Loading ...

Play interactive tourEdit tour

Windows Analysis Report y5ACIMK3tT.exe

Overview

General Information

Sample Name:y5ACIMK3tT.exe
Analysis ID:480992
MD5:72fb1d021cfaa3ef3ea5ddd2aa6edc86
SHA1:7de81647d41ef9c982920e119ebaf27b5affcf26
SHA256:b7a9576a80944c203ddb7a1fbfbfa2a5806c2419ad193f22b84d0fa4f078a725
Tags:exeGoziISFBRM3
Infos:

Most interesting Screenshot:

Detection

Ursnif Ursnif v3
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Ursnif
Multi AV Scanner detection for submitted file
Detected unpacking (changes PE section rights)
Yara detected Ursnif
Writes or reads registry keys via WMI
Writes registry values via WMI
Machine Learning detection for sample
Performs DNS queries to domains with low reputation
Uses 32bit PE files
Antivirus or Machine Learning detection for unpacked file
PE file contains an invalid checksum
PE file contains strange resources
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
PE / OLE file has an invalid certificate
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)

Classification

Process Tree

  • System is w10x64
  • y5ACIMK3tT.exe (PID: 5412 cmdline: 'C:\Users\user\Desktop\y5ACIMK3tT.exe' MD5: 72FB1D021CFAA3EF3EA5DDD2AA6EDC86)
  • iexplore.exe (PID: 4648 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 1392 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:4648 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • iexplore.exe (PID: 4176 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 1488 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:4176 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000002.501326750.00000000036E0000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
    00000000.00000003.280081187.00000000036E0000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
      00000000.00000003.280494462.00000000036E0000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
        00000000.00000003.281430952.00000000036E0000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
          00000000.00000003.280426403.00000000036E0000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
            Click to see the 30 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            0.2.y5ACIMK3tT.exe.1000000.0.unpackJoeSecurity_Ursnifv3Yara detected UrsnifJoe Security
              0.3.y5ACIMK3tT.exe.c79d7c.0.raw.unpackJoeSecurity_Ursnifv3Yara detected UrsnifJoe Security

                Sigma Overview

                No Sigma rule has matched

                Jbx Signature Overview

                Click to jump to signature section

                Show All Signature Results

                AV Detection:

                barindex
                Multi AV Scanner detection for submitted fileShow sources
                Source: y5ACIMK3tT.exeVirustotal: Detection: 13%Perma Link
                Machine Learning detection for sampleShow sources
                Source: y5ACIMK3tT.exeJoe Sandbox ML: detected
                Source: 0.2.y5ACIMK3tT.exe.1000000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen7
                Source: 0.3.y5ACIMK3tT.exe.c79d7c.0.unpackAvira: Label: TR/Patched.Ren.Gen
                Source: y5ACIMK3tT.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
                Source: Binary string: c:\Muchwin\WorkWhich\centstring\shinegray\WanthumanMarket.pdb source: y5ACIMK3tT.exe

                Networking:

                barindex
                Performs DNS queries to domains with low reputationShow sources
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: haverit.xyz
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: haverit.xyz
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: haverit.xyz
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeDNS query: haverit.xyz
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeDNS query: haverit.xyz
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: haverit.xyz
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: haverit.xyz
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: haverit.xyz
                Source: unknownDNS traffic detected: query: haverit.xyz replaycode: Name error (3)
                Source: msapplication.xml0.13.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x642d42ea,0x01d7a64e</date><accdate>0x642d42ea,0x01d7a64e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
                Source: msapplication.xml0.13.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x642d42ea,0x01d7a64e</date><accdate>0x642d42ea,0x01d7a64e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
                Source: msapplication.xml5.13.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x64348842,0x01d7a64e</date><accdate>0x64348842,0x01d7a64e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
                Source: msapplication.xml5.13.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x64348842,0x01d7a64e</date><accdate>0x64348842,0x01d7a64e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
                Source: msapplication.xml7.13.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x64348842,0x01d7a64e</date><accdate>0x64348842,0x01d7a64e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
                Source: msapplication.xml7.13.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x64348842,0x01d7a64e</date><accdate>0x64348842,0x01d7a64e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
                Source: y5ACIMK3tT.exe, 00000000.00000003.280494462.00000000036E0000.00000004.00000040.sdmpString found in binary or memory: http://%s=%s&file://&os=%u.%u_%u_%u_x%uindex.html;
                Source: y5ACIMK3tT.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                Source: y5ACIMK3tT.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                Source: y5ACIMK3tT.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                Source: y5ACIMK3tT.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                Source: y5ACIMK3tT.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
                Source: y5ACIMK3tT.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                Source: y5ACIMK3tT.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                Source: y5ACIMK3tT.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                Source: y5ACIMK3tT.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                Source: y5ACIMK3tT.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
                Source: y5ACIMK3tT.exeString found in binary or memory: http://ocsp.comodoca.com0
                Source: y5ACIMK3tT.exeString found in binary or memory: http://ocsp.digicert.com0C
                Source: y5ACIMK3tT.exeString found in binary or memory: http://ocsp.digicert.com0O
                Source: y5ACIMK3tT.exeString found in binary or memory: http://ocsp.sectigo.com0
                Source: msapplication.xml.13.drString found in binary or memory: http://www.amazon.com/
                Source: y5ACIMK3tT.exeString found in binary or memory: http://www.digicert.com/CPS0
                Source: msapplication.xml1.13.drString found in binary or memory: http://www.google.com/
                Source: msapplication.xml2.13.drString found in binary or memory: http://www.live.com/
                Source: msapplication.xml3.13.drString found in binary or memory: http://www.nytimes.com/
                Source: msapplication.xml4.13.drString found in binary or memory: http://www.reddit.com/
                Source: msapplication.xml5.13.drString found in binary or memory: http://www.twitter.com/
                Source: msapplication.xml6.13.drString found in binary or memory: http://www.wikipedia.com/
                Source: msapplication.xml7.13.drString found in binary or memory: http://www.youtube.com/
                Source: y5ACIMK3tT.exeString found in binary or memory: https://haverit.xyz
                Source: y5ACIMK3tT.exe, 00000000.00000003.433100651.0000000000608000.00000004.00000001.sdmp, ~DF56EA5AC75B303922.TMP.13.drString found in binary or memory: https://haverit.xyz/index.htm
                Source: {B494046C-1241-11EC-90E5-ECF4BB570DC9}.dat.19.drString found in binary or memory: https://haverit.xyz/index.htmRoot
                Source: {B494046C-1241-11EC-90E5-ECF4BB570DC9}.dat.19.drString found in binary or memory: https://haverit.xyz/index.htmdex.htm
                Source: y5ACIMK3tT.exeString found in binary or memory: https://sectigo.com/CPS0
                Source: y5ACIMK3tT.exeString found in binary or memory: https://www.digicert.com/CPS0
                Source: unknownDNS traffic detected: queries for: haverit.xyz

                Key, Mouse, Clipboard, Microphone and Screen Capturing:

                barindex
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 0.2.y5ACIMK3tT.exe.1000000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.y5ACIMK3tT.exe.c79d7c.0.raw.unpack, type: UNPACKEDPE
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 00000000.00000002.501326750.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280081187.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280494462.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281430952.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280426403.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281014480.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280263191.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281416323.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.425935885.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280831725.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281148827.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281353274.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280639725.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280563706.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281240518.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.279765747.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281062590.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280698259.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281191378.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280772678.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281330244.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.279863384.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.279650602.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280906581.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.279954452.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281398809.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281439514.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280341081.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280961190.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281272411.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281107458.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281302346.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281376823.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280182518.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: y5ACIMK3tT.exe PID: 5412, type: MEMORYSTR

                E-Banking Fraud:

                barindex
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 0.2.y5ACIMK3tT.exe.1000000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.y5ACIMK3tT.exe.c79d7c.0.raw.unpack, type: UNPACKEDPE
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 00000000.00000002.501326750.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280081187.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280494462.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281430952.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280426403.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281014480.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280263191.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281416323.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.425935885.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280831725.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281148827.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281353274.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280639725.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280563706.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281240518.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.279765747.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281062590.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280698259.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281191378.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280772678.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281330244.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.279863384.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.279650602.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280906581.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.279954452.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281398809.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281439514.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280341081.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280961190.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281272411.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281107458.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281302346.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281376823.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280182518.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: y5ACIMK3tT.exe PID: 5412, type: MEMORYSTR

                System Summary:

                barindex
                Writes or reads registry keys via WMIShow sources
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetDWORDValue
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                Writes registry values via WMIShow sources
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                Source: y5ACIMK3tT.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                Source: y5ACIMK3tT.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: y5ACIMK3tT.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: y5ACIMK3tT.exeStatic PE information: invalid certificate
                Source: y5ACIMK3tT.exeVirustotal: Detection: 13%
                Source: y5ACIMK3tT.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\y5ACIMK3tT.exe 'C:\Users\user\Desktop\y5ACIMK3tT.exe'
                Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:4648 CREDAT:17410 /prefetch:2
                Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:4176 CREDAT:17410 /prefetch:2
                Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:4648 CREDAT:17410 /prefetch:2Jump to behavior
                Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:4176 CREDAT:17410 /prefetch:2Jump to behavior
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{674B6698-EE92-11D0-AD71-00C04FD8FDFF}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : select * from win32_process
                Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{8E70C929-1241-11EC-90E5-ECF4BB570DC9}.datJump to behavior
                Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DFEAB2FBB4231FF1CC.TMPJump to behavior
                Source: classification engineClassification label: mal88.troj.evad.winEXE@7/29@8/0
                Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
                Source: y5ACIMK3tT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: y5ACIMK3tT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: y5ACIMK3tT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: y5ACIMK3tT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: y5ACIMK3tT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: y5ACIMK3tT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: y5ACIMK3tT.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: c:\Muchwin\WorkWhich\centstring\shinegray\WanthumanMarket.pdb source: y5ACIMK3tT.exe
                Source: y5ACIMK3tT.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: y5ACIMK3tT.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: y5ACIMK3tT.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: y5ACIMK3tT.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: y5ACIMK3tT.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                Data Obfuscation:

                barindex
                Detected unpacking (changes PE section rights)Show sources
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeUnpacked PE file: 0.2.y5ACIMK3tT.exe.1000000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.bss:W;.reloc:R;
                Source: y5ACIMK3tT.exeStatic PE information: real checksum: 0xe6369 should be: 0xe12af
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeCode function: 0_3_036E198A push ds; retf 0_3_036E1991
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeCode function: 0_3_036E198A push ds; retf 0_3_036E1991
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeCode function: 0_3_036E198A push ds; retf 0_3_036E1991
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeCode function: 0_3_036E198A push ds; retf 0_3_036E1991
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeCode function: 0_3_036E198A push ds; retf 0_3_036E1991
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeCode function: 0_3_036E198A push ds; retf 0_3_036E1991
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeCode function: 0_3_036E198A push ds; retf 0_3_036E1991
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeCode function: 0_3_036E198A push ds; retf 0_3_036E1991
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeCode function: 0_3_036E198A push ds; retf 0_3_036E1991
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeCode function: 0_3_036E198A push ds; retf 0_3_036E1991
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeCode function: 0_3_036E198A push ds; retf 0_3_036E1991
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeCode function: 0_3_036E198A push ds; retf 0_3_036E1991
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeCode function: 0_3_036E198A push ds; retf 0_3_036E1991
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeCode function: 0_3_036E198A push ds; retf 0_3_036E1991
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeCode function: 0_3_036E198A push ds; retf 0_3_036E1991
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeCode function: 0_3_036E198A push ds; retf 0_3_036E1991
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeCode function: 0_3_036E198A push ds; retf 0_3_036E1991
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeCode function: 0_3_036E198A push ds; retf 0_3_036E1991
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeCode function: 0_3_036E198A push ds; retf 0_3_036E1991
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeCode function: 0_3_036E198A push ds; retf 0_3_036E1991
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeCode function: 0_3_036E198A push ds; retf 0_3_036E1991
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeCode function: 0_3_036E198A push ds; retf 0_3_036E1991
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeCode function: 0_3_036E198A push ds; retf 0_3_036E1991
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeCode function: 0_3_036E198A push ds; retf 0_3_036E1991
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeCode function: 0_3_036E198A push ds; retf 0_3_036E1991
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeCode function: 0_3_036E198A push ds; retf 0_3_036E1991
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeCode function: 0_3_036E198A push ds; retf 0_3_036E1991
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeCode function: 0_3_036E198A push ds; retf 0_3_036E1991
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeCode function: 0_3_036E198A push ds; retf 0_3_036E1991
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeCode function: 0_3_036E198A push ds; retf 0_3_036E1991
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeCode function: 0_3_036E198A push ds; retf 0_3_036E1991
                Source: initial sampleStatic PE information: section name: .text entropy: 6.85141956597

                Hooking and other Techniques for Hiding and Protection:

                barindex
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 0.2.y5ACIMK3tT.exe.1000000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.y5ACIMK3tT.exe.c79d7c.0.raw.unpack, type: UNPACKEDPE
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 00000000.00000002.501326750.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280081187.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280494462.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281430952.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280426403.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281014480.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280263191.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281416323.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.425935885.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280831725.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281148827.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281353274.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280639725.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280563706.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281240518.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.279765747.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281062590.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280698259.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281191378.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280772678.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281330244.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.279863384.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.279650602.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280906581.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.279954452.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281398809.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281439514.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280341081.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280961190.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281272411.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281107458.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281302346.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281376823.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280182518.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: y5ACIMK3tT.exe PID: 5412, type: MEMORYSTR
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exe TID: 1236Thread sleep time: -30000s >= -30000sJump to behavior
                Source: y5ACIMK3tT.exe, 00000000.00000002.501174006.0000000001100000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                Source: y5ACIMK3tT.exe, 00000000.00000002.501174006.0000000001100000.00000002.00020000.sdmpBinary or memory string: Progman
                Source: y5ACIMK3tT.exe, 00000000.00000002.501174006.0000000001100000.00000002.00020000.sdmpBinary or memory string: SProgram Managerl
                Source: y5ACIMK3tT.exe, 00000000.00000002.501174006.0000000001100000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd,
                Source: y5ACIMK3tT.exe, 00000000.00000002.501174006.0000000001100000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: C:\Users\user\Desktop\y5ACIMK3tT.exeWMI Queries: IWbemServices::ExecQuery - root\securitycenter2 : select * from antispywareproduct

                Stealing of Sensitive Information:

                barindex
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 0.2.y5ACIMK3tT.exe.1000000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.y5ACIMK3tT.exe.c79d7c.0.raw.unpack, type: UNPACKEDPE
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 00000000.00000002.501326750.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280081187.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280494462.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281430952.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280426403.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281014480.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280263191.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281416323.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.425935885.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280831725.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281148827.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281353274.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280639725.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280563706.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281240518.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.279765747.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281062590.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280698259.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281191378.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280772678.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281330244.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.279863384.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.279650602.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280906581.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.279954452.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281398809.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281439514.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280341081.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280961190.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281272411.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281107458.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281302346.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281376823.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280182518.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: y5ACIMK3tT.exe PID: 5412, type: MEMORYSTR

                Remote Access Functionality:

                barindex
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 0.2.y5ACIMK3tT.exe.1000000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.y5ACIMK3tT.exe.c79d7c.0.raw.unpack, type: UNPACKEDPE
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 00000000.00000002.501326750.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280081187.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280494462.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281430952.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280426403.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281014480.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280263191.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281416323.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.425935885.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280831725.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281148827.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281353274.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280639725.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280563706.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281240518.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.279765747.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281062590.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280698259.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281191378.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280772678.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281330244.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.279863384.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.279650602.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280906581.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.279954452.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281398809.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281439514.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280341081.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280961190.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281272411.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281107458.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281302346.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.281376823.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.280182518.00000000036E0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: y5ACIMK3tT.exe PID: 5412, type: MEMORYSTR

                Mitre Att&ck Matrix

                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid AccountsWindows Management Instrumentation211Path InterceptionProcess Injection2Masquerading1OS Credential DumpingQuery Registry1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion1LSASS MemorySecurity Software Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection2Security Account ManagerVirtualization/Sandbox Evasion1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information2NTDSProcess Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing12LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery3Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

                Behavior Graph

                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 480992 Sample: y5ACIMK3tT.exe Startdate: 10/09/2021 Architecture: WINDOWS Score: 88 25 Multi AV Scanner detection for submitted file 2->25 27 Yara detected Ursnif 2->27 29 Yara detected  Ursnif 2->29 31 2 other signatures 2->31 6 y5ACIMK3tT.exe 2->6         started        10 iexplore.exe 1 72 2->10         started        12 iexplore.exe 1 50 2->12         started        process3 dnsIp4 19 haverit.xyz 6->19 33 Detected unpacking (changes PE section rights) 6->33 35 Performs DNS queries to domains with low reputation 6->35 37 Writes or reads registry keys via WMI 6->37 39 Writes registry values via WMI 6->39 14 iexplore.exe 29 10->14         started        17 iexplore.exe 30 12->17         started        signatures5 process6 dnsIp7 21 haverit.xyz 14->21 23 haverit.xyz 17->23

                Screenshots

                Thumbnails

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                windows-stand

                Antivirus, Machine Learning and Genetic Malware Detection

                Initial Sample

                SourceDetectionScannerLabelLink
                y5ACIMK3tT.exe14%VirustotalBrowse
                y5ACIMK3tT.exe7%ReversingLabs
                y5ACIMK3tT.exe100%Joe Sandbox ML

                Dropped Files

                No Antivirus matches

                Unpacked PE Files

                SourceDetectionScannerLabelLinkDownload
                0.2.y5ACIMK3tT.exe.1000000.0.unpack100%AviraTR/Crypt.XPACK.Gen7Download File
                0.3.y5ACIMK3tT.exe.c79d7c.0.unpack100%AviraTR/Patched.Ren.GenDownload File

                Domains

                No Antivirus matches

                URLs

                SourceDetectionScannerLabelLink
                https://haverit.xyz/index.htm0%Avira URL Cloudsafe
                https://sectigo.com/CPS00%URL Reputationsafe
                http://ocsp.sectigo.com00%URL Reputationsafe
                https://haverit.xyz/index.htmdex.htm0%Avira URL Cloudsafe
                http://%s=%s&file://&os=%u.%u_%u_%u_x%uindex.html;0%Avira URL Cloudsafe
                http://www.wikipedia.com/0%URL Reputationsafe
                https://haverit.xyz0%Avira URL Cloudsafe
                http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
                http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%URL Reputationsafe
                https://haverit.xyz/index.htmRoot0%Avira URL Cloudsafe

                Domains and IPs

                Contacted Domains

                NameIPActiveMaliciousAntivirus DetectionReputation
                haverit.xyz
                unknown
                unknowntrue
                  unknown

                  URLs from Memory and Binaries

                  NameSourceMaliciousAntivirus DetectionReputation
                  https://haverit.xyz/index.htmy5ACIMK3tT.exe, 00000000.00000003.433100651.0000000000608000.00000004.00000001.sdmp, ~DF56EA5AC75B303922.TMP.13.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.nytimes.com/msapplication.xml3.13.drfalse
                    high
                    https://sectigo.com/CPS0y5ACIMK3tT.exefalse
                    • URL Reputation: safe
                    unknown
                    http://ocsp.sectigo.com0y5ACIMK3tT.exefalse
                    • URL Reputation: safe
                    unknown
                    https://haverit.xyz/index.htmdex.htm{B494046C-1241-11EC-90E5-ECF4BB570DC9}.dat.19.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://%s=%s&file://&os=%u.%u_%u_%u_x%uindex.html;y5ACIMK3tT.exe, 00000000.00000003.280494462.00000000036E0000.00000004.00000040.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://www.youtube.com/msapplication.xml7.13.drfalse
                      high
                      http://www.wikipedia.com/msapplication.xml6.13.drfalse
                      • URL Reputation: safe
                      unknown
                      http://www.amazon.com/msapplication.xml.13.drfalse
                        high
                        https://haverit.xyzy5ACIMK3tT.exefalse
                        • Avira URL Cloud: safe
                        unknown
                        http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0sy5ACIMK3tT.exefalse
                        • URL Reputation: safe
                        unknown
                        http://www.live.com/msapplication.xml2.13.drfalse
                          high
                          http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#y5ACIMK3tT.exefalse
                          • URL Reputation: safe
                          unknown
                          http://www.reddit.com/msapplication.xml4.13.drfalse
                            high
                            http://www.twitter.com/msapplication.xml5.13.drfalse
                              high
                              https://haverit.xyz/index.htmRoot{B494046C-1241-11EC-90E5-ECF4BB570DC9}.dat.19.drfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.google.com/msapplication.xml1.13.drfalse
                                high

                                Contacted IPs

                                No contacted IP infos

                                General Information

                                Joe Sandbox Version:33.0.0 White Diamond
                                Analysis ID:480992
                                Start date:10.09.2021
                                Start time:07:14:12
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:0h 6m 32s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Sample file name:y5ACIMK3tT.exe
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                Number of analysed new started processes analysed:21
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • HDC enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Detection:MAL
                                Classification:mal88.troj.evad.winEXE@7/29@8/0
                                EGA Information:Failed
                                HDC Information:Failed
                                HCA Information:
                                • Successful, ratio: 100%
                                • Number of executed functions: 0
                                • Number of non-executed functions: 0
                                Cookbook Comments:
                                • Adjust boot time
                                • Enable AMSI
                                • Found application associated with file extension: .exe
                                Warnings:
                                Show All
                                • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, dllhost.exe, ielowutil.exe, UpdateNotificationMgr.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe
                                • Excluded IPs from analysis (whitelisted): 23.211.4.86, 204.79.197.200, 13.107.21.200, 173.222.108.210, 173.222.108.226, 151.139.128.14, 23.203.80.193, 152.199.19.161, 20.49.150.241
                                • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, dual-a-0001.a-msedge.net, ie9comview.vo.msecnd.net, wu-shim.trafficmanager.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, settings-win.data.microsoft.com, a767.dspw65.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, download.windowsupdate.com.edgesuite.net, settingsfd-geo.trafficmanager.net, e11290.dspg.akamaiedge.net, iecvlist.microsoft.com, go.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, crl.comodoca.com, www-bing-com.dual-a-0001.a-msedge.net, go.microsoft.com.edgekey.net, prod.fs.microsoft.com.akadns.net, cs9.wpc.v0cdn.net
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.

                                Simulations

                                Behavior and APIs

                                TimeTypeDescription
                                07:15:45API Interceptor2x Sleep call for process: y5ACIMK3tT.exe modified

                                Joe Sandbox View / Context

                                IPs

                                No context

                                Domains

                                No context

                                ASN

                                No context

                                JA3 Fingerprints

                                No context

                                Dropped Files

                                No context

                                Created / dropped Files

                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{8E70C929-1241-11EC-90E5-ECF4BB570DC9}.dat
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:Microsoft Word Document
                                Category:dropped
                                Size (bytes):29272
                                Entropy (8bit):1.7669382848733182
                                Encrypted:false
                                SSDEEP:48:IweGcprvGwpLxG/ap8PGIpcdtJGvnZpvdtTGo3zCqp9dtnGo4TzMzKpmStjGW3ze:rCZZZ12RWut3bf43AKMaIAzfUqb3MB
                                MD5:7945358580CE004301B14ECCF33C17D2
                                SHA1:F9F713A23F41C627008836FA4F85BA3F7F8FDA69
                                SHA-256:CEF37EA620615897A045CEEFFCBA0D5381E42F9C0DF7497CB8B06D8F7E625C19
                                SHA-512:280D5388D9252CFD5B88BAE3860E19B4608F377D6384715D590E4801CD936A01E473A7C23E70018647CDD9ADA571798ABA69FDDBFE3409ED92719BDE2CC1E935
                                Malicious:false
                                Reputation:low
                                Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{B494046A-1241-11EC-90E5-ECF4BB570DC9}.dat
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:Microsoft Word Document
                                Category:dropped
                                Size (bytes):29272
                                Entropy (8bit):1.7655222910227881
                                Encrypted:false
                                SSDEEP:96:rlZ+ZP2qWNtW27mbfYE27mj27mKMd27mL27mn27mzc27mX27mqLy27mE27mMB:rlZ+ZP2qWNtWpfYElcMdNthclsOyuB
                                MD5:D88CD82AC1F60895D1EB6EC62F06F333
                                SHA1:DF56E8606A2179574B2B5D80DA05E65DA51A04CB
                                SHA-256:8DAE15F4846A28D19541A9514629C22DAA0BDA2A6865BC7599BD8E572F42E4CD
                                SHA-512:6C6F7899D8FC77627E5AA35E4F490DE7328E374181D07820DD006A3B105F57FDDCBCE23B674732A026DD766CFB5BE79FE8DE34C2F9BCFDE48A9C03ECDD12CFDE
                                Malicious:false
                                Reputation:low
                                Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{8E70C92B-1241-11EC-90E5-ECF4BB570DC9}.dat
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:Microsoft Word Document
                                Category:dropped
                                Size (bytes):26240
                                Entropy (8bit):1.6584600639370661
                                Encrypted:false
                                SSDEEP:48:IwDGcpreGwpalG4pQFGrapbSuGQpBVyxGHHpcVBTGUp8VFGzYpmVTNGopOHTyDF8:r5ZWQ361BSmjt2lWVMlksVhA
                                MD5:CD8936B512AAD306702B9FC86A416B85
                                SHA1:0A3F2D76086B86BBFD6E90182AEC239EA8BBA810
                                SHA-256:9E97C5A637B3EB9021DC6B64CA7657660039D58DD89C3A19B12A2A834C864991
                                SHA-512:0AE78E8367CBCA2420D85FCD468C8BA8428EC23BCCA1B50BF8B1D5518966634928E444C0DD247B2EC302B8091056CA7527542AC0BF5B485738DD3D354E78F7EE
                                Malicious:false
                                Reputation:low
                                Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{B494046C-1241-11EC-90E5-ECF4BB570DC9}.dat
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:Microsoft Word Document
                                Category:dropped
                                Size (bytes):26240
                                Entropy (8bit):1.6582689479333252
                                Encrypted:false
                                SSDEEP:48:Iw6GcprnGwpazG4pQrGrapbSiGQpBktGHHpcLTGUp8hzGzYpm1Q4GopOPyDcGqXw:r+ZxQF6fBSqjF2lW7Mzk7VFA
                                MD5:B5CA7495FC9582571052CC861577079B
                                SHA1:C468E4E826A65275A8813D6A753923541A33F2E9
                                SHA-256:CD7558C1567C5551B69316C19AFE67521F86BD98D7980B7023BDE39A3172D63C
                                SHA-512:69B9F5D0EDCE121D66C5E65C9D700CC1C6AB2246FF309E9391986A543EAD96123FD4E413CBF0CC327D07D0549FB598E963DC39F854A903D6F95093485867AEC0
                                Malicious:false
                                Reputation:low
                                Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-17529550060\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):657
                                Entropy (8bit):5.112698068858243
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxOE/tnWimI002EtM3MHdNMNxOE/tnWimI00ONVbkEtMb:2d6NxOUtSZHKd6NxOUtSZ7Qb
                                MD5:56C04B2170D0DEFFB06A9B9F6F37B575
                                SHA1:CA85A57216773C46A9D92517AB8F81AD03C85373
                                SHA-256:C8CFD500E2C71690947B8A4C4CF79B313ACC1678111541A9AAAF2F3968C87E99
                                SHA-512:3909594FAE2FDB23A1DA8DB925B6CB7FE58C33F72BCD04878CD5816A42E5B430423ABA83D6DE828F118E12EB0A3683ACFA3FEB83B49E4E622B931420D04AF92F
                                Malicious:false
                                Reputation:low
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x64348842,0x01d7a64e</date><accdate>0x64348842,0x01d7a64e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x64348842,0x01d7a64e</date><accdate>0x64348842,0x01d7a64e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18270793970\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):654
                                Entropy (8bit):5.105781907353887
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxe2ko3rN3EnWimI002EtM3MHdNMNxe2ko3rN3EnWimI00ONkak6EtMb:2d6NxrDr9ESZHKd6NxrDr9ESZ72a7b
                                MD5:D5284D0B09924DC9096DEEA434C09981
                                SHA1:4353BD8DFBD0A1BF36017203DD9A71A4DC87EAA0
                                SHA-256:693BB50D3FCA8AB0CEFBDD40107BBF4025ABC5024B409865B1208394BEEAACC4
                                SHA-512:4E2269FA633C9AAA2ADBE6C29C76A7F0818793362CE6FA313D46FFF53CCE3C089BAD588375B805124F3CCE19DCEDE601DCAA1BAFA34A0B14B6C1343B920FAB70
                                Malicious:false
                                Reputation:low
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0x642d42ea,0x01d7a64e</date><accdate>0x642d42ea,0x01d7a64e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0x642d42ea,0x01d7a64e</date><accdate>0x642d42ea,0x01d7a64e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Amazon.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-21706820\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):663
                                Entropy (8bit):5.131747444699833
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxvL/tnWimI002EtM3MHdNMNxvL/tnWimI00ONmZEtMb:2d6NxvTtSZHKd6NxvTtSZ7Ub
                                MD5:30FC25A36A0471ECCE7D48FDD6D0E12B
                                SHA1:D4733C92D8009793A25661271027590392427A99
                                SHA-256:34A03EE1D7D5C07C1EFFD920C88860F4384FF00C4AE95F95BF7809363E5FD4FA
                                SHA-512:61C3B6910CC576CC5E137E0ABBEC0676DCC40AE4D8A2720A96B6F0CA64FB73BEC1C9C73DFEC7B61EEC436F20436E40BAC5916524770A868D95B56615642AA912
                                Malicious:false
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0x64348842,0x01d7a64e</date><accdate>0x64348842,0x01d7a64e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0x64348842,0x01d7a64e</date><accdate>0x64348842,0x01d7a64e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Wikipedia.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):648
                                Entropy (8bit):5.107580769884397
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxio3rN3EnWimI002EtM3MHdNMNxio3rtnWimI00ONd5EtMb:2d6NxJr9ESZHKd6NxJrtSZ7njb
                                MD5:78930A6B474FF3C6FC92CF65473DF93A
                                SHA1:1A8D5302E7135E943C109F993296164AA252F93B
                                SHA-256:73C8C3A7ACF4B48F77369F1EB3EE51C913327D428B6A93D5B142B5782A42C1AC
                                SHA-512:B10FAAFE8E2FC9FF7DB456D617682C01E2611E237B894AFD4BA04E43AE79584A012A5C075D42C62121C5A2AAE4C30C5B892B856E38EA89FA8B0053DD59B7A766
                                Malicious:false
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0x642d42ea,0x01d7a64e</date><accdate>0x642d42ea,0x01d7a64e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0x642d42ea,0x01d7a64e</date><accdate>0x64348842,0x01d7a64e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Live.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6757900\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):657
                                Entropy (8bit):5.146947312809163
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxhGw/tnWimI002EtM3MHdNMNxhGw/tnWimI00ON8K075EtMb:2d6NxQQtSZHKd6NxQQtSZ7uKajb
                                MD5:19BAA0AA4F7B42F1CA9D58F85F36A67B
                                SHA1:9113B73F91E064873E1DA1247118B80D78373BA9
                                SHA-256:F430FA5EF7272D5879B8CD143C25B32B5439972DBA3D7AE3AD04C66A234E086F
                                SHA-512:CD6CBE7CDF9AD6DB223C18D560D4264FA8DEDC609F68F254E0D90B4905AF9E93676B7427071604F4DF0C51F2D6184242ECEC16503AFC819D76222A8E5BA991E3
                                Malicious:false
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x64348842,0x01d7a64e</date><accdate>0x64348842,0x01d7a64e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x64348842,0x01d7a64e</date><accdate>0x64348842,0x01d7a64e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8760897390\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):654
                                Entropy (8bit):5.116530535276916
                                Encrypted:false
                                SSDEEP:12:TMHdNMNx0n/tnWimI002EtM3MHdNMNx0n/tnWimI00ONxEtMb:2d6Nx0/tSZHKd6Nx0/tSZ7Vb
                                MD5:A1AFD5D082D3C856A670C9986D04420A
                                SHA1:C8C810DE09A02D662C07CD1E7A49B66ADDBF59B1
                                SHA-256:87D3D0F83FB4DAE3EA812108E1B2F6D61983D66BC58AFF67E720D3C604C15009
                                SHA-512:0D50713677B1B2C0807EDF39715E3C9F42A1C323EFCF6DEF4C7AE3DDB6EBC6276D61C1A8EEA4597C9516B93081C02A300E96BEE2E4B7A8B69707EDF071DD652E
                                Malicious:false
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0x64348842,0x01d7a64e</date><accdate>0x64348842,0x01d7a64e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0x64348842,0x01d7a64e</date><accdate>0x64348842,0x01d7a64e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Reddit.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):657
                                Entropy (8bit):5.152273020515827
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxx/tnWimI002EtM3MHdNMNxx/tnWimI00ON6Kq5EtMb:2d6NxttSZHKd6NxttSZ7ub
                                MD5:22B48B7DDFCE42C42EA81FBD0846B662
                                SHA1:111B0CAAB4F2F1C67000C0731CC9CC4B2EC1B6BE
                                SHA-256:70D89213EF2CF2C2075483C7E79D01DC921200B20A8BDE99A5D91FAA782097E3
                                SHA-512:9D2DDB1124CA4A70739BD5A930CD0C897EE3CEA48A96731FB703B9B5672238B48CB9964B33900E26D90252A79E3ACCDCF71F460652AA041D9E897D27AA75FECE
                                Malicious:false
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0x64348842,0x01d7a64e</date><accdate>0x64348842,0x01d7a64e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0x64348842,0x01d7a64e</date><accdate>0x64348842,0x01d7a64e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\NYTimes.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20332743330\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):660
                                Entropy (8bit):5.099005968693941
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxco3rN3EnWimI002EtM3MHdNMNxco3rN3EnWimI00ONVEtMb:2d6Nx7r9ESZHKd6Nx7r9ESZ71b
                                MD5:770028D27C9FDE5B0995D0D63E48142E
                                SHA1:D87004D71F531D5E4CE044E48F6E5028886C8825
                                SHA-256:77FB3B0296E9681AE26C13093A761F1DE6F5F5F55D23A8F1A2A60A10FEFF4A04
                                SHA-512:FB282B9B497FE481DB14455B1D627E21C4B081395AFABFB17C337C85F04C9CF19AC1C1D1456F2811566E90BDA4C6F0647B133F2DB72316DBF4C1338940F84C13
                                Malicious:false
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x642d42ea,0x01d7a64e</date><accdate>0x642d42ea,0x01d7a64e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x642d42ea,0x01d7a64e</date><accdate>0x642d42ea,0x01d7a64e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin8215062560\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):654
                                Entropy (8bit):5.080308113402304
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxfno3rN3EnWimI002EtM3MHdNMNxfno3rN3EnWimI00ONe5EtMb:2d6NxYr9ESZHKd6NxYr9ESZ7Ejb
                                MD5:24F51F3EF9833D6BBC19AE0B21CEA66F
                                SHA1:9457E5D590C1F5EEEDCA4432966C594AD9949FE4
                                SHA-256:55A7188A06693632F606D862C04ED6140F787C8AEBFA5539CDEE69620FB38100
                                SHA-512:00BF15D1BF9C3C398C6ABF96D8C45572A9C495A968CCE6E74F6CCD011FBED5B9CB4BF50C35E1E578D0D58E07AADBC8C99D29E78A5B9AD44460A5D2A6DEE8EEEF
                                Malicious:false
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0x642d42ea,0x01d7a64e</date><accdate>0x642d42ea,0x01d7a64e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0x642d42ea,0x01d7a64e</date><accdate>0x642d42ea,0x01d7a64e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Google.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4PB7FJMT\dnserror[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):2997
                                Entropy (8bit):4.4885437940628465
                                Encrypted:false
                                SSDEEP:48:u7u5V4VyhhV2lFUW29vj0RkpNc7KpAP8Rra:vIlJ6G7Ao8Ra
                                MD5:2DC61EB461DA1436F5D22BCE51425660
                                SHA1:E1B79BCAB0F073868079D807FAEC669596DC46C1
                                SHA-256:ACDEB4966289B6CE46ECC879531F85E9C6F94B718AAB521D38E2E00F7F7F7993
                                SHA-512:A88BECB4FBDDC5AFC55E4DC0135AF714A3EEC4A63810AE5A989F2CECB824A686165D3CEDB8CBD8F35C7E5B9F4136C29DEA32736AABB451FE8088B978B493AC6D
                                Malicious:false
                                Preview: .<!DOCTYPE HTML>..<html>.. <head>.. <link rel="stylesheet" type="text/css" href="NewErrorPageTemplate.css" >.. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.. <title>Can&rsquo;t reach this page</title>.. <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="getInfo(); initMoreInfo('infoBlockID');">.. <div id="contentContainer" class="mainContent">.. <div id="mainTitle" class="title">Can&rsquo;t reach this page</div>.. <div class="taskSection" id="taskSection">.. <ul id="cantDisplayTasks" class="tasks">.. <li id="task1-1">Make sure the web address <span id="webpage" class="webpageURL"></span>is correct</li>.. <li id="task1-2">Search for this site on Bing</li>..
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4PB7FJMT\errorPageStrings[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):4720
                                Entropy (8bit):5.164796203267696
                                Encrypted:false
                                SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
                                MD5:D65EC06F21C379C87040B83CC1ABAC6B
                                SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
                                SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
                                SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
                                Malicious:false
                                Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4PB7FJMT\httpErrorPagesScripts[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):12105
                                Entropy (8bit):5.451485481468043
                                Encrypted:false
                                SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
                                MD5:9234071287E637F85D721463C488704C
                                SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
                                SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
                                SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
                                Malicious:false
                                Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NUEPGTR9\down[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
                                Category:dropped
                                Size (bytes):748
                                Entropy (8bit):7.249606135668305
                                Encrypted:false
                                SSDEEP:12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
                                MD5:C4F558C4C8B56858F15C09037CD6625A
                                SHA1:EE497CC061D6A7A59BB66DEFEA65F9A8145BA240
                                SHA-256:39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781
                                SHA-512:D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44
                                Malicious:false
                                Preview: .PNG........IHDR...............ex....PLTE....W..W..W..W..W..W..W..W..W..W..W..W..W.U..............W..W.!Y.#Z.$\.'].<r.=s.P..Q..Q..U..o..p..r..x..z..~.............................................b.............................................................................................................................................................................................................$..s...7tRNS.a.o(,.s....e......q*...................................F.Z....IDATx^%.S..@.C..jm.mTk...m.?|;.y..S....F.t...,.......D.>..LpX=f.M...H4........=...=..xy.[h..7....7.....<.q.kH....#+....I..z.....'.ksC...X<.+..J>....%3BmqaV...h..Z._.:<.Y_jG...vN^.<>.Nu.u@.....M....?...1D.m~)s8..&....IEND.B`.
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NUEPGTR9\httpErrorPagesScripts[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):12105
                                Entropy (8bit):5.451485481468043
                                Encrypted:false
                                SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
                                MD5:9234071287E637F85D721463C488704C
                                SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
                                SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
                                SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
                                Malicious:false
                                Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\NewErrorPageTemplate[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1612
                                Entropy (8bit):4.869554560514657
                                Encrypted:false
                                SSDEEP:24:5Y0bQ573pHpACtUZtJD0lFBopZleqw87xTe4D8FaFJ/Doz9AtjJgbCzg:5m73jcJqQep89TEw7Uxkk
                                MD5:DFEABDE84792228093A5A270352395B6
                                SHA1:E41258C9576721025926326F76063C2305586F76
                                SHA-256:77B138AB5D0A90FF04648C26ADDD5E414CC178165E3B54A4CB3739DA0F58E075
                                SHA-512:E256F603E67335151BB709294749794E2E3085F4063C623461A0B3DECBCCA8E620807B707EC9BCBE36DCD7D639C55753DA0495BE85B4AE5FB6BFC52AB4B284FD
                                Malicious:false
                                Preview: .body..{.. background-repeat: repeat-x;.. background-color: white;.. font-family: "Segoe UI", "verdana", "arial";.. margin: 0em;.. color: #1f1f1f;..}.....mainContent..{.. margin-top:80px;.. width: 700px;.. margin-left: 120px;.. margin-right: 120px;..}.....title..{.. color: #54b0f7;.. font-size: 36px;.. font-weight: 300;.. line-height: 40px;.. margin-bottom: 24px;.. font-family: "Segoe UI", "verdana";.. position: relative;..}.....errorExplanation..{.. color: #000000;.. font-size: 12pt;.. font-family: "Segoe UI", "verdana", "arial";.. text-decoration: none;..}.....taskSection..{.. margin-top: 20px;.. margin-bottom: 28px;.. position: relative; ..}.....tasks..{.. color: #000000;.. font-family: "Segoe UI", "verdana";.. font-weight:200;.. font-size: 12pt;..}....li..{.. margin-top: 8px;..}.....diagnoseButton..{.. outline: none;.. font-size: 9pt;..}.....launchInternetOptionsButton..{.. outline: none;
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\NewErrorPageTemplate[2]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1612
                                Entropy (8bit):4.869554560514657
                                Encrypted:false
                                SSDEEP:24:5Y0bQ573pHpACtUZtJD0lFBopZleqw87xTe4D8FaFJ/Doz9AtjJgbCzg:5m73jcJqQep89TEw7Uxkk
                                MD5:DFEABDE84792228093A5A270352395B6
                                SHA1:E41258C9576721025926326F76063C2305586F76
                                SHA-256:77B138AB5D0A90FF04648C26ADDD5E414CC178165E3B54A4CB3739DA0F58E075
                                SHA-512:E256F603E67335151BB709294749794E2E3085F4063C623461A0B3DECBCCA8E620807B707EC9BCBE36DCD7D639C55753DA0495BE85B4AE5FB6BFC52AB4B284FD
                                Malicious:false
                                Preview: .body..{.. background-repeat: repeat-x;.. background-color: white;.. font-family: "Segoe UI", "verdana", "arial";.. margin: 0em;.. color: #1f1f1f;..}.....mainContent..{.. margin-top:80px;.. width: 700px;.. margin-left: 120px;.. margin-right: 120px;..}.....title..{.. color: #54b0f7;.. font-size: 36px;.. font-weight: 300;.. line-height: 40px;.. margin-bottom: 24px;.. font-family: "Segoe UI", "verdana";.. position: relative;..}.....errorExplanation..{.. color: #000000;.. font-size: 12pt;.. font-family: "Segoe UI", "verdana", "arial";.. text-decoration: none;..}.....taskSection..{.. margin-top: 20px;.. margin-bottom: 28px;.. position: relative; ..}.....tasks..{.. color: #000000;.. font-family: "Segoe UI", "verdana";.. font-weight:200;.. font-size: 12pt;..}....li..{.. margin-top: 8px;..}.....diagnoseButton..{.. outline: none;.. font-size: 9pt;..}.....launchInternetOptionsButton..{.. outline: none;
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\dnserror[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):2997
                                Entropy (8bit):4.4885437940628465
                                Encrypted:false
                                SSDEEP:48:u7u5V4VyhhV2lFUW29vj0RkpNc7KpAP8Rra:vIlJ6G7Ao8Ra
                                MD5:2DC61EB461DA1436F5D22BCE51425660
                                SHA1:E1B79BCAB0F073868079D807FAEC669596DC46C1
                                SHA-256:ACDEB4966289B6CE46ECC879531F85E9C6F94B718AAB521D38E2E00F7F7F7993
                                SHA-512:A88BECB4FBDDC5AFC55E4DC0135AF714A3EEC4A63810AE5A989F2CECB824A686165D3CEDB8CBD8F35C7E5B9F4136C29DEA32736AABB451FE8088B978B493AC6D
                                Malicious:false
                                Preview: .<!DOCTYPE HTML>..<html>.. <head>.. <link rel="stylesheet" type="text/css" href="NewErrorPageTemplate.css" >.. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.. <title>Can&rsquo;t reach this page</title>.. <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="getInfo(); initMoreInfo('infoBlockID');">.. <div id="contentContainer" class="mainContent">.. <div id="mainTitle" class="title">Can&rsquo;t reach this page</div>.. <div class="taskSection" id="taskSection">.. <ul id="cantDisplayTasks" class="tasks">.. <li id="task1-1">Make sure the web address <span id="webpage" class="webpageURL"></span>is correct</li>.. <li id="task1-2">Search for this site on Bing</li>..
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\down[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
                                Category:dropped
                                Size (bytes):748
                                Entropy (8bit):7.249606135668305
                                Encrypted:false
                                SSDEEP:12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
                                MD5:C4F558C4C8B56858F15C09037CD6625A
                                SHA1:EE497CC061D6A7A59BB66DEFEA65F9A8145BA240
                                SHA-256:39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781
                                SHA-512:D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44
                                Malicious:false
                                Preview: .PNG........IHDR...............ex....PLTE....W..W..W..W..W..W..W..W..W..W..W..W..W.U..............W..W.!Y.#Z.$\.'].<r.=s.P..Q..Q..U..o..p..r..x..z..~.............................................b.............................................................................................................................................................................................................$..s...7tRNS.a.o(,.s....e......q*...................................F.Z....IDATx^%.S..@.C..jm.mTk...m.?|;.y..S....F.t...,.......D.>..LpX=f.M...H4........=...=..xy.[h..7....7.....<.q.kH....#+....I..z.....'.ksC...X<.+..J>....%3BmqaV...h..Z._.:<.Y_jG...vN^.<>.Nu.u@.....M....?...1D.m~)s8..&....IEND.B`.
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\errorPageStrings[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):4720
                                Entropy (8bit):5.164796203267696
                                Encrypted:false
                                SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
                                MD5:D65EC06F21C379C87040B83CC1ABAC6B
                                SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
                                SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
                                SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
                                Malicious:false
                                Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
                                C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:modified
                                Size (bytes):89
                                Entropy (8bit):4.48547855515619
                                Encrypted:false
                                SSDEEP:3:oVXUpPvTEH8JOGXnEpPvuSun:o9UpoHqEpOSu
                                MD5:D83E06FE427751E9BDB33BB4973DDAE4
                                SHA1:D3B5FD3B9CC417D6C9104133BD4D208B271E3539
                                SHA-256:2560DB494FC84A2E3B784C92C6D21A6E2326B6C022EC01751E3EC1B2D3977051
                                SHA-512:665DED2E622C649F7B540499A542AE24835CD4E32077E584E118279013D35B6E88AB0591AC7BE38EFBF3C63C570245203AF3B7431F2AB965DC62DF05D91361E2
                                Malicious:false
                                Preview: [2021/09/10 07:16:37.656] Latest deploy version: ..[2021/09/10 07:16:37.656] 11.211.2 ..
                                C:\Users\user\AppData\Local\Temp\~DF56EA5AC75B303922.TMP
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):38737
                                Entropy (8bit):0.37178213318940906
                                Encrypted:false
                                SSDEEP:48:kBqoxKAuvScS+VqVyRVWVfVTIVTwHTyDZHTyDbHTyDU:kBqoxKAuvScS+ouk1emqwt
                                MD5:4CFC78871AA73B44EF10B660F7B9A647
                                SHA1:110C151CC0DF69ABDE3C5FB7B92366EF33C72F73
                                SHA-256:EE8635C8F7336AB4769C1F836FE2099EF0EFBAC3B9086AFF3F8B2C1F4796F865
                                SHA-512:BFE2CB219AF232EBD8108A1C0AB1844D7EFCCD6CB6806F29B8806406162104FE816C00FBA58F5CAFB6BDFA6A780B205512E6F94734AFD740C7F8CEBD2E7FCC3D
                                Malicious:false
                                Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Local\Temp\~DF58B12BFEC36A6D12.TMP
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):12933
                                Entropy (8bit):0.4083961078857369
                                Encrypted:false
                                SSDEEP:12:c9lCg5/9lCgeK9l26an9l26an9l8fR3C9l8fR3y9lTq3nnh:c9lLh9lLh9lIn9lIn9loS9loC9lW3h
                                MD5:724E1A38416982867DB7435AF11BE17C
                                SHA1:F664B8739825A1AFBEC4F311F03B01742EC36EEA
                                SHA-256:2BA5B6F622CD7C3D745C61D4CF754E18784D818EDE82EFA121A85501500B52A1
                                SHA-512:5A13C7A97A8A4E1567D7B4503BD36482D23FA3947E3B907908516C5D1F2C3DC7D72C26F2650CF09FE2891D9ED5EE0E83FE254E5C03E55ABDB1D2798153F16A9B
                                Malicious:false
                                Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Local\Temp\~DFA5C652E686E58888.TMP
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):38737
                                Entropy (8bit):0.372600979825686
                                Encrypted:false
                                SSDEEP:48:kBqoxKAuvScS+EkRIZ1I1wPyDZPyDbPyDU:kBqoxKAuvScS+EiIZCaG8Z
                                MD5:334468D3CF49CDFE2CCAC8920F29206F
                                SHA1:9E61FA62581B40C30BD11BF92BECA809689157ED
                                SHA-256:EA945154C25F0CE7ABEC89280E9419AFE8F82C2E3C3FDC6D7FF27DF0152ECBD4
                                SHA-512:F8C7833DDF8F0204CAAD36CA56A29F7BB32D965076C6263F7C75C27ACA1999CE7AD0E1611BB510388C8A50978ADAA81A8BA445166AD7E847119CE9C7DA316741
                                Malicious:false
                                Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Local\Temp\~DFEAB2FBB4231FF1CC.TMP
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):12933
                                Entropy (8bit):0.40716309839094866
                                Encrypted:false
                                SSDEEP:24:c9lLh9lLh9lIn9lIn9loIT9loIT9lWINvinev6WnE:kBqoIv59SE
                                MD5:5217D7AB6A9D794AAC70438D98666715
                                SHA1:DB061C2C7A891FC61AEFC4D9586D6259E91ABF99
                                SHA-256:66EBFEDA3EF90C4EEE430B0738C08546A62BE6EAE13B1C77918B900BAF9878D3
                                SHA-512:CF2C8FB599D15499CE609B1187CDF10E133FFCA0EC96FE183BA60D514691732A740807FE5F0FF084E4163BEA1916CAA0EA294B975FFFFC1004E91DD7B73590EA
                                Malicious:false
                                Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                                Static File Info

                                General

                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Entropy (8bit):6.614360119917732
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:y5ACIMK3tT.exe
                                File size:901960
                                MD5:72fb1d021cfaa3ef3ea5ddd2aa6edc86
                                SHA1:7de81647d41ef9c982920e119ebaf27b5affcf26
                                SHA256:b7a9576a80944c203ddb7a1fbfbfa2a5806c2419ad193f22b84d0fa4f078a725
                                SHA512:f487c205746f3b9de76de7029fb9fab108c384e55c8d1918120a76feccd1284ab566eedacd5c7b279a8a9ba16c8c357e56dd6c0497866cb3a41d098d9618cd4e
                                SSDEEP:24576:y9PsA9vHAYobFGQdRHylSk61LXXhNxvZXmtk1/GqgLGu:3YqJk61bRLZXmWGGu
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s/>..Am..Am..Am...m..Am...m..Am...m..Am..@mb.Am.e.m..Am...m..Amn..m..Am...m..Am...m..Am...m..AmRich..Am.......................

                                File Icon

                                Icon Hash:f0b0e8e4e4e8b2dc

                                Static PE Info

                                General

                                Entrypoint:0x1005725
                                Entrypoint Section:.text
                                Digitally signed:true
                                Imagebase:0x1000000
                                Subsystem:windows gui
                                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                DLL Characteristics:TERMINAL_SERVER_AWARE, NX_COMPAT
                                Time Stamp:0x55E85856 [Thu Sep 3 14:25:26 2015 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:6
                                OS Version Minor:0
                                File Version Major:6
                                File Version Minor:0
                                Subsystem Version Major:6
                                Subsystem Version Minor:0
                                Import Hash:e256626a548828ef6c76be7957372a60

                                Authenticode Signature

                                Signature Valid:false
                                Signature Issuer:CN=Sectigo RSA Code Signing CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
                                Signature Validation Error:No signature was present in the subject
                                Error Number:-2146762496
                                Not Before, Not After
                                • 4/12/2021 5:00:00 PM 4/13/2022 4:59:59 PM
                                Subject Chain
                                • CN=FORTH PROPERTY LTD, O=FORTH PROPERTY LTD, L=Edinburgh, C=GB
                                Version:3
                                Thumbprint MD5:8AB6A86211EE700AA961C3292ADB312D
                                Thumbprint SHA-1:A533DFA7E6AED2A9FFBE41FCEC5A8927A6EAFBBB
                                Thumbprint SHA-256:9E0611728595A506CC2A55486FDD88ECA0971EF0B08F74CB3B3B6F5F6F3C7E27
                                Serial:239664C12BAEB5A6D787912888051392

                                Entrypoint Preview

                                Instruction
                                call 00007F38FCDBF020h
                                jmp 00007F38FCDB7F35h
                                push 00000014h
                                push 0108A9F8h
                                call 00007F38FCDBCF0Ah
                                call 00007F38FCDB870Bh
                                movzx esi, ax
                                push 00000002h
                                call 00007F38FCDBEFB3h
                                pop ecx
                                mov eax, 00005A4Dh
                                cmp word ptr [01000000h], ax
                                je 00007F38FCDB7F36h
                                xor ebx, ebx
                                jmp 00007F38FCDB7F65h
                                mov eax, dword ptr [0100003Ch]
                                cmp dword ptr [eax+01000000h], 00004550h
                                jne 00007F38FCDB7F1Dh
                                mov ecx, 0000010Bh
                                cmp word ptr [eax+01000018h], cx
                                jne 00007F38FCDB7F0Fh
                                xor ebx, ebx
                                cmp dword ptr [eax+01000074h], 0Eh
                                jbe 00007F38FCDB7F3Bh
                                cmp dword ptr [eax+010000E8h], ebx
                                setne bl
                                mov dword ptr [ebp-1Ch], ebx
                                call 00007F38FCDBCE5Dh
                                test eax, eax
                                jne 00007F38FCDB7F3Ah
                                push 0000001Ch
                                call 00007F38FCDB8057h
                                pop ecx
                                call 00007F38FCDBE31Bh
                                test eax, eax
                                jne 00007F38FCDB7F3Ah
                                push 00000010h
                                call 00007F38FCDB8046h
                                pop ecx
                                call 00007F38FCDBF02Ch
                                and dword ptr [ebp-04h], 00000000h
                                call 00007F38FCDBE917h
                                test eax, eax
                                jns 00007F38FCDB7F3Ah
                                push 0000001Bh
                                call 00007F38FCDB802Ch
                                pop ecx
                                call dword ptr [0106A19Ch]
                                mov dword ptr [010AC3A8h], eax
                                call 00007F38FCDBF047h
                                mov dword ptr [01097A94h], eax
                                call 00007F38FCDBEC04h
                                test eax, eax
                                jns 00007F38FCDB7F3Ah

                                Data Directories

                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x8ccf80x8c.rdata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xad0000x41028.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0xda0000x2348.rsrc
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xef0000x4d50.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x6a3b00x38.rdata
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x879400x40.rdata
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x6a0000x328.rdata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                Sections

                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x681b90x68200False0.62395192452data6.85141956597IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                .rdata0x6a0000x23f8a0x24000False0.641872829861data6.36645327435IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .data0x8e0000x1e3ac0x7a00False0.527792008197data6.51367686644IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                .rsrc0xad0000x410280x41200False0.240744211852data5.36312234805IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0xef0000x4d500x4e00False0.730168269231data6.65913941378IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                Resources

                                NameRVASizeTypeLanguageCountry
                                RT_ICON0xad4340x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0EnglishUnited States
                                RT_ICON0xbdc5c0x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 16580607, next used block 4294917888EnglishUnited States
                                RT_ICON0xc1e840x25a8dataEnglishUnited States
                                RT_ICON0xc442c0x10a8dataEnglishUnited States
                                RT_ICON0xc54d40x988dataEnglishUnited States
                                RT_ICON0xc5e5c0x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                                RT_ICON0xc62c40x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0EnglishUnited States
                                RT_ICON0xd6aec0x94a8dataEnglishUnited States
                                RT_ICON0xdff940x5488dataEnglishUnited States
                                RT_ICON0xe541c0x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 254, next used block 520093696EnglishUnited States
                                RT_ICON0xe96440x25a8dataEnglishUnited States
                                RT_ICON0xebbec0x10a8dataEnglishUnited States
                                RT_ICON0xecc940x988dataEnglishUnited States
                                RT_ICON0xed61c0x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                                RT_STRING0xeda840xbcdataEnglishUnited States
                                RT_STRING0xedb400x150dataEnglishUnited States
                                RT_GROUP_ICON0xedc900x76dataEnglishUnited States
                                RT_GROUP_ICON0xedd080x5adataEnglishUnited States
                                RT_VERSION0xedd640x2c4dataEnglishUnited States

                                Imports

                                DLLImport
                                KERNEL32.dllGetLastError, VirtualProtectEx, LoadLibraryA, OpenMutexA, SetConsoleOutputCP, DeviceIoControl, GetModuleFileNameA, CloseHandle, DeleteFileA, WriteConsoleW, SetStdHandle, GetStringTypeW, LoadLibraryW, WaitForMultipleObjectsEx, GetStartupInfoA, GetConsoleMode, GetConsoleCP, FlushFileBuffers, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetLocaleInfoW, LCMapStringW, CompareStringW, GetTimeFormatW, GetDateFormatW, GetCPInfo, GetOEMCP, GetACP, IsValidCodePage, HeapReAlloc, CreateProcessA, Sleep, GetTickCount, SetFilePointerEx, GetCurrentProcess, UnregisterWaitEx, QueryDepthSList, InterlockedFlushSList, InterlockedPushEntrySList, InterlockedPopEntrySList, InitializeSListHead, ReleaseSemaphore, SetProcessAffinityMask, VirtualProtect, VirtualFree, VirtualAlloc, GetVersionExW, GetModuleHandleA, FreeLibraryAndExitThread, FreeLibrary, GetThreadTimes, OutputDebugStringW, FatalAppExitA, SetConsoleCtrlHandler, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCurrentProcessId, QueryPerformanceCounter, GetFileType, HeapSize, GetProcessHeap, GetModuleFileNameW, WriteFile, GetStdHandle, WideCharToMultiByte, MultiByteToWideChar, AreFileApisANSI, GetModuleHandleExW, ExitProcess, IsDebuggerPresent, UnregisterWait, RegisterWaitForSingleObject, SetThreadAffinityMask, GetProcessAffinityMask, GetNumaHighestNodeNumber, DeleteTimerQueueTimer, ChangeTimerQueueTimer, CreateTimerQueueTimer, GetLogicalProcessorInformation, GetThreadPriority, SetThreadPriority, SwitchToThread, SignalObjectAndWait, WaitForSingleObjectEx, SetEvent, DuplicateHandle, WaitForSingleObject, GetCurrentThread, GetCurrentThreadId, GetExitCodeThread, GetSystemTimeAsFileTime, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, HeapAlloc, EncodePointer, DecodePointer, GetCommandLineA, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, SetLastError, InitializeCriticalSectionAndSpinCount, CreateEventW, TerminateProcess, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetModuleHandleW, GetProcAddress, CreateSemaphoreW, CreateThread, ExitThread, LoadLibraryExW, RaiseException, RtlUnwind, HeapFree, TryEnterCriticalSection, CreateTimerQueue, RtlCaptureStackBackTrace, CreateFileW
                                USER32.dllSetWindowTextA, CallNextHookEx, LoadBitmapA, GetClassInfoExA, EnumWindows, GetIconInfo, IsDialogMessageA, GetWindowLongA, CreateWindowExA, ReleaseDC, DefWindowProcA, CheckDlgButton, SendMessageA
                                ole32.dllCoUninitialize, OleSetContainedObject, OleInitialize, CoSuspendClassObjects, OleUninitialize, StgCreateDocfile, CoInitialize
                                COMCTL32.dllImageList_LoadImageA, PropertySheetA, CreatePropertySheetPageA
                                WINSPOOL.DRVAddJobA, DeletePortA, SetPortA, SetPrinterDataA, DeletePrintProcessorA, AbortPrinter, GetPrinterDriverDirectoryA, ResetPrinterA, StartPagePrinter, ReadPrinter, FlushPrinter, DeletePrinterConnectionA, StartDocPrinterA, DeletePrinterKeyA, DeletePrintProvidorA, DeletePrinterDriverExA, GetPrintProcessorDirectoryA, FindClosePrinterChangeNotification, DeletePrinterDriverA, AddPrintProvidorA, OpenPrinterA, GetJobA, ClosePrinter, AddPrintProcessorA, AddPrinterA, PrinterMessageBoxA, SetFormA, GetFormA, DeletePrinter, AddPortA, SetJobA, AddPrinterDriverA, SetPrinterDataExA, DeletePrinterDataExA, DeletePrinterDataA, GetPrinterDataA, AddFormA, AddPrinterDriverExA, AddPrinterConnectionA, AddMonitorA, DeleteFormA, DeleteMonitorA, GetPrinterA, ConfigurePortA, ScheduleJob, GetPrinterDriverA, GetPrinterDataExA
                                sfc.dllSfcIsFileProtected

                                Version Infos

                                DescriptionData
                                LegalCopyright(C) 2011 Helpwould Use Corporation. All rights reserved.
                                FileVersion14.1.55.63
                                CompanyNameHelpwould Use Corporation
                                ProductNameDeathice
                                ProductVersion14.1.55.63
                                FileDescriptionDeathice The Certain
                                Translation0x0409 0x04b0

                                Possible Origin

                                Language of compilation systemCountry where language is spokenMap
                                EnglishUnited States

                                Network Behavior

                                Network Port Distribution

                                UDP Packets

                                TimestampSource PortDest PortSource IPDest IP
                                Sep 10, 2021 07:15:23.031836033 CEST5116553192.168.2.58.8.8.8
                                Sep 10, 2021 07:15:23.067981005 CEST53511658.8.8.8192.168.2.5
                                Sep 10, 2021 07:15:24.261713982 CEST5318353192.168.2.58.8.8.8
                                Sep 10, 2021 07:15:24.286346912 CEST53531838.8.8.8192.168.2.5
                                Sep 10, 2021 07:15:24.403858900 CEST5758753192.168.2.58.8.8.8
                                Sep 10, 2021 07:15:24.438414097 CEST53575878.8.8.8192.168.2.5
                                Sep 10, 2021 07:15:24.588327885 CEST5543253192.168.2.58.8.8.8
                                Sep 10, 2021 07:15:24.613374949 CEST53554328.8.8.8192.168.2.5
                                Sep 10, 2021 07:15:24.691654921 CEST6493653192.168.2.58.8.8.8
                                Sep 10, 2021 07:15:24.724833012 CEST53649368.8.8.8192.168.2.5
                                Sep 10, 2021 07:15:33.078450918 CEST5270453192.168.2.58.8.8.8
                                Sep 10, 2021 07:15:33.121984959 CEST53527048.8.8.8192.168.2.5
                                Sep 10, 2021 07:15:34.716731071 CEST5221253192.168.2.58.8.8.8
                                Sep 10, 2021 07:15:34.752845049 CEST53522128.8.8.8192.168.2.5
                                Sep 10, 2021 07:15:34.768047094 CEST5430253192.168.2.58.8.8.8
                                Sep 10, 2021 07:15:34.803451061 CEST53543028.8.8.8192.168.2.5
                                Sep 10, 2021 07:15:34.820358038 CEST5378453192.168.2.58.8.8.8
                                Sep 10, 2021 07:15:34.854804039 CEST53537848.8.8.8192.168.2.5
                                Sep 10, 2021 07:15:46.217190027 CEST6530753192.168.2.58.8.8.8
                                Sep 10, 2021 07:15:46.254637003 CEST53653078.8.8.8192.168.2.5
                                Sep 10, 2021 07:15:56.312530041 CEST6434453192.168.2.58.8.8.8
                                Sep 10, 2021 07:15:56.348328114 CEST53643448.8.8.8192.168.2.5
                                Sep 10, 2021 07:16:03.049340963 CEST6206053192.168.2.58.8.8.8
                                Sep 10, 2021 07:16:03.081857920 CEST53620608.8.8.8192.168.2.5
                                Sep 10, 2021 07:16:04.060501099 CEST6206053192.168.2.58.8.8.8
                                Sep 10, 2021 07:16:04.095017910 CEST53620608.8.8.8192.168.2.5
                                Sep 10, 2021 07:16:05.064035892 CEST6206053192.168.2.58.8.8.8
                                Sep 10, 2021 07:16:05.096472025 CEST53620608.8.8.8192.168.2.5
                                Sep 10, 2021 07:16:07.107239008 CEST6206053192.168.2.58.8.8.8
                                Sep 10, 2021 07:16:07.141813040 CEST53620608.8.8.8192.168.2.5
                                Sep 10, 2021 07:16:11.172729015 CEST6206053192.168.2.58.8.8.8
                                Sep 10, 2021 07:16:11.198000908 CEST53620608.8.8.8192.168.2.5
                                Sep 10, 2021 07:16:24.833563089 CEST6180553192.168.2.58.8.8.8
                                Sep 10, 2021 07:16:24.870574951 CEST53618058.8.8.8192.168.2.5
                                Sep 10, 2021 07:16:28.709317923 CEST5479553192.168.2.58.8.8.8
                                Sep 10, 2021 07:16:28.745152950 CEST53547958.8.8.8192.168.2.5
                                Sep 10, 2021 07:16:31.068264961 CEST4955753192.168.2.58.8.8.8
                                Sep 10, 2021 07:16:31.114586115 CEST53495578.8.8.8192.168.2.5
                                Sep 10, 2021 07:16:37.002940893 CEST6173353192.168.2.58.8.8.8
                                Sep 10, 2021 07:16:37.036864996 CEST53617338.8.8.8192.168.2.5
                                Sep 10, 2021 07:16:38.532948971 CEST6544753192.168.2.58.8.8.8
                                Sep 10, 2021 07:16:38.560961962 CEST53654478.8.8.8192.168.2.5
                                Sep 10, 2021 07:16:38.567085028 CEST5244153192.168.2.58.8.8.8
                                Sep 10, 2021 07:16:38.603250980 CEST53524418.8.8.8192.168.2.5
                                Sep 10, 2021 07:16:38.613707066 CEST6217653192.168.2.58.8.8.8
                                Sep 10, 2021 07:16:38.646589994 CEST53621768.8.8.8192.168.2.5

                                DNS Queries

                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                Sep 10, 2021 07:15:34.716731071 CEST192.168.2.58.8.8.80x1bccStandard query (0)haverit.xyzA (IP address)IN (0x0001)
                                Sep 10, 2021 07:15:34.768047094 CEST192.168.2.58.8.8.80xaf32Standard query (0)haverit.xyzA (IP address)IN (0x0001)
                                Sep 10, 2021 07:15:34.820358038 CEST192.168.2.58.8.8.80xe91bStandard query (0)haverit.xyzA (IP address)IN (0x0001)
                                Sep 10, 2021 07:15:46.217190027 CEST192.168.2.58.8.8.80xb663Standard query (0)haverit.xyzA (IP address)IN (0x0001)
                                Sep 10, 2021 07:15:56.312530041 CEST192.168.2.58.8.8.80x9483Standard query (0)haverit.xyzA (IP address)IN (0x0001)
                                Sep 10, 2021 07:16:38.532948971 CEST192.168.2.58.8.8.80x528fStandard query (0)haverit.xyzA (IP address)IN (0x0001)
                                Sep 10, 2021 07:16:38.567085028 CEST192.168.2.58.8.8.80xf2Standard query (0)haverit.xyzA (IP address)IN (0x0001)
                                Sep 10, 2021 07:16:38.613707066 CEST192.168.2.58.8.8.80x9562Standard query (0)haverit.xyzA (IP address)IN (0x0001)

                                DNS Answers

                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                Sep 10, 2021 07:15:34.752845049 CEST8.8.8.8192.168.2.50x1bccName error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                                Sep 10, 2021 07:15:34.803451061 CEST8.8.8.8192.168.2.50xaf32Name error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                                Sep 10, 2021 07:15:34.854804039 CEST8.8.8.8192.168.2.50xe91bName error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                                Sep 10, 2021 07:15:46.254637003 CEST8.8.8.8192.168.2.50xb663Name error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                                Sep 10, 2021 07:15:56.348328114 CEST8.8.8.8192.168.2.50x9483Name error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                                Sep 10, 2021 07:16:38.560961962 CEST8.8.8.8192.168.2.50x528fName error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                                Sep 10, 2021 07:16:38.603250980 CEST8.8.8.8192.168.2.50xf2Name error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                                Sep 10, 2021 07:16:38.646589994 CEST8.8.8.8192.168.2.50x9562Name error (3)haverit.xyznonenoneA (IP address)IN (0x0001)

                                Code Manipulations

                                Statistics

                                CPU Usage

                                Click to jump to process

                                Memory Usage

                                Click to jump to process

                                Behavior

                                Click to jump to process

                                System Behavior

                                General

                                Start time:07:15:04
                                Start date:10/09/2021
                                Path:C:\Users\user\Desktop\y5ACIMK3tT.exe
                                Wow64 process (32bit):true
                                Commandline:'C:\Users\user\Desktop\y5ACIMK3tT.exe'
                                Imagebase:0x1000000
                                File size:901960 bytes
                                MD5 hash:72FB1D021CFAA3EF3EA5DDD2AA6EDC86
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000002.501326750.00000000036E0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.280081187.00000000036E0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.280494462.00000000036E0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.281430952.00000000036E0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.280426403.00000000036E0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.281014480.00000000036E0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.280263191.00000000036E0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.281416323.00000000036E0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.425935885.00000000036E0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.280831725.00000000036E0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.281148827.00000000036E0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.281353274.00000000036E0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.280639725.00000000036E0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.280563706.00000000036E0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.281240518.00000000036E0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.279765747.00000000036E0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.281062590.00000000036E0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.280698259.00000000036E0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.281191378.00000000036E0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.280772678.00000000036E0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.281330244.00000000036E0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.279863384.00000000036E0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.279650602.00000000036E0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.280906581.00000000036E0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.279954452.00000000036E0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.281398809.00000000036E0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.281439514.00000000036E0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.280341081.00000000036E0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.280961190.00000000036E0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.281272411.00000000036E0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.281107458.00000000036E0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.281302346.00000000036E0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.281376823.00000000036E0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.280182518.00000000036E0000.00000004.00000040.sdmp, Author: Joe Security
                                Reputation:low

                                General

                                Start time:07:15:32
                                Start date:10/09/2021
                                Path:C:\Program Files\internet explorer\iexplore.exe
                                Wow64 process (32bit):false
                                Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                                Imagebase:0x7ff7cbd60000
                                File size:823560 bytes
                                MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:07:15:32
                                Start date:10/09/2021
                                Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                Wow64 process (32bit):true
                                Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:4648 CREDAT:17410 /prefetch:2
                                Imagebase:0xd50000
                                File size:822536 bytes
                                MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:07:16:36
                                Start date:10/09/2021
                                Path:C:\Program Files\internet explorer\iexplore.exe
                                Wow64 process (32bit):false
                                Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                                Imagebase:0x7ff7cbd60000
                                File size:823560 bytes
                                MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:07:16:36
                                Start date:10/09/2021
                                Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                Wow64 process (32bit):true
                                Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:4176 CREDAT:17410 /prefetch:2
                                Imagebase:0xd50000
                                File size:822536 bytes
                                MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Disassembly

                                Code Analysis

                                Reset < >