 12, 2021 13:07:57.389878988 CEST49757443192.168.2.452.97.233.66
                                    May 12, 2021 13:07:57.389921904 CEST49756443192.168.2.452.97.233.66
                                    May 12, 2021 13:07:57.391278028 CEST49757443192.168.2.452.97.233.66
                                    May 12, 2021 13:07:57.392539024 CEST49756443192.168.2.452.97.233.66
                                    May 12, 2021 13:07:57.404428005 CEST4434975540.97.153.146192.168.2.4
                                    May 12, 2021 13:07:57.440767050 CEST4434975752.97.233.66192.168.2.4
                                    May 12, 2021 13:07:57.440804958 CEST4434975752.97.233.66192.168.2.4
                                    May 12, 2021 13:07:57.440829992 CEST4434975752.97.233.66192.168.2.4
                                    May 12, 2021 13:07:57.440850973 CEST49757443192.168.2.452.97.233.66
                                    May 12, 2021 13:07:57.440888882 CEST49757443192.168.2.452.97.233.66
                                    May 12, 2021 13:07:57.441837072 CEST4434975652.97.233.66192.168.2.4
                                    May 12, 2021 13:07:57.441859961 CEST4434975652.97.233.66192.168.2.4
                                    May 12, 2021 13:07:57.441878080 CEST4434975652.97.233.66192.168.2.4
                                    May 12, 2021 13:07:57.441922903 CEST49756443192.168.2.452.97.233.66
                                    May 12, 2021 13:07:57.441966057 CEST49756443192.168.2.452.97.233.66
                                    May 12, 2021 13:07:57.456420898 CEST49756443192.168.2.452.97.233.66
                                    May 12, 2021 13:07:57.456739902 CEST49757443192.168.2.452.97.233.66
                                    May 12, 2021 13:07:57.457509995 CEST49756443192.168.2.452.97.233.66
                                    May 12, 2021 13:07:57.507992983 CEST4434975752.97.233.66192.168.2.4
                                    May 12, 2021 13:07:57.508028984 CEST4434975652.97.233.66192.168.2.4
                                    May 12, 2021 13:07:57.508058071 CEST4434975652.97.233.66192.168.2.4
                                    May 12, 2021 13:07:57.508086920 CEST49757443192.168.2.452.97.233.66
                                    May 12, 2021 13:07:57.508121967 CEST49756443192.168.2.452.97.233.66
                                    May 12, 2021 13:07:57.510467052 CEST4434975652.97.233.66192.168.2.4
                                    May 12, 2021 13:07:57.510528088 CEST49756443192.168.2.452.97.233.66
                                    May 12, 2021 13:07:57.511269093 CEST49756443192.168.2.452.97.233.66
                                    May 12, 2021 13:07:57.559741020 CEST4434975652.97.233.66192.168.2.4
                                    May 12, 2021 13:07:57.595808029 CEST49758443192.168.2.440.101.137.82
                                    May 12, 2021 13:07:57.595855951 CEST49759443192.168.2.440.101.137.82
                                    May 12, 2021 13:07:57.645627022 CEST4434975940.101.137.82192.168.2.4
                                    May 12, 2021 13:07:57.645654917 CEST4434975840.101.137.82192.168.2.4
                                    May 12, 2021 13:07:57.645747900 CEST49759443192.168.2.440.101.137.82
                                    May 12, 2021 13:07:57.645814896 CEST49758443192.168.2.440.101.137.82
                                    May 12, 2021 13:07:57.649241924 CEST49759443192.168.2.440.101.137.82
                                    May 12, 2021 13:07:57.650088072 CEST49758443192.168.2.440.101.137.82
                                    May 12, 2021 13:07:57.701133013 CEST4434975940.101.137.82192.168.2.4
                                    May 12, 2021 13:07:57.701167107 CEST4434975940.101.137.82192.168.2.4
                                    May 12, 2021 13:07:57.701189041 CEST4434975940.101.137.82192.168.2.4
                                    May 12, 2021 13:07:57.701257944 CEST49759443192.168.2.440.101.137.82
                                    May 12, 2021 13:07:57.701292038 CEST49759443192.168.2.440.101.137.82
                                    May 12, 2021 13:07:57.701807976 CEST4434975840.101.137.82192.168.2.4
                                    May 12, 2021 13:07:57.701838017 CEST4434975840.101.137.82192.168.2.4
                                    May 12, 2021 13:07:57.701862097 CEST4434975840.101.137.82192.168.2.4
                                    May 12, 2021 13:07:57.701891899 CEST49758443192.168.2.440.101.137.82
                                    May 12, 2021 13:07:57.701932907 CEST49758443192.168.2.440.101.137.82
                                    May 12, 2021 13:07:57.715931892 CEST49759443192.168.2.440.101.137.82
                                    May 12, 2021 13:07:57.716289043 CEST49759443192.168.2.440.101.137.82
                                    May 12, 2021 13:07:57.720307112 CEST49758443192.168.2.440.101.137.82
                                    May 12, 2021 13:07:57.765304089 CEST4434975940.101.137.82192.168.2.4
                                    May 12, 2021 13:07:57.766113043 CEST4434975940.101.137.82192.168.2.4
                                    May 12, 2021 13:07:57.766210079 CEST49759443192.168.2.440.101.137.82
                                    May 12, 2021 13:07:57.770592928 CEST4434975840.101.137.82192.168.2.4
                                    May 12, 2021 13:07:57.770699978 CEST49758443192.168.2.440.101.137.82
                                    May 12, 2021 13:07:57.794503927 CEST4434975940.101.137.82192.168.2.4
                                    May 12, 2021 13:07:57.794528008 CEST4434975940.101.137.82192.168.2.4
                                    May 12, 2021 13:07:57.794564962 CEST49759443192.168.2.440.101.137.82
                                    May 12, 2021 13:07:57.794585943 CEST49759443192.168.2.440.101.137.82
                                    May 12, 2021 13:07:58.988245010 CEST4975480192.168.2.440.97.153.146
                                    May 12, 2021 13:07:58.988343954 CEST49759443192.168.2.440.101.137.82
                                    May 12, 2021 13:07:58.989630938 CEST49757443192.168.2.452.97.233.66
                                    May 12, 2021 13:07:58.989656925 CEST49758443192.168.2.440.101.137.82

                                    UDP Packets

                                    TimestampSource PortDest PortSource IPDest IP
                                    May 12, 2021 13:06:00.430233955 CEST5309753192.168.2.48.8.8.8
                                    May 12, 2021 13:06:00.479023933 CEST53530978.8.8.8192.168.2.4
                                    May 12, 2021 13:06:01.537579060 CEST4925753192.168.2.48.8.8.8
                                    May 12, 2021 13:06:01.589147091 CEST53492578.8.8.8192.168.2.4
                                    May 12, 2021 13:06:01.686364889 CEST6238953192.168.2.48.8.8.8
                                    May 12, 2021 13:06:01.749185085 CEST53623898.8.8.8192.168.2.4
                                    May 12, 2021 13:06:02.330004930 CEST4991053192.168.2.48.8.8.8
                                    May 12, 2021 13:06:02.381606102 CEST53499108.8.8.8192.168.2.4
                                    May 12, 2021 13:06:03.079670906 CEST5585453192.168.2.48.8.8.8
                                    May 12, 2021 13:06:03.131386995 CEST53558548.8.8.8192.168.2.4
                                    May 12, 2021 13:06:03.838140965 CEST6454953192.168.2.48.8.8.8
                                    May 12, 2021 13:06:03.890248060 CEST53645498.8.8.8192.168.2.4
                                    May 12, 2021 13:06:05.137980938 CEST6315353192.168.2.48.8.8.8
                                    May 12, 2021 13:06:05.186661959 CEST53631538.8.8.8192.168.2.4
                                    May 12, 2021 13:06:06.116621017 CEST5299153192.168.2.48.8.8.8
                                    May 12, 2021 13:06:06.165359974 CEST53529918.8.8.8192.168.2.4
                                    May 12, 2021 13:06:07.012972116 CEST5370053192.168.2.48.8.8.8
                                    May 12, 2021 13:06:07.064455986 CEST53537008.8.8.8192.168.2.4
                                    May 12, 2021 13:06:59.158689022 CEST5172653192.168.2.48.8.8.8
                                    May 12, 2021 13:06:59.218735933 CEST53517268.8.8.8192.168.2.4
                                    May 12, 2021 13:07:13.575684071 CEST5679453192.168.2.48.8.8.8
                                    May 12, 2021 13:07:13.624511003 CEST53567948.8.8.8192.168.2.4
                                    May 12, 2021 13:07:33.184400082 CEST5653453192.168.2.48.8.8.8
                                    May 12, 2021 13:07:33.233283997 CEST53565348.8.8.8192.168.2.4
                                    May 12, 2021 13:07:34.089867115 CEST5662753192.168.2.48.8.8.8
                                    May 12, 2021 13:07:34.147365093 CEST53566278.8.8.8192.168.2.4
                                    May 12, 2021 13:07:35.026246071 CEST5662153192.168.2.48.8.8.8
                                    May 12, 2021 13:07:35.086539030 CEST53566218.8.8.8192.168.2.4
                                    May 12, 2021 13:07:35.351069927 CEST6311653192.168.2.48.8.8.8
                                    May 12, 2021 13:07:35.401068926 CEST53631168.8.8.8192.168.2.4
                                    May 12, 2021 13:07:36.008440971 CEST6407853192.168.2.48.8.8.8
                                    May 12, 2021 13:07:36.083830118 CEST53640788.8.8.8192.168.2.4
                                    May 12, 2021 13:07:37.127737045 CEST6480153192.168.2.48.8.8.8
                                    May 12, 2021 13:07:37.176460028 CEST53648018.8.8.8192.168.2.4
                                    May 12, 2021 13:07:38.093313932 CEST6172153192.168.2.48.8.8.8
                                    May 12, 2021 13:07:38.143081903 CEST53617218.8.8.8192.168.2.4
                                    May 12, 2021 13:07:39.032254934 CEST5125553192.168.2.48.8.8.8
                                    May 12, 2021 13:07:39.081478119 CEST53512558.8.8.8192.168.2.4
                                    May 12, 2021 13:07:41.426986933 CEST6152253192.168.2.48.8.8.8
                                    May 12, 2021 13:07:41.476294041 CEST53615228.8.8.8192.168.2.4
                                    May 12, 2021 13:07:42.213614941 CEST5233753192.168.2.48.8.8.8
                                    May 12, 2021 13:07:42.263492107 CEST53523378.8.8.8192.168.2.4
                                    May 12, 2021 13:07:42.913527966 CEST5504653192.168.2.48.8.8.8
                                    May 12, 2021 13:07:42.973959923 CEST53550468.8.8.8192.168.2.4
                                    May 12, 2021 13:07:43.147269964 CEST4961253192.168.2.48.8.8.8
                                    May 12, 2021 13:07:43.198693991 CEST53496128.8.8.8192.168.2.4
                                    May 12, 2021 13:07:44.032737017 CEST4928553192.168.2.48.8.8.8
                                    May 12, 2021 13:07:44.083465099 CEST53492858.8.8.8192.168.2.4
                                    May 12, 2021 13:07:54.982896090 CEST5060153192.168.2.48.8.8.8
                                    May 12, 2021 13:07:55.040282965 CEST53506018.8.8.8192.168.2.4
                                    May 12, 2021 13:07:56.442893982 CEST6087553192.168.2.48.8.8.8
                                    May 12, 2021 13:07:56.493007898 CEST53608758.8.8.8192.168.2.4
                                    May 12, 2021 13:07:57.287398100 CEST5644853192.168.2.48.8.8.8
                                    May 12, 2021 13:07:57.337733984 CEST53564488.8.8.8192.168.2.4
                                    May 12, 2021 13:07:57.538420916 CEST5917253192.168.2.48.8.8.8
                                    May 12, 2021 13:07:57.587490082 CEST53591728.8.8.8192.168.2.4
                                    May 12, 2021 13:08:01.508614063 CEST6242053192.168.2.48.8.8.8
                                    May 12, 2021 13:08:01.557399988 CEST53624208.8.8.8192.168.2.4

                                    DNS Queries

                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                    May 12, 2021 13:07:56.442893982 CEST192.168.2.48.8.8.80x4465Standard query (0)outlook.comA (IP address)IN (0x0001)
                                    May 12, 2021 13:07:57.287398100 CEST192.168.2.48.8.8.80x80a2Standard query (0)www.outlook.comA (IP address)IN (0x0001)
                                    May 12, 2021 13:07:57.538420916 CEST192.168.2.48.8.8.80x4050Standard query (0)outlook.office365.comA (IP address)IN (0x0001)

                                    DNS Answers

                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                    May 12, 2021 13:07:35.401068926 CEST8.8.8.8192.168.2.40x64b5No error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.trafficmanager.netCNAME (Canonical name)IN (0x0001)
                                    May 12, 2021 13:07:56.493007898 CEST8.8.8.8192.168.2.40x4465No error (0)outlook.com40.97.153.146A (IP address)IN (0x0001)
                                    May 12, 2021 13:07:56.493007898 CEST8.8.8.8192.168.2.40x4465No error (0)outlook.com40.97.161.50A (IP address)IN (0x0001)
                                    May 12, 2021 13:07:56.493007898 CEST8.8.8.8192.168.2.40x4465No error (0)outlook.com40.97.116.82A (IP address)IN (0x0001)
                                    May 12, 2021 13:07:56.493007898 CEST8.8.8.8192.168.2.40x4465No error (0)outlook.com40.97.160.2A (IP address)IN (0x0001)
                                    May 12, 2021 13:07:56.493007898 CEST8.8.8.8192.168.2.40x4465No error (0)outlook.com40.97.148.226A (IP address)IN (0x0001)
                                    May 12, 2021 13:07:56.493007898 CEST8.8.8.8192.168.2.40x4465No error (0)outlook.com40.97.164.146A (IP address)IN (0x0001)
                                    May 12, 2021 13:07:56.493007898 CEST8.8.8.8192.168.2.40x4465No error (0)outlook.com40.97.128.194A (IP address)IN (0x0001)
                                    May 12, 2021 13:07:56.493007898 CEST8.8.8.8192.168.2.40x4465No error (0)outlook.com40.97.156.114A (IP address)IN (0x0001)
                                    May 12, 2021 13:07:57.337733984 CEST8.8.8.8192.168.2.40x80a2No error (0)www.outlook.comoutlook.office365.comCNAME (Canonical name)IN (0x0001)
                                    May 12, 2021 13:07:57.337733984 CEST8.8.8.8192.168.2.40x80a2No error (0)outlook.office365.comoutlook.ha.office365.comCNAME (Canonical name)IN (0x0001)
                                    May 12, 2021 13:07:57.337733984 CEST8.8.8.8192.168.2.40x80a2No error (0)outlook.ha.office365.comoutlook.ms-acdc.office.comCNAME (Canonical name)IN (0x0001)
                                    May 12, 2021 13:07:57.337733984 CEST8.8.8.8192.168.2.40x80a2No error (0)outlook.ms-acdc.office.comHHN-efz.ms-acdc.office.comCNAME (Canonical name)IN (0x0001)
                                    May 12, 2021 13:07:57.337733984 CEST8.8.8.8192.168.2.40x80a2No error (0)HHN-efz.ms-acdc.office.com52.97.233.66A (IP address)IN (0x0001)
                                    May 12, 2021 13:07:57.337733984 CEST8.8.8.8192.168.2.40x80a2No error (0)HHN-efz.ms-acdc.office.com40.101.137.98A (IP address)IN (0x0001)
                                    May 12, 2021 13:07:57.337733984 CEST8.8.8.8192.168.2.40x80a2No error (0)HHN-efz.ms-acdc.office.com52.98.152.178A (IP address)IN (0x0001)
                                    May 12, 2021 13:07:57.337733984 CEST8.8.8.8192.168.2.40x80a2No error (0)HHN-efz.ms-acdc.office.com52.97.233.82A (IP address)IN (0x0001)
                                    May 12, 2021 13:07:57.587490082 CEST8.8.8.8192.168.2.40x4050No error (0)outlook.office365.comoutlook.ha.office365.comCNAME (Canonical name)IN (0x0001)
                                    May 12, 2021 13:07:57.587490082 CEST8.8.8.8192.168.2.40x4050No error (0)outlook.ha.office365.comoutlook.ms-acdc.office.comCNAME (Canonical name)IN (0x0001)
                                    May 12, 2021 13:07:57.587490082 CEST8.8.8.8192.168.2.40x4050No error (0)outlook.ms-acdc.office.comHHN-efz.ms-acdc.office.comCNAME (Canonical name)IN (0x0001)
                                    May 12, 2021 13:07:57.587490082 CEST8.8.8.8192.168.2.40x4050No error (0)HHN-efz.ms-acdc.office.com40.101.137.82A (IP address)IN (0x0001)
                                    May 12, 2021 13:07:57.587490082 CEST8.8.8.8192.168.2.40x4050No error (0)HHN-efz.ms-acdc.office.com52.97.233.98A (IP address)IN (0x0001)
                                    May 12, 2021 13:07:57.587490082 CEST8.8.8.8192.168.2.40x4050No error (0)HHN-efz.ms-acdc.office.com40.101.136.18A (IP address)IN (0x0001)
                                    May 12, 2021 13:07:57.587490082 CEST8.8.8.8192.168.2.40x4050No error (0)HHN-efz.ms-acdc.office.com52.98.175.18A (IP address)IN (0x0001)

                                    HTTP Request Dependency Graph

                                    • outlook.com

                                    HTTP Packets

                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                    0192.168.2.44975340.97.153.14680C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                    TimestampkBytes transferredDirectionData
                                    May 12, 2021 13:07:56.654592991 CEST1552OUTGET /login/greed/KnH9H6Qjc_2F7/0e3_2F0_/2FRqQPyOKs18rFK5waVCGCI/jIBCBbgDdF/18TiURZdioL3eU4Wc/SUXArexakZ5d/R0lDxIGeIYj/c6FwtLcTr3EmEj/nbrTM1t_2BdTxREGmfFhs/_2BnTf5cT9dEAnPd/AFLbs3lARk22SMJ/POUz7dti2oyFXHE3_2/FgEVGs1vD/4LhoHpnAxyp/chUrsX.gfk HTTP/1.1
                                    Accept: text/html, application/xhtml+xml, image/jxr, */*
                                    Accept-Language: en-US
                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
                                    Accept-Encoding: gzip, deflate
                                    Host: outlook.com
                                    Connection: Keep-Alive
                                    May 12, 2021 13:07:56.787769079 CEST1552INHTTP/1.1 301 Moved Permanently
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Location: https://outlook.com/login/greed/KnH9H6Qjc_2F7/0e3_2F0_/2FRqQPyOKs18rFK5waVCGCI/jIBCBbgDdF/18TiURZdioL3eU4Wc/SUXArexakZ5d/R0lDxIGeIYj/c6FwtLcTr3EmEj/nbrTM1t_2BdTxREGmfFhs/_2BnTf5cT9dEAnPd/AFLbs3lARk22SMJ/POUz7dti2oyFXHE3_2/FgEVGs1vD/4LhoHpnAxyp/chUrsX.gfk
                                    Server: Microsoft-IIS/10.0
                                    request-id: d22bf8f3-ef91-4d9e-851c-4890d74dfbb5
                                    X-FEServer: BN6PR2001CA0017
                                    X-RequestId: 83f746fe-8412-4293-9793-e5f694c948c0
                                    X-Powered-By: ASP.NET
                                    X-FEServer: BN6PR2001CA0017
                                    Date: Wed, 12 May 2021 11:07:56 GMT
                                    Connection: close
                                    Content-Length: 0


                                    Code Manipulations

                                    Statistics

                                    Behavior

                                    Click to jump to process

                                    System Behavior

                                    General

                                    Start time:13:06:05
                                    Start date:12/05/2021
                                    Path:C:\Windows\System32\loaddll32.exe
                                    Wow64 process (32bit):true
                                    Commandline:loaddll32.exe 'C:\Users\user\Desktop\nT5pUwoJSS.dll'
                                    Imagebase:0x190000
                                    File size:116736 bytes
                                    MD5 hash:542795ADF7CC08EFCF675D65310596E8
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    General

                                    Start time:13:06:06
                                    Start date:12/05/2021
                                    Path:C:\Windows\SysWOW64\cmd.exe
                                    Wow64 process (32bit):true
                                    Commandline:cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\nT5pUwoJSS.dll',#1
                                    Imagebase:0x11d0000
                                    File size:232960 bytes
                                    MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    General

                                    Start time:13:06:06
                                    Start date:12/05/2021
                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                    Wow64 process (32bit):true
                                    Commandline:rundll32.exe C:\Users\user\Desktop\nT5pUwoJSS.dll,Eithernothing
                                    Imagebase:0x2a0000
                                    File size:61952 bytes
                                    MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    General

                                    Start time:13:06:06
                                    Start date:12/05/2021
                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                    Wow64 process (32bit):true
                                    Commandline:rundll32.exe 'C:\Users\user\Desktop\nT5pUwoJSS.dll',#1
                                    Imagebase:0x2a0000
                                    File size:61952 bytes
                                    MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.881584954.00000000050E8000.00000004.00000040.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.881638380.00000000050E8000.00000004.00000040.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.881444184.00000000050E8000.00000004.00000040.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.881614039.00000000050E8000.00000004.00000040.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.881537844.00000000050E8000.00000004.00000040.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.881689753.00000000050E8000.00000004.00000040.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.881502007.00000000050E8000.00000004.00000040.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000003.00000003.881360850.00000000050E8000.00000004.00000040.sdmp, Author: Joe Security
                                    Reputation:high

                                    General

                                    Start time:13:06:10
                                    Start date:12/05/2021
                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                    Wow64 process (32bit):true
                                    Commandline:rundll32.exe C:\Users\user\Desktop\nT5pUwoJSS.dll,Order
                                    Imagebase:0x2a0000
                                    File size:61952 bytes
                                    MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    General

                                    Start time:13:06:14
                                    Start date:12/05/2021
                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                    Wow64 process (32bit):true
                                    Commandline:rundll32.exe C:\Users\user\Desktop\nT5pUwoJSS.dll,Smileschool
                                    Imagebase:0x2a0000
                                    File size:61952 bytes
                                    MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    General

                                    Start time:13:07:51
                                    Start date:12/05/2021
                                    Path:C:\Windows\SysWOW64\WerFault.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6992 -s 892
                                    Imagebase:0xcf0000
                                    File size:434592 bytes
                                    MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    General

                                    Start time:13:07:53
                                    Start date:12/05/2021
                                    Path:C:\Program Files\internet explorer\iexplore.exe
                                    Wow64 process (32bit):false
                                    Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                                    Imagebase:0x7ff7fded0000
                                    File size:823560 bytes
                                    MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    General

                                    Start time:13:07:54
                                    Start date:12/05/2021
                                    Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                    Wow64 process (32bit):true
                                    Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5516 CREDAT:17410 /prefetch:2
                                    Imagebase:0xe90000
                                    File size:822536 bytes
                                    MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Disassembly

                                    Code Analysis

                                    Reset < >