Loading ...

Play interactive tourEdit tour

Windows Analysis Report VjLfUM5cMx

Overview

General Information

Sample Name:VjLfUM5cMx (renamed file extension from none to exe)
Analysis ID:480997
MD5:c07d4f7dcac497a3c06cbba9e6e9e711
SHA1:f9910595a15ee0ca41871bda8f1a23a3aa7f9360
SHA256:82aabb70809394ec910ecdff3dfe4982d652c6d65f7fa65e7da16b83ebf87192
Tags:exeFORTHPROPERTYLTD
Infos:

Most interesting Screenshot:

Detection

Ursnif Ursnif v3
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Ursnif
Multi AV Scanner detection for submitted file
Detected unpacking (changes PE section rights)
Yara detected Ursnif
Writes or reads registry keys via WMI
Writes registry values via WMI
Machine Learning detection for sample
Performs DNS queries to domains with low reputation
Uses 32bit PE files
Antivirus or Machine Learning detection for unpacked file
PE file contains an invalid checksum
PE file contains strange resources
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
PE / OLE file has an invalid certificate
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)

Classification

Process Tree

  • System is w10x64
  • VjLfUM5cMx.exe (PID: 6120 cmdline: 'C:\Users\user\Desktop\VjLfUM5cMx.exe' MD5: C07D4F7DCAC497A3C06CBBA9E6E9E711)
  • iexplore.exe (PID: 2856 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 6960 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2856 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • iexplore.exe (PID: 1492 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 3740 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1492 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000003.743054194.0000000003640000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
    00000000.00000003.742911268.0000000003640000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
      00000000.00000003.742353433.0000000003640000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
        00000000.00000003.743093279.0000000003640000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
          00000000.00000003.743313694.0000000003640000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
            Click to see the 29 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            0.3.VjLfUM5cMx.exe.dc9d7c.0.raw.unpackJoeSecurity_Ursnifv3Yara detected UrsnifJoe Security
              0.2.VjLfUM5cMx.exe.1000000.0.unpackJoeSecurity_Ursnifv3Yara detected UrsnifJoe Security

                Sigma Overview

                No Sigma rule has matched

                Jbx Signature Overview

                Click to jump to signature section

                Show All Signature Results

                AV Detection:

                barindex
                Multi AV Scanner detection for submitted fileShow sources
                Source: VjLfUM5cMx.exeVirustotal: Detection: 13%Perma Link
                Machine Learning detection for sampleShow sources
                Source: VjLfUM5cMx.exeJoe Sandbox ML: detected
                Source: 0.3.VjLfUM5cMx.exe.dc9d7c.0.unpackAvira: Label: TR/Patched.Ren.Gen
                Source: 0.2.VjLfUM5cMx.exe.1000000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen7
                Source: VjLfUM5cMx.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
                Source: Binary string: c:\Muchwin\WorkWhich\centstring\shinegray\WanthumanMarket.pdb source: VjLfUM5cMx.exe

                Networking:

                barindex
                Performs DNS queries to domains with low reputationShow sources
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: haverit.xyz
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: haverit.xyz
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: haverit.xyz
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeDNS query: haverit.xyz
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeDNS query: haverit.xyz
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: haverit.xyz
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: haverit.xyz
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: haverit.xyz
                Source: unknownDNS traffic detected: query: haverit.xyz replaycode: Name error (3)
                Source: msapplication.xml0.7.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xb71b6d91,0x01d7a604</date><accdate>0xb71b6d91,0x01d7a604</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
                Source: msapplication.xml0.7.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xb71b6d91,0x01d7a604</date><accdate>0xb71b6d91,0x01d7a604</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
                Source: msapplication.xml5.7.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xb71b6d91,0x01d7a604</date><accdate>0xb71b6d91,0x01d7a604</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
                Source: msapplication.xml5.7.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xb71b6d91,0x01d7a604</date><accdate>0xb71b6d91,0x01d7a604</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
                Source: msapplication.xml7.7.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xb7229583,0x01d7a604</date><accdate>0xb7229583,0x01d7a604</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
                Source: msapplication.xml7.7.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xb7229583,0x01d7a604</date><accdate>0xb7229583,0x01d7a604</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
                Source: VjLfUM5cMx.exe, 00000000.00000003.743266389.0000000003640000.00000004.00000040.sdmpString found in binary or memory: http://%s=%s&file://&os=%u.%u_%u_%u_x%uindex.html;
                Source: VjLfUM5cMx.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                Source: VjLfUM5cMx.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                Source: VjLfUM5cMx.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                Source: VjLfUM5cMx.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                Source: VjLfUM5cMx.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
                Source: VjLfUM5cMx.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                Source: VjLfUM5cMx.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                Source: VjLfUM5cMx.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                Source: VjLfUM5cMx.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                Source: VjLfUM5cMx.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
                Source: VjLfUM5cMx.exeString found in binary or memory: http://ocsp.comodoca.com0
                Source: VjLfUM5cMx.exeString found in binary or memory: http://ocsp.digicert.com0C
                Source: VjLfUM5cMx.exeString found in binary or memory: http://ocsp.digicert.com0O
                Source: VjLfUM5cMx.exeString found in binary or memory: http://ocsp.sectigo.com0
                Source: msapplication.xml.7.drString found in binary or memory: http://www.amazon.com/
                Source: VjLfUM5cMx.exeString found in binary or memory: http://www.digicert.com/CPS0
                Source: msapplication.xml1.7.drString found in binary or memory: http://www.google.com/
                Source: msapplication.xml2.7.drString found in binary or memory: http://www.live.com/
                Source: msapplication.xml3.7.drString found in binary or memory: http://www.nytimes.com/
                Source: msapplication.xml4.7.drString found in binary or memory: http://www.reddit.com/
                Source: msapplication.xml5.7.drString found in binary or memory: http://www.twitter.com/
                Source: msapplication.xml6.7.drString found in binary or memory: http://www.wikipedia.com/
                Source: msapplication.xml7.7.drString found in binary or memory: http://www.youtube.com/
                Source: VjLfUM5cMx.exe, VjLfUM5cMx.exe, 00000000.00000002.961204866.0000000000629000.00000004.00000020.sdmpString found in binary or memory: https://haverit.xyz
                Source: VjLfUM5cMx.exe, 00000000.00000003.929576578.000000000066A000.00000004.00000001.sdmpString found in binary or memory: https://haverit.xyz/0b
                Source: VjLfUM5cMx.exe, 00000000.00000003.800653313.0000000000669000.00000004.00000001.sdmpString found in binary or memory: https://haverit.xyz/Q
                Source: VjLfUM5cMx.exe, 00000000.00000002.961204866.0000000000629000.00000004.00000020.sdmp, ~DFD3F956B20687A278.TMP.7.drString found in binary or memory: https://haverit.xyz/index.htm
                Source: VjLfUM5cMx.exe, 00000000.00000002.961204866.0000000000629000.00000004.00000020.sdmpString found in binary or memory: https://haverit.xyz/index.htm&E
                Source: {077FA0D6-11F8-11EC-90EB-ECF4BBEA1588}.dat.15.drString found in binary or memory: https://haverit.xyz/index.htmRoot
                Source: {077FA0D6-11F8-11EC-90EB-ECF4BBEA1588}.dat.15.drString found in binary or memory: https://haverit.xyz/index.htmdex.htm
                Source: VjLfUM5cMx.exe, 00000000.00000003.892700634.000000000068C000.00000004.00000001.sdmpString found in binary or memory: https://haverit.xyz/index.htmr#
                Source: VjLfUM5cMx.exeString found in binary or memory: https://sectigo.com/CPS0
                Source: VjLfUM5cMx.exeString found in binary or memory: https://www.digicert.com/CPS0
                Source: unknownDNS traffic detected: queries for: haverit.xyz

                Key, Mouse, Clipboard, Microphone and Screen Capturing:

                barindex
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 0.3.VjLfUM5cMx.exe.dc9d7c.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.VjLfUM5cMx.exe.1000000.0.unpack, type: UNPACKEDPE
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 00000000.00000003.743054194.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742911268.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742353433.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743093279.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743313694.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742958135.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743290829.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.741931302.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742268425.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743331263.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743266389.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742496222.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743239058.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743391740.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.961646531.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743211426.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742430984.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742097013.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743177986.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743353889.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742801405.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742634138.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743003429.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742749222.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742570614.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743401742.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743138802.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742692154.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742188110.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742014211.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743370213.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742861166.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.741849479.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: VjLfUM5cMx.exe PID: 6120, type: MEMORYSTR

                E-Banking Fraud:

                barindex
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 0.3.VjLfUM5cMx.exe.dc9d7c.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.VjLfUM5cMx.exe.1000000.0.unpack, type: UNPACKEDPE
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 00000000.00000003.743054194.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742911268.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742353433.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743093279.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743313694.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742958135.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743290829.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.741931302.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742268425.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743331263.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743266389.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742496222.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743239058.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743391740.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.961646531.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743211426.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742430984.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742097013.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743177986.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743353889.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742801405.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742634138.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743003429.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742749222.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742570614.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743401742.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743138802.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742692154.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742188110.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742014211.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743370213.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742861166.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.741849479.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: VjLfUM5cMx.exe PID: 6120, type: MEMORYSTR

                System Summary:

                barindex
                Writes or reads registry keys via WMIShow sources
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetDWORDValue
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                Writes registry values via WMIShow sources
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                Source: VjLfUM5cMx.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                Source: VjLfUM5cMx.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: VjLfUM5cMx.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: VjLfUM5cMx.exeStatic PE information: invalid certificate
                Source: VjLfUM5cMx.exeVirustotal: Detection: 13%
                Source: VjLfUM5cMx.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\VjLfUM5cMx.exe 'C:\Users\user\Desktop\VjLfUM5cMx.exe'
                Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2856 CREDAT:17410 /prefetch:2
                Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1492 CREDAT:17410 /prefetch:2
                Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2856 CREDAT:17410 /prefetch:2Jump to behavior
                Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1492 CREDAT:17410 /prefetch:2Jump to behavior
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{674B6698-EE92-11D0-AD71-00C04FD8FDFF}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : select * from win32_process
                Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E1A18F6F-11F7-11EC-90EB-ECF4BBEA1588}.datJump to behavior
                Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DFCE99751527B74E99.TMPJump to behavior
                Source: classification engineClassification label: mal88.troj.evad.winEXE@7/29@8/0
                Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
                Source: VjLfUM5cMx.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: VjLfUM5cMx.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: VjLfUM5cMx.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: VjLfUM5cMx.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: VjLfUM5cMx.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: VjLfUM5cMx.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: VjLfUM5cMx.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: c:\Muchwin\WorkWhich\centstring\shinegray\WanthumanMarket.pdb source: VjLfUM5cMx.exe
                Source: VjLfUM5cMx.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: VjLfUM5cMx.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: VjLfUM5cMx.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: VjLfUM5cMx.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: VjLfUM5cMx.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                Data Obfuscation:

                barindex
                Detected unpacking (changes PE section rights)Show sources
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeUnpacked PE file: 0.2.VjLfUM5cMx.exe.1000000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.bss:W;.reloc:R;
                Source: VjLfUM5cMx.exeStatic PE information: real checksum: 0xe20f3 should be: 0xe153a
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeCode function: 0_3_0364198A push ds; retf 0_3_03641991
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeCode function: 0_3_0364198A push ds; retf 0_3_03641991
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeCode function: 0_3_0364198A push ds; retf 0_3_03641991
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeCode function: 0_3_0364198A push ds; retf 0_3_03641991
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeCode function: 0_3_0364198A push ds; retf 0_3_03641991
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeCode function: 0_3_0364198A push ds; retf 0_3_03641991
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeCode function: 0_3_0364198A push ds; retf 0_3_03641991
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeCode function: 0_3_0364198A push ds; retf 0_3_03641991
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeCode function: 0_3_0364198A push ds; retf 0_3_03641991
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeCode function: 0_3_0364198A push ds; retf 0_3_03641991
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeCode function: 0_3_0364198A push ds; retf 0_3_03641991
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeCode function: 0_3_0364198A push ds; retf 0_3_03641991
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeCode function: 0_3_0364198A push ds; retf 0_3_03641991
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeCode function: 0_3_0364198A push ds; retf 0_3_03641991
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeCode function: 0_3_0364198A push ds; retf 0_3_03641991
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeCode function: 0_3_0364198A push ds; retf 0_3_03641991
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeCode function: 0_3_0364198A push ds; retf 0_3_03641991
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeCode function: 0_3_0364198A push ds; retf 0_3_03641991
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeCode function: 0_3_0364198A push ds; retf 0_3_03641991
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeCode function: 0_3_0364198A push ds; retf 0_3_03641991
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeCode function: 0_3_0364198A push ds; retf 0_3_03641991
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeCode function: 0_3_0364198A push ds; retf 0_3_03641991
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeCode function: 0_3_0364198A push ds; retf 0_3_03641991
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeCode function: 0_3_0364198A push ds; retf 0_3_03641991
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeCode function: 0_3_0364198A push ds; retf 0_3_03641991
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeCode function: 0_3_0364198A push ds; retf 0_3_03641991
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeCode function: 0_3_0364198A push ds; retf 0_3_03641991
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeCode function: 0_3_0364198A push ds; retf 0_3_03641991
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeCode function: 0_3_0364198A push ds; retf 0_3_03641991
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeCode function: 0_3_0364198A push ds; retf 0_3_03641991
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeCode function: 0_3_0364198A push ds; retf 0_3_03641991
                Source: initial sampleStatic PE information: section name: .text entropy: 6.85141546298

                Hooking and other Techniques for Hiding and Protection:

                barindex
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 0.3.VjLfUM5cMx.exe.dc9d7c.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.VjLfUM5cMx.exe.1000000.0.unpack, type: UNPACKEDPE
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 00000000.00000003.743054194.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742911268.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742353433.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743093279.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743313694.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742958135.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743290829.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.741931302.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742268425.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743331263.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743266389.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742496222.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743239058.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743391740.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.961646531.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743211426.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742430984.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742097013.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743177986.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743353889.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742801405.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742634138.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743003429.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742749222.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742570614.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743401742.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743138802.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742692154.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742188110.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742014211.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743370213.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742861166.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.741849479.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: VjLfUM5cMx.exe PID: 6120, type: MEMORYSTR
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exe TID: 4972Thread sleep time: -30000s >= -30000sJump to behavior
                Source: VjLfUM5cMx.exe, 00000000.00000003.943610130.000000000065B000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: VjLfUM5cMx.exe, 00000000.00000002.961561728.0000000001100000.00000002.00020000.sdmpBinary or memory string: Program Manager
                Source: VjLfUM5cMx.exe, 00000000.00000002.961561728.0000000001100000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                Source: VjLfUM5cMx.exe, 00000000.00000002.961561728.0000000001100000.00000002.00020000.sdmpBinary or memory string: Progman
                Source: VjLfUM5cMx.exe, 00000000.00000002.961561728.0000000001100000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: C:\Users\user\Desktop\VjLfUM5cMx.exeWMI Queries: IWbemServices::ExecQuery - root\securitycenter2 : select * from antispywareproduct

                Stealing of Sensitive Information:

                barindex
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 0.3.VjLfUM5cMx.exe.dc9d7c.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.VjLfUM5cMx.exe.1000000.0.unpack, type: UNPACKEDPE
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 00000000.00000003.743054194.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742911268.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742353433.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743093279.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743313694.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742958135.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743290829.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.741931302.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742268425.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743331263.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743266389.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742496222.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743239058.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743391740.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.961646531.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743211426.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742430984.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742097013.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743177986.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743353889.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742801405.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742634138.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743003429.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742749222.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742570614.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743401742.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743138802.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742692154.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742188110.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742014211.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743370213.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742861166.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.741849479.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: VjLfUM5cMx.exe PID: 6120, type: MEMORYSTR

                Remote Access Functionality:

                barindex
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 0.3.VjLfUM5cMx.exe.dc9d7c.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.VjLfUM5cMx.exe.1000000.0.unpack, type: UNPACKEDPE
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 00000000.00000003.743054194.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742911268.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742353433.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743093279.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743313694.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742958135.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743290829.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.741931302.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742268425.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743331263.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743266389.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742496222.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743239058.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743391740.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.961646531.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743211426.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742430984.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742097013.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743177986.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743353889.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742801405.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742634138.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743003429.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742749222.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742570614.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743401742.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743138802.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742692154.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742188110.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742014211.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.743370213.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.742861166.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.741849479.0000000003640000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: VjLfUM5cMx.exe PID: 6120, type: MEMORYSTR

                Mitre Att&ck Matrix

                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid AccountsWindows Management Instrumentation211Path InterceptionProcess Injection2Masquerading1OS Credential DumpingQuery Registry1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion1LSASS MemorySecurity Software Discovery11Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection2Security Account ManagerVirtualization/Sandbox Evasion1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information2NTDSProcess Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing12LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery3Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

                Behavior Graph

                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 480997 Sample: VjLfUM5cMx Startdate: 10/09/2021 Architecture: WINDOWS Score: 88 25 Multi AV Scanner detection for submitted file 2->25 27 Yara detected Ursnif 2->27 29 Yara detected  Ursnif 2->29 31 2 other signatures 2->31 6 VjLfUM5cMx.exe 2->6         started        10 iexplore.exe 1 73 2->10         started        12 iexplore.exe 1 50 2->12         started        process3 dnsIp4 19 haverit.xyz 6->19 33 Detected unpacking (changes PE section rights) 6->33 35 Performs DNS queries to domains with low reputation 6->35 37 Writes or reads registry keys via WMI 6->37 39 Writes registry values via WMI 6->39 14 iexplore.exe 29 10->14         started        17 iexplore.exe 29 12->17         started        signatures5 process6 dnsIp7 21 haverit.xyz 14->21 23 haverit.xyz 17->23

                Screenshots

                Thumbnails

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                windows-stand

                Antivirus, Machine Learning and Genetic Malware Detection

                Initial Sample

                SourceDetectionScannerLabelLink
                VjLfUM5cMx.exe13%VirustotalBrowse
                VjLfUM5cMx.exe100%Joe Sandbox ML

                Dropped Files

                No Antivirus matches

                Unpacked PE Files

                SourceDetectionScannerLabelLinkDownload
                0.3.VjLfUM5cMx.exe.dc9d7c.0.unpack100%AviraTR/Patched.Ren.GenDownload File
                0.2.VjLfUM5cMx.exe.1000000.0.unpack100%AviraTR/Crypt.XPACK.Gen7Download File

                Domains

                No Antivirus matches

                URLs

                SourceDetectionScannerLabelLink
                https://haverit.xyz/index.htm0%Avira URL Cloudsafe
                https://haverit.xyz/index.htmr#0%Avira URL Cloudsafe
                https://sectigo.com/CPS00%URL Reputationsafe
                http://ocsp.sectigo.com00%URL Reputationsafe
                https://haverit.xyz/index.htmdex.htm0%Avira URL Cloudsafe
                http://%s=%s&file://&os=%u.%u_%u_%u_x%uindex.html;0%Avira URL Cloudsafe
                http://www.wikipedia.com/0%URL Reputationsafe
                https://haverit.xyz0%Avira URL Cloudsafe
                http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
                https://haverit.xyz/0b0%Avira URL Cloudsafe
                https://haverit.xyz/Q0%Avira URL Cloudsafe
                http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%URL Reputationsafe
                https://haverit.xyz/index.htm&E0%Avira URL Cloudsafe
                https://haverit.xyz/index.htmRoot0%Avira URL Cloudsafe

                Domains and IPs

                Contacted Domains

                NameIPActiveMaliciousAntivirus DetectionReputation
                haverit.xyz
                unknown
                unknowntrue
                  unknown

                  URLs from Memory and Binaries

                  NameSourceMaliciousAntivirus DetectionReputation
                  https://haverit.xyz/index.htmVjLfUM5cMx.exe, 00000000.00000002.961204866.0000000000629000.00000004.00000020.sdmp, ~DFD3F956B20687A278.TMP.7.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://haverit.xyz/index.htmr#VjLfUM5cMx.exe, 00000000.00000003.892700634.000000000068C000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.nytimes.com/msapplication.xml3.7.drfalse
                    high
                    https://sectigo.com/CPS0VjLfUM5cMx.exefalse
                    • URL Reputation: safe
                    unknown
                    http://ocsp.sectigo.com0VjLfUM5cMx.exefalse
                    • URL Reputation: safe
                    unknown
                    https://haverit.xyz/index.htmdex.htm{077FA0D6-11F8-11EC-90EB-ECF4BBEA1588}.dat.15.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://%s=%s&file://&os=%u.%u_%u_%u_x%uindex.html;VjLfUM5cMx.exe, 00000000.00000003.743266389.0000000003640000.00000004.00000040.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://www.youtube.com/msapplication.xml7.7.drfalse
                      high
                      http://www.wikipedia.com/msapplication.xml6.7.drfalse
                      • URL Reputation: safe
                      unknown
                      http://www.amazon.com/msapplication.xml.7.drfalse
                        high
                        https://haverit.xyzVjLfUM5cMx.exe, VjLfUM5cMx.exe, 00000000.00000002.961204866.0000000000629000.00000004.00000020.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0sVjLfUM5cMx.exefalse
                        • URL Reputation: safe
                        unknown
                        http://www.live.com/msapplication.xml2.7.drfalse
                          high
                          https://haverit.xyz/0bVjLfUM5cMx.exe, 00000000.00000003.929576578.000000000066A000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://haverit.xyz/QVjLfUM5cMx.exe, 00000000.00000003.800653313.0000000000669000.00000004.00000001.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#VjLfUM5cMx.exefalse
                          • URL Reputation: safe
                          unknown
                          http://www.reddit.com/msapplication.xml4.7.drfalse
                            high
                            http://www.twitter.com/msapplication.xml5.7.drfalse
                              high
                              https://haverit.xyz/index.htm&EVjLfUM5cMx.exe, 00000000.00000002.961204866.0000000000629000.00000004.00000020.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://haverit.xyz/index.htmRoot{077FA0D6-11F8-11EC-90EB-ECF4BBEA1588}.dat.15.drfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.google.com/msapplication.xml1.7.drfalse
                                high

                                Contacted IPs

                                No contacted IP infos

                                General Information

                                Joe Sandbox Version:33.0.0 White Diamond
                                Analysis ID:480997
                                Start date:10.09.2021
                                Start time:07:26:27
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:0h 6m 48s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Sample file name:VjLfUM5cMx (renamed file extension from none to exe)
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                Number of analysed new started processes analysed:18
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • HDC enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Detection:MAL
                                Classification:mal88.troj.evad.winEXE@7/29@8/0
                                EGA Information:Failed
                                HDC Information:Failed
                                HCA Information:
                                • Successful, ratio: 100%
                                • Number of executed functions: 0
                                • Number of non-executed functions: 0
                                Cookbook Comments:
                                • Adjust boot time
                                • Enable AMSI
                                Warnings:
                                Show All
                                • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, ielowutil.exe, backgroundTaskHost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                                • Excluded IPs from analysis (whitelisted): 20.82.210.154, 23.203.80.193, 20.54.110.249, 173.222.108.210, 173.222.108.226, 40.112.88.60, 152.199.19.161, 80.67.82.235, 80.67.82.211, 20.82.209.183
                                • Excluded domains from analysis (whitelisted): iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ie9comview.vo.msecnd.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, wu-shim.trafficmanager.net, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, ctldl.windowsupdate.com, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a767.dspw65.akamai.net, a1449.dscg2.akamai.net, arc.msn.com, download.windowsupdate.com.edgesuite.net, e11290.dspg.akamaiedge.net, ris.api.iris.microsoft.com, iecvlist.microsoft.com, go.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, go.microsoft.com.edgekey.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, cs9.wpc.v0cdn.net
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.

                                Simulations

                                Behavior and APIs

                                TimeTypeDescription
                                07:28:22API Interceptor2x Sleep call for process: VjLfUM5cMx.exe modified

                                Joe Sandbox View / Context

                                IPs

                                No context

                                Domains

                                No context

                                ASN

                                No context

                                JA3 Fingerprints

                                No context

                                Dropped Files

                                No context

                                Created / dropped Files

                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{077FA0D4-11F8-11EC-90EB-ECF4BBEA1588}.dat
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:Microsoft Word Document
                                Category:dropped
                                Size (bytes):29272
                                Entropy (8bit):1.7687952691507924
                                Encrypted:false
                                SSDEEP:192:rZZe9Zi2z1WzMtzJifzzU2zMzwOg62CBzMlpB:rPezBzMz4zmz+zlzq
                                MD5:E92FD7DF6802E331C7A855D3A78FEFEA
                                SHA1:80610D98C43B9F68C370E37224AA9D5A25CC650A
                                SHA-256:D1E5051E0E89115F43C3EB87B41D8EE0272787B84AA7936A41CB4E39B031B4AD
                                SHA-512:05E023DF86A9A6ADBA94FE937A96493B2B89FE69DACF871FC9F370D28CB0EFA12B5E8811B3D43427D55F7368F46080900F5F966F42FB61C88D6C93345EA1D91B
                                Malicious:false
                                Reputation:low
                                Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E1A18F6F-11F7-11EC-90EB-ECF4BBEA1588}.dat
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:Microsoft Word Document
                                Category:dropped
                                Size (bytes):29272
                                Entropy (8bit):1.7653733500022424
                                Encrypted:false
                                SSDEEP:192:rSZX9Za2IWRtJHifJ3jxvzM9353+6YjBxw34gpB:rOXzZ/jawYu
                                MD5:D24E24FB19663AB8E7C73D6587EFFF6C
                                SHA1:B82737BFA7A49BA4BCF3A0C81C14962DAEEDBAF1
                                SHA-256:B08D2BC882D1E7ECCC639CD0054218DE9BF9B7DD213335A776E96D876A2CD96D
                                SHA-512:D2F202639C2A74152BC1DE4AA9F2AB33240A2C09E25D4196C6A2EEBD50EC0458A5680A35B05F46FC064EF2C87BBAE6421AF14E84DC4753798C74E31B6AD69621
                                Malicious:false
                                Reputation:low
                                Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{077FA0D6-11F8-11EC-90EB-ECF4BBEA1588}.dat
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:Microsoft Word Document
                                Category:dropped
                                Size (bytes):26240
                                Entropy (8bit):1.6585521788268434
                                Encrypted:false
                                SSDEEP:48:IwDGcprCjGwpaCG4pQqGrapbSAGQpBtcBGHHpct62TGUp8tdGzYpmtEOGopOzEyq:r5ZC9Qy6cBSojt2lWNMFk+V2A
                                MD5:8C6512EF426D5BB96705D87CC986C2D3
                                SHA1:F3EC5C5DF2C53E864807177BA6F9FDA27D3CFCD1
                                SHA-256:6999B248C19B53968E3EAB2BCB6D7DCB82D1263108B80FF236D032245D633799
                                SHA-512:FD5798A38BB65D6975E9F59A8BBC0D6A0D2194D52798F67702DE11B97DD6DF68CACBBE2D050A11B39D3632B9982C1A767F0BE620B4364EE300EB91595DB52390
                                Malicious:false
                                Reputation:low
                                Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{E1A18F71-11F7-11EC-90EB-ECF4BBEA1588}.dat
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:Microsoft Word Document
                                Category:dropped
                                Size (bytes):26240
                                Entropy (8bit):1.6568915553272197
                                Encrypted:false
                                SSDEEP:48:IwXGcprqjGwpaeG4pQ6GrapbSZGQpByGHHpcrTGUp8kGzYpmb0GopOdyDCGqXpHR:rdZq9Qe6sBSzjJ2FWAMQkPVGA
                                MD5:976CE6A118BC49942D4F83A41795AF60
                                SHA1:0886BB24D61554692CF98EB0DAEF152B8D82130C
                                SHA-256:C1363B5295C4FC934787D3D95811D426B5009EFCAE0004611A2F9FC9CE36C4D9
                                SHA-512:51ED9BB236F9FD16CBD91C63689B10EB504C61366F2B628CD43F27176E285F7619019DF2781F97C91F5213FD1D26291548EDB6857D01DE1A693124C83C431EF5
                                Malicious:false
                                Reputation:low
                                Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-17529550060\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):656
                                Entropy (8bit):5.097103490576207
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxOEjwanWimI002EtM3MHdNMNxOEjwanWimI00OYGVbkEtMb:2d6NxOcwaSZHKd6NxOcwaSZ7YLb
                                MD5:01FB138155392A0403F38515CE0F9A89
                                SHA1:3870F06CE96AA652A0E4291609CB3538AB309936
                                SHA-256:24D93C2842111FE151324DA082D5C8559AA307AF5F185AF9DA4E468956E4D585
                                SHA-512:E9D30B7E77328CD6733E95C137A6996EEAF3FDEB8F317C6940D36A190DF0508D98EEDC1F5130F6E3B15677755E77724EE698656E775D151A3F1FEF2D208D99F1
                                Malicious:false
                                Reputation:low
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xb71b6d91,0x01d7a604</date><accdate>0xb71b6d91,0x01d7a604</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xb71b6d91,0x01d7a604</date><accdate>0xb71b6d91,0x01d7a604</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18270793970\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):653
                                Entropy (8bit):5.119386841314523
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxe2kRqanWimI002EtM3MHdNMNxe2kRqanWimI00OYGkak6EtMb:2d6NxrGqaSZHKd6NxrGqaSZ7Yza7b
                                MD5:78C567EB422B95A55974D3844C4E3A25
                                SHA1:4A043CD69791CB35A7BBE32E0A019B1024DA867C
                                SHA-256:DB54273546F218206DDCADD0D68EF38F3922184C700AE0F5180F22733C6A626E
                                SHA-512:340977812B58FF75C72FB24707C819A1831D83F7D95D4740EA3D21735A28B20472966F2046BD458D3A9E58005AABC7547D729FE3BB54065D144BDFB0B8A61CD3
                                Malicious:false
                                Reputation:low
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0xb714465a,0x01d7a604</date><accdate>0xb714465a,0x01d7a604</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0xb714465a,0x01d7a604</date><accdate>0xb714465a,0x01d7a604</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Amazon.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-21706820\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):662
                                Entropy (8bit):5.167162589928272
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxvL1pSpanWimI002EtM3MHdNMNxvL1pSpanWimI00OYGmZEtMb:2d6NxvjYaSZHKd6NxvjYaSZ7Yjb
                                MD5:95E9AFC9B0CA3948C096400220F6E2FC
                                SHA1:ED40EE9CBEF489E1A0937B55484C50004366147A
                                SHA-256:2637059B1F09E429B62D3442314CC96CD1D0D031173BFE42C04790E26ED3F3C6
                                SHA-512:35F4FFFADAEC9EC48833FCE35C5B9B3BD9BAE7D14E22CED33FD549DB4A97B644603D92D79F3FAB26FFE2A3413C777AFC41E85AF4C3F7FB62DAE0271F30292DB2
                                Malicious:false
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0xb7229583,0x01d7a604</date><accdate>0xb7229583,0x01d7a604</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0xb7229583,0x01d7a604</date><accdate>0xb7229583,0x01d7a604</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Wikipedia.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):647
                                Entropy (8bit):5.11260966532361
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxijwanWimI002EtM3MHdNMNxijwanWimI00OYGd5EtMb:2d6Nx2waSZHKd6Nx2waSZ7YEjb
                                MD5:4ADAE51FDF242ACCBA0BA603E37F65C8
                                SHA1:096307D1C70E2E3AFE1651ECF0A009BB24062841
                                SHA-256:A112CC8C0B606E3D96F3985A70B44BC93ED0CD87EA3C8A19A3F225B2B7BD6B71
                                SHA-512:AAB1906DBE98B8F6C21A4C10EE06C82C93565B9CB5DD6E690BFD8D947650C0BE8A9665C36681E5FF1C9C312E39386DFF9102AD9D4F0FDCBEB7DA0C8038B5ED4E
                                Malicious:false
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0xb71b6d91,0x01d7a604</date><accdate>0xb71b6d91,0x01d7a604</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0xb71b6d91,0x01d7a604</date><accdate>0xb71b6d91,0x01d7a604</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Live.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6757900\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):656
                                Entropy (8bit):5.178861223167003
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxhGw1pSpanWimI002EtM3MHdNMNxhGw1pSpanWimI00OYG8K075EtMb:2d6NxQYYaSZHKd6NxQYYaSZ7YrKajb
                                MD5:A32AA08FE4957F980C25BA02B088C7A3
                                SHA1:9C0B720474A1BCFE89045161D504C6A1F19DCDD0
                                SHA-256:1C39487B76D89749483D67B722E091B8A159D75A7B0CFD126627218126A103F5
                                SHA-512:79638801E8F940CDD4FB7F98D4D54C74E0613BEDBD8BB6DC7C076635DCE08ED84FAD73D66C5358137AA88845630FDC1D1AD79FA730E7A2F2443516A9C19F3952
                                Malicious:false
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xb7229583,0x01d7a604</date><accdate>0xb7229583,0x01d7a604</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xb7229583,0x01d7a604</date><accdate>0xb7229583,0x01d7a604</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8760897390\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):653
                                Entropy (8bit):5.0983299559903665
                                Encrypted:false
                                SSDEEP:12:TMHdNMNx0njwanWimI002EtM3MHdNMNx0njwanWimI00OYGxEtMb:2d6Nx0jwaSZHKd6Nx0jwaSZ7Ygb
                                MD5:30009857A260CBF0B20FAA19AEED39DC
                                SHA1:31E15FD67D29A6BB7BA93456B319C1F311D1423D
                                SHA-256:22E514DBB72F0368497D4E14279F41CEC6E42D5D1DEA55434C9D7849BC11DC77
                                SHA-512:DD691F1D0820CCF54A52A8F1F6C520AC085514B305606F73E62814EDF041F47D8886CF08ED13301BE0A999ACDEA11CF38EB77DE932547120BB304A8676D49CDE
                                Malicious:false
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0xb71b6d91,0x01d7a604</date><accdate>0xb71b6d91,0x01d7a604</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0xb71b6d91,0x01d7a604</date><accdate>0xb71b6d91,0x01d7a604</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Reddit.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):656
                                Entropy (8bit):5.136738769904
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxxjwanWimI002EtM3MHdNMNxxjwanWimI00OYG6Kq5EtMb:2d6NxBwaSZHKd6NxBwaSZ7Yhb
                                MD5:9443E152D8CB24CCE6B18B7FB82AF0CC
                                SHA1:A7A4916172C5A0FF545F1192057DA50246E2FD9C
                                SHA-256:F4ACB9872F7882249023FDFA21CA78B8267B0E277701467281EFFC6AE805AD03
                                SHA-512:B348117CCFC016FD9FBB101EEC1E53899E4087C665F7B4A0E846E198D9838A71FB2DEC497EEA70A8576013174C2C95F581EF3663C38AD614883CF8D3FE9F6DE7
                                Malicious:false
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0xb71b6d91,0x01d7a604</date><accdate>0xb71b6d91,0x01d7a604</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0xb71b6d91,0x01d7a604</date><accdate>0xb71b6d91,0x01d7a604</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\NYTimes.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20332743330\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):659
                                Entropy (8bit):5.111475006436849
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxcjwanWimI002EtM3MHdNMNxcjwanWimI00OYGVEtMb:2d6NxEwaSZHKd6NxEwaSZ7Ykb
                                MD5:DE14F026220BC4AD975589A143D4862D
                                SHA1:D4B22718CF721228E0CDB1C10489148FD3DF0CBC
                                SHA-256:696399FD8895D1AAE33915A14619DEC5B7C8744AD37E1C99E56DF656A9EFBF70
                                SHA-512:E98BE0BFC148546AE0191E54C96931639D12DE30A9821A1C529002CF681B932DF1968A1D2CCC38B3B9F48C81D69810A7E389F20C4589E339144785EB89219BC0
                                Malicious:false
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xb71b6d91,0x01d7a604</date><accdate>0xb71b6d91,0x01d7a604</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xb71b6d91,0x01d7a604</date><accdate>0xb71b6d91,0x01d7a604</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin8215062560\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):653
                                Entropy (8bit):5.097923317006781
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxfnjwanWimI002EtM3MHdNMNxfnjwanWimI00OYGe5EtMb:2d6NxLwaSZHKd6NxLwaSZ7YLjb
                                MD5:2505F5CDDDEC582665E57DD8138AE8FE
                                SHA1:580DF47543557FB9077349D0BA0ACAC798857786
                                SHA-256:ED9E4F3EBF559EC0BBB0B52FC9E6E83EA099648AB523B97904A4E3F95A3729F7
                                SHA-512:E233567EC2DE9325ED0AE16EA3B43721B67EA77ECD8F17B32746B94BE2C64A788542E91F4880EDFC8D8923673C53CBCC17AAE1921538CB3744EF3F7736367D78
                                Malicious:false
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0xb71b6d91,0x01d7a604</date><accdate>0xb71b6d91,0x01d7a604</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0xb71b6d91,0x01d7a604</date><accdate>0xb71b6d91,0x01d7a604</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Google.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\NewErrorPageTemplate[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1612
                                Entropy (8bit):4.869554560514657
                                Encrypted:false
                                SSDEEP:24:5Y0bQ573pHpACtUZtJD0lFBopZleqw87xTe4D8FaFJ/Doz9AtjJgbCzg:5m73jcJqQep89TEw7Uxkk
                                MD5:DFEABDE84792228093A5A270352395B6
                                SHA1:E41258C9576721025926326F76063C2305586F76
                                SHA-256:77B138AB5D0A90FF04648C26ADDD5E414CC178165E3B54A4CB3739DA0F58E075
                                SHA-512:E256F603E67335151BB709294749794E2E3085F4063C623461A0B3DECBCCA8E620807B707EC9BCBE36DCD7D639C55753DA0495BE85B4AE5FB6BFC52AB4B284FD
                                Malicious:false
                                Preview: .body..{.. background-repeat: repeat-x;.. background-color: white;.. font-family: "Segoe UI", "verdana", "arial";.. margin: 0em;.. color: #1f1f1f;..}.....mainContent..{.. margin-top:80px;.. width: 700px;.. margin-left: 120px;.. margin-right: 120px;..}.....title..{.. color: #54b0f7;.. font-size: 36px;.. font-weight: 300;.. line-height: 40px;.. margin-bottom: 24px;.. font-family: "Segoe UI", "verdana";.. position: relative;..}.....errorExplanation..{.. color: #000000;.. font-size: 12pt;.. font-family: "Segoe UI", "verdana", "arial";.. text-decoration: none;..}.....taskSection..{.. margin-top: 20px;.. margin-bottom: 28px;.. position: relative; ..}.....tasks..{.. color: #000000;.. font-family: "Segoe UI", "verdana";.. font-weight:200;.. font-size: 12pt;..}....li..{.. margin-top: 8px;..}.....diagnoseButton..{.. outline: none;.. font-size: 9pt;..}.....launchInternetOptionsButton..{.. outline: none;
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\dnserror[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):2997
                                Entropy (8bit):4.4885437940628465
                                Encrypted:false
                                SSDEEP:48:u7u5V4VyhhV2lFUW29vj0RkpNc7KpAP8Rra:vIlJ6G7Ao8Ra
                                MD5:2DC61EB461DA1436F5D22BCE51425660
                                SHA1:E1B79BCAB0F073868079D807FAEC669596DC46C1
                                SHA-256:ACDEB4966289B6CE46ECC879531F85E9C6F94B718AAB521D38E2E00F7F7F7993
                                SHA-512:A88BECB4FBDDC5AFC55E4DC0135AF714A3EEC4A63810AE5A989F2CECB824A686165D3CEDB8CBD8F35C7E5B9F4136C29DEA32736AABB451FE8088B978B493AC6D
                                Malicious:false
                                Preview: .<!DOCTYPE HTML>..<html>.. <head>.. <link rel="stylesheet" type="text/css" href="NewErrorPageTemplate.css" >.. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.. <title>Can&rsquo;t reach this page</title>.. <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="getInfo(); initMoreInfo('infoBlockID');">.. <div id="contentContainer" class="mainContent">.. <div id="mainTitle" class="title">Can&rsquo;t reach this page</div>.. <div class="taskSection" id="taskSection">.. <ul id="cantDisplayTasks" class="tasks">.. <li id="task1-1">Make sure the web address <span id="webpage" class="webpageURL"></span>is correct</li>.. <li id="task1-2">Search for this site on Bing</li>..
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\errorPageStrings[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):4720
                                Entropy (8bit):5.164796203267696
                                Encrypted:false
                                SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
                                MD5:D65EC06F21C379C87040B83CC1ABAC6B
                                SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
                                SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
                                SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
                                Malicious:false
                                Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\httpErrorPagesScripts[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):12105
                                Entropy (8bit):5.451485481468043
                                Encrypted:false
                                SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
                                MD5:9234071287E637F85D721463C488704C
                                SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
                                SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
                                SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
                                Malicious:false
                                Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\down[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
                                Category:dropped
                                Size (bytes):748
                                Entropy (8bit):7.249606135668305
                                Encrypted:false
                                SSDEEP:12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
                                MD5:C4F558C4C8B56858F15C09037CD6625A
                                SHA1:EE497CC061D6A7A59BB66DEFEA65F9A8145BA240
                                SHA-256:39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781
                                SHA-512:D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44
                                Malicious:false
                                Preview: .PNG........IHDR...............ex....PLTE....W..W..W..W..W..W..W..W..W..W..W..W..W.U..............W..W.!Y.#Z.$\.'].<r.=s.P..Q..Q..U..o..p..r..x..z..~.............................................b.............................................................................................................................................................................................................$..s...7tRNS.a.o(,.s....e......q*...................................F.Z....IDATx^%.S..@.C..jm.mTk...m.?|;.y..S....F.t...,.......D.>..LpX=f.M...H4........=...=..xy.[h..7....7.....<.q.kH....#+....I..z.....'.ksC...X<.+..J>....%3BmqaV...h..Z._.:<.Y_jG...vN^.<>.Nu.u@.....M....?...1D.m~)s8..&....IEND.B`.
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\NewErrorPageTemplate[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1612
                                Entropy (8bit):4.869554560514657
                                Encrypted:false
                                SSDEEP:24:5Y0bQ573pHpACtUZtJD0lFBopZleqw87xTe4D8FaFJ/Doz9AtjJgbCzg:5m73jcJqQep89TEw7Uxkk
                                MD5:DFEABDE84792228093A5A270352395B6
                                SHA1:E41258C9576721025926326F76063C2305586F76
                                SHA-256:77B138AB5D0A90FF04648C26ADDD5E414CC178165E3B54A4CB3739DA0F58E075
                                SHA-512:E256F603E67335151BB709294749794E2E3085F4063C623461A0B3DECBCCA8E620807B707EC9BCBE36DCD7D639C55753DA0495BE85B4AE5FB6BFC52AB4B284FD
                                Malicious:false
                                Preview: .body..{.. background-repeat: repeat-x;.. background-color: white;.. font-family: "Segoe UI", "verdana", "arial";.. margin: 0em;.. color: #1f1f1f;..}.....mainContent..{.. margin-top:80px;.. width: 700px;.. margin-left: 120px;.. margin-right: 120px;..}.....title..{.. color: #54b0f7;.. font-size: 36px;.. font-weight: 300;.. line-height: 40px;.. margin-bottom: 24px;.. font-family: "Segoe UI", "verdana";.. position: relative;..}.....errorExplanation..{.. color: #000000;.. font-size: 12pt;.. font-family: "Segoe UI", "verdana", "arial";.. text-decoration: none;..}.....taskSection..{.. margin-top: 20px;.. margin-bottom: 28px;.. position: relative; ..}.....tasks..{.. color: #000000;.. font-family: "Segoe UI", "verdana";.. font-weight:200;.. font-size: 12pt;..}....li..{.. margin-top: 8px;..}.....diagnoseButton..{.. outline: none;.. font-size: 9pt;..}.....launchInternetOptionsButton..{.. outline: none;
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\dnserror[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):2997
                                Entropy (8bit):4.4885437940628465
                                Encrypted:false
                                SSDEEP:48:u7u5V4VyhhV2lFUW29vj0RkpNc7KpAP8Rra:vIlJ6G7Ao8Ra
                                MD5:2DC61EB461DA1436F5D22BCE51425660
                                SHA1:E1B79BCAB0F073868079D807FAEC669596DC46C1
                                SHA-256:ACDEB4966289B6CE46ECC879531F85E9C6F94B718AAB521D38E2E00F7F7F7993
                                SHA-512:A88BECB4FBDDC5AFC55E4DC0135AF714A3EEC4A63810AE5A989F2CECB824A686165D3CEDB8CBD8F35C7E5B9F4136C29DEA32736AABB451FE8088B978B493AC6D
                                Malicious:false
                                Preview: .<!DOCTYPE HTML>..<html>.. <head>.. <link rel="stylesheet" type="text/css" href="NewErrorPageTemplate.css" >.. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.. <title>Can&rsquo;t reach this page</title>.. <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="getInfo(); initMoreInfo('infoBlockID');">.. <div id="contentContainer" class="mainContent">.. <div id="mainTitle" class="title">Can&rsquo;t reach this page</div>.. <div class="taskSection" id="taskSection">.. <ul id="cantDisplayTasks" class="tasks">.. <li id="task1-1">Make sure the web address <span id="webpage" class="webpageURL"></span>is correct</li>.. <li id="task1-2">Search for this site on Bing</li>..
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\errorPageStrings[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):4720
                                Entropy (8bit):5.164796203267696
                                Encrypted:false
                                SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
                                MD5:D65EC06F21C379C87040B83CC1ABAC6B
                                SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
                                SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
                                SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
                                Malicious:false
                                Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\down[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
                                Category:dropped
                                Size (bytes):748
                                Entropy (8bit):7.249606135668305
                                Encrypted:false
                                SSDEEP:12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
                                MD5:C4F558C4C8B56858F15C09037CD6625A
                                SHA1:EE497CC061D6A7A59BB66DEFEA65F9A8145BA240
                                SHA-256:39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781
                                SHA-512:D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44
                                Malicious:false
                                Preview: .PNG........IHDR...............ex....PLTE....W..W..W..W..W..W..W..W..W..W..W..W..W.U..............W..W.!Y.#Z.$\.'].<r.=s.P..Q..Q..U..o..p..r..x..z..~.............................................b.............................................................................................................................................................................................................$..s...7tRNS.a.o(,.s....e......q*...................................F.Z....IDATx^%.S..@.C..jm.mTk...m.?|;.y..S....F.t...,.......D.>..LpX=f.M...H4........=...=..xy.[h..7....7.....<.q.kH....#+....I..z.....'.ksC...X<.+..J>....%3BmqaV...h..Z._.:<.Y_jG...vN^.<>.Nu.u@.....M....?...1D.m~)s8..&....IEND.B`.
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\httpErrorPagesScripts[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):12105
                                Entropy (8bit):5.451485481468043
                                Encrypted:false
                                SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
                                MD5:9234071287E637F85D721463C488704C
                                SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
                                SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
                                SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
                                Malicious:false
                                Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
                                C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:modified
                                Size (bytes):89
                                Entropy (8bit):4.412554678800313
                                Encrypted:false
                                SSDEEP:3:oVXUpjHLTMW8JOGXnEpjHLTBn:o9UpLLVqEpLLV
                                MD5:C1257D744F3D940640B1C3A5B5AFD9E7
                                SHA1:9A590780CAC06216357B82052A64909D1C3C44B2
                                SHA-256:DBDCE1B51B72E8776ECD1B4CAE2223360B2059257442B2CFE8EE031D0B18046B
                                SHA-512:61B08C8D7975445BAFB761369756E2DA18AC35ED934AE61B690CE2CBCDCE0B7C86E60AD5A606F4D7ED2571AABC4B0FDC74C2B8718F0ED05C08E4443B53CE29E3
                                Malicious:false
                                Preview: [2021/09/10 07:29:13.693] Latest deploy version: ..[2021/09/10 07:29:13.693] 11.211.2 ..
                                C:\Users\user\AppData\Local\Temp\~DF53DFCC907A82F6AE.TMP
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):38737
                                Entropy (8bit):0.3709746847672781
                                Encrypted:false
                                SSDEEP:48:kBqoxKAuvScS+tVt7t5totEItEwzEyDZzEyDbzEyDU:kBqoxKAuvScS+j9PGNVRDc
                                MD5:48B207ABB84ABD21E374BF3B0BC629E5
                                SHA1:9BA15FD9C6856628363D65CD9A28881F8BB17F7F
                                SHA-256:8C3149638C6002175CFB043340B3CDDFD45176DDA6107DE00DAE2D7CD441E0EB
                                SHA-512:483EC9170E76167B87E298712AC45E6F82DAF33B571A1486233C36DBE8B464207E53FF287D43281FDE824074558C86399483A08C7565DB34DFB653E5C739BABC
                                Malicious:false
                                Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Local\Temp\~DFB3B5364D27108BD7.TMP
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):12933
                                Entropy (8bit):0.40524698605679654
                                Encrypted:false
                                SSDEEP:24:c9lLh9lLh9lIn9lIn9loha9lohK9lWhFR9qc9Yd2f:kBqoIhFhzhFR9qc9A2f
                                MD5:F20C0B95ECC352ED980E564C0785243D
                                SHA1:6841084009F9D90222280DD230F23D1E1D42B7EB
                                SHA-256:886BFFC3541110649828420D7529FEC5E40BA180BD48719B3C54E693E5DBDC16
                                SHA-512:57F02927448FDA4B144FF81A7A82A2632FB11D4DCEF1D1F3C8B02C30AFA8B05B16870BC3B10610FFA8CE0816AF03E073DF7AD2BAFC6B8CCA08ED4671DD4C5517
                                Malicious:false
                                Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Local\Temp\~DFCE99751527B74E99.TMP
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):12933
                                Entropy (8bit):0.40712809719208554
                                Encrypted:false
                                SSDEEP:24:c9lLh9lLh9lIn9lIn9lo2A9lo2Q9lW26xiSHibOB:kBqoI272d26xiSHibOB
                                MD5:E8C95AF8D3A8F841CC5EA3B6E1BDC24E
                                SHA1:7A6869487B6DC66DC8038E2790CCB35238E741F7
                                SHA-256:A0D8599D0CFBE862CF3B689A7BBBC70B9DE9B6DE02DE139B27DB3AD9E9D89004
                                SHA-512:AF8E65D1D7F61414D7260ABB7DCDDFD34DC50547EE48DA26BF002B1141B0C8166FF6CD3B0255738C4C89DCCDC475ABC270CC2D8B244429552C24330F5A344161
                                Malicious:false
                                Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Local\Temp\~DFD3F956B20687A278.TMP
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):38737
                                Entropy (8bit):0.37078044094891244
                                Encrypted:false
                                SSDEEP:48:kBqoxKAuvScS+S0e3bIbwdyDZdyDbdyDU:kBqoxKAuvScS+S0e3Ec8GT
                                MD5:122B6346770EE93D6C99E259ACAADEF4
                                SHA1:61DFF47B74EC6657F8103666A0142F372367155F
                                SHA-256:11A757AA78EEFF90A2EC39FA8DE22BC95284EE5CF0F7A5813C553D11C967DA11
                                SHA-512:2335BE3DCB0C1A1470E076582F4DA12678992AC4017109ECF8B0C04B96BC562A816C3EAAA8B8931ADE41E2842EBED5C08C96DA7C84A4713A7775C9B979F23177
                                Malicious:false
                                Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                                Static File Info

                                General

                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Entropy (8bit):6.614337368439923
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:VjLfUM5cMx.exe
                                File size:901960
                                MD5:c07d4f7dcac497a3c06cbba9e6e9e711
                                SHA1:f9910595a15ee0ca41871bda8f1a23a3aa7f9360
                                SHA256:82aabb70809394ec910ecdff3dfe4982d652c6d65f7fa65e7da16b83ebf87192
                                SHA512:0eafdb6efe6a117ed331d828613131509cd9d0d5b6be3bfc010b4af0cf809b5f8866dc0362cc853ba8d13fd2f15716e2e4d4d437b7a4503c064c2b15c653417d
                                SSDEEP:24576:49PsA9vHAYobFGQdRGylSk61LXXhNxvZXmtk1/GqgLGr:VYLJk61bRLZXmWGGr
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Hl..Hl..Hl..../.Jl....*.Xl....+.Kl..Hl...l....].Ml....).Cl....+.Il....7.zl....-.Il....(.Il..RichHl.........................

                                File Icon

                                Icon Hash:f0b0e8e4e4e8b2dc

                                Static PE Info

                                General

                                Entrypoint:0x1005725
                                Entrypoint Section:.text
                                Digitally signed:true
                                Imagebase:0x1000000
                                Subsystem:windows gui
                                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                DLL Characteristics:TERMINAL_SERVER_AWARE, NX_COMPAT
                                Time Stamp:0x55E85856 [Thu Sep 3 14:25:26 2015 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:6
                                OS Version Minor:0
                                File Version Major:6
                                File Version Minor:0
                                Subsystem Version Major:6
                                Subsystem Version Minor:0
                                Import Hash:e256626a548828ef6c76be7957372a60

                                Authenticode Signature

                                Signature Valid:false
                                Signature Issuer:CN=Sectigo RSA Code Signing CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
                                Signature Validation Error:No signature was present in the subject
                                Error Number:-2146762496
                                Not Before, Not After
                                • 4/13/2021 2:00:00 AM 4/14/2022 1:59:59 AM
                                Subject Chain
                                • CN=FORTH PROPERTY LTD, O=FORTH PROPERTY LTD, L=Edinburgh, C=GB
                                Version:3
                                Thumbprint MD5:8AB6A86211EE700AA961C3292ADB312D
                                Thumbprint SHA-1:A533DFA7E6AED2A9FFBE41FCEC5A8927A6EAFBBB
                                Thumbprint SHA-256:9E0611728595A506CC2A55486FDD88ECA0971EF0B08F74CB3B3B6F5F6F3C7E27
                                Serial:239664C12BAEB5A6D787912888051392

                                Entrypoint Preview

                                Instruction
                                call 00007F1CF4E3F540h
                                jmp 00007F1CF4E38455h
                                push 00000014h
                                push 0108A9F8h
                                call 00007F1CF4E3D42Ah
                                call 00007F1CF4E38C2Bh
                                movzx esi, ax
                                push 00000002h
                                call 00007F1CF4E3F4D3h
                                pop ecx
                                mov eax, 00005A4Dh
                                cmp word ptr [01000000h], ax
                                je 00007F1CF4E38456h
                                xor ebx, ebx
                                jmp 00007F1CF4E38485h
                                mov eax, dword ptr [0100003Ch]
                                cmp dword ptr [eax+01000000h], 00004550h
                                jne 00007F1CF4E3843Dh
                                mov ecx, 0000010Bh
                                cmp word ptr [eax+01000018h], cx
                                jne 00007F1CF4E3842Fh
                                xor ebx, ebx
                                cmp dword ptr [eax+01000074h], 0Eh
                                jbe 00007F1CF4E3845Bh
                                cmp dword ptr [eax+010000E8h], ebx
                                setne bl
                                mov dword ptr [ebp-1Ch], ebx
                                call 00007F1CF4E3D37Dh
                                test eax, eax
                                jne 00007F1CF4E3845Ah
                                push 0000001Ch
                                call 00007F1CF4E38577h
                                pop ecx
                                call 00007F1CF4E3E83Bh
                                test eax, eax
                                jne 00007F1CF4E3845Ah
                                push 00000010h
                                call 00007F1CF4E38566h
                                pop ecx
                                call 00007F1CF4E3F54Ch
                                and dword ptr [ebp-04h], 00000000h
                                call 00007F1CF4E3EE37h
                                test eax, eax
                                jns 00007F1CF4E3845Ah
                                push 0000001Bh
                                call 00007F1CF4E3854Ch
                                pop ecx
                                call dword ptr [0106A19Ch]
                                mov dword ptr [010AC3A8h], eax
                                call 00007F1CF4E3F567h
                                mov dword ptr [01097A94h], eax
                                call 00007F1CF4E3F124h
                                test eax, eax
                                jns 00007F1CF4E3845Ah

                                Data Directories

                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x8ccf80x8c.rdata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xad0000x41028.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0xda0000x2348.rsrc
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xef0000x4d50.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x6a3b00x38.rdata
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x879400x40.rdata
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x6a0000x328.rdata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                Sections

                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x681b90x68200False0.62395192452data6.85141546298IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                .rdata0x6a0000x23f8a0x24000False0.641872829861data6.36645327435IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .data0x8e0000x1e3ac0x7a00False0.527792008197data6.51367686644IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                .rsrc0xad0000x410280x41200False0.240744211852data5.36312234805IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0xef0000x4d500x4e00False0.730168269231data6.65913941378IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                Resources

                                NameRVASizeTypeLanguageCountry
                                RT_ICON0xad4340x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0EnglishUnited States
                                RT_ICON0xbdc5c0x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 16580607, next used block 4294917888EnglishUnited States
                                RT_ICON0xc1e840x25a8dataEnglishUnited States
                                RT_ICON0xc442c0x10a8dataEnglishUnited States
                                RT_ICON0xc54d40x988dataEnglishUnited States
                                RT_ICON0xc5e5c0x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                                RT_ICON0xc62c40x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0EnglishUnited States
                                RT_ICON0xd6aec0x94a8dataEnglishUnited States
                                RT_ICON0xdff940x5488dataEnglishUnited States
                                RT_ICON0xe541c0x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 254, next used block 520093696EnglishUnited States
                                RT_ICON0xe96440x25a8dataEnglishUnited States
                                RT_ICON0xebbec0x10a8dataEnglishUnited States
                                RT_ICON0xecc940x988dataEnglishUnited States
                                RT_ICON0xed61c0x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                                RT_STRING0xeda840xbcdataEnglishUnited States
                                RT_STRING0xedb400x150dataEnglishUnited States
                                RT_GROUP_ICON0xedc900x76dataEnglishUnited States
                                RT_GROUP_ICON0xedd080x5adataEnglishUnited States
                                RT_VERSION0xedd640x2c4dataEnglishUnited States

                                Imports

                                DLLImport
                                KERNEL32.dllGetLastError, VirtualProtectEx, LoadLibraryA, OpenMutexA, SetConsoleOutputCP, DeviceIoControl, GetModuleFileNameA, CloseHandle, DeleteFileA, WriteConsoleW, SetStdHandle, GetStringTypeW, LoadLibraryW, WaitForMultipleObjectsEx, GetStartupInfoA, GetConsoleMode, GetConsoleCP, FlushFileBuffers, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetLocaleInfoW, LCMapStringW, CompareStringW, GetTimeFormatW, GetDateFormatW, GetCPInfo, GetOEMCP, GetACP, IsValidCodePage, HeapReAlloc, CreateProcessA, Sleep, GetTickCount, SetFilePointerEx, GetCurrentProcess, UnregisterWaitEx, QueryDepthSList, InterlockedFlushSList, InterlockedPushEntrySList, InterlockedPopEntrySList, InitializeSListHead, ReleaseSemaphore, SetProcessAffinityMask, VirtualProtect, VirtualFree, VirtualAlloc, GetVersionExW, GetModuleHandleA, FreeLibraryAndExitThread, FreeLibrary, GetThreadTimes, OutputDebugStringW, FatalAppExitA, SetConsoleCtrlHandler, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCurrentProcessId, QueryPerformanceCounter, GetFileType, HeapSize, GetProcessHeap, GetModuleFileNameW, WriteFile, GetStdHandle, WideCharToMultiByte, MultiByteToWideChar, AreFileApisANSI, GetModuleHandleExW, ExitProcess, IsDebuggerPresent, UnregisterWait, RegisterWaitForSingleObject, SetThreadAffinityMask, GetProcessAffinityMask, GetNumaHighestNodeNumber, DeleteTimerQueueTimer, ChangeTimerQueueTimer, CreateTimerQueueTimer, GetLogicalProcessorInformation, GetThreadPriority, SetThreadPriority, SwitchToThread, SignalObjectAndWait, WaitForSingleObjectEx, SetEvent, DuplicateHandle, WaitForSingleObject, GetCurrentThread, GetCurrentThreadId, GetExitCodeThread, GetSystemTimeAsFileTime, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, HeapAlloc, EncodePointer, DecodePointer, GetCommandLineA, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, SetLastError, InitializeCriticalSectionAndSpinCount, CreateEventW, TerminateProcess, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetModuleHandleW, GetProcAddress, CreateSemaphoreW, CreateThread, ExitThread, LoadLibraryExW, RaiseException, RtlUnwind, HeapFree, TryEnterCriticalSection, CreateTimerQueue, RtlCaptureStackBackTrace, CreateFileW
                                USER32.dllSetWindowTextA, CallNextHookEx, LoadBitmapA, GetClassInfoExA, EnumWindows, GetIconInfo, IsDialogMessageA, GetWindowLongA, CreateWindowExA, ReleaseDC, DefWindowProcA, CheckDlgButton, SendMessageA
                                ole32.dllCoUninitialize, OleSetContainedObject, OleInitialize, CoSuspendClassObjects, OleUninitialize, StgCreateDocfile, CoInitialize
                                COMCTL32.dllImageList_LoadImageA, PropertySheetA, CreatePropertySheetPageA
                                WINSPOOL.DRVAddJobA, DeletePortA, SetPortA, SetPrinterDataA, DeletePrintProcessorA, AbortPrinter, GetPrinterDriverDirectoryA, ResetPrinterA, StartPagePrinter, ReadPrinter, FlushPrinter, DeletePrinterConnectionA, StartDocPrinterA, DeletePrinterKeyA, DeletePrintProvidorA, DeletePrinterDriverExA, GetPrintProcessorDirectoryA, FindClosePrinterChangeNotification, DeletePrinterDriverA, AddPrintProvidorA, OpenPrinterA, GetJobA, ClosePrinter, AddPrintProcessorA, AddPrinterA, PrinterMessageBoxA, SetFormA, GetFormA, DeletePrinter, AddPortA, SetJobA, AddPrinterDriverA, SetPrinterDataExA, DeletePrinterDataExA, DeletePrinterDataA, GetPrinterDataA, AddFormA, AddPrinterDriverExA, AddPrinterConnectionA, AddMonitorA, DeleteFormA, DeleteMonitorA, GetPrinterA, ConfigurePortA, ScheduleJob, GetPrinterDriverA, GetPrinterDataExA
                                sfc.dllSfcIsFileProtected

                                Version Infos

                                DescriptionData
                                LegalCopyright(C) 2011 Helpwould Use Corporation. All rights reserved.
                                FileVersion14.1.55.63
                                CompanyNameHelpwould Use Corporation
                                ProductNameDeathice
                                ProductVersion14.1.55.63
                                FileDescriptionDeathice The Certain
                                Translation0x0409 0x04b0

                                Possible Origin

                                Language of compilation systemCountry where language is spokenMap
                                EnglishUnited States

                                Network Behavior

                                Network Port Distribution

                                UDP Packets

                                TimestampSource PortDest PortSource IPDest IP
                                Sep 10, 2021 07:28:06.141274929 CEST6454953192.168.2.48.8.8.8
                                Sep 10, 2021 07:28:06.173835993 CEST53645498.8.8.8192.168.2.4
                                Sep 10, 2021 07:28:09.794151068 CEST6315353192.168.2.48.8.8.8
                                Sep 10, 2021 07:28:09.828183889 CEST53631538.8.8.8192.168.2.4
                                Sep 10, 2021 07:28:11.163975954 CEST5299153192.168.2.48.8.8.8
                                Sep 10, 2021 07:28:11.196463108 CEST53529918.8.8.8192.168.2.4
                                Sep 10, 2021 07:28:11.213056087 CEST5370053192.168.2.48.8.8.8
                                Sep 10, 2021 07:28:11.245542049 CEST53537008.8.8.8192.168.2.4
                                Sep 10, 2021 07:28:11.255109072 CEST5172653192.168.2.48.8.8.8
                                Sep 10, 2021 07:28:11.283317089 CEST53517268.8.8.8192.168.2.4
                                Sep 10, 2021 07:28:22.515371084 CEST5679453192.168.2.48.8.8.8
                                Sep 10, 2021 07:28:22.552726030 CEST53567948.8.8.8192.168.2.4
                                Sep 10, 2021 07:28:27.221208096 CEST5653453192.168.2.48.8.8.8
                                Sep 10, 2021 07:28:27.270185947 CEST53565348.8.8.8192.168.2.4
                                Sep 10, 2021 07:28:27.582804918 CEST5662753192.168.2.48.8.8.8
                                Sep 10, 2021 07:28:27.618233919 CEST53566278.8.8.8192.168.2.4
                                Sep 10, 2021 07:28:27.817651033 CEST5662153192.168.2.48.8.8.8
                                Sep 10, 2021 07:28:27.866524935 CEST53566218.8.8.8192.168.2.4
                                Sep 10, 2021 07:28:28.229381084 CEST6311653192.168.2.48.8.8.8
                                Sep 10, 2021 07:28:28.278403997 CEST53631168.8.8.8192.168.2.4
                                Sep 10, 2021 07:28:28.366758108 CEST6407853192.168.2.48.8.8.8
                                Sep 10, 2021 07:28:28.403283119 CEST53640788.8.8.8192.168.2.4
                                Sep 10, 2021 07:28:28.786196947 CEST6480153192.168.2.48.8.8.8
                                Sep 10, 2021 07:28:28.825587988 CEST53648018.8.8.8192.168.2.4
                                Sep 10, 2021 07:28:29.329730988 CEST6172153192.168.2.48.8.8.8
                                Sep 10, 2021 07:28:29.362298012 CEST53617218.8.8.8192.168.2.4
                                Sep 10, 2021 07:28:29.829440117 CEST5125553192.168.2.48.8.8.8
                                Sep 10, 2021 07:28:29.865679979 CEST53512558.8.8.8192.168.2.4
                                Sep 10, 2021 07:28:30.428303003 CEST6152253192.168.2.48.8.8.8
                                Sep 10, 2021 07:28:30.461085081 CEST53615228.8.8.8192.168.2.4
                                Sep 10, 2021 07:28:31.139528036 CEST5233753192.168.2.48.8.8.8
                                Sep 10, 2021 07:28:31.172951937 CEST53523378.8.8.8192.168.2.4
                                Sep 10, 2021 07:28:31.912934065 CEST5504653192.168.2.48.8.8.8
                                Sep 10, 2021 07:28:31.952032089 CEST53550468.8.8.8192.168.2.4
                                Sep 10, 2021 07:28:32.339919090 CEST4961253192.168.2.48.8.8.8
                                Sep 10, 2021 07:28:32.372539997 CEST53496128.8.8.8192.168.2.4
                                Sep 10, 2021 07:28:32.627718925 CEST4928553192.168.2.48.8.8.8
                                Sep 10, 2021 07:28:32.662878990 CEST53492858.8.8.8192.168.2.4
                                Sep 10, 2021 07:28:39.815841913 CEST5060153192.168.2.48.8.8.8
                                Sep 10, 2021 07:28:39.850405931 CEST53506018.8.8.8192.168.2.4
                                Sep 10, 2021 07:28:40.850609064 CEST5060153192.168.2.48.8.8.8
                                Sep 10, 2021 07:28:40.886810064 CEST53506018.8.8.8192.168.2.4
                                Sep 10, 2021 07:28:41.897170067 CEST5060153192.168.2.48.8.8.8
                                Sep 10, 2021 07:28:41.924233913 CEST53506018.8.8.8192.168.2.4
                                Sep 10, 2021 07:28:43.943135023 CEST5060153192.168.2.48.8.8.8
                                Sep 10, 2021 07:28:43.969206095 CEST53506018.8.8.8192.168.2.4
                                Sep 10, 2021 07:28:44.122525930 CEST6087553192.168.2.48.8.8.8
                                Sep 10, 2021 07:28:44.157752991 CEST53608758.8.8.8192.168.2.4
                                Sep 10, 2021 07:28:47.990400076 CEST5060153192.168.2.48.8.8.8
                                Sep 10, 2021 07:28:48.025816917 CEST53506018.8.8.8192.168.2.4
                                Sep 10, 2021 07:29:13.323084116 CEST5644853192.168.2.48.8.8.8
                                Sep 10, 2021 07:29:13.357377052 CEST53564488.8.8.8192.168.2.4
                                Sep 10, 2021 07:29:14.412585020 CEST5917253192.168.2.48.8.8.8
                                Sep 10, 2021 07:29:14.448110104 CEST53591728.8.8.8192.168.2.4
                                Sep 10, 2021 07:29:14.453455925 CEST6242053192.168.2.48.8.8.8
                                Sep 10, 2021 07:29:14.481364012 CEST53624208.8.8.8192.168.2.4
                                Sep 10, 2021 07:29:14.488106012 CEST6057953192.168.2.48.8.8.8
                                Sep 10, 2021 07:29:14.512888908 CEST53605798.8.8.8192.168.2.4
                                Sep 10, 2021 07:29:16.641024113 CEST5018353192.168.2.48.8.8.8
                                Sep 10, 2021 07:29:16.679554939 CEST53501838.8.8.8192.168.2.4
                                Sep 10, 2021 07:29:18.316977978 CEST6153153192.168.2.48.8.8.8
                                Sep 10, 2021 07:29:18.352873087 CEST53615318.8.8.8192.168.2.4

                                DNS Queries

                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                Sep 10, 2021 07:28:11.163975954 CEST192.168.2.48.8.8.80xa173Standard query (0)haverit.xyzA (IP address)IN (0x0001)
                                Sep 10, 2021 07:28:11.213056087 CEST192.168.2.48.8.8.80xf9a7Standard query (0)haverit.xyzA (IP address)IN (0x0001)
                                Sep 10, 2021 07:28:11.255109072 CEST192.168.2.48.8.8.80x35abStandard query (0)haverit.xyzA (IP address)IN (0x0001)
                                Sep 10, 2021 07:28:22.515371084 CEST192.168.2.48.8.8.80x1438Standard query (0)haverit.xyzA (IP address)IN (0x0001)
                                Sep 10, 2021 07:28:32.627718925 CEST192.168.2.48.8.8.80x105Standard query (0)haverit.xyzA (IP address)IN (0x0001)
                                Sep 10, 2021 07:29:14.412585020 CEST192.168.2.48.8.8.80x2194Standard query (0)haverit.xyzA (IP address)IN (0x0001)
                                Sep 10, 2021 07:29:14.453455925 CEST192.168.2.48.8.8.80x24Standard query (0)haverit.xyzA (IP address)IN (0x0001)
                                Sep 10, 2021 07:29:14.488106012 CEST192.168.2.48.8.8.80x17aeStandard query (0)haverit.xyzA (IP address)IN (0x0001)

                                DNS Answers

                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                Sep 10, 2021 07:28:11.196463108 CEST8.8.8.8192.168.2.40xa173Name error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                                Sep 10, 2021 07:28:11.245542049 CEST8.8.8.8192.168.2.40xf9a7Name error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                                Sep 10, 2021 07:28:11.283317089 CEST8.8.8.8192.168.2.40x35abName error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                                Sep 10, 2021 07:28:22.552726030 CEST8.8.8.8192.168.2.40x1438Name error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                                Sep 10, 2021 07:28:32.662878990 CEST8.8.8.8192.168.2.40x105Name error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                                Sep 10, 2021 07:29:14.448110104 CEST8.8.8.8192.168.2.40x2194Name error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                                Sep 10, 2021 07:29:14.481364012 CEST8.8.8.8192.168.2.40x24Name error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                                Sep 10, 2021 07:29:14.512888908 CEST8.8.8.8192.168.2.40x17aeName error (3)haverit.xyznonenoneA (IP address)IN (0x0001)

                                Code Manipulations

                                Statistics

                                CPU Usage

                                Click to jump to process

                                Memory Usage

                                Click to jump to process

                                Behavior

                                Click to jump to process

                                System Behavior

                                General

                                Start time:07:27:43
                                Start date:10/09/2021
                                Path:C:\Users\user\Desktop\VjLfUM5cMx.exe
                                Wow64 process (32bit):true
                                Commandline:'C:\Users\user\Desktop\VjLfUM5cMx.exe'
                                Imagebase:0x1000000
                                File size:901960 bytes
                                MD5 hash:C07D4F7DCAC497A3C06CBBA9E6E9E711
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.743054194.0000000003640000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.742911268.0000000003640000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.742353433.0000000003640000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.743093279.0000000003640000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.743313694.0000000003640000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.742958135.0000000003640000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.743290829.0000000003640000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.741931302.0000000003640000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.742268425.0000000003640000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.743331263.0000000003640000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.743266389.0000000003640000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.742496222.0000000003640000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.743239058.0000000003640000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.743391740.0000000003640000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000002.961646531.0000000003640000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.743211426.0000000003640000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.742430984.0000000003640000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.742097013.0000000003640000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.743177986.0000000003640000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.743353889.0000000003640000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.742801405.0000000003640000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.742634138.0000000003640000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.743003429.0000000003640000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.742749222.0000000003640000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.742570614.0000000003640000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.743401742.0000000003640000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.743138802.0000000003640000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.742692154.0000000003640000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.742188110.0000000003640000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.742014211.0000000003640000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.743370213.0000000003640000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.742861166.0000000003640000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.741849479.0000000003640000.00000004.00000040.sdmp, Author: Joe Security
                                Reputation:low

                                General

                                Start time:07:28:08
                                Start date:10/09/2021
                                Path:C:\Program Files\internet explorer\iexplore.exe
                                Wow64 process (32bit):false
                                Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                                Imagebase:0x7ff7cd730000
                                File size:823560 bytes
                                MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:07:28:09
                                Start date:10/09/2021
                                Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                Wow64 process (32bit):true
                                Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2856 CREDAT:17410 /prefetch:2
                                Imagebase:0xd90000
                                File size:822536 bytes
                                MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:07:29:12
                                Start date:10/09/2021
                                Path:C:\Program Files\internet explorer\iexplore.exe
                                Wow64 process (32bit):false
                                Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                                Imagebase:0x7ff7cd730000
                                File size:823560 bytes
                                MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:07:29:13
                                Start date:10/09/2021
                                Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                Wow64 process (32bit):true
                                Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:1492 CREDAT:17410 /prefetch:2
                                Imagebase:0xd90000
                                File size:822536 bytes
                                MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Disassembly

                                Code Analysis

                                Reset < >