Loading ...

Play interactive tourEdit tour

Windows Analysis Report nheQqfaVcS

Overview

General Information

Sample Name:nheQqfaVcS (renamed file extension from none to exe)
Analysis ID:480998
MD5:2926d2ff62efaa0fbfdcc3fb7e77c6d2
SHA1:dc5ebad8503139f8ce84927fda0ec9adb5b77200
SHA256:041d5d8edb606415cdcb6670b69ed4b2a2d80a8eb3e4dc75f0a9b2d558bedf60
Tags:exeFORTHPROPERTYLTD
Infos:

Most interesting Screenshot:

Detection

Ursnif Ursnif v3
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Ursnif
Multi AV Scanner detection for submitted file
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for domain / URL
Yara detected Ursnif
Writes or reads registry keys via WMI
Writes registry values via WMI
Machine Learning detection for sample
Performs DNS queries to domains with low reputation
Uses 32bit PE files
Antivirus or Machine Learning detection for unpacked file
PE file contains an invalid checksum
PE file contains strange resources
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
PE / OLE file has an invalid certificate
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)

Classification

Process Tree

  • System is w10x64
  • nheQqfaVcS.exe (PID: 6572 cmdline: 'C:\Users\user\Desktop\nheQqfaVcS.exe' MD5: 2926D2FF62EFAA0FBFDCC3FB7E77C6D2)
  • iexplore.exe (PID: 6256 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 6444 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6256 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • iexplore.exe (PID: 5720 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 5888 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5720 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000003.313661419.00000000036D0000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
    00000000.00000002.533943454.00000000036D0000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
      00000000.00000003.313428934.00000000036D0000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
        00000000.00000003.313350824.00000000036D0000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
          00000000.00000003.312765827.00000000036D0000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
            Click to see the 29 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            0.2.nheQqfaVcS.exe.1000000.0.unpackJoeSecurity_Ursnifv3Yara detected UrsnifJoe Security
              0.3.nheQqfaVcS.exe.ea9d7c.0.raw.unpackJoeSecurity_Ursnifv3Yara detected UrsnifJoe Security

                Sigma Overview

                No Sigma rule has matched

                Jbx Signature Overview

                Click to jump to signature section

                Show All Signature Results

                AV Detection:

                barindex
                Multi AV Scanner detection for submitted fileShow sources
                Source: nheQqfaVcS.exeVirustotal: Detection: 19%Perma Link
                Multi AV Scanner detection for domain / URLShow sources
                Source: haverit.xyzVirustotal: Detection: 5%Perma Link
                Machine Learning detection for sampleShow sources
                Source: nheQqfaVcS.exeJoe Sandbox ML: detected
                Source: 0.2.nheQqfaVcS.exe.1000000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen7
                Source: 0.3.nheQqfaVcS.exe.ea9d7c.0.unpackAvira: Label: TR/Patched.Ren.Gen
                Source: nheQqfaVcS.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
                Source: Binary string: c:\Muchwin\WorkWhich\centstring\shinegray\WanthumanMarket.pdb source: nheQqfaVcS.exe

                Networking:

                barindex
                Performs DNS queries to domains with low reputationShow sources
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: haverit.xyz
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: haverit.xyz
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: haverit.xyz
                Source: C:\Users\user\Desktop\nheQqfaVcS.exeDNS query: haverit.xyz
                Source: C:\Users\user\Desktop\nheQqfaVcS.exeDNS query: haverit.xyz
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: haverit.xyz
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: haverit.xyz
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: haverit.xyz
                Source: unknownDNS traffic detected: query: haverit.xyz replaycode: Name error (3)
                Source: msapplication.xml0.13.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x26116b42,0x01d7a650</date><accdate>0x26116b42,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
                Source: msapplication.xml0.13.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x26116b42,0x01d7a650</date><accdate>0x26116b42,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
                Source: msapplication.xml5.13.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x26189557,0x01d7a650</date><accdate>0x26189557,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
                Source: msapplication.xml5.13.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x26189557,0x01d7a650</date><accdate>0x26189557,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
                Source: msapplication.xml7.13.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x26189557,0x01d7a650</date><accdate>0x26189557,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
                Source: msapplication.xml7.13.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x26189557,0x01d7a650</date><accdate>0x26189557,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
                Source: nheQqfaVcS.exe, 00000000.00000003.313289878.00000000036D0000.00000004.00000040.sdmpString found in binary or memory: http://%s=%s&file://&os=%u.%u_%u_%u_x%uindex.html;
                Source: nheQqfaVcS.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                Source: nheQqfaVcS.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                Source: nheQqfaVcS.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                Source: nheQqfaVcS.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                Source: nheQqfaVcS.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
                Source: nheQqfaVcS.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                Source: nheQqfaVcS.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                Source: nheQqfaVcS.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                Source: nheQqfaVcS.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                Source: nheQqfaVcS.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
                Source: nheQqfaVcS.exeString found in binary or memory: http://ocsp.comodoca.com0
                Source: nheQqfaVcS.exeString found in binary or memory: http://ocsp.digicert.com0C
                Source: nheQqfaVcS.exeString found in binary or memory: http://ocsp.digicert.com0O
                Source: nheQqfaVcS.exeString found in binary or memory: http://ocsp.sectigo.com0
                Source: msapplication.xml.13.drString found in binary or memory: http://www.amazon.com/
                Source: nheQqfaVcS.exeString found in binary or memory: http://www.digicert.com/CPS0
                Source: msapplication.xml1.13.drString found in binary or memory: http://www.google.com/
                Source: msapplication.xml2.13.drString found in binary or memory: http://www.live.com/
                Source: msapplication.xml3.13.drString found in binary or memory: http://www.nytimes.com/
                Source: msapplication.xml4.13.drString found in binary or memory: http://www.reddit.com/
                Source: msapplication.xml5.13.drString found in binary or memory: http://www.twitter.com/
                Source: msapplication.xml6.13.drString found in binary or memory: http://www.wikipedia.com/
                Source: msapplication.xml7.13.drString found in binary or memory: http://www.youtube.com/
                Source: nheQqfaVcS.exeString found in binary or memory: https://haverit.xyz
                Source: ~DF165B26F914703F17.TMP.13.drString found in binary or memory: https://haverit.xyz/index.htm
                Source: {7678AF57-1243-11EC-90E5-ECF4BB570DC9}.dat.26.drString found in binary or memory: https://haverit.xyz/index.htmRoot
                Source: {7678AF57-1243-11EC-90E5-ECF4BB570DC9}.dat.26.drString found in binary or memory: https://haverit.xyz/index.htmdex.htm
                Source: nheQqfaVcS.exeString found in binary or memory: https://sectigo.com/CPS0
                Source: nheQqfaVcS.exeString found in binary or memory: https://www.digicert.com/CPS0
                Source: unknownDNS traffic detected: queries for: haverit.xyz

                Key, Mouse, Clipboard, Microphone and Screen Capturing:

                barindex
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 0.2.nheQqfaVcS.exe.1000000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.nheQqfaVcS.exe.ea9d7c.0.raw.unpack, type: UNPACKEDPE
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 00000000.00000003.313661419.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.533943454.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313428934.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313350824.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312765827.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313524102.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313391092.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313620745.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313575015.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312402940.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313494038.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313143533.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313289878.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313551158.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313087674.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312317005.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313243229.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312902480.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.311981135.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313033304.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313650621.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313636918.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312584205.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313461705.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312495587.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313193145.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312229401.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312975464.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312836081.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312674731.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313595976.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312150380.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312065477.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: nheQqfaVcS.exe PID: 6572, type: MEMORYSTR

                E-Banking Fraud:

                barindex
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 0.2.nheQqfaVcS.exe.1000000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.nheQqfaVcS.exe.ea9d7c.0.raw.unpack, type: UNPACKEDPE
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 00000000.00000003.313661419.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.533943454.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313428934.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313350824.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312765827.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313524102.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313391092.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313620745.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313575015.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312402940.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313494038.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313143533.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313289878.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313551158.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313087674.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312317005.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313243229.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312902480.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.311981135.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313033304.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313650621.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313636918.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312584205.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313461705.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312495587.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313193145.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312229401.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312975464.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312836081.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312674731.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313595976.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312150380.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312065477.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: nheQqfaVcS.exe PID: 6572, type: MEMORYSTR

                System Summary:

                barindex
                Writes or reads registry keys via WMIShow sources
                Source: C:\Users\user\Desktop\nheQqfaVcS.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetDWORDValue
                Source: C:\Users\user\Desktop\nheQqfaVcS.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                Source: C:\Users\user\Desktop\nheQqfaVcS.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                Source: C:\Users\user\Desktop\nheQqfaVcS.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                Source: C:\Users\user\Desktop\nheQqfaVcS.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                Source: C:\Users\user\Desktop\nheQqfaVcS.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                Writes registry values via WMIShow sources
                Source: C:\Users\user\Desktop\nheQqfaVcS.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                Source: C:\Users\user\Desktop\nheQqfaVcS.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                Source: C:\Users\user\Desktop\nheQqfaVcS.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                Source: C:\Users\user\Desktop\nheQqfaVcS.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                Source: C:\Users\user\Desktop\nheQqfaVcS.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                Source: nheQqfaVcS.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                Source: nheQqfaVcS.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: nheQqfaVcS.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: nheQqfaVcS.exeStatic PE information: invalid certificate
                Source: nheQqfaVcS.exeVirustotal: Detection: 19%
                Source: nheQqfaVcS.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\nheQqfaVcS.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\nheQqfaVcS.exe 'C:\Users\user\Desktop\nheQqfaVcS.exe'
                Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6256 CREDAT:17410 /prefetch:2
                Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5720 CREDAT:17410 /prefetch:2
                Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6256 CREDAT:17410 /prefetch:2Jump to behavior
                Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5720 CREDAT:17410 /prefetch:2Jump to behavior
                Source: C:\Users\user\Desktop\nheQqfaVcS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{674B6698-EE92-11D0-AD71-00C04FD8FDFF}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\nheQqfaVcS.exeMutant created: \Sessions\1\BaseNamedObjects\Local\1978EE24-ED7A-8F95-C655-46BAE5CC03A0
                Source: C:\Users\user\Desktop\nheQqfaVcS.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : select * from win32_process
                Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{506886DB-1243-11EC-90E5-ECF4BB570DC9}.datJump to behavior
                Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DFCDB1AD29A328B9E8.TMPJump to behavior
                Source: classification engineClassification label: mal96.troj.evad.winEXE@7/29@8/0
                Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\nheQqfaVcS.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\nheQqfaVcS.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
                Source: nheQqfaVcS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: nheQqfaVcS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: nheQqfaVcS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: nheQqfaVcS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: nheQqfaVcS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: nheQqfaVcS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: nheQqfaVcS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: c:\Muchwin\WorkWhich\centstring\shinegray\WanthumanMarket.pdb source: nheQqfaVcS.exe
                Source: nheQqfaVcS.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: nheQqfaVcS.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: nheQqfaVcS.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: nheQqfaVcS.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: nheQqfaVcS.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                Data Obfuscation:

                barindex
                Detected unpacking (changes PE section rights)Show sources
                Source: C:\Users\user\Desktop\nheQqfaVcS.exeUnpacked PE file: 0.2.nheQqfaVcS.exe.1000000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.bss:W;.reloc:R;
                Source: nheQqfaVcS.exeStatic PE information: real checksum: 0xe2b91 should be: 0xe302d
                Source: initial sampleStatic PE information: section name: .text entropy: 6.85141828955

                Hooking and other Techniques for Hiding and Protection:

                barindex
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 0.2.nheQqfaVcS.exe.1000000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.nheQqfaVcS.exe.ea9d7c.0.raw.unpack, type: UNPACKEDPE
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 00000000.00000003.313661419.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.533943454.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313428934.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313350824.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312765827.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313524102.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313391092.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313620745.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313575015.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312402940.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313494038.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313143533.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313289878.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313551158.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313087674.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312317005.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313243229.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312902480.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.311981135.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313033304.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313650621.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313636918.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312584205.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313461705.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312495587.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313193145.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312229401.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312975464.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312836081.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312674731.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313595976.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312150380.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312065477.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: nheQqfaVcS.exe PID: 6572, type: MEMORYSTR
                Source: C:\Users\user\Desktop\nheQqfaVcS.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                Source: C:\Users\user\Desktop\nheQqfaVcS.exe TID: 6236Thread sleep time: -30000s >= -30000sJump to behavior
                Source: nheQqfaVcS.exe, 00000000.00000002.533850677.0000000001100000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                Source: nheQqfaVcS.exe, 00000000.00000002.533850677.0000000001100000.00000002.00020000.sdmpBinary or memory string: Progman
                Source: nheQqfaVcS.exe, 00000000.00000002.533850677.0000000001100000.00000002.00020000.sdmpBinary or memory string: SProgram Managerl
                Source: nheQqfaVcS.exe, 00000000.00000002.533850677.0000000001100000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd,
                Source: nheQqfaVcS.exe, 00000000.00000002.533850677.0000000001100000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\nheQqfaVcS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: C:\Users\user\Desktop\nheQqfaVcS.exeWMI Queries: IWbemServices::ExecQuery - root\securitycenter2 : select * from antispywareproduct

                Stealing of Sensitive Information:

                barindex
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 0.2.nheQqfaVcS.exe.1000000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.nheQqfaVcS.exe.ea9d7c.0.raw.unpack, type: UNPACKEDPE
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 00000000.00000003.313661419.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.533943454.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313428934.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313350824.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312765827.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313524102.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313391092.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313620745.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313575015.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312402940.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313494038.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313143533.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313289878.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313551158.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313087674.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312317005.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313243229.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312902480.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.311981135.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313033304.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313650621.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313636918.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312584205.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313461705.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312495587.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313193145.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312229401.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312975464.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312836081.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312674731.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313595976.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312150380.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312065477.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: nheQqfaVcS.exe PID: 6572, type: MEMORYSTR

                Remote Access Functionality:

                barindex
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 0.2.nheQqfaVcS.exe.1000000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.3.nheQqfaVcS.exe.ea9d7c.0.raw.unpack, type: UNPACKEDPE
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 00000000.00000003.313661419.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.533943454.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313428934.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313350824.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312765827.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313524102.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313391092.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313620745.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313575015.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312402940.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313494038.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313143533.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313289878.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313551158.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313087674.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312317005.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313243229.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312902480.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.311981135.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313033304.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313650621.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313636918.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312584205.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313461705.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312495587.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313193145.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312229401.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312975464.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312836081.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312674731.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.313595976.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312150380.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.312065477.00000000036D0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: nheQqfaVcS.exe PID: 6572, type: MEMORYSTR

                Mitre Att&ck Matrix

                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid AccountsWindows Management Instrumentation211Path InterceptionProcess Injection2Masquerading1OS Credential DumpingQuery Registry1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion1LSASS MemorySecurity Software Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection2Security Account ManagerVirtualization/Sandbox Evasion1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information1NTDSProcess Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing12LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery3Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

                Behavior Graph

                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 480998 Sample: nheQqfaVcS Startdate: 10/09/2021 Architecture: WINDOWS Score: 96 25 Multi AV Scanner detection for domain / URL 2->25 27 Multi AV Scanner detection for submitted file 2->27 29 Yara detected Ursnif 2->29 31 3 other signatures 2->31 6 nheQqfaVcS.exe 2->6         started        10 iexplore.exe 1 50 2->10         started        12 iexplore.exe 1 73 2->12         started        process3 dnsIp4 19 haverit.xyz 6->19 33 Detected unpacking (changes PE section rights) 6->33 35 Performs DNS queries to domains with low reputation 6->35 37 Writes or reads registry keys via WMI 6->37 39 Writes registry values via WMI 6->39 14 iexplore.exe 30 10->14         started        17 iexplore.exe 29 12->17         started        signatures5 process6 dnsIp7 21 haverit.xyz 14->21 23 haverit.xyz 17->23

                Screenshots

                Thumbnails

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                windows-stand

                Antivirus, Machine Learning and Genetic Malware Detection

                Initial Sample

                SourceDetectionScannerLabelLink
                nheQqfaVcS.exe19%VirustotalBrowse
                nheQqfaVcS.exe100%Joe Sandbox ML

                Dropped Files

                No Antivirus matches

                Unpacked PE Files

                SourceDetectionScannerLabelLinkDownload
                0.2.nheQqfaVcS.exe.1000000.0.unpack100%AviraTR/Crypt.XPACK.Gen7Download File
                0.3.nheQqfaVcS.exe.ea9d7c.0.unpack100%AviraTR/Patched.Ren.GenDownload File

                Domains

                SourceDetectionScannerLabelLink
                haverit.xyz6%VirustotalBrowse

                URLs

                SourceDetectionScannerLabelLink
                https://haverit.xyz/index.htm4%VirustotalBrowse
                https://haverit.xyz/index.htm0%Avira URL Cloudsafe
                https://sectigo.com/CPS00%URL Reputationsafe
                http://ocsp.sectigo.com00%URL Reputationsafe
                https://haverit.xyz/index.htmdex.htm0%Avira URL Cloudsafe
                http://%s=%s&file://&os=%u.%u_%u_%u_x%uindex.html;0%Avira URL Cloudsafe
                http://www.wikipedia.com/0%URL Reputationsafe
                https://haverit.xyz0%Avira URL Cloudsafe
                http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
                http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%URL Reputationsafe
                https://haverit.xyz/index.htmRoot0%Avira URL Cloudsafe

                Domains and IPs

                Contacted Domains

                NameIPActiveMaliciousAntivirus DetectionReputation
                haverit.xyz
                unknown
                unknowntrueunknown

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                https://haverit.xyz/index.htm~DF165B26F914703F17.TMP.13.drtrue
                • 4%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://www.nytimes.com/msapplication.xml3.13.drfalse
                  high
                  https://sectigo.com/CPS0nheQqfaVcS.exefalse
                  • URL Reputation: safe
                  unknown
                  http://ocsp.sectigo.com0nheQqfaVcS.exefalse
                  • URL Reputation: safe
                  unknown
                  https://haverit.xyz/index.htmdex.htm{7678AF57-1243-11EC-90E5-ECF4BB570DC9}.dat.26.drtrue
                  • Avira URL Cloud: safe
                  unknown
                  http://%s=%s&file://&os=%u.%u_%u_%u_x%uindex.html;nheQqfaVcS.exe, 00000000.00000003.313289878.00000000036D0000.00000004.00000040.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://www.youtube.com/msapplication.xml7.13.drfalse
                    high
                    http://www.wikipedia.com/msapplication.xml6.13.drfalse
                    • URL Reputation: safe
                    unknown
                    http://www.amazon.com/msapplication.xml.13.drfalse
                      high
                      https://haverit.xyznheQqfaVcS.exetrue
                      • Avira URL Cloud: safe
                      unknown
                      http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0snheQqfaVcS.exefalse
                      • URL Reputation: safe
                      unknown
                      http://www.live.com/msapplication.xml2.13.drfalse
                        high
                        http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#nheQqfaVcS.exefalse
                        • URL Reputation: safe
                        unknown
                        http://www.reddit.com/msapplication.xml4.13.drfalse
                          high
                          http://www.twitter.com/msapplication.xml5.13.drfalse
                            high
                            https://haverit.xyz/index.htmRoot{7678AF57-1243-11EC-90E5-ECF4BB570DC9}.dat.26.drtrue
                            • Avira URL Cloud: safe
                            unknown
                            http://www.google.com/msapplication.xml1.13.drfalse
                              high

                              Contacted IPs

                              No contacted IP infos

                              General Information

                              Joe Sandbox Version:33.0.0 White Diamond
                              Analysis ID:480998
                              Start date:10.09.2021
                              Start time:07:26:28
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 6m 44s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Sample file name:nheQqfaVcS (renamed file extension from none to exe)
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:29
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal96.troj.evad.winEXE@7/29@8/0
                              EGA Information:Failed
                              HDC Information:Failed
                              HCA Information:
                              • Successful, ratio: 100%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              Warnings:
                              Show All
                              • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, ielowutil.exe, UpdateNotificationMgr.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, WmiPrvSE.exe, svchost.exe
                              • Excluded IPs from analysis (whitelisted): 23.211.4.86, 20.82.210.154, 23.203.80.193, 40.112.88.60, 152.199.19.161, 20.82.209.183, 80.67.82.235, 80.67.82.211, 40.127.240.158
                              • Excluded domains from analysis (whitelisted): iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, fs.microsoft.com, ie9comview.vo.msecnd.net, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, settings-win.data.microsoft.com, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, settingsfd-geo.trafficmanager.net, e11290.dspg.akamaiedge.net, ris.api.iris.microsoft.com, iecvlist.microsoft.com, go.microsoft.com, go.microsoft.com.edgekey.net, arc.trafficmanager.net, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, cs9.wpc.v0cdn.net
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.

                              Simulations

                              Behavior and APIs

                              TimeTypeDescription
                              07:28:20API Interceptor2x Sleep call for process: nheQqfaVcS.exe modified

                              Joe Sandbox View / Context

                              IPs

                              No context

                              Domains

                              No context

                              ASN

                              No context

                              JA3 Fingerprints

                              No context

                              Dropped Files

                              No context

                              Created / dropped Files

                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{506886DB-1243-11EC-90E5-ECF4BB570DC9}.dat
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:Microsoft Word Document
                              Category:dropped
                              Size (bytes):29272
                              Entropy (8bit):1.771427654928644
                              Encrypted:false
                              SSDEEP:96:rBZWZL2OBWO9tOFbfOsw3KMONfhziTqOnwMB:rBZWZL2OBWO9tOZfOshMOr9ODB
                              MD5:E8166AD9C4D6191DD8C51030C263321E
                              SHA1:61AD14E0A1D4BF14E711A26E241F5F060A40E8C3
                              SHA-256:72336C9DED2DC7C99135FC983ABF3780D99B828FAA1FF57CB8065F91DA33A82A
                              SHA-512:78642E04288D2E3AEA575EAE6439B8E456BC530724B50FA278753E2FF0039B0723BD65C9775C2C7E78D53A93F37A4E0211CB49609F499A920162396C5EC851BF
                              Malicious:false
                              Reputation:low
                              Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{7678AF55-1243-11EC-90E5-ECF4BB570DC9}.dat
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:Microsoft Word Document
                              Category:dropped
                              Size (bytes):29272
                              Entropy (8bit):1.7678202020698055
                              Encrypted:false
                              SSDEEP:96:rAZ3Zj2xAWxutxebfxU2dKMxX1szbpqxe2MB:rAZ3Zj2xAWxutxOfxUlMx+0xcB
                              MD5:7148254D4FADD6EDD26BC42BB795B2BB
                              SHA1:5F8D1A30EF81D47F76BD2D9DF20D45A2C111D41C
                              SHA-256:C5427B07D6C5EED675B24B4D78E6396059F3F3B7789E85C403D8171090E1EA89
                              SHA-512:A784604EEF93D41E5C96ECC8EB05AEE70F27D8F03DB111EFE87CE501A9D96DB598A2BF59102BF6C8CABE7A8E8E0C7AD9F3CA1B7F5A8B05161D0008A60E75B572
                              Malicious:false
                              Reputation:low
                              Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{506886DD-1243-11EC-90E5-ECF4BB570DC9}.dat
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:Microsoft Word Document
                              Category:dropped
                              Size (bytes):26240
                              Entropy (8bit):1.6577965569535396
                              Encrypted:false
                              SSDEEP:48:IwTGcprhGwpa9G4pQ1GrapbSpGQpBKGHHpcSTGUp8bGzYpm/jGopORyDGGqXpHRA:rpZ7Q/6lBSjjR2CWhM9kDVpA
                              MD5:C892D13DD1CD1998B7477CFE1FCDC3C9
                              SHA1:32C026788A88FCAC8F0B5A9C35ED93D84B599259
                              SHA-256:60799FB8BC177347E5FDD2EA561AE534E71E9BE501346CB9F96C595CB03CC2B5
                              SHA-512:3C4F587D9FA8BCBFE6DE40D5E8CCAA4C87ECB687FD4E595E5BB195087EDC8CB1D19F1A21A8FA265234DD6D3859C113666DD21D1521DB19DB84B688ADAD76F3A7
                              Malicious:false
                              Reputation:low
                              Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{7678AF57-1243-11EC-90E5-ECF4BB570DC9}.dat
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:Microsoft Word Document
                              Category:dropped
                              Size (bytes):26240
                              Entropy (8bit):1.6594241652982409
                              Encrypted:false
                              SSDEEP:48:Iw5GcprsGwpaAG4pQIGrapbS3GQpBSGHHpcDTGUp8MxGzYpm8kyGopOayDHGqXpo:rfZEQg6WBSBjp2dWYMAkRVfA
                              MD5:291690DBD83163CCA5FD3E0D02BB1F36
                              SHA1:B95DF0F5F82CE3679FBD865D376FECE6100F0A10
                              SHA-256:D208D5CDCC082B127052B55A8AF6DFA11A0CCD45D1C6E854099AC772108756ED
                              SHA-512:3AD8EB543A7267A882D838D6896A7EA9D6A27D0E454A5260C3ECEBF6F3A8E5B807ED5553B7A36F95004B87F996284E2F6EDB791F349D2D3A49F37ECE1B83E1C0
                              Malicious:false
                              Reputation:low
                              Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-17529550060\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):657
                              Entropy (8bit):5.113905124514613
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxOEMaraMnWimI002EtM3MHdNMNxOEMaraMnWimI00ONVbkEtMb:2d6NxOA2MSZHKd6NxOA2MSZ7Qb
                              MD5:7012472634EB96820B6EEC294FFA2AB2
                              SHA1:46B70A08F8F0B7C210D7E2016C79505166019066
                              SHA-256:C5EC7B30B03613C6450AA1953B7F13B82163B3CDEF0ADD1D83D771346BCA0F24
                              SHA-512:B55B9BCE216DE90290FDA211C0F561C7BA5EE5403E93C473003DCCA84728BA82F8C3956D67894CB1C71805E1CD79DC314929C1CF0E68019A20E955941BED761E
                              Malicious:false
                              Reputation:low
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x26189557,0x01d7a650</date><accdate>0x26189557,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x26189557,0x01d7a650</date><accdate>0x26189557,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18270793970\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):654
                              Entropy (8bit):5.126785934700775
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxe2kMugougHnWimI002EtM3MHdNMNxe2kMugougHnWimI00ONkak6EtMb:2d6NxrgSZHKd6NxrgSZ72a7b
                              MD5:036A6E3282047CFBD313BC951C0FDCC6
                              SHA1:FACC78394DC05D4584A2C59D45409D28C0EC2528
                              SHA-256:C87DB800F390409FF72B1C096495CAFF04E708187F7646559CE7BF2D882C5DAD
                              SHA-512:1C1F7F565131612E1B0DB5B6ABF19676756BAAAA1C34E2F483AAF0607185D39735B6B44814C4B4D2D5F7D3E2656E66CC3898651A812D6277AC72E6DC44B4D028
                              Malicious:false
                              Reputation:low
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0x260a44b2,0x01d7a650</date><accdate>0x260a44b2,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0x260a44b2,0x01d7a650</date><accdate>0x260a44b2,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Amazon.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-21706820\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):663
                              Entropy (8bit):5.132943576775603
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxvLMaraMnWimI002EtM3MHdNMNxvLMaraMnWimI00ONmZEtMb:2d6Nxv12MSZHKd6Nxv12MSZ7Ub
                              MD5:0810F0747527C354F4C7B878EC6C037D
                              SHA1:0CE70619C66F00ED1A5FD6B7421358B9CABC4E13
                              SHA-256:F97424B8D542DAA2736F2142CBC911B99AE4D09A3B382D336831F9110CAC8D80
                              SHA-512:58102F88EACDF34CBF1F04A782BC60DA0DDEEE3AE7FE73F668435FD5D2B314BF21EB0E9BBDE3AFADC1B75FBB58692CBB585BD3E58061655A10E35178FED7C9EF
                              Malicious:false
                              Reputation:low
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0x26189557,0x01d7a650</date><accdate>0x26189557,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0x26189557,0x01d7a650</date><accdate>0x26189557,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Wikipedia.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):648
                              Entropy (8bit):5.123568335705859
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxiMrMnWimI002EtM3MHdNMNxiMrMnWimI00ONd5EtMb:2d6Nx8SZHKd6Nx8SZ7njb
                              MD5:5DA483F61304960D0F776FB1C0AC546E
                              SHA1:F6FB15F9FE4A2B2CECAE1219CDCC214002C36E03
                              SHA-256:1770B45C0925C77FCB065FB7D79A3D7DCC249F395EFFB214E6EE1583DE63B7B8
                              SHA-512:BB0D0B8F4F43AE2878DDA27B7D4653794645B10B9437C11061C77F759B2D085AEF1075627BB8E250128E3CEAFB2870929C478B17750CF13220FC4A890D971F36
                              Malicious:false
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0x26116b42,0x01d7a650</date><accdate>0x26116b42,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0x26116b42,0x01d7a650</date><accdate>0x26116b42,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Live.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6757900\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):657
                              Entropy (8bit):5.1481543684655335
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxhGwMaraMnWimI002EtM3MHdNMNxhGwMaraMnWimI00ON8K075EtMb:2d6NxQc2MSZHKd6NxQc2MSZ7uKajb
                              MD5:5E414D55D9C5C113853E0245A19215C1
                              SHA1:C4EF265F1D3977769CBC094CCE02FD5DEDE6545D
                              SHA-256:7B41E8602389BE61D50ADAC69C387146B3C29F2D34BEA8999D0CC5F40F35E88D
                              SHA-512:3364A941E12C6D76EE67BBB4223ED009129D6A89794F2D39C9F3CB79A2E9FD049989A781F04307955ED51D3D128253A87012E40DC77EB848E7C3183C4D4E0E42
                              Malicious:false
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x26189557,0x01d7a650</date><accdate>0x26189557,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x26189557,0x01d7a650</date><accdate>0x26189557,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8760897390\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):654
                              Entropy (8bit):5.112015487709611
                              Encrypted:false
                              SSDEEP:12:TMHdNMNx0nMrMnWimI002EtM3MHdNMNx0nMrMnWimI00ONxEtMb:2d6Nx0bSZHKd6Nx0bSZ7Vb
                              MD5:5DB865CF1E6A450A7E3E42EB09234DC4
                              SHA1:0D6EA71BF5715A483214C89E8E1FD8514ACFAD46
                              SHA-256:C2DCB2A500F9235E55C2750262BC304FC7454304A466F44DE6BC219C88DA38B4
                              SHA-512:92E6885A9DF1131578F120C997E3C583D4AF54DE78614C4E92E930F0158565E7E6617196319B272B99B518484495C5BEC38FF86ADDB7750FFB0D4913BB5F8E0F
                              Malicious:false
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0x26116b42,0x01d7a650</date><accdate>0x26116b42,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0x26116b42,0x01d7a650</date><accdate>0x26116b42,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Reddit.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):657
                              Entropy (8bit):5.147778589604081
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxxMrMnWimI002EtM3MHdNMNxxMrMnWimI00ON6Kq5EtMb:2d6NxtSZHKd6NxtSZ7ub
                              MD5:B1BB196FF5EDF1BC272963AB21FCABB5
                              SHA1:6B5D418C755223D69CF07CF4362C6F7DD01187E3
                              SHA-256:BC5CCB9E63BC889CE68A41461AAF3AD5A90FC3DE632F3405C3FCCC9DE605DB75
                              SHA-512:DF824DE32328A196D51A4CE489F19D175930751EA153C71C8C23740EFF46F4032ABEBD209AB66E030628FE287F0DBCB464722101E6B41EF48007698B9B82CA8B
                              Malicious:false
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0x26116b42,0x01d7a650</date><accdate>0x26116b42,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0x26116b42,0x01d7a650</date><accdate>0x26116b42,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\NYTimes.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20332743330\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):660
                              Entropy (8bit):5.124275386432658
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxcMrMnWimI002EtM3MHdNMNxcMrMnWimI00ONVEtMb:2d6Nx+SZHKd6Nx+SZ71b
                              MD5:6E42AC1028D8AB88EFB8CAA36B282D89
                              SHA1:688B731F70840DFD8EC1464B1F7829DDD3675D49
                              SHA-256:6541E1956991734ED55917912A40D64DDFAD6607440705CBA4E8DDD95780B7CF
                              SHA-512:AFD585A1BDD6224744BF41D43B0918B847A02905623D6AE95DABAA0185527B9254F7974BE6F706D17A8001B291E4E59909CADB913957E5B7195DCC33BD8041EA
                              Malicious:false
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x26116b42,0x01d7a650</date><accdate>0x26116b42,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x26116b42,0x01d7a650</date><accdate>0x26116b42,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin8215062560\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):654
                              Entropy (8bit):5.1087139086941935
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxfnMrMnWimI002EtM3MHdNMNxfnMrMnWimI00ONe5EtMb:2d6NxDSZHKd6NxDSZ7Ejb
                              MD5:B130923143DF009BD3DBE0EB65452958
                              SHA1:4794E0BA69ABBFC18985B69796F925B384939EFA
                              SHA-256:5F6E2870EEE5B52FA68DE47B4C15F5B30F060F064313ED9854748BD44FAAC1AD
                              SHA-512:5713FCE4DC67B3F526CC8850E55F1BF00161BB96C20EEC63254B2043C19839FEB3DFE818AAEA9D80D91AA9DF7552DF35F712936137CAFF5B0F2B78C929250D18
                              Malicious:false
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0x26116b42,0x01d7a650</date><accdate>0x26116b42,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0x26116b42,0x01d7a650</date><accdate>0x26116b42,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Google.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4PB7FJMT\dnserror[1]
                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              File Type:HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):2997
                              Entropy (8bit):4.4885437940628465
                              Encrypted:false
                              SSDEEP:48:u7u5V4VyhhV2lFUW29vj0RkpNc7KpAP8Rra:vIlJ6G7Ao8Ra
                              MD5:2DC61EB461DA1436F5D22BCE51425660
                              SHA1:E1B79BCAB0F073868079D807FAEC669596DC46C1
                              SHA-256:ACDEB4966289B6CE46ECC879531F85E9C6F94B718AAB521D38E2E00F7F7F7993
                              SHA-512:A88BECB4FBDDC5AFC55E4DC0135AF714A3EEC4A63810AE5A989F2CECB824A686165D3CEDB8CBD8F35C7E5B9F4136C29DEA32736AABB451FE8088B978B493AC6D
                              Malicious:false
                              Preview: .<!DOCTYPE HTML>..<html>.. <head>.. <link rel="stylesheet" type="text/css" href="NewErrorPageTemplate.css" >.. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.. <title>Can&rsquo;t reach this page</title>.. <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="getInfo(); initMoreInfo('infoBlockID');">.. <div id="contentContainer" class="mainContent">.. <div id="mainTitle" class="title">Can&rsquo;t reach this page</div>.. <div class="taskSection" id="taskSection">.. <ul id="cantDisplayTasks" class="tasks">.. <li id="task1-1">Make sure the web address <span id="webpage" class="webpageURL"></span>is correct</li>.. <li id="task1-2">Search for this site on Bing</li>..
                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4PB7FJMT\errorPageStrings[1]
                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):4720
                              Entropy (8bit):5.164796203267696
                              Encrypted:false
                              SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
                              MD5:D65EC06F21C379C87040B83CC1ABAC6B
                              SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
                              SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
                              SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
                              Malicious:false
                              Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4PB7FJMT\httpErrorPagesScripts[1]
                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):12105
                              Entropy (8bit):5.451485481468043
                              Encrypted:false
                              SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
                              MD5:9234071287E637F85D721463C488704C
                              SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
                              SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
                              SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
                              Malicious:false
                              Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NUEPGTR9\down[1]
                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
                              Category:dropped
                              Size (bytes):748
                              Entropy (8bit):7.249606135668305
                              Encrypted:false
                              SSDEEP:12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
                              MD5:C4F558C4C8B56858F15C09037CD6625A
                              SHA1:EE497CC061D6A7A59BB66DEFEA65F9A8145BA240
                              SHA-256:39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781
                              SHA-512:D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44
                              Malicious:false
                              Preview: .PNG........IHDR...............ex....PLTE....W..W..W..W..W..W..W..W..W..W..W..W..W.U..............W..W.!Y.#Z.$\.'].<r.=s.P..Q..Q..U..o..p..r..x..z..~.............................................b.............................................................................................................................................................................................................$..s...7tRNS.a.o(,.s....e......q*...................................F.Z....IDATx^%.S..@.C..jm.mTk...m.?|;.y..S....F.t...,.......D.>..LpX=f.M...H4........=...=..xy.[h..7....7.....<.q.kH....#+....I..z.....'.ksC...X<.+..J>....%3BmqaV...h..Z._.:<.Y_jG...vN^.<>.Nu.u@.....M....?...1D.m~)s8..&....IEND.B`.
                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NUEPGTR9\httpErrorPagesScripts[1]
                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):12105
                              Entropy (8bit):5.451485481468043
                              Encrypted:false
                              SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
                              MD5:9234071287E637F85D721463C488704C
                              SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
                              SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
                              SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
                              Malicious:false
                              Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\NewErrorPageTemplate[1]
                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1612
                              Entropy (8bit):4.869554560514657
                              Encrypted:false
                              SSDEEP:24:5Y0bQ573pHpACtUZtJD0lFBopZleqw87xTe4D8FaFJ/Doz9AtjJgbCzg:5m73jcJqQep89TEw7Uxkk
                              MD5:DFEABDE84792228093A5A270352395B6
                              SHA1:E41258C9576721025926326F76063C2305586F76
                              SHA-256:77B138AB5D0A90FF04648C26ADDD5E414CC178165E3B54A4CB3739DA0F58E075
                              SHA-512:E256F603E67335151BB709294749794E2E3085F4063C623461A0B3DECBCCA8E620807B707EC9BCBE36DCD7D639C55753DA0495BE85B4AE5FB6BFC52AB4B284FD
                              Malicious:false
                              Preview: .body..{.. background-repeat: repeat-x;.. background-color: white;.. font-family: "Segoe UI", "verdana", "arial";.. margin: 0em;.. color: #1f1f1f;..}.....mainContent..{.. margin-top:80px;.. width: 700px;.. margin-left: 120px;.. margin-right: 120px;..}.....title..{.. color: #54b0f7;.. font-size: 36px;.. font-weight: 300;.. line-height: 40px;.. margin-bottom: 24px;.. font-family: "Segoe UI", "verdana";.. position: relative;..}.....errorExplanation..{.. color: #000000;.. font-size: 12pt;.. font-family: "Segoe UI", "verdana", "arial";.. text-decoration: none;..}.....taskSection..{.. margin-top: 20px;.. margin-bottom: 28px;.. position: relative; ..}.....tasks..{.. color: #000000;.. font-family: "Segoe UI", "verdana";.. font-weight:200;.. font-size: 12pt;..}....li..{.. margin-top: 8px;..}.....diagnoseButton..{.. outline: none;.. font-size: 9pt;..}.....launchInternetOptionsButton..{.. outline: none;
                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\NewErrorPageTemplate[2]
                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1612
                              Entropy (8bit):4.869554560514657
                              Encrypted:false
                              SSDEEP:24:5Y0bQ573pHpACtUZtJD0lFBopZleqw87xTe4D8FaFJ/Doz9AtjJgbCzg:5m73jcJqQep89TEw7Uxkk
                              MD5:DFEABDE84792228093A5A270352395B6
                              SHA1:E41258C9576721025926326F76063C2305586F76
                              SHA-256:77B138AB5D0A90FF04648C26ADDD5E414CC178165E3B54A4CB3739DA0F58E075
                              SHA-512:E256F603E67335151BB709294749794E2E3085F4063C623461A0B3DECBCCA8E620807B707EC9BCBE36DCD7D639C55753DA0495BE85B4AE5FB6BFC52AB4B284FD
                              Malicious:false
                              Preview: .body..{.. background-repeat: repeat-x;.. background-color: white;.. font-family: "Segoe UI", "verdana", "arial";.. margin: 0em;.. color: #1f1f1f;..}.....mainContent..{.. margin-top:80px;.. width: 700px;.. margin-left: 120px;.. margin-right: 120px;..}.....title..{.. color: #54b0f7;.. font-size: 36px;.. font-weight: 300;.. line-height: 40px;.. margin-bottom: 24px;.. font-family: "Segoe UI", "verdana";.. position: relative;..}.....errorExplanation..{.. color: #000000;.. font-size: 12pt;.. font-family: "Segoe UI", "verdana", "arial";.. text-decoration: none;..}.....taskSection..{.. margin-top: 20px;.. margin-bottom: 28px;.. position: relative; ..}.....tasks..{.. color: #000000;.. font-family: "Segoe UI", "verdana";.. font-weight:200;.. font-size: 12pt;..}....li..{.. margin-top: 8px;..}.....diagnoseButton..{.. outline: none;.. font-size: 9pt;..}.....launchInternetOptionsButton..{.. outline: none;
                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\dnserror[1]
                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              File Type:HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):2997
                              Entropy (8bit):4.4885437940628465
                              Encrypted:false
                              SSDEEP:48:u7u5V4VyhhV2lFUW29vj0RkpNc7KpAP8Rra:vIlJ6G7Ao8Ra
                              MD5:2DC61EB461DA1436F5D22BCE51425660
                              SHA1:E1B79BCAB0F073868079D807FAEC669596DC46C1
                              SHA-256:ACDEB4966289B6CE46ECC879531F85E9C6F94B718AAB521D38E2E00F7F7F7993
                              SHA-512:A88BECB4FBDDC5AFC55E4DC0135AF714A3EEC4A63810AE5A989F2CECB824A686165D3CEDB8CBD8F35C7E5B9F4136C29DEA32736AABB451FE8088B978B493AC6D
                              Malicious:false
                              Preview: .<!DOCTYPE HTML>..<html>.. <head>.. <link rel="stylesheet" type="text/css" href="NewErrorPageTemplate.css" >.. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.. <title>Can&rsquo;t reach this page</title>.. <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="getInfo(); initMoreInfo('infoBlockID');">.. <div id="contentContainer" class="mainContent">.. <div id="mainTitle" class="title">Can&rsquo;t reach this page</div>.. <div class="taskSection" id="taskSection">.. <ul id="cantDisplayTasks" class="tasks">.. <li id="task1-1">Make sure the web address <span id="webpage" class="webpageURL"></span>is correct</li>.. <li id="task1-2">Search for this site on Bing</li>..
                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\down[1]
                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
                              Category:dropped
                              Size (bytes):748
                              Entropy (8bit):7.249606135668305
                              Encrypted:false
                              SSDEEP:12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
                              MD5:C4F558C4C8B56858F15C09037CD6625A
                              SHA1:EE497CC061D6A7A59BB66DEFEA65F9A8145BA240
                              SHA-256:39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781
                              SHA-512:D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44
                              Malicious:false
                              Preview: .PNG........IHDR...............ex....PLTE....W..W..W..W..W..W..W..W..W..W..W..W..W.U..............W..W.!Y.#Z.$\.'].<r.=s.P..Q..Q..U..o..p..r..x..z..~.............................................b.............................................................................................................................................................................................................$..s...7tRNS.a.o(,.s....e......q*...................................F.Z....IDATx^%.S..@.C..jm.mTk...m.?|;.y..S....F.t...,.......D.>..LpX=f.M...H4........=...=..xy.[h..7....7.....<.q.kH....#+....I..z.....'.ksC...X<.+..J>....%3BmqaV...h..Z._.:<.Y_jG...vN^.<>.Nu.u@.....M....?...1D.m~)s8..&....IEND.B`.
                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\errorPageStrings[1]
                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):4720
                              Entropy (8bit):5.164796203267696
                              Encrypted:false
                              SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
                              MD5:D65EC06F21C379C87040B83CC1ABAC6B
                              SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
                              SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
                              SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
                              Malicious:false
                              Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
                              C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:modified
                              Size (bytes):89
                              Entropy (8bit):4.224587757977836
                              Encrypted:false
                              SSDEEP:3:oVXUpjGrpEH8JOGXnEpjGrU7n:o9Up2p4qEp2g
                              MD5:03064E3244A4514F8AA241D46356725E
                              SHA1:A7EB233C8F4C96653926FBB83A75850023AADEC4
                              SHA-256:46B83B9473554CD475F07746945F6E70B2F892E581BD04354024B0050F32E359
                              SHA-512:360B1BF6340283B8EF4D99A9E388CEADC24C27CF2C26B53D04070A97AA1CB464AFF958F5F394532E7B84089E7B3E3F5AE44CA385D895C24DE97F662870937FA6
                              Malicious:false
                              Preview: [2021/09/10 07:29:12.207] Latest deploy version: ..[2021/09/10 07:29:12.207] 11.211.2 ..
                              C:\Users\user\AppData\Local\Temp\~DF04D35234F04DF89A.TMP
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):38737
                              Entropy (8bit):0.37172545806157037
                              Encrypted:false
                              SSDEEP:48:kBqoxKAuvScS+tzxQ8I8wayDZayDbayDU:kBqoxKAuvScS+tzxQTbLpa
                              MD5:B1843149433FC41DF0EFE9263ED154F7
                              SHA1:4316C4FB4DB1846095CA848A325571CADE049A5D
                              SHA-256:3822E398E5C6FB036F326BC322DE411C4A4A330BFAE0B7C52490F4A9C55A8C46
                              SHA-512:B6CB2620D3D5120A0BE2336E07AB9E62D6F0BBCB92677731AF360400C80E53750E24A7897D154A52C435ACFAC44F43E45E8F2E3ABF7A773375BC47BE1DB1036D
                              Malicious:false
                              Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Temp\~DF165B26F914703F17.TMP
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):38737
                              Entropy (8bit):0.37049313974713743
                              Encrypted:false
                              SSDEEP:48:kBqoxKAuvScS+2wqD/I/wRyDZRyDbRyDU:kBqoxKAuvScS+2wqDwIwqX
                              MD5:2C7140FAB24D2288CC34CC904663D3EF
                              SHA1:4A7C0F021D2B0442BFE31BF1505DAFB109366005
                              SHA-256:8C0486AF2E2FCB5AE3E0CCC853BE52C25F361376541027BE62E0455BDD485DCC
                              SHA-512:899E67BAC8F5749CA9312E3BBC24F2EF44B327E098984870FB3D93F4FB295FC851D76360C45906723B3563DADF8683D365355A2FF27C8CF8E492737D3281C944
                              Malicious:false
                              Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Temp\~DF65FC542F93EC8AEB.TMP
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):12933
                              Entropy (8bit):0.4092348646167777
                              Encrypted:false
                              SSDEEP:24:c9lLh9lLh9lIn9lIn9loET9loET9lWECM/PDy/O7nE:kBqoIjVx5
                              MD5:F3FB9D4A2F87340D0E3B8FB18F3B2922
                              SHA1:F039854E0419799C7653095805BF099BE1B22E89
                              SHA-256:D69CC8BF9FEA5B6A2FD2333303DBAE774E3DCBEB9E21325FA3B050339375B93E
                              SHA-512:A5123B626E879D8100140439AC0BB7CC50B384BC6BC21C956BAD8E6D48F7FD66464B5420CF488A58E0D76F3A5D0076AA4B6F3B495A5E0B27310C5FE5A38EBF04
                              Malicious:false
                              Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Temp\~DFCDB1AD29A328B9E8.TMP
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):12933
                              Entropy (8bit):0.40841972555186656
                              Encrypted:false
                              SSDEEP:12:c9lCg5/9lCgeK9l26an9l26an9l8fRj9l8fRj9lTqOZOeq:c9lLh9lLh9lIn9lIn9loj9loj9lWOZ6
                              MD5:1819126BFFACD56CF744DB7D42C47680
                              SHA1:010E551B291C05657DBCBFA833109E2102DFF41A
                              SHA-256:C0DE1F200170DFA47C1C87589CAB0B63BF7A82A5AFEC9BE3A1425E7714B95539
                              SHA-512:843E114EFD05E6BB6D3A7655DF38A16CEB4B345A4CF293439664F1A11EBAA98F4B75287040EF514A3104DDF34E93824D196BE60FFAA85D4C82E4F31F93664EC1
                              Malicious:false
                              Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                              Static File Info

                              General

                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Entropy (8bit):6.614401628444266
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.96%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:nheQqfaVcS.exe
                              File size:901960
                              MD5:2926d2ff62efaa0fbfdcc3fb7e77c6d2
                              SHA1:dc5ebad8503139f8ce84927fda0ec9adb5b77200
                              SHA256:041d5d8edb606415cdcb6670b69ed4b2a2d80a8eb3e4dc75f0a9b2d558bedf60
                              SHA512:1c122a0a63f010e55765f32c0495611c48eec7f7f076a3644e4ddc37763b5c6984e3ef62cf27f3e2b771b8b3a4917e998a88e1ec94e679cdc891e490cc20ec07
                              SSDEEP:24576:g9PsA9vHAYobFGQdRHylSk61LXXhtxvZPmtk1/GqgLG4:NYKJk61bRrZPmWGG4
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Zm.f...5...5...5..r5...5..w5...5..v5...5...5...5.{.5...5..t5...5..v5...5..j5-..5..p5...5..u5...5Rich...5.......................

                              File Icon

                              Icon Hash:f0b0e8e4e4e8b2dc

                              Static PE Info

                              General

                              Entrypoint:0x1005725
                              Entrypoint Section:.text
                              Digitally signed:true
                              Imagebase:0x1000000
                              Subsystem:windows gui
                              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                              DLL Characteristics:TERMINAL_SERVER_AWARE, NX_COMPAT
                              Time Stamp:0x55E85856 [Thu Sep 3 14:25:26 2015 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:6
                              OS Version Minor:0
                              File Version Major:6
                              File Version Minor:0
                              Subsystem Version Major:6
                              Subsystem Version Minor:0
                              Import Hash:6e09f5ea9222053b840f418fc7379964

                              Authenticode Signature

                              Signature Valid:false
                              Signature Issuer:CN=Sectigo RSA Code Signing CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
                              Signature Validation Error:No signature was present in the subject
                              Error Number:-2146762496
                              Not Before, Not After
                              • 4/12/2021 5:00:00 PM 4/13/2022 4:59:59 PM
                              Subject Chain
                              • CN=FORTH PROPERTY LTD, O=FORTH PROPERTY LTD, L=Edinburgh, C=GB
                              Version:3
                              Thumbprint MD5:8AB6A86211EE700AA961C3292ADB312D
                              Thumbprint SHA-1:A533DFA7E6AED2A9FFBE41FCEC5A8927A6EAFBBB
                              Thumbprint SHA-256:9E0611728595A506CC2A55486FDD88ECA0971EF0B08F74CB3B3B6F5F6F3C7E27
                              Serial:239664C12BAEB5A6D787912888051392

                              Entrypoint Preview

                              Instruction
                              call 00007F5FBCB5E4C0h
                              jmp 00007F5FBCB573D5h
                              push 00000014h
                              push 0108A9F8h
                              call 00007F5FBCB5C3AAh
                              call 00007F5FBCB57BABh
                              movzx esi, ax
                              push 00000002h
                              call 00007F5FBCB5E453h
                              pop ecx
                              mov eax, 00005A4Dh
                              cmp word ptr [01000000h], ax
                              je 00007F5FBCB573D6h
                              xor ebx, ebx
                              jmp 00007F5FBCB57405h
                              mov eax, dword ptr [0100003Ch]
                              cmp dword ptr [eax+01000000h], 00004550h
                              jne 00007F5FBCB573BDh
                              mov ecx, 0000010Bh
                              cmp word ptr [eax+01000018h], cx
                              jne 00007F5FBCB573AFh
                              xor ebx, ebx
                              cmp dword ptr [eax+01000074h], 0Eh
                              jbe 00007F5FBCB573DBh
                              cmp dword ptr [eax+010000E8h], ebx
                              setne bl
                              mov dword ptr [ebp-1Ch], ebx
                              call 00007F5FBCB5C2FDh
                              test eax, eax
                              jne 00007F5FBCB573DAh
                              push 0000001Ch
                              call 00007F5FBCB574F7h
                              pop ecx
                              call 00007F5FBCB5D7BBh
                              test eax, eax
                              jne 00007F5FBCB573DAh
                              push 00000010h
                              call 00007F5FBCB574E6h
                              pop ecx
                              call 00007F5FBCB5E4CCh
                              and dword ptr [ebp-04h], 00000000h
                              call 00007F5FBCB5DDB7h
                              test eax, eax
                              jns 00007F5FBCB573DAh
                              push 0000001Bh
                              call 00007F5FBCB574CCh
                              pop ecx
                              call dword ptr [0106A19Ch]
                              mov dword ptr [010AC3A8h], eax
                              call 00007F5FBCB5E4E7h
                              mov dword ptr [01097A94h], eax
                              call 00007F5FBCB5E0A4h
                              test eax, eax
                              jns 00007F5FBCB573DAh

                              Data Directories

                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x8ccf80x8c.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xad0000x41028.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0xda0000x2348.rsrc
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xef0000x4d50.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x6a3b00x38.rdata
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x879400x40.rdata
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x6a0000x328.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                              Sections

                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x681b90x68200False0.623954269208data6.85141828955IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                              .rdata0x6a0000x23f8a0x24000False0.64170328776data6.36645327435IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0x8e0000x1e3ac0x7a00False0.527792008197data6.51367686644IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                              .rsrc0xad0000x410280x41200False0.240744211852data5.36312234805IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0xef0000x4d500x4e00False0.730168269231data6.65913941378IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                              Resources

                              NameRVASizeTypeLanguageCountry
                              RT_ICON0xad4340x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0EnglishUnited States
                              RT_ICON0xbdc5c0x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 16580607, next used block 4294917888EnglishUnited States
                              RT_ICON0xc1e840x25a8dataEnglishUnited States
                              RT_ICON0xc442c0x10a8dataEnglishUnited States
                              RT_ICON0xc54d40x988dataEnglishUnited States
                              RT_ICON0xc5e5c0x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                              RT_ICON0xc62c40x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0EnglishUnited States
                              RT_ICON0xd6aec0x94a8dataEnglishUnited States
                              RT_ICON0xdff940x5488dataEnglishUnited States
                              RT_ICON0xe541c0x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 254, next used block 520093696EnglishUnited States
                              RT_ICON0xe96440x25a8dataEnglishUnited States
                              RT_ICON0xebbec0x10a8dataEnglishUnited States
                              RT_ICON0xecc940x988dataEnglishUnited States
                              RT_ICON0xed61c0x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                              RT_STRING0xeda840xbcdataEnglishUnited States
                              RT_STRING0xedb400x150dataEnglishUnited States
                              RT_GROUP_ICON0xedc900x76dataEnglishUnited States
                              RT_GROUP_ICON0xedd080x5adataEnglishUnited States
                              RT_VERSION0xedd640x2c4dataEnglishUnited States

                              Imports

                              DLLImport
                              KERNEL32.dllGetLastError, VirtualProtectEx, LoadLibraryA, OpenMutexA, SetConsoleOutputCP, DeviceIoControl, GetModuleFileNameA, CloseHandle, DeleteFileA, WriteConsoleW, SetStdHandle, GetStringTypeW, LoadLibraryW, WaitForMultipleObjectsEx, GetStartupInfoA, GetConsoleMode, GetConsoleCP, FlushFileBuffers, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetLocaleInfoW, LCMapStringW, CompareStringW, GetTimeFormatW, GetDateFormatW, GetCPInfo, GetOEMCP, GetACP, IsValidCodePage, HeapReAlloc, CreateProcessA, Sleep, GetTickCount, SetFilePointerEx, GetCurrentProcess, UnregisterWaitEx, QueryDepthSList, InterlockedFlushSList, InterlockedPushEntrySList, InterlockedPopEntrySList, InitializeSListHead, ReleaseSemaphore, SetProcessAffinityMask, VirtualProtect, VirtualFree, VirtualAlloc, GetVersionExW, GetModuleHandleA, FreeLibraryAndExitThread, FreeLibrary, GetThreadTimes, OutputDebugStringW, FatalAppExitA, SetConsoleCtrlHandler, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCurrentProcessId, QueryPerformanceCounter, GetFileType, HeapSize, GetProcessHeap, GetModuleFileNameW, WriteFile, GetStdHandle, WideCharToMultiByte, MultiByteToWideChar, AreFileApisANSI, GetModuleHandleExW, ExitProcess, IsDebuggerPresent, UnregisterWait, RegisterWaitForSingleObject, SetThreadAffinityMask, GetProcessAffinityMask, GetNumaHighestNodeNumber, DeleteTimerQueueTimer, ChangeTimerQueueTimer, CreateTimerQueueTimer, GetLogicalProcessorInformation, GetThreadPriority, SetThreadPriority, SwitchToThread, SignalObjectAndWait, WaitForSingleObjectEx, SetEvent, DuplicateHandle, WaitForSingleObject, GetCurrentThread, GetCurrentThreadId, GetExitCodeThread, GetSystemTimeAsFileTime, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, HeapAlloc, EncodePointer, DecodePointer, GetCommandLineA, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, SetLastError, InitializeCriticalSectionAndSpinCount, CreateEventW, TerminateProcess, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetModuleHandleW, GetProcAddress, CreateSemaphoreW, CreateThread, ExitThread, LoadLibraryExW, RaiseException, RtlUnwind, HeapFree, TryEnterCriticalSection, CreateTimerQueue, RtlCaptureStackBackTrace, CreateFileW
                              USER32.dllSetWindowTextA, CallNextHookEx, LoadBitmapA, GetClassInfoExA, EnumWindows, GetIconInfo, IsDialogMessageA, GetWindowLongA, CreateWindowExA, ReleaseDC, DefWindowProcA, CheckDlgButton, SendMessageA
                              ole32.dllOleUninitialize, CoUninitialize, CoSuspendClassObjects, OleSetContainedObject, StgCreateDocfile, OleInitialize, CoInitialize
                              COMCTL32.dllImageList_LoadImageA, PropertySheetA, CreatePropertySheetPageA
                              WINSPOOL.DRVDeletePortA, SetPrinterDataA, DeleteFormA, SetPortA, SetPrinterDataExA, AddMonitorA, ScheduleJob, AddPrinterConnectionA, ReadPrinter, AddPrinterDriverA, GetPrinterDataA, ResetPrinterA, PrinterMessageBoxA, DeletePrintProcessorA, GetPrinterDriverDirectoryA, OpenPrinterA, AddPortA, ConfigurePortA, GetPrinterDataExA, GetJobA, AddPrinterDriverExA, ClosePrinter, DeletePrinterDataExA, DeletePrinterConnectionA, DeletePrintProvidorA, StartPagePrinter, AbortPrinter, GetPrintProcessorDirectoryA, StartDocPrinterA, GetPrinterA, AddPrinterA, DeletePrinter, DeleteMonitorA, GetPrinterDriverA, AddFormA, DeletePrinterDriverA, AddPrintProcessorA, AddPrintProvidorA, SetFormA, GetFormA, DeletePrinterDataA, AddJobA, FlushPrinter, DeletePrinterDriverExA, SetJobA, FindClosePrinterChangeNotification, DeletePrinterKeyA
                              sfc.dllSfcIsFileProtected

                              Version Infos

                              DescriptionData
                              LegalCopyright(C) 2011 Helpwould Use Corporation. All rights reserved.
                              FileVersion14.1.55.63
                              CompanyNameHelpwould Use Corporation
                              ProductNameDeathice
                              ProductVersion14.1.55.63
                              FileDescriptionDeathice The Certain
                              Translation0x0409 0x04b0

                              Possible Origin

                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States

                              Network Behavior

                              Network Port Distribution

                              UDP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              Sep 10, 2021 07:27:39.750437975 CEST5244153192.168.2.58.8.8.8
                              Sep 10, 2021 07:27:39.802483082 CEST53524418.8.8.8192.168.2.5
                              Sep 10, 2021 07:28:03.941092014 CEST6217653192.168.2.58.8.8.8
                              Sep 10, 2021 07:28:03.973735094 CEST53621768.8.8.8192.168.2.5
                              Sep 10, 2021 07:28:07.658811092 CEST5959653192.168.2.58.8.8.8
                              Sep 10, 2021 07:28:07.696305990 CEST53595968.8.8.8192.168.2.5
                              Sep 10, 2021 07:28:09.204570055 CEST6529653192.168.2.58.8.8.8
                              Sep 10, 2021 07:28:09.240426064 CEST53652968.8.8.8192.168.2.5
                              Sep 10, 2021 07:28:09.247970104 CEST6318353192.168.2.58.8.8.8
                              Sep 10, 2021 07:28:09.274013996 CEST53631838.8.8.8192.168.2.5
                              Sep 10, 2021 07:28:09.286760092 CEST6015153192.168.2.58.8.8.8
                              Sep 10, 2021 07:28:09.311476946 CEST53601518.8.8.8192.168.2.5
                              Sep 10, 2021 07:28:20.653501987 CEST5696953192.168.2.58.8.8.8
                              Sep 10, 2021 07:28:20.687736034 CEST53569698.8.8.8192.168.2.5
                              Sep 10, 2021 07:28:27.698112965 CEST5516153192.168.2.58.8.8.8
                              Sep 10, 2021 07:28:27.748544931 CEST53551618.8.8.8192.168.2.5
                              Sep 10, 2021 07:28:30.802565098 CEST5475753192.168.2.58.8.8.8
                              Sep 10, 2021 07:28:30.835525990 CEST53547578.8.8.8192.168.2.5
                              Sep 10, 2021 07:28:37.671355009 CEST4999253192.168.2.58.8.8.8
                              Sep 10, 2021 07:28:37.705704927 CEST53499928.8.8.8192.168.2.5
                              Sep 10, 2021 07:28:38.718317032 CEST4999253192.168.2.58.8.8.8
                              Sep 10, 2021 07:28:38.751202106 CEST53499928.8.8.8192.168.2.5
                              Sep 10, 2021 07:28:39.720861912 CEST4999253192.168.2.58.8.8.8
                              Sep 10, 2021 07:28:39.747662067 CEST53499928.8.8.8192.168.2.5
                              Sep 10, 2021 07:28:40.197954893 CEST6007553192.168.2.58.8.8.8
                              Sep 10, 2021 07:28:40.243762970 CEST53600758.8.8.8192.168.2.5
                              Sep 10, 2021 07:28:41.719208002 CEST4999253192.168.2.58.8.8.8
                              Sep 10, 2021 07:28:41.760893106 CEST53499928.8.8.8192.168.2.5
                              Sep 10, 2021 07:28:44.987360954 CEST5501653192.168.2.58.8.8.8
                              Sep 10, 2021 07:28:45.026432037 CEST53550168.8.8.8192.168.2.5
                              Sep 10, 2021 07:28:45.767276049 CEST4999253192.168.2.58.8.8.8
                              Sep 10, 2021 07:28:45.800985098 CEST53499928.8.8.8192.168.2.5
                              Sep 10, 2021 07:28:47.821943045 CEST6434553192.168.2.58.8.8.8
                              Sep 10, 2021 07:28:47.859509945 CEST53643458.8.8.8192.168.2.5
                              Sep 10, 2021 07:28:48.851515055 CEST5712853192.168.2.58.8.8.8
                              Sep 10, 2021 07:28:48.894433975 CEST53571288.8.8.8192.168.2.5
                              Sep 10, 2021 07:29:11.492307901 CEST5479153192.168.2.58.8.8.8
                              Sep 10, 2021 07:29:11.526818037 CEST53547918.8.8.8192.168.2.5
                              Sep 10, 2021 07:29:12.638621092 CEST5046353192.168.2.58.8.8.8
                              Sep 10, 2021 07:29:12.675548077 CEST53504638.8.8.8192.168.2.5
                              Sep 10, 2021 07:29:12.688169003 CEST5039453192.168.2.58.8.8.8
                              Sep 10, 2021 07:29:12.725872040 CEST53503948.8.8.8192.168.2.5
                              Sep 10, 2021 07:29:12.749125004 CEST5853053192.168.2.58.8.8.8
                              Sep 10, 2021 07:29:12.782552004 CEST53585308.8.8.8192.168.2.5
                              Sep 10, 2021 07:29:15.815572977 CEST5381353192.168.2.58.8.8.8
                              Sep 10, 2021 07:29:15.851185083 CEST53538138.8.8.8192.168.2.5
                              Sep 10, 2021 07:29:17.516053915 CEST6373253192.168.2.58.8.8.8
                              Sep 10, 2021 07:29:17.551978111 CEST53637328.8.8.8192.168.2.5

                              DNS Queries

                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                              Sep 10, 2021 07:28:09.204570055 CEST192.168.2.58.8.8.80x8102Standard query (0)haverit.xyzA (IP address)IN (0x0001)
                              Sep 10, 2021 07:28:09.247970104 CEST192.168.2.58.8.8.80x3467Standard query (0)haverit.xyzA (IP address)IN (0x0001)
                              Sep 10, 2021 07:28:09.286760092 CEST192.168.2.58.8.8.80xd1feStandard query (0)haverit.xyzA (IP address)IN (0x0001)
                              Sep 10, 2021 07:28:20.653501987 CEST192.168.2.58.8.8.80xcc39Standard query (0)haverit.xyzA (IP address)IN (0x0001)
                              Sep 10, 2021 07:28:30.802565098 CEST192.168.2.58.8.8.80x2628Standard query (0)haverit.xyzA (IP address)IN (0x0001)
                              Sep 10, 2021 07:29:12.638621092 CEST192.168.2.58.8.8.80x3cc1Standard query (0)haverit.xyzA (IP address)IN (0x0001)
                              Sep 10, 2021 07:29:12.688169003 CEST192.168.2.58.8.8.80xf6a9Standard query (0)haverit.xyzA (IP address)IN (0x0001)
                              Sep 10, 2021 07:29:12.749125004 CEST192.168.2.58.8.8.80x4222Standard query (0)haverit.xyzA (IP address)IN (0x0001)

                              DNS Answers

                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                              Sep 10, 2021 07:28:09.240426064 CEST8.8.8.8192.168.2.50x8102Name error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                              Sep 10, 2021 07:28:09.274013996 CEST8.8.8.8192.168.2.50x3467Name error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                              Sep 10, 2021 07:28:09.311476946 CEST8.8.8.8192.168.2.50xd1feName error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                              Sep 10, 2021 07:28:20.687736034 CEST8.8.8.8192.168.2.50xcc39Name error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                              Sep 10, 2021 07:28:30.835525990 CEST8.8.8.8192.168.2.50x2628Name error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                              Sep 10, 2021 07:29:12.675548077 CEST8.8.8.8192.168.2.50x3cc1Name error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                              Sep 10, 2021 07:29:12.725872040 CEST8.8.8.8192.168.2.50xf6a9Name error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                              Sep 10, 2021 07:29:12.782552004 CEST8.8.8.8192.168.2.50x4222Name error (3)haverit.xyznonenoneA (IP address)IN (0x0001)

                              Code Manipulations

                              Statistics

                              CPU Usage

                              Click to jump to process

                              Memory Usage

                              Click to jump to process

                              Behavior

                              Click to jump to process

                              System Behavior

                              General

                              Start time:07:27:39
                              Start date:10/09/2021
                              Path:C:\Users\user\Desktop\nheQqfaVcS.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Users\user\Desktop\nheQqfaVcS.exe'
                              Imagebase:0x1000000
                              File size:901960 bytes
                              MD5 hash:2926D2FF62EFAA0FBFDCC3FB7E77C6D2
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.313661419.00000000036D0000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000002.533943454.00000000036D0000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.313428934.00000000036D0000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.313350824.00000000036D0000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.312765827.00000000036D0000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.313524102.00000000036D0000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.313391092.00000000036D0000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.313620745.00000000036D0000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.313575015.00000000036D0000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.312402940.00000000036D0000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.313494038.00000000036D0000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.313143533.00000000036D0000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.313289878.00000000036D0000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.313551158.00000000036D0000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.313087674.00000000036D0000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.312317005.00000000036D0000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.313243229.00000000036D0000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.312902480.00000000036D0000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.311981135.00000000036D0000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.313033304.00000000036D0000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.313650621.00000000036D0000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.313636918.00000000036D0000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.312584205.00000000036D0000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.313461705.00000000036D0000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.312495587.00000000036D0000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.313193145.00000000036D0000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.312229401.00000000036D0000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.312975464.00000000036D0000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.312836081.00000000036D0000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.312674731.00000000036D0000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.313595976.00000000036D0000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.312150380.00000000036D0000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.312065477.00000000036D0000.00000004.00000040.sdmp, Author: Joe Security
                              Reputation:low

                              General

                              Start time:07:28:07
                              Start date:10/09/2021
                              Path:C:\Program Files\internet explorer\iexplore.exe
                              Wow64 process (32bit):false
                              Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                              Imagebase:0x7ff640a80000
                              File size:823560 bytes
                              MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:07:28:07
                              Start date:10/09/2021
                              Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6256 CREDAT:17410 /prefetch:2
                              Imagebase:0xaa0000
                              File size:822536 bytes
                              MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:07:29:10
                              Start date:10/09/2021
                              Path:C:\Program Files\internet explorer\iexplore.exe
                              Wow64 process (32bit):false
                              Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                              Imagebase:0x7ff640a80000
                              File size:823560 bytes
                              MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:07:29:11
                              Start date:10/09/2021
                              Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5720 CREDAT:17410 /prefetch:2
                              Imagebase:0xaa0000
                              File size:822536 bytes
                              MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Disassembly

                              Code Analysis

                              Reset < >