Loading ...

Play interactive tourEdit tour

Windows Analysis Report eZY2eXORIp

Overview

General Information

Sample Name:eZY2eXORIp (renamed file extension from none to exe)
Analysis ID:481002
MD5:8baf707c7afeb686ca13710762829052
SHA1:e4e5310572a5f15be59a84185d7bc999a47cef2f
SHA256:ad6d0f94a890ee4ef5b0a36ab1fa2845910d3b687ef7bc0c42f0dfc3e1952469
Tags:exeFORTHPROPERTYLTD
Infos:

Most interesting Screenshot:

Detection

Ursnif Ursnif v3
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Ursnif
Multi AV Scanner detection for submitted file
Detected unpacking (changes PE section rights)
Yara detected Ursnif
Writes or reads registry keys via WMI
Writes registry values via WMI
Machine Learning detection for sample
Performs DNS queries to domains with low reputation
Creates a DirectInput object (often for capturing keystrokes)
Uses 32bit PE files
Antivirus or Machine Learning detection for unpacked file
PE file contains an invalid checksum
PE file contains strange resources
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
PE / OLE file has an invalid certificate
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)

Classification

Process Tree

  • System is w10x64
  • eZY2eXORIp.exe (PID: 4304 cmdline: 'C:\Users\user\Desktop\eZY2eXORIp.exe' MD5: 8BAF707C7AFEB686CA13710762829052)
  • iexplore.exe (PID: 6212 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 6296 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6212 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • iexplore.exe (PID: 6496 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 5400 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6496 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000003.292866191.00000000036F0000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
    00000000.00000003.291929905.00000000036F0000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
      00000000.00000003.292913639.00000000036F0000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
        00000000.00000003.291547643.00000000036F0000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
          00000000.00000003.291632853.00000000036F0000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
            Click to see the 29 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            0.3.eZY2eXORIp.exe.619d7c.0.raw.unpackJoeSecurity_Ursnifv3Yara detected UrsnifJoe Security
              0.2.eZY2eXORIp.exe.1000000.0.unpackJoeSecurity_Ursnifv3Yara detected UrsnifJoe Security

                Sigma Overview

                No Sigma rule has matched

                Jbx Signature Overview

                Click to jump to signature section

                Show All Signature Results

                AV Detection:

                barindex
                Multi AV Scanner detection for submitted fileShow sources
                Source: eZY2eXORIp.exeReversingLabs: Detection: 24%
                Machine Learning detection for sampleShow sources
                Source: eZY2eXORIp.exeJoe Sandbox ML: detected
                Source: 0.2.eZY2eXORIp.exe.1000000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen7
                Source: 0.3.eZY2eXORIp.exe.619d7c.0.unpackAvira: Label: TR/Patched.Ren.Gen
                Source: eZY2eXORIp.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
                Source: Binary string: c:\Muchwin\WorkWhich\centstring\shinegray\WanthumanMarket.pdb source: eZY2eXORIp.exe

                Networking:

                barindex
                Performs DNS queries to domains with low reputationShow sources
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: haverit.xyz
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: haverit.xyz
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: haverit.xyz
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeDNS query: haverit.xyz
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeDNS query: haverit.xyz
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: haverit.xyz
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: haverit.xyz
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: haverit.xyz
                Source: unknownDNS traffic detected: query: haverit.xyz replaycode: Name error (3)
                Source: msapplication.xml0.14.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x9dce2b00,0x01d7a650</date><accdate>0x9dce2b00,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
                Source: msapplication.xml0.14.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x9dce2b00,0x01d7a650</date><accdate>0x9dd5514f,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
                Source: msapplication.xml5.14.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x9dd5514f,0x01d7a650</date><accdate>0x9dd5514f,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
                Source: msapplication.xml5.14.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x9dd5514f,0x01d7a650</date><accdate>0x9ddc796c,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
                Source: msapplication.xml7.14.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x9ddc796c,0x01d7a650</date><accdate>0x9ddc796c,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
                Source: msapplication.xml7.14.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x9ddc796c,0x01d7a650</date><accdate>0x9ddc796c,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
                Source: eZY2eXORIp.exe, 00000000.00000003.292440254.00000000036F0000.00000004.00000040.sdmpString found in binary or memory: http://%s=%s&file://&os=%u.%u_%u_%u_x%uindex.html;
                Source: eZY2eXORIp.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                Source: eZY2eXORIp.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                Source: eZY2eXORIp.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                Source: eZY2eXORIp.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                Source: eZY2eXORIp.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
                Source: eZY2eXORIp.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                Source: eZY2eXORIp.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                Source: eZY2eXORIp.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                Source: eZY2eXORIp.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                Source: eZY2eXORIp.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
                Source: eZY2eXORIp.exeString found in binary or memory: http://ocsp.comodoca.com0
                Source: eZY2eXORIp.exeString found in binary or memory: http://ocsp.digicert.com0C
                Source: eZY2eXORIp.exeString found in binary or memory: http://ocsp.digicert.com0O
                Source: eZY2eXORIp.exeString found in binary or memory: http://ocsp.sectigo.com0
                Source: msapplication.xml.14.drString found in binary or memory: http://www.amazon.com/
                Source: eZY2eXORIp.exeString found in binary or memory: http://www.digicert.com/CPS0
                Source: msapplication.xml1.14.drString found in binary or memory: http://www.google.com/
                Source: msapplication.xml2.14.drString found in binary or memory: http://www.live.com/
                Source: msapplication.xml3.14.drString found in binary or memory: http://www.nytimes.com/
                Source: msapplication.xml4.14.drString found in binary or memory: http://www.reddit.com/
                Source: msapplication.xml5.14.drString found in binary or memory: http://www.twitter.com/
                Source: msapplication.xml6.14.drString found in binary or memory: http://www.wikipedia.com/
                Source: msapplication.xml7.14.drString found in binary or memory: http://www.youtube.com/
                Source: eZY2eXORIp.exe, eZY2eXORIp.exe, 00000000.00000002.510872632.00000000006B8000.00000004.00000020.sdmpString found in binary or memory: https://haverit.xyz
                Source: eZY2eXORIp.exe, 00000000.00000002.510961640.00000000006FE000.00000004.00000001.sdmpString found in binary or memory: https://haverit.xyz/
                Source: eZY2eXORIp.exe, 00000000.00000002.510872632.00000000006B8000.00000004.00000020.sdmp, eZY2eXORIp.exe, 00000000.00000003.493318612.00000000006FC000.00000004.00000001.sdmp, ~DF19831833E1675488.TMP.26.drString found in binary or memory: https://haverit.xyz/index.htm
                Source: eZY2eXORIp.exe, 00000000.00000002.510872632.00000000006B8000.00000004.00000020.sdmpString found in binary or memory: https://haverit.xyz/index.htm5
                Source: {EE1A57EC-1243-11EC-90E5-ECF4BB570DC9}.dat.26.drString found in binary or memory: https://haverit.xyz/index.htmRoot
                Source: eZY2eXORIp.exe, 00000000.00000002.510872632.00000000006B8000.00000004.00000020.sdmpString found in binary or memory: https://haverit.xyz/index.htmbY
                Source: {EE1A57EC-1243-11EC-90E5-ECF4BB570DC9}.dat.26.drString found in binary or memory: https://haverit.xyz/index.htmdex.htm
                Source: eZY2eXORIp.exeString found in binary or memory: https://sectigo.com/CPS0
                Source: eZY2eXORIp.exeString found in binary or memory: https://www.digicert.com/CPS0
                Source: unknownDNS traffic detected: queries for: haverit.xyz

                Key, Mouse, Clipboard, Microphone and Screen Capturing:

                barindex
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 0.3.eZY2eXORIp.exe.619d7c.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.eZY2eXORIp.exe.1000000.0.unpack, type: UNPACKEDPE
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 00000000.00000003.292866191.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291929905.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292913639.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291547643.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291632853.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291835576.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292487674.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292971089.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292333881.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292136155.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291360640.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.512177753.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292440254.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291279386.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291701567.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292984133.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292892828.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292791301.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292276017.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292076935.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292753214.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292948084.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292386062.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291458965.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291769273.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292670276.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291996066.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292712718.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292211990.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292930955.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292554837.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292619377.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292820042.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: eZY2eXORIp.exe PID: 4304, type: MEMORYSTR
                Source: eZY2eXORIp.exe, 00000000.00000002.510804819.000000000068A000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                E-Banking Fraud:

                barindex
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 0.3.eZY2eXORIp.exe.619d7c.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.eZY2eXORIp.exe.1000000.0.unpack, type: UNPACKEDPE
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 00000000.00000003.292866191.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291929905.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292913639.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291547643.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291632853.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291835576.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292487674.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292971089.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292333881.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292136155.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291360640.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.512177753.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292440254.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291279386.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291701567.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292984133.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292892828.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292791301.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292276017.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292076935.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292753214.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292948084.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292386062.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291458965.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291769273.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292670276.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291996066.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292712718.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292211990.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292930955.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292554837.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292619377.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292820042.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: eZY2eXORIp.exe PID: 4304, type: MEMORYSTR

                System Summary:

                barindex
                Writes or reads registry keys via WMIShow sources
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetDWORDValue
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                Writes registry values via WMIShow sources
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                Source: eZY2eXORIp.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                Source: eZY2eXORIp.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: eZY2eXORIp.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: eZY2eXORIp.exeStatic PE information: invalid certificate
                Source: eZY2eXORIp.exeReversingLabs: Detection: 24%
                Source: eZY2eXORIp.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\eZY2eXORIp.exe 'C:\Users\user\Desktop\eZY2eXORIp.exe'
                Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6212 CREDAT:17410 /prefetch:2
                Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6496 CREDAT:17410 /prefetch:2
                Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6212 CREDAT:17410 /prefetch:2Jump to behavior
                Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6496 CREDAT:17410 /prefetch:2Jump to behavior
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{674B6698-EE92-11D0-AD71-00C04FD8FDFF}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeMutant created: \Sessions\1\BaseNamedObjects\Local\1978EE24-ED7A-8F95-C655-46BAE5CC03A0
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : select * from win32_process
                Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{C85B3E60-1243-11EC-90E5-ECF4BB570DC9}.datJump to behavior
                Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DF56A785732A2B1070.TMPJump to behavior
                Source: classification engineClassification label: mal88.troj.evad.winEXE@7/29@8/1
                Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
                Source: eZY2eXORIp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: eZY2eXORIp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: eZY2eXORIp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: eZY2eXORIp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: eZY2eXORIp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: eZY2eXORIp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: eZY2eXORIp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: c:\Muchwin\WorkWhich\centstring\shinegray\WanthumanMarket.pdb source: eZY2eXORIp.exe
                Source: eZY2eXORIp.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: eZY2eXORIp.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: eZY2eXORIp.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: eZY2eXORIp.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: eZY2eXORIp.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                Data Obfuscation:

                barindex
                Detected unpacking (changes PE section rights)Show sources
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeUnpacked PE file: 0.2.eZY2eXORIp.exe.1000000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.bss:W;.reloc:R;
                Source: eZY2eXORIp.exeStatic PE information: real checksum: 0xe0d1f should be: 0xe96d5
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeCode function: 0_3_036F198A push ds; retf 0_3_036F1991
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeCode function: 0_3_036F198A push ds; retf 0_3_036F1991
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeCode function: 0_3_036F198A push ds; retf 0_3_036F1991
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeCode function: 0_3_036F198A push ds; retf 0_3_036F1991
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeCode function: 0_3_036F198A push ds; retf 0_3_036F1991
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeCode function: 0_3_036F198A push ds; retf 0_3_036F1991
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeCode function: 0_3_036F198A push ds; retf 0_3_036F1991
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeCode function: 0_3_036F198A push ds; retf 0_3_036F1991
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeCode function: 0_3_036F198A push ds; retf 0_3_036F1991
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeCode function: 0_3_036F198A push ds; retf 0_3_036F1991
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeCode function: 0_3_036F198A push ds; retf 0_3_036F1991
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeCode function: 0_3_036F198A push ds; retf 0_3_036F1991
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeCode function: 0_3_036F198A push ds; retf 0_3_036F1991
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeCode function: 0_3_036F198A push ds; retf 0_3_036F1991
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeCode function: 0_3_036F198A push ds; retf 0_3_036F1991
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeCode function: 0_3_036F198A push ds; retf 0_3_036F1991
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeCode function: 0_3_036F198A push ds; retf 0_3_036F1991
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeCode function: 0_3_036F198A push ds; retf 0_3_036F1991
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeCode function: 0_3_036F198A push ds; retf 0_3_036F1991
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeCode function: 0_3_036F198A push ds; retf 0_3_036F1991
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeCode function: 0_3_036F198A push ds; retf 0_3_036F1991
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeCode function: 0_3_036F198A push ds; retf 0_3_036F1991
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeCode function: 0_3_036F198A push ds; retf 0_3_036F1991
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeCode function: 0_3_036F198A push ds; retf 0_3_036F1991
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeCode function: 0_3_036F198A push ds; retf 0_3_036F1991
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeCode function: 0_3_036F198A push ds; retf 0_3_036F1991
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeCode function: 0_3_036F198A push ds; retf 0_3_036F1991
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeCode function: 0_3_036F198A push ds; retf 0_3_036F1991
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeCode function: 0_3_036F198A push ds; retf 0_3_036F1991
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeCode function: 0_3_036F198A push ds; retf 0_3_036F1991
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeCode function: 0_3_036F198A push ds; retf 0_3_036F1991
                Source: initial sampleStatic PE information: section name: .text entropy: 6.85142500946

                Hooking and other Techniques for Hiding and Protection:

                barindex
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 0.3.eZY2eXORIp.exe.619d7c.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.eZY2eXORIp.exe.1000000.0.unpack, type: UNPACKEDPE
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 00000000.00000003.292866191.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291929905.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292913639.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291547643.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291632853.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291835576.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292487674.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292971089.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292333881.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292136155.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291360640.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.512177753.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292440254.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291279386.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291701567.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292984133.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292892828.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292791301.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292276017.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292076935.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292753214.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292948084.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292386062.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291458965.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291769273.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292670276.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291996066.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292712718.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292211990.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292930955.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292554837.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292619377.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292820042.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: eZY2eXORIp.exe PID: 4304, type: MEMORYSTR
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                Source: C:\Users\user\Desktop\eZY2eXORIp.exe TID: 6528Thread sleep time: -60000s >= -30000sJump to behavior
                Source: eZY2eXORIp.exe, 00000000.00000003.493460895.00000000006EA000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllxx
                Source: eZY2eXORIp.exe, 00000000.00000002.512016519.0000000001100000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                Source: eZY2eXORIp.exe, 00000000.00000002.512016519.0000000001100000.00000002.00020000.sdmpBinary or memory string: Progman
                Source: eZY2eXORIp.exe, 00000000.00000002.512016519.0000000001100000.00000002.00020000.sdmpBinary or memory string: SProgram Managerl
                Source: eZY2eXORIp.exe, 00000000.00000002.512016519.0000000001100000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd,
                Source: eZY2eXORIp.exe, 00000000.00000002.512016519.0000000001100000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: C:\Users\user\Desktop\eZY2eXORIp.exeWMI Queries: IWbemServices::ExecQuery - root\securitycenter2 : select * from antispywareproduct

                Stealing of Sensitive Information:

                barindex
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 0.3.eZY2eXORIp.exe.619d7c.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.eZY2eXORIp.exe.1000000.0.unpack, type: UNPACKEDPE
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 00000000.00000003.292866191.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291929905.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292913639.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291547643.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291632853.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291835576.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292487674.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292971089.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292333881.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292136155.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291360640.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.512177753.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292440254.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291279386.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291701567.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292984133.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292892828.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292791301.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292276017.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292076935.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292753214.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292948084.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292386062.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291458965.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291769273.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292670276.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291996066.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292712718.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292211990.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292930955.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292554837.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292619377.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292820042.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: eZY2eXORIp.exe PID: 4304, type: MEMORYSTR

                Remote Access Functionality:

                barindex
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 0.3.eZY2eXORIp.exe.619d7c.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.eZY2eXORIp.exe.1000000.0.unpack, type: UNPACKEDPE
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 00000000.00000003.292866191.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291929905.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292913639.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291547643.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291632853.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291835576.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292487674.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292971089.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292333881.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292136155.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291360640.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.512177753.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292440254.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291279386.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291701567.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292984133.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292892828.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292791301.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292276017.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292076935.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292753214.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292948084.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292386062.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291458965.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291769273.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292670276.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.291996066.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292712718.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292211990.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292930955.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292554837.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292619377.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.292820042.00000000036F0000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: eZY2eXORIp.exe PID: 4304, type: MEMORYSTR

                Mitre Att&ck Matrix

                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid AccountsWindows Management Instrumentation211Path InterceptionProcess Injection2Masquerading1Input Capture1Query Registry1Remote ServicesInput Capture1Exfiltration Over Other Network MediumNon-Application Layer Protocol1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion1LSASS MemorySecurity Software Discovery11Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection2Security Account ManagerVirtualization/Sandbox Evasion1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information2NTDSProcess Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing12LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery3Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

                Behavior Graph

                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 481002 Sample: eZY2eXORIp Startdate: 10/09/2021 Architecture: WINDOWS Score: 88 27 Multi AV Scanner detection for submitted file 2->27 29 Yara detected Ursnif 2->29 31 Yara detected  Ursnif 2->31 33 2 other signatures 2->33 6 eZY2eXORIp.exe 2->6         started        10 iexplore.exe 1 50 2->10         started        12 iexplore.exe 1 73 2->12         started        process3 dnsIp4 19 haverit.xyz 6->19 35 Detected unpacking (changes PE section rights) 6->35 37 Performs DNS queries to domains with low reputation 6->37 39 Writes or reads registry keys via WMI 6->39 41 Writes registry values via WMI 6->41 14 iexplore.exe 30 10->14         started        17 iexplore.exe 29 12->17         started        signatures5 process6 dnsIp7 21 haverit.xyz 14->21 23 192.168.2.1 unknown unknown 14->23 25 haverit.xyz 17->25

                Screenshots

                Thumbnails

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                windows-stand

                Antivirus, Machine Learning and Genetic Malware Detection

                Initial Sample

                SourceDetectionScannerLabelLink
                eZY2eXORIp.exe24%ReversingLabsWin32.Infostealer.Gozi
                eZY2eXORIp.exe100%Joe Sandbox ML

                Dropped Files

                No Antivirus matches

                Unpacked PE Files

                SourceDetectionScannerLabelLinkDownload
                0.2.eZY2eXORIp.exe.1000000.0.unpack100%AviraTR/Crypt.XPACK.Gen7Download File
                0.3.eZY2eXORIp.exe.619d7c.0.unpack100%AviraTR/Patched.Ren.GenDownload File

                Domains

                No Antivirus matches

                URLs

                SourceDetectionScannerLabelLink
                https://haverit.xyz/index.htm0%Avira URL Cloudsafe
                https://haverit.xyz/index.htmbY0%Avira URL Cloudsafe
                https://sectigo.com/CPS00%URL Reputationsafe
                http://ocsp.sectigo.com00%URL Reputationsafe
                https://haverit.xyz/index.htmdex.htm0%Avira URL Cloudsafe
                http://%s=%s&file://&os=%u.%u_%u_%u_x%uindex.html;0%Avira URL Cloudsafe
                https://haverit.xyz/0%Avira URL Cloudsafe
                http://www.wikipedia.com/0%URL Reputationsafe
                https://haverit.xyz0%Avira URL Cloudsafe
                http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
                https://haverit.xyz/index.htm50%Avira URL Cloudsafe
                http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%URL Reputationsafe
                https://haverit.xyz/index.htmRoot0%Avira URL Cloudsafe

                Domains and IPs

                Contacted Domains

                NameIPActiveMaliciousAntivirus DetectionReputation
                haverit.xyz
                unknown
                unknowntrue
                  unknown

                  URLs from Memory and Binaries

                  NameSourceMaliciousAntivirus DetectionReputation
                  https://haverit.xyz/index.htmeZY2eXORIp.exe, 00000000.00000002.510872632.00000000006B8000.00000004.00000020.sdmp, eZY2eXORIp.exe, 00000000.00000003.493318612.00000000006FC000.00000004.00000001.sdmp, ~DF19831833E1675488.TMP.26.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.nytimes.com/msapplication.xml3.14.drfalse
                    high
                    https://haverit.xyz/index.htmbYeZY2eXORIp.exe, 00000000.00000002.510872632.00000000006B8000.00000004.00000020.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://sectigo.com/CPS0eZY2eXORIp.exefalse
                    • URL Reputation: safe
                    unknown
                    http://ocsp.sectigo.com0eZY2eXORIp.exefalse
                    • URL Reputation: safe
                    unknown
                    https://haverit.xyz/index.htmdex.htm{EE1A57EC-1243-11EC-90E5-ECF4BB570DC9}.dat.26.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://%s=%s&file://&os=%u.%u_%u_%u_x%uindex.html;eZY2eXORIp.exe, 00000000.00000003.292440254.00000000036F0000.00000004.00000040.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    https://haverit.xyz/eZY2eXORIp.exe, 00000000.00000002.510961640.00000000006FE000.00000004.00000001.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.youtube.com/msapplication.xml7.14.drfalse
                      high
                      http://www.wikipedia.com/msapplication.xml6.14.drfalse
                      • URL Reputation: safe
                      unknown
                      http://www.amazon.com/msapplication.xml.14.drfalse
                        high
                        https://haverit.xyzeZY2eXORIp.exe, eZY2eXORIp.exe, 00000000.00000002.510872632.00000000006B8000.00000004.00000020.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0seZY2eXORIp.exefalse
                        • URL Reputation: safe
                        unknown
                        http://www.live.com/msapplication.xml2.14.drfalse
                          high
                          https://haverit.xyz/index.htm5eZY2eXORIp.exe, 00000000.00000002.510872632.00000000006B8000.00000004.00000020.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#eZY2eXORIp.exefalse
                          • URL Reputation: safe
                          unknown
                          http://www.reddit.com/msapplication.xml4.14.drfalse
                            high
                            http://www.twitter.com/msapplication.xml5.14.drfalse
                              high
                              https://haverit.xyz/index.htmRoot{EE1A57EC-1243-11EC-90E5-ECF4BB570DC9}.dat.26.drfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.google.com/msapplication.xml1.14.drfalse
                                high

                                Contacted IPs

                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs

                                Public

                                IPDomainCountryFlagASNASN NameMalicious

                                Private

                                IP
                                192.168.2.1

                                General Information

                                Joe Sandbox Version:33.0.0 White Diamond
                                Analysis ID:481002
                                Start date:10.09.2021
                                Start time:07:29:58
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:0h 6m 35s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Sample file name:eZY2eXORIp (renamed file extension from none to exe)
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                Number of analysed new started processes analysed:29
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • HDC enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Detection:MAL
                                Classification:mal88.troj.evad.winEXE@7/29@8/1
                                EGA Information:Failed
                                HDC Information:Failed
                                HCA Information:
                                • Successful, ratio: 100%
                                • Number of executed functions: 0
                                • Number of non-executed functions: 0
                                Cookbook Comments:
                                • Adjust boot time
                                • Enable AMSI
                                Warnings:
                                Show All
                                • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, ielowutil.exe, UpdateNotificationMgr.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, WmiPrvSE.exe, svchost.exe
                                • Excluded IPs from analysis (whitelisted): 23.211.6.115, 23.211.4.86, 204.79.197.200, 13.107.21.200, 20.82.210.154, 23.203.80.193, 40.112.88.60, 152.199.19.161, 20.82.209.183, 80.67.82.211, 80.67.82.235, 20.49.150.241, 20.50.102.62
                                • Excluded domains from analysis (whitelisted): store-images.s-microsoft.com-c.edgekey.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, e11290.dspg.akamaiedge.net, iecvlist.microsoft.com, e12564.dspb.akamaiedge.net, go.microsoft.com, www-bing-com.dual-a-0001.a-msedge.net, arc.trafficmanager.net, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, www.bing.com, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, fs.microsoft.com, dual-a-0001.a-msedge.net, ie9comview.vo.msecnd.net, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, settings-win.data.microsoft.com, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, settingsfd-geo.trafficmanager.net, ris.api.iris.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, go.microsoft.com.edgekey.net, cs9.wpc.v0cdn.net
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                • VT rate limit hit for: /opt/package/joesandbox/database/analysis/481002/sample/eZY2eXORIp.exe

                                Simulations

                                Behavior and APIs

                                TimeTypeDescription
                                07:31:41API Interceptor2x Sleep call for process: eZY2eXORIp.exe modified

                                Joe Sandbox View / Context

                                IPs

                                No context

                                Domains

                                No context

                                ASN

                                No context

                                JA3 Fingerprints

                                No context

                                Dropped Files

                                No context

                                Created / dropped Files

                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{C85B3E60-1243-11EC-90E5-ECF4BB570DC9}.dat
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:Microsoft Word Document
                                Category:dropped
                                Size (bytes):29272
                                Entropy (8bit):1.7692342563186865
                                Encrypted:false
                                SSDEEP:192:rvZ0ZJ2PW7ti2UfUz2D2BMS2b2i2sG2j2HA2I2XB:rREY+5i7a8rS09qIqAzS
                                MD5:16CD853F9BB3249F875F53A335567F31
                                SHA1:D115EFBF633C11D90E322E49C1E4DA2404262A14
                                SHA-256:CFB9A5347535B85CD396624DE4FAAA0C14CE18790FEA2424B1564D62029D6662
                                SHA-512:E910A4A390FB8EE30FBA7E4E1BC493C20400FAD693C698D1EF0D6E7BC09199E32F369B24D699783FB5CB011AF893C67A2295BC9942F4662AA0F3F5A24557E433
                                Malicious:false
                                Reputation:low
                                Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{EE1A57EA-1243-11EC-90E5-ECF4BB570DC9}.dat
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:Microsoft Word Document
                                Category:dropped
                                Size (bytes):29272
                                Entropy (8bit):1.7661571500338409
                                Encrypted:false
                                SSDEEP:96:rhZGZ52xWlt1lbf+Ol7lKMelzl5lz4lXlqglOlMB:rhZGZ52xWltDf+dMMVqB
                                MD5:99719235CEDF51DC9A9C5AA25735B6E2
                                SHA1:4E31EF8B1B8B86274058D147AF8F147BA1387C60
                                SHA-256:05FEA6CBCF8DA678CB98BF3BD46CCCD0CD48F580B584474FC9C1F3E27601AB9B
                                SHA-512:482D26EF07C381BC09EFBA28A820CCC7D252AB8181625BE633580E73DE60244E81C1AD7E3CE2A96709F92FAA0165A958DB49CC491A545E87B9C59956271A8BA9
                                Malicious:false
                                Reputation:low
                                Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{C85B3E62-1243-11EC-90E5-ECF4BB570DC9}.dat
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:Microsoft Word Document
                                Category:dropped
                                Size (bytes):26240
                                Entropy (8bit):1.6590556677730706
                                Encrypted:false
                                SSDEEP:48:IwTGcprqGwpaGG4pQqGrapbS5GQpBaGHHpcrTGUp86GzYpmVMGopODyDUGqXpHD7:rpZyQ26cBSTjh2FWGMGkHVcA
                                MD5:EA394C009BBBC9CC790E38E10A83BFE8
                                SHA1:8B329694FA126C14F77F7C68210CBC3E995015C0
                                SHA-256:90C10C459E1D92509AE08173CACFF44499CEEBAE68C532DFA64EA27EF7AEF684
                                SHA-512:FD1DB3CBE22AD2B28742D1F098E8BE706047A7FB16600035A1506C5409A5E726F63F4F057B3A05C6C62F6D41CB7A8A406A4CDA1172311E98019408B72946530C
                                Malicious:false
                                Reputation:low
                                Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{EE1A57EC-1243-11EC-90E5-ECF4BB570DC9}.dat
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:Microsoft Word Document
                                Category:dropped
                                Size (bytes):26240
                                Entropy (8bit):1.6565063731609562
                                Encrypted:false
                                SSDEEP:48:IwVGcprcGwpakG4pQoGrapbSfGQpBVoGHHpcVBTGUp8VlGzYpmVusGopOHuyD6G8:rLZUQU62BSJjJ2dW1MVk+VQA
                                MD5:1E58A29DA2A4312A45FAA2D01D76109C
                                SHA1:5832CBC2AE5EB8B7990BE7BA0F82F114A5897472
                                SHA-256:050DFEC32863013B4BE9ACA2F03EC57DC469677F21CF1FC33091526027386504
                                SHA-512:13F6CA1D5E81249048D4131F2BBC0F7B1C9A03A6DFBF595714C12839238C453A9A0EAD5966F7B90E60CBF8EB91DEA328D1C2724EA15A798D05F8B4330E1BE9EA
                                Malicious:false
                                Reputation:low
                                Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-17529550060\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):657
                                Entropy (8bit):5.08614049275016
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxOEK+s+dnWimI002EtM3MHdNMNxOEK+KmAnWimI00ONVbkEtMb:2d6NxOWSZHKd6NxOzSZ7Qb
                                MD5:34756FBFB616052EC6728614A787918B
                                SHA1:5151C45AE09324408EDE60365EABE94749BD01BC
                                SHA-256:839EE47E1B844F3FF0027D0C5A60AFBD466F991DABAFE0782C7EC336C090D93F
                                SHA-512:9E0B508AB07B9D0A94A358FB8DE931552859F17FCC86FD1579635B134D986FE71230257BE3601D070D67E95F8AD54BD95470709CCCE45A355F12EE1B78186EDE
                                Malicious:false
                                Reputation:low
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x9dd5514f,0x01d7a650</date><accdate>0x9dd5514f,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x9dd5514f,0x01d7a650</date><accdate>0x9ddc796c,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18270793970\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):654
                                Entropy (8bit):5.0881480293534045
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxe2ktmunWimI002EtM3MHdNMNxe2ktmunWimI00ONkak6EtMb:2d6Nxr0SZHKd6Nxr0SZ72a7b
                                MD5:52C87AEF474954562016604D3BCF8638
                                SHA1:95C0FBEE7D2F1E2804646F0418DE07E6B475B808
                                SHA-256:E89060CD8CC7DBB7AE52F8F0BBDC8F9BA58AB4B5EAD36BA1BD9B1E3B35E75707
                                SHA-512:023F61FFF5C7CDE20BCA93714BC4B6F2D945B038C58A9A68088A5EB4F24F2B4CF52A2B33262A7061CD61C600449684CCCFE217C66A8B4B139D34E0FD4ADAAAF5
                                Malicious:false
                                Reputation:low
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0x9dce2b00,0x01d7a650</date><accdate>0x9dce2b00,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0x9dce2b00,0x01d7a650</date><accdate>0x9dce2b00,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Amazon.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-21706820\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):663
                                Entropy (8bit):5.082030103454813
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxvLwmzmAnWimI002EtM3MHdNMNxvLwmzmAnWimI00ONmZEtMb:2d6NxvpSZHKd6NxvpSZ7Ub
                                MD5:BD66403AD12711352BAF9B7E619D6F44
                                SHA1:5D06C2CC75CEC70F055C7CD069273F64D310C121
                                SHA-256:045E4D04E14F146D75431798A6CDBCDFABF145724A184D037BB022615433F80A
                                SHA-512:7F91F4311A275EC1B3604BB14D5F37A1D95715F9986BDD9C2BFD1EBD3ED2CCEA509BF2C654D591BC8D1BC1E2D5E2E2F04D0C58CD5BC6F889939912228AF095C5
                                Malicious:false
                                Reputation:low
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0x9ddc796c,0x01d7a650</date><accdate>0x9ddc796c,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0x9ddc796c,0x01d7a650</date><accdate>0x9ddc796c,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Wikipedia.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):648
                                Entropy (8bit):5.100814711754593
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxiK+s+dnWimI002EtM3MHdNMNxiK+s+dnWimI00ONd5EtMb:2d6NxkSZHKd6NxkSZ7njb
                                MD5:0F1E1D8C383951C79E47569FAF4EC0E4
                                SHA1:B72BC35E51AE847B16564006D32E6E269391E91F
                                SHA-256:E2954BDAEE454071AC25195591DB7E7E7C57DFA55B27C2B2A9ADEB7860A63376
                                SHA-512:D4A4056AAE5302068A0906AC83265B540314879E8AAA74497A60BB6D2E491B4DF640406BA15B32362A4AB90E2EE0FEB130694BB62BDC90EBE3EA0F34E2673429
                                Malicious:false
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0x9dd5514f,0x01d7a650</date><accdate>0x9dd5514f,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0x9dd5514f,0x01d7a650</date><accdate>0x9dd5514f,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Live.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6757900\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):657
                                Entropy (8bit):5.0992603151535
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxhGwwmzmAnWimI002EtM3MHdNMNxhGwwmzmAnWimI00ON8K075EtMb:2d6NxQ0SZHKd6NxQ0SZ7uKajb
                                MD5:9968E6700B7904FCBFB23C871E4BEE10
                                SHA1:A2EBEA3AE938FAF06F763F6BE9A651C0B976D20B
                                SHA-256:E0BDDC0AA5F5BA47D5FC23E6A55305DC797A49BB95F157EA73C7B07DA3A7AFA1
                                SHA-512:612E86AD9BC7C68E7FA0C6D78191284BA28CD6798233D7BF64FC5B20ED50F75EF49A112E5EF2458B5D3FC3EC397EE019BCB1C698EFC0EDAE50FBD4CA87E54B2D
                                Malicious:false
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x9ddc796c,0x01d7a650</date><accdate>0x9ddc796c,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x9ddc796c,0x01d7a650</date><accdate>0x9ddc796c,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8760897390\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):654
                                Entropy (8bit):5.084791526606633
                                Encrypted:false
                                SSDEEP:12:TMHdNMNx0nK+s+dnWimI002EtM3MHdNMNx0nK+s+dnWimI00ONxEtMb:2d6Nx0bSZHKd6Nx0bSZ7Vb
                                MD5:31CB5C8E49BAA4545A5BCD0E5E463D4D
                                SHA1:166449210D1AF8650186826B1F7B3624B8101CE0
                                SHA-256:49E36B69A92F9449E46C58A7C570B9B6343BDA39D3D53EADC0D21AF70C337A61
                                SHA-512:CE6D8F46CF8ACF6DD98C77A53E700C70860DF2C02DDCF819B5914C336E8FE8B3B15824DF51B10F6F3CFB4984EEB2CC26234CB089ACAC7BB7133C00DA6F267FAA
                                Malicious:false
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0x9dd5514f,0x01d7a650</date><accdate>0x9dd5514f,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0x9dd5514f,0x01d7a650</date><accdate>0x9dd5514f,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Reddit.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):657
                                Entropy (8bit):5.1253366591316
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxxK+s+dnWimI002EtM3MHdNMNxxK+s+dnWimI00ON6Kq5EtMb:2d6Nx9SZHKd6Nx9SZ7ub
                                MD5:52CACA505A5304CDC4397F0392FDE8E4
                                SHA1:7A283C504427E8B1FD1CC4C33D72969D88DC25E8
                                SHA-256:93CE589238591676F5DDBE5628EFD813B23F018531189CEA37A0F48635F1BEF1
                                SHA-512:CE76C228922971D96466DC9CB2C68697D4F06EFFE83246D82F94A37606C572A52C3F1975AA33FAFF1AC79CD6C5D6BDBC5D15E95C2253D3D8A30CBFA3AB66C67A
                                Malicious:false
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0x9dd5514f,0x01d7a650</date><accdate>0x9dd5514f,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0x9dd5514f,0x01d7a650</date><accdate>0x9dd5514f,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\NYTimes.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20332743330\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):660
                                Entropy (8bit):5.091895200007159
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxctmunWimI002EtM3MHdNMNxcth+dnWimI00ONVEtMb:2d6Nx8SZHKd6NxHSZ71b
                                MD5:F1281256632B3ABD2112C73168771C89
                                SHA1:D9430226A200D26C89CE36E60C8CF285297621D1
                                SHA-256:A414D92A5275F39C7ABAB80734ACC20C69866A05018FF82F50EB0720587ABECB
                                SHA-512:EA8C6356CFAA819075E4C8CB3239AE499752ECF909AC7663C9E7A55E59A0D5D70F965BBB5236845489DBFE573CD78B6F6B7A4DDCA49910165A43EE49C0F3FC5C
                                Malicious:false
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x9dce2b00,0x01d7a650</date><accdate>0x9dce2b00,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x9dce2b00,0x01d7a650</date><accdate>0x9dd5514f,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin8215062560\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):654
                                Entropy (8bit):5.086169033586517
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxfnK+s+dnWimI002EtM3MHdNMNxfnK+s+dnWimI00ONe5EtMb:2d6NxDSZHKd6NxDSZ7Ejb
                                MD5:25B8E3BC59B372252DA0B6F517029B9B
                                SHA1:1096690AF1D515AEE77C3263F6F4366977D8FA26
                                SHA-256:26A070A41FFAC86B1DE2210F2C05B49B9E8CDDEE6BC4D1030E773CE2C26165B0
                                SHA-512:95E2D93B31692DD2A2E3164DA9321C73E72ED767E7CFD0E6AACBE48D55F68F6BDA3126281483A7376A42A1158109ED032E7E94E34ADD50B7FBFF160E268A5B00
                                Malicious:false
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0x9dd5514f,0x01d7a650</date><accdate>0x9dd5514f,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0x9dd5514f,0x01d7a650</date><accdate>0x9dd5514f,0x01d7a650</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Google.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4PB7FJMT\dnserror[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):2997
                                Entropy (8bit):4.4885437940628465
                                Encrypted:false
                                SSDEEP:48:u7u5V4VyhhV2lFUW29vj0RkpNc7KpAP8Rra:vIlJ6G7Ao8Ra
                                MD5:2DC61EB461DA1436F5D22BCE51425660
                                SHA1:E1B79BCAB0F073868079D807FAEC669596DC46C1
                                SHA-256:ACDEB4966289B6CE46ECC879531F85E9C6F94B718AAB521D38E2E00F7F7F7993
                                SHA-512:A88BECB4FBDDC5AFC55E4DC0135AF714A3EEC4A63810AE5A989F2CECB824A686165D3CEDB8CBD8F35C7E5B9F4136C29DEA32736AABB451FE8088B978B493AC6D
                                Malicious:false
                                Preview: .<!DOCTYPE HTML>..<html>.. <head>.. <link rel="stylesheet" type="text/css" href="NewErrorPageTemplate.css" >.. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.. <title>Can&rsquo;t reach this page</title>.. <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="getInfo(); initMoreInfo('infoBlockID');">.. <div id="contentContainer" class="mainContent">.. <div id="mainTitle" class="title">Can&rsquo;t reach this page</div>.. <div class="taskSection" id="taskSection">.. <ul id="cantDisplayTasks" class="tasks">.. <li id="task1-1">Make sure the web address <span id="webpage" class="webpageURL"></span>is correct</li>.. <li id="task1-2">Search for this site on Bing</li>..
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4PB7FJMT\errorPageStrings[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):4720
                                Entropy (8bit):5.164796203267696
                                Encrypted:false
                                SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
                                MD5:D65EC06F21C379C87040B83CC1ABAC6B
                                SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
                                SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
                                SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
                                Malicious:false
                                Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4PB7FJMT\httpErrorPagesScripts[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):12105
                                Entropy (8bit):5.451485481468043
                                Encrypted:false
                                SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
                                MD5:9234071287E637F85D721463C488704C
                                SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
                                SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
                                SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
                                Malicious:false
                                Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NUEPGTR9\down[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
                                Category:dropped
                                Size (bytes):748
                                Entropy (8bit):7.249606135668305
                                Encrypted:false
                                SSDEEP:12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
                                MD5:C4F558C4C8B56858F15C09037CD6625A
                                SHA1:EE497CC061D6A7A59BB66DEFEA65F9A8145BA240
                                SHA-256:39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781
                                SHA-512:D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44
                                Malicious:false
                                Preview: .PNG........IHDR...............ex....PLTE....W..W..W..W..W..W..W..W..W..W..W..W..W.U..............W..W.!Y.#Z.$\.'].<r.=s.P..Q..Q..U..o..p..r..x..z..~.............................................b.............................................................................................................................................................................................................$..s...7tRNS.a.o(,.s....e......q*...................................F.Z....IDATx^%.S..@.C..jm.mTk...m.?|;.y..S....F.t...,.......D.>..LpX=f.M...H4........=...=..xy.[h..7....7.....<.q.kH....#+....I..z.....'.ksC...X<.+..J>....%3BmqaV...h..Z._.:<.Y_jG...vN^.<>.Nu.u@.....M....?...1D.m~)s8..&....IEND.B`.
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NUEPGTR9\httpErrorPagesScripts[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):12105
                                Entropy (8bit):5.451485481468043
                                Encrypted:false
                                SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
                                MD5:9234071287E637F85D721463C488704C
                                SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
                                SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
                                SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
                                Malicious:false
                                Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\NewErrorPageTemplate[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1612
                                Entropy (8bit):4.869554560514657
                                Encrypted:false
                                SSDEEP:24:5Y0bQ573pHpACtUZtJD0lFBopZleqw87xTe4D8FaFJ/Doz9AtjJgbCzg:5m73jcJqQep89TEw7Uxkk
                                MD5:DFEABDE84792228093A5A270352395B6
                                SHA1:E41258C9576721025926326F76063C2305586F76
                                SHA-256:77B138AB5D0A90FF04648C26ADDD5E414CC178165E3B54A4CB3739DA0F58E075
                                SHA-512:E256F603E67335151BB709294749794E2E3085F4063C623461A0B3DECBCCA8E620807B707EC9BCBE36DCD7D639C55753DA0495BE85B4AE5FB6BFC52AB4B284FD
                                Malicious:false
                                Preview: .body..{.. background-repeat: repeat-x;.. background-color: white;.. font-family: "Segoe UI", "verdana", "arial";.. margin: 0em;.. color: #1f1f1f;..}.....mainContent..{.. margin-top:80px;.. width: 700px;.. margin-left: 120px;.. margin-right: 120px;..}.....title..{.. color: #54b0f7;.. font-size: 36px;.. font-weight: 300;.. line-height: 40px;.. margin-bottom: 24px;.. font-family: "Segoe UI", "verdana";.. position: relative;..}.....errorExplanation..{.. color: #000000;.. font-size: 12pt;.. font-family: "Segoe UI", "verdana", "arial";.. text-decoration: none;..}.....taskSection..{.. margin-top: 20px;.. margin-bottom: 28px;.. position: relative; ..}.....tasks..{.. color: #000000;.. font-family: "Segoe UI", "verdana";.. font-weight:200;.. font-size: 12pt;..}....li..{.. margin-top: 8px;..}.....diagnoseButton..{.. outline: none;.. font-size: 9pt;..}.....launchInternetOptionsButton..{.. outline: none;
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\NewErrorPageTemplate[2]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1612
                                Entropy (8bit):4.869554560514657
                                Encrypted:false
                                SSDEEP:24:5Y0bQ573pHpACtUZtJD0lFBopZleqw87xTe4D8FaFJ/Doz9AtjJgbCzg:5m73jcJqQep89TEw7Uxkk
                                MD5:DFEABDE84792228093A5A270352395B6
                                SHA1:E41258C9576721025926326F76063C2305586F76
                                SHA-256:77B138AB5D0A90FF04648C26ADDD5E414CC178165E3B54A4CB3739DA0F58E075
                                SHA-512:E256F603E67335151BB709294749794E2E3085F4063C623461A0B3DECBCCA8E620807B707EC9BCBE36DCD7D639C55753DA0495BE85B4AE5FB6BFC52AB4B284FD
                                Malicious:false
                                Preview: .body..{.. background-repeat: repeat-x;.. background-color: white;.. font-family: "Segoe UI", "verdana", "arial";.. margin: 0em;.. color: #1f1f1f;..}.....mainContent..{.. margin-top:80px;.. width: 700px;.. margin-left: 120px;.. margin-right: 120px;..}.....title..{.. color: #54b0f7;.. font-size: 36px;.. font-weight: 300;.. line-height: 40px;.. margin-bottom: 24px;.. font-family: "Segoe UI", "verdana";.. position: relative;..}.....errorExplanation..{.. color: #000000;.. font-size: 12pt;.. font-family: "Segoe UI", "verdana", "arial";.. text-decoration: none;..}.....taskSection..{.. margin-top: 20px;.. margin-bottom: 28px;.. position: relative; ..}.....tasks..{.. color: #000000;.. font-family: "Segoe UI", "verdana";.. font-weight:200;.. font-size: 12pt;..}....li..{.. margin-top: 8px;..}.....diagnoseButton..{.. outline: none;.. font-size: 9pt;..}.....launchInternetOptionsButton..{.. outline: none;
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\dnserror[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):2997
                                Entropy (8bit):4.4885437940628465
                                Encrypted:false
                                SSDEEP:48:u7u5V4VyhhV2lFUW29vj0RkpNc7KpAP8Rra:vIlJ6G7Ao8Ra
                                MD5:2DC61EB461DA1436F5D22BCE51425660
                                SHA1:E1B79BCAB0F073868079D807FAEC669596DC46C1
                                SHA-256:ACDEB4966289B6CE46ECC879531F85E9C6F94B718AAB521D38E2E00F7F7F7993
                                SHA-512:A88BECB4FBDDC5AFC55E4DC0135AF714A3EEC4A63810AE5A989F2CECB824A686165D3CEDB8CBD8F35C7E5B9F4136C29DEA32736AABB451FE8088B978B493AC6D
                                Malicious:false
                                Preview: .<!DOCTYPE HTML>..<html>.. <head>.. <link rel="stylesheet" type="text/css" href="NewErrorPageTemplate.css" >.. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.. <title>Can&rsquo;t reach this page</title>.. <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="getInfo(); initMoreInfo('infoBlockID');">.. <div id="contentContainer" class="mainContent">.. <div id="mainTitle" class="title">Can&rsquo;t reach this page</div>.. <div class="taskSection" id="taskSection">.. <ul id="cantDisplayTasks" class="tasks">.. <li id="task1-1">Make sure the web address <span id="webpage" class="webpageURL"></span>is correct</li>.. <li id="task1-2">Search for this site on Bing</li>..
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\down[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
                                Category:dropped
                                Size (bytes):748
                                Entropy (8bit):7.249606135668305
                                Encrypted:false
                                SSDEEP:12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
                                MD5:C4F558C4C8B56858F15C09037CD6625A
                                SHA1:EE497CC061D6A7A59BB66DEFEA65F9A8145BA240
                                SHA-256:39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781
                                SHA-512:D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44
                                Malicious:false
                                Preview: .PNG........IHDR...............ex....PLTE....W..W..W..W..W..W..W..W..W..W..W..W..W.U..............W..W.!Y.#Z.$\.'].<r.=s.P..Q..Q..U..o..p..r..x..z..~.............................................b.............................................................................................................................................................................................................$..s...7tRNS.a.o(,.s....e......q*...................................F.Z....IDATx^%.S..@.C..jm.mTk...m.?|;.y..S....F.t...,.......D.>..LpX=f.M...H4........=...=..xy.[h..7....7.....<.q.kH....#+....I..z.....'.ksC...X<.+..J>....%3BmqaV...h..Z._.:<.Y_jG...vN^.<>.Nu.u@.....M....?...1D.m~)s8..&....IEND.B`.
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\errorPageStrings[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):4720
                                Entropy (8bit):5.164796203267696
                                Encrypted:false
                                SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
                                MD5:D65EC06F21C379C87040B83CC1ABAC6B
                                SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
                                SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
                                SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
                                Malicious:false
                                Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
                                C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:modified
                                Size (bytes):89
                                Entropy (8bit):4.412554678800313
                                Encrypted:false
                                SSDEEP:3:oVXUpgoT7EmW8JOGXnEpgoTG7n:o9UpgOsqEpgOG7
                                MD5:CEB2B8FF511F0C77788AFF3088ADFE1F
                                SHA1:1389591A2412531726460B8767D67A44CDDB5CD6
                                SHA-256:0D1CDC957F25E1EFBBD2844FA9CE699EAA32F13D4502C2B3CDAFF185A6A2C79E
                                SHA-512:76222C70C82480A5DF5FAA26DF57129945A36152BDA71BAB1EE4812F295232D76D362134D8B766421AA9789CA7F5E9F27A21833A03A4FC80D781C72446C85DE4
                                Malicious:false
                                Preview: [2021/09/10 07:32:32.963] Latest deploy version: ..[2021/09/10 07:32:32.963] 11.211.2 ..
                                C:\Users\user\AppData\Local\Temp\~DF19831833E1675488.TMP
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):38737
                                Entropy (8bit):0.37196897512526256
                                Encrypted:false
                                SSDEEP:48:kBqoxKAuvScS+VfVBVjVKVuIVuwHuyDZHuyDbHuyDU:kBqoxKAuvScS+1bZILjP9+
                                MD5:5A9F2B4A95F9A59197B940FBAAC5D1E0
                                SHA1:A73703F015B1380789EEDE5BD78021B4F3F26DC6
                                SHA-256:E435D0D5483C2EACF3BCCF85BD58D8624145CAF43FE8360B3504EA70D440AF70
                                SHA-512:D69C4720F468667677433157A3A55D644FB2A0B5CF90A8EF596119A82219A37C71D03D57853F281607184BE5A3494B88C218A6E4F84DA0C45110298069023686
                                Malicious:false
                                Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Local\Temp\~DF56A785732A2B1070.TMP
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):12933
                                Entropy (8bit):0.410446729019332
                                Encrypted:false
                                SSDEEP:12:c9lCg5/9lCgeK9l26an9l26an9l8fR/9l8fR/9lTqZOEl:c9lLh9lLh9lIn9lIn9lo/9lo/9lWZv
                                MD5:A991FBD5C78689A3B6EEF1F3BD891747
                                SHA1:40045C81D7E89720A8721934AC83CF77F2AD4E9C
                                SHA-256:8F5821A9460E5BC3DF316160D43164A91D3CD0345514C3DC9FAEF8CFCD59DCE0
                                SHA-512:08B9DB5590863E8BB76FDBA3AE973898C51F3EA777977E5F88FE498B27BEF564340551F242DC72866B372702941B8B48909A03CACFADFE38E06611514ED349F2
                                Malicious:false
                                Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Local\Temp\~DF97D4377F1C48C61D.TMP
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):12933
                                Entropy (8bit):0.40747151996666525
                                Encrypted:false
                                SSDEEP:24:c9lLh9lLh9lIn9lIn9loZX9loZX9lWZO6/EJXgTB:kBqoI+gn/Ep8
                                MD5:55CDF5F71D65F87C6A5168D119A50178
                                SHA1:CE9CFF16DDB2F31B50875E7FE0C9657F08320ABB
                                SHA-256:746FE270A62FE896E010A41922B373EE26A83B878055E15AEC6C24369A2C9EF9
                                SHA-512:62C38EF692D3BC9E8BD00AF42AAB651BF2D0335B7C8CE0622C6A85A45C168A1C3E6A3F8AE48693DF0EF179A5CBE643DFE8E428F7A00F8F59D4C2D0C46916F424
                                Malicious:false
                                Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Local\Temp\~DFB0F1E322AEAF92F9.TMP
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):38737
                                Entropy (8bit):0.3712734317171775
                                Encrypted:false
                                SSDEEP:48:kBqoxKAuvScS+kCo5VIVwDyDZDyDbDyDU:kBqoxKAuvScS+kCo5i66gd
                                MD5:DEAF00B56502DE9648C9618E0FE0198C
                                SHA1:D875CCCC1618B6F15115EFC50D151D139A884F30
                                SHA-256:613D53715C76F4D2812D0DD7DB618F9D75D4FFA54B519C234034D7EB30CF3585
                                SHA-512:25B1FD42D55EF707BB58DAF52AC15982F751DEB805ED3AF265030537686E9159D7A5EB1D6849666A410E6C8572E5C74DF6ECC4CEB4FC1C92EC91AA757B8E705C
                                Malicious:false
                                Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                                Static File Info

                                General

                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Entropy (8bit):6.614325391488204
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:eZY2eXORIp.exe
                                File size:901960
                                MD5:8baf707c7afeb686ca13710762829052
                                SHA1:e4e5310572a5f15be59a84185d7bc999a47cef2f
                                SHA256:ad6d0f94a890ee4ef5b0a36ab1fa2845910d3b687ef7bc0c42f0dfc3e1952469
                                SHA512:a7e66d381dee8db04317cb70df7f7de03ab9381de8db7313d2613c478b345945c97ebc1bed94d167501b4bff7e005b9a6fdc1e2cda9c1c837d14b50fee1bf8e1
                                SSDEEP:24576:F9PsA9vHAYobFGQdRbylSk61LXXhBxvZLmtk1/GqgLGY:OYWJk61bRfZLmWGGY
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........]...3...3...3..X....3..X....3..X....3...2.}.3.......3..X....3.u.....3..X....3..X....3..X....3.Rich..3........................

                                File Icon

                                Icon Hash:f0b0e8e4e4e8b2dc

                                Static PE Info

                                General

                                Entrypoint:0x1005725
                                Entrypoint Section:.text
                                Digitally signed:true
                                Imagebase:0x1000000
                                Subsystem:windows gui
                                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                DLL Characteristics:TERMINAL_SERVER_AWARE, NX_COMPAT
                                Time Stamp:0x55E85856 [Thu Sep 3 14:25:26 2015 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:6
                                OS Version Minor:0
                                File Version Major:6
                                File Version Minor:0
                                Subsystem Version Major:6
                                Subsystem Version Minor:0
                                Import Hash:502eb1b3d0d5ed0f86c05ef6d3a41476

                                Authenticode Signature

                                Signature Valid:false
                                Signature Issuer:CN=Sectigo RSA Code Signing CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
                                Signature Validation Error:No signature was present in the subject
                                Error Number:-2146762496
                                Not Before, Not After
                                • 4/12/2021 5:00:00 PM 4/13/2022 4:59:59 PM
                                Subject Chain
                                • CN=FORTH PROPERTY LTD, O=FORTH PROPERTY LTD, L=Edinburgh, C=GB
                                Version:3
                                Thumbprint MD5:8AB6A86211EE700AA961C3292ADB312D
                                Thumbprint SHA-1:A533DFA7E6AED2A9FFBE41FCEC5A8927A6EAFBBB
                                Thumbprint SHA-256:9E0611728595A506CC2A55486FDD88ECA0971EF0B08F74CB3B3B6F5F6F3C7E27
                                Serial:239664C12BAEB5A6D787912888051392

                                Entrypoint Preview

                                Instruction
                                call 00007FEAF8BA4770h
                                jmp 00007FEAF8B9D685h
                                push 00000014h
                                push 0108A9F8h
                                call 00007FEAF8BA265Ah
                                call 00007FEAF8B9DE5Bh
                                movzx esi, ax
                                push 00000002h
                                call 00007FEAF8BA4703h
                                pop ecx
                                mov eax, 00005A4Dh
                                cmp word ptr [01000000h], ax
                                je 00007FEAF8B9D686h
                                xor ebx, ebx
                                jmp 00007FEAF8B9D6B5h
                                mov eax, dword ptr [0100003Ch]
                                cmp dword ptr [eax+01000000h], 00004550h
                                jne 00007FEAF8B9D66Dh
                                mov ecx, 0000010Bh
                                cmp word ptr [eax+01000018h], cx
                                jne 00007FEAF8B9D65Fh
                                xor ebx, ebx
                                cmp dword ptr [eax+01000074h], 0Eh
                                jbe 00007FEAF8B9D68Bh
                                cmp dword ptr [eax+010000E8h], ebx
                                setne bl
                                mov dword ptr [ebp-1Ch], ebx
                                call 00007FEAF8BA25ADh
                                test eax, eax
                                jne 00007FEAF8B9D68Ah
                                push 0000001Ch
                                call 00007FEAF8B9D7A7h
                                pop ecx
                                call 00007FEAF8BA3A6Bh
                                test eax, eax
                                jne 00007FEAF8B9D68Ah
                                push 00000010h
                                call 00007FEAF8B9D796h
                                pop ecx
                                call 00007FEAF8BA477Ch
                                and dword ptr [ebp-04h], 00000000h
                                call 00007FEAF8BA4067h
                                test eax, eax
                                jns 00007FEAF8B9D68Ah
                                push 0000001Bh
                                call 00007FEAF8B9D77Ch
                                pop ecx
                                call dword ptr [0106A19Ch]
                                mov dword ptr [010AC3A8h], eax
                                call 00007FEAF8BA4797h
                                mov dword ptr [01097A94h], eax
                                call 00007FEAF8BA4354h
                                test eax, eax
                                jns 00007FEAF8B9D68Ah

                                Data Directories

                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x8ccf80x8c.rdata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xad0000x41028.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0xda0000x2348.rsrc
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xef0000x4d50.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x6a3b00x38.rdata
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x879400x40.rdata
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x6a0000x328.rdata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                Sections

                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x681b90x68200False0.623956613896data6.85142500946IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                .rdata0x6a0000x23f8a0x24000False0.64170328776data6.36645327435IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .data0x8e0000x1e3ac0x7a00False0.527792008197data6.51367686644IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                .rsrc0xad0000x410280x41200False0.240744211852data5.36312234805IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0xef0000x4d500x4e00False0.730168269231data6.65913941378IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                Resources

                                NameRVASizeTypeLanguageCountry
                                RT_ICON0xad4340x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0EnglishUnited States
                                RT_ICON0xbdc5c0x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 16580607, next used block 4294917888EnglishUnited States
                                RT_ICON0xc1e840x25a8dataEnglishUnited States
                                RT_ICON0xc442c0x10a8dataEnglishUnited States
                                RT_ICON0xc54d40x988dataEnglishUnited States
                                RT_ICON0xc5e5c0x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                                RT_ICON0xc62c40x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0EnglishUnited States
                                RT_ICON0xd6aec0x94a8dataEnglishUnited States
                                RT_ICON0xdff940x5488dataEnglishUnited States
                                RT_ICON0xe541c0x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 254, next used block 520093696EnglishUnited States
                                RT_ICON0xe96440x25a8dataEnglishUnited States
                                RT_ICON0xebbec0x10a8dataEnglishUnited States
                                RT_ICON0xecc940x988dataEnglishUnited States
                                RT_ICON0xed61c0x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                                RT_STRING0xeda840xbcdataEnglishUnited States
                                RT_STRING0xedb400x150dataEnglishUnited States
                                RT_GROUP_ICON0xedc900x76dataEnglishUnited States
                                RT_GROUP_ICON0xedd080x5adataEnglishUnited States
                                RT_VERSION0xedd640x2c4dataEnglishUnited States

                                Imports

                                DLLImport
                                KERNEL32.dllGetLastError, VirtualProtectEx, LoadLibraryA, OpenMutexA, SetConsoleOutputCP, DeviceIoControl, GetModuleFileNameA, CloseHandle, DeleteFileA, WriteConsoleW, SetStdHandle, GetStringTypeW, LoadLibraryW, WaitForMultipleObjectsEx, GetStartupInfoA, GetConsoleMode, GetConsoleCP, FlushFileBuffers, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetLocaleInfoW, LCMapStringW, CompareStringW, GetTimeFormatW, GetDateFormatW, GetCPInfo, GetOEMCP, GetACP, IsValidCodePage, HeapReAlloc, CreateProcessA, Sleep, GetTickCount, SetFilePointerEx, GetCurrentProcess, UnregisterWaitEx, QueryDepthSList, InterlockedFlushSList, InterlockedPushEntrySList, InterlockedPopEntrySList, InitializeSListHead, ReleaseSemaphore, SetProcessAffinityMask, VirtualProtect, VirtualFree, VirtualAlloc, GetVersionExW, GetModuleHandleA, FreeLibraryAndExitThread, FreeLibrary, GetThreadTimes, OutputDebugStringW, FatalAppExitA, SetConsoleCtrlHandler, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCurrentProcessId, QueryPerformanceCounter, GetFileType, HeapSize, GetProcessHeap, GetModuleFileNameW, WriteFile, GetStdHandle, WideCharToMultiByte, MultiByteToWideChar, AreFileApisANSI, GetModuleHandleExW, ExitProcess, IsDebuggerPresent, UnregisterWait, RegisterWaitForSingleObject, SetThreadAffinityMask, GetProcessAffinityMask, GetNumaHighestNodeNumber, DeleteTimerQueueTimer, ChangeTimerQueueTimer, CreateTimerQueueTimer, GetLogicalProcessorInformation, GetThreadPriority, SetThreadPriority, SwitchToThread, SignalObjectAndWait, WaitForSingleObjectEx, SetEvent, DuplicateHandle, WaitForSingleObject, GetCurrentThread, GetCurrentThreadId, GetExitCodeThread, GetSystemTimeAsFileTime, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, HeapAlloc, EncodePointer, DecodePointer, GetCommandLineA, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, SetLastError, InitializeCriticalSectionAndSpinCount, CreateEventW, TerminateProcess, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetModuleHandleW, GetProcAddress, CreateSemaphoreW, CreateThread, ExitThread, LoadLibraryExW, RaiseException, RtlUnwind, HeapFree, TryEnterCriticalSection, CreateTimerQueue, RtlCaptureStackBackTrace, CreateFileW
                                USER32.dllSetWindowTextA, CallNextHookEx, LoadBitmapA, GetClassInfoExA, EnumWindows, GetIconInfo, IsDialogMessageA, GetWindowLongA, CreateWindowExA, ReleaseDC, DefWindowProcA, CheckDlgButton, SendMessageA
                                ole32.dllCoUninitialize, OleSetContainedObject, OleInitialize, CoSuspendClassObjects, OleUninitialize, StgCreateDocfile, CoInitialize
                                COMCTL32.dllPropertySheetA, ImageList_LoadImageA, CreatePropertySheetPageA
                                WINSPOOL.DRVDeletePortA, SetPrinterDataA, DeleteFormA, SetPortA, SetPrinterDataExA, AddMonitorA, ScheduleJob, AddPrinterConnectionA, ReadPrinter, AddPrinterDriverA, GetPrinterDataA, ResetPrinterA, PrinterMessageBoxA, DeletePrintProcessorA, GetPrinterDriverDirectoryA, OpenPrinterA, AddPortA, ConfigurePortA, GetPrinterDataExA, GetJobA, AddPrinterDriverExA, ClosePrinter, DeletePrinterDataExA, DeletePrinterConnectionA, DeletePrintProvidorA, StartPagePrinter, AbortPrinter, GetPrintProcessorDirectoryA, StartDocPrinterA, GetPrinterA, AddPrinterA, DeletePrinter, DeleteMonitorA, GetPrinterDriverA, AddFormA, DeletePrinterDriverA, AddPrintProcessorA, AddPrintProvidorA, SetFormA, GetFormA, DeletePrinterDataA, AddJobA, FlushPrinter, DeletePrinterDriverExA, SetJobA, FindClosePrinterChangeNotification, DeletePrinterKeyA
                                sfc.dllSfcIsFileProtected

                                Version Infos

                                DescriptionData
                                LegalCopyright(C) 2011 Helpwould Use Corporation. All rights reserved.
                                FileVersion14.1.55.63
                                CompanyNameHelpwould Use Corporation
                                ProductNameDeathice
                                ProductVersion14.1.55.63
                                FileDescriptionDeathice The Certain
                                Translation0x0409 0x04b0

                                Possible Origin

                                Language of compilation systemCountry where language is spokenMap
                                EnglishUnited States

                                Network Behavior

                                Network Port Distribution

                                UDP Packets

                                TimestampSource PortDest PortSource IPDest IP
                                Sep 10, 2021 07:30:55.161859035 CEST4955753192.168.2.58.8.8.8
                                Sep 10, 2021 07:30:55.197312117 CEST53495578.8.8.8192.168.2.5
                                Sep 10, 2021 07:31:10.916383028 CEST6173353192.168.2.58.8.8.8
                                Sep 10, 2021 07:31:10.951030970 CEST53617338.8.8.8192.168.2.5
                                Sep 10, 2021 07:31:19.997536898 CEST6544753192.168.2.58.8.8.8
                                Sep 10, 2021 07:31:20.043931961 CEST53654478.8.8.8192.168.2.5
                                Sep 10, 2021 07:31:27.506947994 CEST5244153192.168.2.58.8.8.8
                                Sep 10, 2021 07:31:27.545623064 CEST53524418.8.8.8192.168.2.5
                                Sep 10, 2021 07:31:28.440042019 CEST6217653192.168.2.58.8.8.8
                                Sep 10, 2021 07:31:28.475739002 CEST53621768.8.8.8192.168.2.5
                                Sep 10, 2021 07:31:29.754574060 CEST5959653192.168.2.58.8.8.8
                                Sep 10, 2021 07:31:29.790503025 CEST53595968.8.8.8192.168.2.5
                                Sep 10, 2021 07:31:29.796334028 CEST6529653192.168.2.58.8.8.8
                                Sep 10, 2021 07:31:29.832600117 CEST53652968.8.8.8192.168.2.5
                                Sep 10, 2021 07:31:29.838227034 CEST6318353192.168.2.58.8.8.8
                                Sep 10, 2021 07:31:29.872378111 CEST53631838.8.8.8192.168.2.5
                                Sep 10, 2021 07:31:40.988069057 CEST6015153192.168.2.58.8.8.8
                                Sep 10, 2021 07:31:41.013710022 CEST53601518.8.8.8192.168.2.5
                                Sep 10, 2021 07:31:49.056999922 CEST5696953192.168.2.58.8.8.8
                                Sep 10, 2021 07:31:49.102355003 CEST53569698.8.8.8192.168.2.5
                                Sep 10, 2021 07:31:51.125768900 CEST5516153192.168.2.58.8.8.8
                                Sep 10, 2021 07:31:51.150780916 CEST53551618.8.8.8192.168.2.5
                                Sep 10, 2021 07:31:58.465188980 CEST5475753192.168.2.58.8.8.8
                                Sep 10, 2021 07:31:58.499152899 CEST53547578.8.8.8192.168.2.5
                                Sep 10, 2021 07:31:59.470118046 CEST5475753192.168.2.58.8.8.8
                                Sep 10, 2021 07:31:59.506232977 CEST53547578.8.8.8192.168.2.5
                                Sep 10, 2021 07:32:00.437400103 CEST5475753192.168.2.58.8.8.8
                                Sep 10, 2021 07:32:00.463336945 CEST53547578.8.8.8192.168.2.5
                                Sep 10, 2021 07:32:02.510970116 CEST5475753192.168.2.58.8.8.8
                                Sep 10, 2021 07:32:02.537878990 CEST53547578.8.8.8192.168.2.5
                                Sep 10, 2021 07:32:04.306214094 CEST4999253192.168.2.58.8.8.8
                                Sep 10, 2021 07:32:04.339040041 CEST53499928.8.8.8192.168.2.5
                                Sep 10, 2021 07:32:06.531378984 CEST5475753192.168.2.58.8.8.8
                                Sep 10, 2021 07:32:06.564235926 CEST53547578.8.8.8192.168.2.5
                                Sep 10, 2021 07:32:07.834889889 CEST6007553192.168.2.58.8.8.8
                                Sep 10, 2021 07:32:07.870435953 CEST53600758.8.8.8192.168.2.5
                                Sep 10, 2021 07:32:18.093997002 CEST5501653192.168.2.58.8.8.8
                                Sep 10, 2021 07:32:18.133222103 CEST53550168.8.8.8192.168.2.5
                                Sep 10, 2021 07:32:18.746993065 CEST6434553192.168.2.58.8.8.8
                                Sep 10, 2021 07:32:18.801651955 CEST53643458.8.8.8192.168.2.5
                                Sep 10, 2021 07:32:31.764832020 CEST5712853192.168.2.58.8.8.8
                                Sep 10, 2021 07:32:31.799298048 CEST53571288.8.8.8192.168.2.5
                                Sep 10, 2021 07:32:32.938472033 CEST5479153192.168.2.58.8.8.8
                                Sep 10, 2021 07:32:32.964363098 CEST53547918.8.8.8192.168.2.5
                                Sep 10, 2021 07:32:32.972771883 CEST5046353192.168.2.58.8.8.8
                                Sep 10, 2021 07:32:33.007313013 CEST53504638.8.8.8192.168.2.5
                                Sep 10, 2021 07:32:33.036322117 CEST5039453192.168.2.58.8.8.8
                                Sep 10, 2021 07:32:33.073888063 CEST53503948.8.8.8192.168.2.5
                                Sep 10, 2021 07:32:39.218358994 CEST5853053192.168.2.58.8.8.8
                                Sep 10, 2021 07:32:39.254507065 CEST53585308.8.8.8192.168.2.5
                                Sep 10, 2021 07:32:40.963495016 CEST5381353192.168.2.58.8.8.8
                                Sep 10, 2021 07:32:40.999063969 CEST53538138.8.8.8192.168.2.5

                                DNS Queries

                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                Sep 10, 2021 07:31:29.754574060 CEST192.168.2.58.8.8.80xe26Standard query (0)haverit.xyzA (IP address)IN (0x0001)
                                Sep 10, 2021 07:31:29.796334028 CEST192.168.2.58.8.8.80x3ff9Standard query (0)haverit.xyzA (IP address)IN (0x0001)
                                Sep 10, 2021 07:31:29.838227034 CEST192.168.2.58.8.8.80xf32eStandard query (0)haverit.xyzA (IP address)IN (0x0001)
                                Sep 10, 2021 07:31:40.988069057 CEST192.168.2.58.8.8.80x4d28Standard query (0)haverit.xyzA (IP address)IN (0x0001)
                                Sep 10, 2021 07:31:51.125768900 CEST192.168.2.58.8.8.80x8786Standard query (0)haverit.xyzA (IP address)IN (0x0001)
                                Sep 10, 2021 07:32:32.938472033 CEST192.168.2.58.8.8.80x4383Standard query (0)haverit.xyzA (IP address)IN (0x0001)
                                Sep 10, 2021 07:32:32.972771883 CEST192.168.2.58.8.8.80xc67cStandard query (0)haverit.xyzA (IP address)IN (0x0001)
                                Sep 10, 2021 07:32:33.036322117 CEST192.168.2.58.8.8.80x102fStandard query (0)haverit.xyzA (IP address)IN (0x0001)

                                DNS Answers

                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                Sep 10, 2021 07:31:29.790503025 CEST8.8.8.8192.168.2.50xe26Name error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                                Sep 10, 2021 07:31:29.832600117 CEST8.8.8.8192.168.2.50x3ff9Name error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                                Sep 10, 2021 07:31:29.872378111 CEST8.8.8.8192.168.2.50xf32eName error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                                Sep 10, 2021 07:31:41.013710022 CEST8.8.8.8192.168.2.50x4d28Name error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                                Sep 10, 2021 07:31:51.150780916 CEST8.8.8.8192.168.2.50x8786Name error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                                Sep 10, 2021 07:32:32.964363098 CEST8.8.8.8192.168.2.50x4383Name error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                                Sep 10, 2021 07:32:33.007313013 CEST8.8.8.8192.168.2.50xc67cName error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                                Sep 10, 2021 07:32:33.073888063 CEST8.8.8.8192.168.2.50x102fName error (3)haverit.xyznonenoneA (IP address)IN (0x0001)

                                Code Manipulations

                                Statistics

                                CPU Usage

                                Click to jump to process

                                Memory Usage

                                Click to jump to process

                                Behavior

                                Click to jump to process

                                System Behavior

                                General

                                Start time:07:31:02
                                Start date:10/09/2021
                                Path:C:\Users\user\Desktop\eZY2eXORIp.exe
                                Wow64 process (32bit):true
                                Commandline:'C:\Users\user\Desktop\eZY2eXORIp.exe'
                                Imagebase:0x1000000
                                File size:901960 bytes
                                MD5 hash:8BAF707C7AFEB686CA13710762829052
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.292866191.00000000036F0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.291929905.00000000036F0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.292913639.00000000036F0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.291547643.00000000036F0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.291632853.00000000036F0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.291835576.00000000036F0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.292487674.00000000036F0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.292971089.00000000036F0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.292333881.00000000036F0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.292136155.00000000036F0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.291360640.00000000036F0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000002.512177753.00000000036F0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.292440254.00000000036F0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.291279386.00000000036F0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.291701567.00000000036F0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.292984133.00000000036F0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.292892828.00000000036F0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.292791301.00000000036F0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.292276017.00000000036F0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.292076935.00000000036F0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.292753214.00000000036F0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.292948084.00000000036F0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.292386062.00000000036F0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.291458965.00000000036F0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.291769273.00000000036F0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.292670276.00000000036F0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.291996066.00000000036F0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.292712718.00000000036F0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.292211990.00000000036F0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.292930955.00000000036F0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.292554837.00000000036F0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.292619377.00000000036F0000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.292820042.00000000036F0000.00000004.00000040.sdmp, Author: Joe Security
                                Reputation:low

                                General

                                Start time:07:31:28
                                Start date:10/09/2021
                                Path:C:\Program Files\internet explorer\iexplore.exe
                                Wow64 process (32bit):false
                                Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                                Imagebase:0x7ff6c59d0000
                                File size:823560 bytes
                                MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:07:31:29
                                Start date:10/09/2021
                                Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                Wow64 process (32bit):true
                                Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6212 CREDAT:17410 /prefetch:2
                                Imagebase:0x1240000
                                File size:822536 bytes
                                MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:07:32:31
                                Start date:10/09/2021
                                Path:C:\Program Files\internet explorer\iexplore.exe
                                Wow64 process (32bit):false
                                Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                                Imagebase:0x7ff6c59d0000
                                File size:823560 bytes
                                MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:07:32:32
                                Start date:10/09/2021
                                Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                Wow64 process (32bit):true
                                Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6496 CREDAT:17410 /prefetch:2
                                Imagebase:0x1240000
                                File size:822536 bytes
                                MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                Disassembly

                                Code Analysis

                                Reset < >