Loading ...

Play interactive tourEdit tour

Windows Analysis Report qMROoJ.exe-

Overview

General Information

Sample Name:qMROoJ.exe- (renamed file extension from exe- to exe)
Analysis ID:481083
MD5:a9ea51f7e1691524abf0d910b79daf9e
SHA1:e62e10856d92fe0309730fba2aa1b4d7283089db
SHA256:7b9333217f38f9730ac3fdddb68e57daea342b9a985d07a6453adeea702424b7
Tags:exe
Infos:

Most interesting Screenshot:

Detection

Ursnif Ursnif v3
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Ursnif
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for domain / URL
Yara detected Ursnif
Writes or reads registry keys via WMI
Writes registry values via WMI
Machine Learning detection for sample
Performs DNS queries to domains with low reputation
Uses 32bit PE files
Antivirus or Machine Learning detection for unpacked file
PE file contains an invalid checksum
PE file contains strange resources
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
PE / OLE file has an invalid certificate
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)

Classification

Process Tree

  • System is w10x64
  • qMROoJ.exe (PID: 6872 cmdline: 'C:\Users\user\Desktop\qMROoJ.exe' MD5: A9EA51F7E1691524ABF0D910B79DAF9E)
  • iexplore.exe (PID: 6084 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 6372 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6084 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • iexplore.exe (PID: 6536 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 2288 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6536 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000001.00000003.380136818.0000000003680000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
    00000001.00000003.380681935.0000000003680000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
      00000001.00000003.381031036.0000000003680000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
        00000001.00000003.381667904.0000000003680000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
          00000001.00000003.381609527.0000000003680000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
            Click to see the 29 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            1.2.qMROoJ.exe.1000000.0.unpackJoeSecurity_Ursnifv3Yara detected UrsnifJoe Security
              1.3.qMROoJ.exe.d89d7c.0.raw.unpackJoeSecurity_Ursnifv3Yara detected UrsnifJoe Security

                Sigma Overview

                No Sigma rule has matched

                Jbx Signature Overview

                Click to jump to signature section

                Show All Signature Results

                AV Detection:

                barindex
                Multi AV Scanner detection for domain / URLShow sources
                Source: haverit.xyzVirustotal: Detection: 5%Perma Link
                Machine Learning detection for sampleShow sources
                Source: qMROoJ.exeJoe Sandbox ML: detected
                Source: 1.2.qMROoJ.exe.1000000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen7
                Source: 1.3.qMROoJ.exe.d89d7c.0.unpackAvira: Label: TR/Patched.Ren.Gen
                Source: qMROoJ.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
                Source: Binary string: c:\Muchwin\WorkWhich\centstring\shinegray\WanthumanMarket.pdb source: qMROoJ.exe

                Networking:

                barindex
                Performs DNS queries to domains with low reputationShow sources
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: haverit.xyz
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: haverit.xyz
                Source: C:\Users\user\Desktop\qMROoJ.exeDNS query: haverit.xyz
                Source: C:\Users\user\Desktop\qMROoJ.exeDNS query: haverit.xyz
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: haverit.xyz
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: haverit.xyz
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: haverit.xyz
                Source: unknownDNS traffic detected: query: haverit.xyz replaycode: Name error (3)
                Source: msapplication.xml0.8.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x84ba93b3,0x01d7a668</date><accdate>0x84ba93b3,0x01d7a668</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
                Source: msapplication.xml0.8.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x84ba93b3,0x01d7a668</date><accdate>0x84ba93b3,0x01d7a668</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
                Source: msapplication.xml5.8.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x84c1baa4,0x01d7a668</date><accdate>0x84c1baa4,0x01d7a668</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
                Source: msapplication.xml5.8.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x84c1baa4,0x01d7a668</date><accdate>0x84c1baa4,0x01d7a668</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
                Source: msapplication.xml7.8.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x84c1baa4,0x01d7a668</date><accdate>0x84c1baa4,0x01d7a668</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
                Source: msapplication.xml7.8.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x84c1baa4,0x01d7a668</date><accdate>0x84c1baa4,0x01d7a668</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
                Source: qMROoJ.exe, 00000001.00000003.380136818.0000000003680000.00000004.00000040.sdmpString found in binary or memory: http://%s=%s&file://&os=%u.%u_%u_%u_x%uindex.html;
                Source: qMROoJ.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                Source: qMROoJ.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                Source: qMROoJ.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                Source: qMROoJ.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                Source: qMROoJ.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
                Source: qMROoJ.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                Source: qMROoJ.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                Source: qMROoJ.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                Source: qMROoJ.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                Source: qMROoJ.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
                Source: qMROoJ.exeString found in binary or memory: http://ocsp.comodoca.com0
                Source: qMROoJ.exeString found in binary or memory: http://ocsp.digicert.com0C
                Source: qMROoJ.exeString found in binary or memory: http://ocsp.digicert.com0O
                Source: qMROoJ.exeString found in binary or memory: http://ocsp.sectigo.com0
                Source: msapplication.xml.8.drString found in binary or memory: http://www.amazon.com/
                Source: qMROoJ.exeString found in binary or memory: http://www.digicert.com/CPS0
                Source: msapplication.xml1.8.drString found in binary or memory: http://www.google.com/
                Source: msapplication.xml2.8.drString found in binary or memory: http://www.live.com/
                Source: msapplication.xml3.8.drString found in binary or memory: http://www.nytimes.com/
                Source: msapplication.xml4.8.drString found in binary or memory: http://www.reddit.com/
                Source: msapplication.xml5.8.drString found in binary or memory: http://www.twitter.com/
                Source: msapplication.xml6.8.drString found in binary or memory: http://www.wikipedia.com/
                Source: msapplication.xml7.8.drString found in binary or memory: http://www.youtube.com/
                Source: qMROoJ.exeString found in binary or memory: https://haverit.xyz
                Source: ~DF922DBE2E8FFEAC90.TMP.22.drString found in binary or memory: https://haverit.xyz/index.htm
                Source: {D5521093-125B-11EC-90E5-ECF4BB2D2496}.dat.22.drString found in binary or memory: https://haverit.xyz/index.htmRoot
                Source: {D5521093-125B-11EC-90E5-ECF4BB2D2496}.dat.22.drString found in binary or memory: https://haverit.xyz/index.htmdex.htm
                Source: qMROoJ.exeString found in binary or memory: https://sectigo.com/CPS0
                Source: qMROoJ.exeString found in binary or memory: https://www.digicert.com/CPS0
                Source: unknownDNS traffic detected: queries for: haverit.xyz

                Key, Mouse, Clipboard, Microphone and Screen Capturing:

                barindex
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 1.2.qMROoJ.exe.1000000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.3.qMROoJ.exe.d89d7c.0.raw.unpack, type: UNPACKEDPE
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 00000001.00000003.380136818.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380681935.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381031036.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381667904.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381609527.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381098376.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380826374.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381456584.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380954582.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381283033.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381792101.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381513326.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381725556.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.606917729.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381223984.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.379920263.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381641073.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381783120.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380238117.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380038613.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381573847.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381770851.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380416686.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380893206.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380519571.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381690336.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381152025.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380754604.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381401291.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381344804.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381754017.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380600806.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380334227.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: qMROoJ.exe PID: 6872, type: MEMORYSTR

                E-Banking Fraud:

                barindex
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 1.2.qMROoJ.exe.1000000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.3.qMROoJ.exe.d89d7c.0.raw.unpack, type: UNPACKEDPE
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 00000001.00000003.380136818.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380681935.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381031036.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381667904.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381609527.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381098376.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380826374.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381456584.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380954582.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381283033.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381792101.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381513326.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381725556.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.606917729.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381223984.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.379920263.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381641073.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381783120.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380238117.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380038613.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381573847.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381770851.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380416686.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380893206.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380519571.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381690336.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381152025.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380754604.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381401291.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381344804.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381754017.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380600806.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380334227.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: qMROoJ.exe PID: 6872, type: MEMORYSTR

                System Summary:

                barindex
                Writes or reads registry keys via WMIShow sources
                Source: C:\Users\user\Desktop\qMROoJ.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetDWORDValue
                Source: C:\Users\user\Desktop\qMROoJ.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                Source: C:\Users\user\Desktop\qMROoJ.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                Source: C:\Users\user\Desktop\qMROoJ.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                Source: C:\Users\user\Desktop\qMROoJ.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                Source: C:\Users\user\Desktop\qMROoJ.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                Writes registry values via WMIShow sources
                Source: C:\Users\user\Desktop\qMROoJ.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                Source: C:\Users\user\Desktop\qMROoJ.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                Source: C:\Users\user\Desktop\qMROoJ.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                Source: C:\Users\user\Desktop\qMROoJ.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                Source: C:\Users\user\Desktop\qMROoJ.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                Source: qMROoJ.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                Source: qMROoJ.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: qMROoJ.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: qMROoJ.exeStatic PE information: invalid certificate
                Source: qMROoJ.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\qMROoJ.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\qMROoJ.exe 'C:\Users\user\Desktop\qMROoJ.exe'
                Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6084 CREDAT:17410 /prefetch:2
                Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6536 CREDAT:17410 /prefetch:2
                Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6084 CREDAT:17410 /prefetch:2Jump to behavior
                Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6536 CREDAT:17410 /prefetch:2Jump to behavior
                Source: C:\Users\user\Desktop\qMROoJ.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{674B6698-EE92-11D0-AD71-00C04FD8FDFF}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\qMROoJ.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : select * from win32_process
                Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{AF41F182-125B-11EC-90E5-ECF4BB2D2496}.datJump to behavior
                Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DFFFC0064E6ABA1F29.TMPJump to behavior
                Source: classification engineClassification label: mal88.troj.evad.winEXE@7/29@7/0
                Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\qMROoJ.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\qMROoJ.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
                Source: qMROoJ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: qMROoJ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: qMROoJ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: qMROoJ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: qMROoJ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: qMROoJ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: qMROoJ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: c:\Muchwin\WorkWhich\centstring\shinegray\WanthumanMarket.pdb source: qMROoJ.exe
                Source: qMROoJ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: qMROoJ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: qMROoJ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: qMROoJ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: qMROoJ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                Data Obfuscation:

                barindex
                Detected unpacking (changes PE section rights)Show sources
                Source: C:\Users\user\Desktop\qMROoJ.exeUnpacked PE file: 1.2.qMROoJ.exe.1000000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.bss:W;.reloc:R;
                Source: qMROoJ.exeStatic PE information: real checksum: 0xe80db should be: 0xdcc51
                Source: C:\Users\user\Desktop\qMROoJ.exeCode function: 1_3_0368198A push ds; retf 1_3_03681991
                Source: C:\Users\user\Desktop\qMROoJ.exeCode function: 1_3_0368198A push ds; retf 1_3_03681991
                Source: C:\Users\user\Desktop\qMROoJ.exeCode function: 1_3_0368198A push ds; retf 1_3_03681991
                Source: C:\Users\user\Desktop\qMROoJ.exeCode function: 1_3_0368198A push ds; retf 1_3_03681991
                Source: C:\Users\user\Desktop\qMROoJ.exeCode function: 1_3_0368198A push ds; retf 1_3_03681991
                Source: C:\Users\user\Desktop\qMROoJ.exeCode function: 1_3_0368198A push ds; retf 1_3_03681991
                Source: C:\Users\user\Desktop\qMROoJ.exeCode function: 1_3_0368198A push ds; retf 1_3_03681991
                Source: C:\Users\user\Desktop\qMROoJ.exeCode function: 1_3_0368198A push ds; retf 1_3_03681991
                Source: C:\Users\user\Desktop\qMROoJ.exeCode function: 1_3_0368198A push ds; retf 1_3_03681991
                Source: C:\Users\user\Desktop\qMROoJ.exeCode function: 1_3_0368198A push ds; retf 1_3_03681991
                Source: C:\Users\user\Desktop\qMROoJ.exeCode function: 1_3_0368198A push ds; retf 1_3_03681991
                Source: C:\Users\user\Desktop\qMROoJ.exeCode function: 1_3_0368198A push ds; retf 1_3_03681991
                Source: C:\Users\user\Desktop\qMROoJ.exeCode function: 1_3_0368198A push ds; retf 1_3_03681991
                Source: C:\Users\user\Desktop\qMROoJ.exeCode function: 1_3_0368198A push ds; retf 1_3_03681991
                Source: C:\Users\user\Desktop\qMROoJ.exeCode function: 1_3_0368198A push ds; retf 1_3_03681991
                Source: C:\Users\user\Desktop\qMROoJ.exeCode function: 1_3_0368198A push ds; retf 1_3_03681991
                Source: C:\Users\user\Desktop\qMROoJ.exeCode function: 1_3_0368198A push ds; retf 1_3_03681991
                Source: C:\Users\user\Desktop\qMROoJ.exeCode function: 1_3_0368198A push ds; retf 1_3_03681991
                Source: C:\Users\user\Desktop\qMROoJ.exeCode function: 1_3_0368198A push ds; retf 1_3_03681991
                Source: C:\Users\user\Desktop\qMROoJ.exeCode function: 1_3_0368198A push ds; retf 1_3_03681991
                Source: C:\Users\user\Desktop\qMROoJ.exeCode function: 1_3_0368198A push ds; retf 1_3_03681991
                Source: C:\Users\user\Desktop\qMROoJ.exeCode function: 1_3_0368198A push ds; retf 1_3_03681991
                Source: C:\Users\user\Desktop\qMROoJ.exeCode function: 1_3_0368198A push ds; retf 1_3_03681991
                Source: C:\Users\user\Desktop\qMROoJ.exeCode function: 1_3_0368198A push ds; retf 1_3_03681991
                Source: C:\Users\user\Desktop\qMROoJ.exeCode function: 1_3_0368198A push ds; retf 1_3_03681991
                Source: C:\Users\user\Desktop\qMROoJ.exeCode function: 1_3_0368198A push ds; retf 1_3_03681991
                Source: C:\Users\user\Desktop\qMROoJ.exeCode function: 1_3_0368198A push ds; retf 1_3_03681991
                Source: C:\Users\user\Desktop\qMROoJ.exeCode function: 1_3_0368198A push ds; retf 1_3_03681991
                Source: C:\Users\user\Desktop\qMROoJ.exeCode function: 1_3_0368198A push ds; retf 1_3_03681991
                Source: C:\Users\user\Desktop\qMROoJ.exeCode function: 1_3_0368198A push ds; retf 1_3_03681991
                Source: C:\Users\user\Desktop\qMROoJ.exeCode function: 1_3_0368198A push ds; retf 1_3_03681991
                Source: initial sampleStatic PE information: section name: .text entropy: 6.85141670338

                Hooking and other Techniques for Hiding and Protection:

                barindex
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 1.2.qMROoJ.exe.1000000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.3.qMROoJ.exe.d89d7c.0.raw.unpack, type: UNPACKEDPE
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 00000001.00000003.380136818.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380681935.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381031036.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381667904.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381609527.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381098376.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380826374.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381456584.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380954582.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381283033.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381792101.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381513326.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381725556.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.606917729.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381223984.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.379920263.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381641073.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381783120.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380238117.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380038613.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381573847.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381770851.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380416686.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380893206.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380519571.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381690336.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381152025.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380754604.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381401291.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381344804.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381754017.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380600806.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380334227.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: qMROoJ.exe PID: 6872, type: MEMORYSTR
                Source: C:\Users\user\Desktop\qMROoJ.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                Source: C:\Users\user\Desktop\qMROoJ.exe TID: 6980Thread sleep time: -30000s >= -30000sJump to behavior
                Source: qMROoJ.exe, 00000001.00000002.606810597.0000000001100000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                Source: qMROoJ.exe, 00000001.00000002.606810597.0000000001100000.00000002.00020000.sdmpBinary or memory string: Progman
                Source: qMROoJ.exe, 00000001.00000002.606810597.0000000001100000.00000002.00020000.sdmpBinary or memory string: &Program Manager
                Source: qMROoJ.exe, 00000001.00000002.606810597.0000000001100000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\qMROoJ.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: C:\Users\user\Desktop\qMROoJ.exeWMI Queries: IWbemServices::ExecQuery - root\securitycenter2 : select * from antispywareproduct

                Stealing of Sensitive Information:

                barindex
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 1.2.qMROoJ.exe.1000000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.3.qMROoJ.exe.d89d7c.0.raw.unpack, type: UNPACKEDPE
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 00000001.00000003.380136818.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380681935.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381031036.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381667904.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381609527.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381098376.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380826374.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381456584.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380954582.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381283033.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381792101.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381513326.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381725556.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.606917729.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381223984.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.379920263.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381641073.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381783120.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380238117.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380038613.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381573847.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381770851.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380416686.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380893206.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380519571.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381690336.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381152025.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380754604.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381401291.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381344804.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381754017.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380600806.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380334227.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: qMROoJ.exe PID: 6872, type: MEMORYSTR

                Remote Access Functionality:

                barindex
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 1.2.qMROoJ.exe.1000000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.3.qMROoJ.exe.d89d7c.0.raw.unpack, type: UNPACKEDPE
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 00000001.00000003.380136818.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380681935.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381031036.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381667904.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381609527.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381098376.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380826374.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381456584.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380954582.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381283033.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381792101.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381513326.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381725556.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.606917729.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381223984.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.379920263.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381641073.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381783120.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380238117.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380038613.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381573847.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381770851.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380416686.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380893206.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380519571.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381690336.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381152025.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380754604.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381401291.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381344804.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.381754017.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380600806.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000003.380334227.0000000003680000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: qMROoJ.exe PID: 6872, type: MEMORYSTR

                Mitre Att&ck Matrix

                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid AccountsWindows Management Instrumentation211Path InterceptionProcess Injection2Masquerading1OS Credential DumpingQuery Registry1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion1LSASS MemorySecurity Software Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection2Security Account ManagerVirtualization/Sandbox Evasion1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information2NTDSProcess Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing12LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery3Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

                Behavior Graph

                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 481083 Sample: qMROoJ.exe- Startdate: 10/09/2021 Architecture: WINDOWS Score: 88 25 Multi AV Scanner detection for domain / URL 2->25 27 Yara detected Ursnif 2->27 29 Yara detected  Ursnif 2->29 31 2 other signatures 2->31 6 qMROoJ.exe 2->6         started        10 iexplore.exe 1 50 2->10         started        12 iexplore.exe 1 73 2->12         started        process3 dnsIp4 19 haverit.xyz 6->19 33 Detected unpacking (changes PE section rights) 6->33 35 Performs DNS queries to domains with low reputation 6->35 37 Writes or reads registry keys via WMI 6->37 39 Writes registry values via WMI 6->39 14 iexplore.exe 29 10->14         started        17 iexplore.exe 29 12->17         started        signatures5 process6 dnsIp7 21 haverit.xyz 14->21 23 haverit.xyz 17->23

                Screenshots

                Thumbnails

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                windows-stand

                Antivirus, Machine Learning and Genetic Malware Detection

                Initial Sample

                SourceDetectionScannerLabelLink
                qMROoJ.exe100%Joe Sandbox ML

                Dropped Files

                No Antivirus matches

                Unpacked PE Files

                SourceDetectionScannerLabelLinkDownload
                1.2.qMROoJ.exe.1000000.0.unpack100%AviraTR/Crypt.XPACK.Gen7Download File
                1.3.qMROoJ.exe.d89d7c.0.unpack100%AviraTR/Patched.Ren.GenDownload File

                Domains

                SourceDetectionScannerLabelLink
                haverit.xyz6%VirustotalBrowse

                URLs

                SourceDetectionScannerLabelLink
                https://haverit.xyz/index.htm4%VirustotalBrowse
                https://haverit.xyz/index.htm0%Avira URL Cloudsafe
                https://sectigo.com/CPS00%URL Reputationsafe
                http://ocsp.sectigo.com00%URL Reputationsafe
                https://haverit.xyz/index.htmdex.htm0%Avira URL Cloudsafe
                http://%s=%s&file://&os=%u.%u_%u_%u_x%uindex.html;0%Avira URL Cloudsafe
                http://www.wikipedia.com/0%URL Reputationsafe
                https://haverit.xyz0%Avira URL Cloudsafe
                http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
                http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%URL Reputationsafe
                https://haverit.xyz/index.htmRoot0%Avira URL Cloudsafe

                Domains and IPs

                Contacted Domains

                NameIPActiveMaliciousAntivirus DetectionReputation
                haverit.xyz
                unknown
                unknowntrueunknown

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                https://haverit.xyz/index.htm~DF922DBE2E8FFEAC90.TMP.22.drtrue
                • 4%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://www.nytimes.com/msapplication.xml3.8.drfalse
                  high
                  https://sectigo.com/CPS0qMROoJ.exefalse
                  • URL Reputation: safe
                  unknown
                  http://ocsp.sectigo.com0qMROoJ.exefalse
                  • URL Reputation: safe
                  unknown
                  https://haverit.xyz/index.htmdex.htm{D5521093-125B-11EC-90E5-ECF4BB2D2496}.dat.22.drtrue
                  • Avira URL Cloud: safe
                  unknown
                  http://%s=%s&file://&os=%u.%u_%u_%u_x%uindex.html;qMROoJ.exe, 00000001.00000003.380136818.0000000003680000.00000004.00000040.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://www.youtube.com/msapplication.xml7.8.drfalse
                    high
                    http://www.wikipedia.com/msapplication.xml6.8.drfalse
                    • URL Reputation: safe
                    unknown
                    http://www.amazon.com/msapplication.xml.8.drfalse
                      high
                      https://haverit.xyzqMROoJ.exetrue
                      • Avira URL Cloud: safe
                      unknown
                      http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0sqMROoJ.exefalse
                      • URL Reputation: safe
                      unknown
                      http://www.live.com/msapplication.xml2.8.drfalse
                        high
                        http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#qMROoJ.exefalse
                        • URL Reputation: safe
                        unknown
                        http://www.reddit.com/msapplication.xml4.8.drfalse
                          high
                          http://www.twitter.com/msapplication.xml5.8.drfalse
                            high
                            https://haverit.xyz/index.htmRoot{D5521093-125B-11EC-90E5-ECF4BB2D2496}.dat.22.drtrue
                            • Avira URL Cloud: safe
                            unknown
                            http://www.google.com/msapplication.xml1.8.drfalse
                              high

                              Contacted IPs

                              No contacted IP infos

                              General Information

                              Joe Sandbox Version:33.0.0 White Diamond
                              Analysis ID:481083
                              Start date:10.09.2021
                              Start time:10:21:14
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 6m 4s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Sample file name:qMROoJ.exe- (renamed file extension from exe- to exe)
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:27
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal88.troj.evad.winEXE@7/29@7/0
                              EGA Information:Failed
                              HDC Information:Failed
                              HCA Information:
                              • Successful, ratio: 100%
                              • Number of executed functions: 0
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              Warnings:
                              Show All
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, ielowutil.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                              • Excluded IPs from analysis (whitelisted): 23.203.80.193, 20.50.102.62, 20.54.110.249, 40.112.88.60, 152.199.19.161, 80.67.82.211, 80.67.82.235, 23.211.4.86, 20.82.210.154
                              • Excluded domains from analysis (whitelisted): iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a1449.dscg2.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, e11290.dspg.akamaiedge.net, iecvlist.microsoft.com, go.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ie9comview.vo.msecnd.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, ris.api.iris.microsoft.com, go.microsoft.com.edgekey.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, cs9.wpc.v0cdn.net
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.

                              Simulations

                              Behavior and APIs

                              TimeTypeDescription
                              10:22:47API Interceptor2x Sleep call for process: qMROoJ.exe modified

                              Joe Sandbox View / Context

                              IPs

                              No context

                              Domains

                              No context

                              ASN

                              No context

                              JA3 Fingerprints

                              No context

                              Dropped Files

                              No context

                              Created / dropped Files

                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{AF41F182-125B-11EC-90E5-ECF4BB2D2496}.dat
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:Microsoft Word Document
                              Category:dropped
                              Size (bytes):29272
                              Entropy (8bit):1.7700201076088986
                              Encrypted:false
                              SSDEEP:48:IwaGcprvGwpL2G/ap8MGIpc/GvnZpvmGoCRqp9zGo4ey1pmRGWCz21XGWCBT6pdW:reZZZ02cWQtRAfkey1MuaGIKKT2NDB
                              MD5:8815918715AC9C2C9AC3822D464BE37A
                              SHA1:3FDFC24B0B6F8B80E450B6A2490F7B31EE3A4A3A
                              SHA-256:F74560F04EB7F106EF85460CE8F11220CD62C2DF99E00D1C9E22350DB18B4F17
                              SHA-512:3BA7C75D89D0C70C7D20E813BF58059957568B6609FC417EF008E0E8AB920A79AC7B12D28EBCAE49AC6F51DD6E1F212689944544F114E6F3B862DD36BA7E6454
                              Malicious:false
                              Reputation:low
                              Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{D5521091-125B-11EC-90E5-ECF4BB2D2496}.dat
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:Microsoft Word Document
                              Category:dropped
                              Size (bytes):29272
                              Entropy (8bit):1.7689561844857538
                              Encrypted:false
                              SSDEEP:48:IwfGcpryGwpLh2G/ap8hXGIpchzGvnZpvhkGooRqp9hgGo4c41pmhQGWoz014gG/:r1Z6Zi2rWitbAfpc41MVgYIUwTKTDB
                              MD5:98268F732CCE9237A0DD487E748844B1
                              SHA1:AEDC3A08C08D607169FF5B8A27C857F058F626E6
                              SHA-256:2DE91B08193167BB2CEAE0E92BE3BB2885F30E9469372973265A0C0CD5A79394
                              SHA-512:2B6DD3186D9ED527B701C939EACB293441DB556330D979AE3F4E03CCEC6B749F28FD816429FEB10B98F7DC7F4D7AEBB9B92C617E5B063BA979290A08DDC1CCD9
                              Malicious:false
                              Reputation:low
                              Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{AF41F184-125B-11EC-90E5-ECF4BB2D2496}.dat
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:Microsoft Word Document
                              Category:dropped
                              Size (bytes):26240
                              Entropy (8bit):1.657788661267248
                              Encrypted:false
                              SSDEEP:48:IwPGcpr6GwpaqG4pQiGrapbSyGQpB+GHHpcrTGUp8MGzYpm4MoGopOCyDmnGqXpN:rFZiQK6kBSajN2FWYMDokcLVKA
                              MD5:2E0EA3F97F3F56FBF17FA0A82F5C2122
                              SHA1:64017E8691A6D82B84BEC487C06ADE7A5435B33F
                              SHA-256:9297FE11442A6166F81C7E71AC35DF515695BBE329D4F0E66A48935750DE95EE
                              SHA-512:670DAF297F755D54BE802DB31247B9E5CB1F1EFCCF7A536873D1484F82B705FEBB63C588830E724A80C35822C11004280B29E05ECA442B8BF066524EC7A6D362
                              Malicious:false
                              Reputation:low
                              Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{D5521093-125B-11EC-90E5-ECF4BB2D2496}.dat
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:Microsoft Word Document
                              Category:dropped
                              Size (bytes):26240
                              Entropy (8bit):1.6591805213784219
                              Encrypted:false
                              SSDEEP:48:IwnGcprqGwpaiG4pQqGrapbSgGQpBSGHHpcTTGUp8jGzYpmrPGopOVyDvGqXpHVG:rNZyQS6cBSIjp2tW5MlksVfA
                              MD5:DE122800416B39DD3CE2031E99AF1569
                              SHA1:788D79CB5F26BEAAF69CB340020B96A3E7454424
                              SHA-256:C27BA46BECE2EA828B2E3BE1531D5546142D134862C2DD7884E5E1BD43F69EF6
                              SHA-512:CEEE340A09C4D953CBDADA12A395375EEAE5A5C9AA7AE8447F6384A1235C5E83E07258433A7B80C34717ACAEC7BB013BB6355D1607940E3833381E4BE7C4B923
                              Malicious:false
                              Reputation:low
                              Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-17529550060\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):659
                              Entropy (8bit):5.07368978082793
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxOEIbQiebQMnWimI002EtM3MHdNMNxOEIbQiebQMnWimI00OVbVbkEtMb:2d6NxOVQHQMSZHKd6NxOVQHQMSZ7V6b
                              MD5:CFEBA4313DA7C7C1AE90EC3981DA0B6A
                              SHA1:08AD8F18125548C0D53995922B7709AD57FC531B
                              SHA-256:B3C5300C9C9905194327E0A3E495AB3AAF29C310569BFA95E84C2A5C1B7C19D4
                              SHA-512:75E587AD8756AEC093884C653D93900A2C3D19B085D1EB73438AEA62220BA5AC8B4F3612D22B82F86768CBBFF5DE0C94EAC17F0B2E5C66926097739A64CFE111
                              Malicious:false
                              Reputation:low
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x84c1baa4,0x01d7a668</date><accdate>0x84c1baa4,0x01d7a668</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x84c1baa4,0x01d7a668</date><accdate>0x84c1baa4,0x01d7a668</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18270793970\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):656
                              Entropy (8bit):5.136679707625141
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxe2kIvJevbnWimI002EtM3MHdNMNxe2kIvJevbnWimI00OVbkak6EtMb:2d6Nxr5GbSZHKd6Nxr5GbSZ7VAa7b
                              MD5:1F680AF4C81AAFD60B9136CE33A35450
                              SHA1:B80C91C84F417123F677135404BB68F838DC0E79
                              SHA-256:7451400BCB06ECE957B20ABB6C3D6EE549979544B76B1EFF1B1CB8AAE883D224
                              SHA-512:57C9071DB329248A3B0FEAC95D1B44156DB8F296FC7351FB813BA9154A0C4964A4E99665B76789BA8E838F514EBA0848F3B9CB25EA6439827A98CFB1D792CAB5
                              Malicious:false
                              Reputation:low
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0x84ba93b3,0x01d7a668</date><accdate>0x84ba93b3,0x01d7a668</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0x84ba93b3,0x01d7a668</date><accdate>0x84ba93b3,0x01d7a668</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Amazon.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-21706820\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):665
                              Entropy (8bit):5.091728893531095
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxvLIbQiebQMnWimI002EtM3MHdNMNxvLIbQiebQMnWimI00OVbmZEtMb:2d6NxvGQHQMSZHKd6NxvGQHQMSZ7Vmb
                              MD5:D98F5583C127A64B6DC81138BDCACD0B
                              SHA1:745BE4D7E1272DE1FE03E9FD34B6F23942F17BEA
                              SHA-256:38A735FE34F51783EC0D5A3E6DAF8573893E38563080C42E0E0FC951585C838C
                              SHA-512:A629667C04FD445CD1313DAC1CF547112978902BA7A16853E491B52DCEF4D5CD22856E0502D5F4242B00F3E2DE0F6E793060905CFD6BDD5468C8B8F36AC433BD
                              Malicious:false
                              Reputation:low
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0x84c1baa4,0x01d7a668</date><accdate>0x84c1baa4,0x01d7a668</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0x84c1baa4,0x01d7a668</date><accdate>0x84c1baa4,0x01d7a668</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Wikipedia.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):650
                              Entropy (8bit):5.126826954336331
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxiIvJevbnWimI002EtM3MHdNMNxiIvJevbnWimI00OVbd5EtMb:2d6NxbGbSZHKd6NxbGbSZ7VJjb
                              MD5:E56A2E41AA8805A488250E27F3FFF08A
                              SHA1:53B85470288059377BB1473B9B9949BC5C795BF8
                              SHA-256:2DF7F753682486384F9C66C3AB9165C257BCCD4981B2625510D04BC50A78E25D
                              SHA-512:032D85F060A9E1423FD89C7A4C332E495984C6B18798FA6D0D0E78925E6A92BF2CCD3752391347C90731F44276E4B06246CB388D4786271B9BDE8DDAF8AB99F4
                              Malicious:false
                              Reputation:low
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0x84ba93b3,0x01d7a668</date><accdate>0x84ba93b3,0x01d7a668</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0x84ba93b3,0x01d7a668</date><accdate>0x84ba93b3,0x01d7a668</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Live.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6757900\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):659
                              Entropy (8bit):5.104854106494101
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxhGwIbQiebQMnWimI002EtM3MHdNMNxhGwIbQiebQMnWimI00OVb8K07/:2d6NxQxQHQMSZHKd6NxQxQHQMSZ7VYKG
                              MD5:B51E6D8A937A79944712320C3C397D98
                              SHA1:5E8E545C2D9A7EA04A8A4838E43630C7098936B6
                              SHA-256:0E1718A31E31D330A5CEABFC5FFA830D44D7AB934DEF10798607C473700DBE5D
                              SHA-512:D8C184DA4A3B1B146171A6429BA025AB4490D1A213D4B795717883E90C2109951306E8F454F40FEA6117A0DB53CB8A733D9FEE361BC748CE3796D8CC87131152
                              Malicious:false
                              Reputation:low
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x84c1baa4,0x01d7a668</date><accdate>0x84c1baa4,0x01d7a668</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x84c1baa4,0x01d7a668</date><accdate>0x84c1baa4,0x01d7a668</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8760897390\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):656
                              Entropy (8bit):5.07740373282178
                              Encrypted:false
                              SSDEEP:12:TMHdNMNx0nIbQiebQMnWimI002EtM3MHdNMNx0nIbQiebQMnWimI00OVbxEtMb:2d6Nx0SQHQMSZHKd6Nx0SQHQMSZ7Vnb
                              MD5:C83FFA85E9ADCDD945ED2C82BA34E3E2
                              SHA1:7655B3EF8313D43B0FD0783887665EF971F5A24E
                              SHA-256:F5344E1FE17BC1890FB60D3CDB2E1CA60FD0981E2C31FF581D8D463FBCD79935
                              SHA-512:B92DFE32ED7F646577EBBE26D00D3CA9836B07D5D72C424CA70355C41109B3838CF30AF74A7881CF9BCA7148D7EA5B7D18E946509B000406352FE5B3B9223F94
                              Malicious:false
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0x84c1baa4,0x01d7a668</date><accdate>0x84c1baa4,0x01d7a668</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0x84c1baa4,0x01d7a668</date><accdate>0x84c1baa4,0x01d7a668</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Reddit.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):659
                              Entropy (8bit):5.113490882790129
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxxIbQiebQMnWimI002EtM3MHdNMNxxIbQiebQMnWimI00OVb6Kq5EtMb:2d6NxwQHQMSZHKd6NxwQHQMSZ7Vob
                              MD5:5CEDDD82E728A8D62ACF7CC3F6E043AB
                              SHA1:36FFD1EC2C3806C802DD8C04029C015181730327
                              SHA-256:0521A7F238587A79E83050785E941DFDDBB84FE23A0049F8758AF0E157B4DD07
                              SHA-512:CEBD2C4CDC13B9945EACCD77D7005002C2CA32893E4AC112C2F5281741361B8516403D5133EC1A33CDA22796C9FD5749424054E82BBC72529301726037602A2D
                              Malicious:false
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0x84c1baa4,0x01d7a668</date><accdate>0x84c1baa4,0x01d7a668</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0x84c1baa4,0x01d7a668</date><accdate>0x84c1baa4,0x01d7a668</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\NYTimes.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20332743330\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):662
                              Entropy (8bit):5.125313660830756
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxcIvJevbnWimI002EtM3MHdNMNxcIvJevbnWimI00OVbVEtMb:2d6NxBGbSZHKd6NxBGbSZ7VDb
                              MD5:172A98CF599ABF3D9957641EBBDA31B8
                              SHA1:40FB8B7A0827EE7242D10118FA8BBDDD197BEEEC
                              SHA-256:823DD68FC55E04CDDF0528F7080DA923399C440ABB690B45240FFC21C6444CC3
                              SHA-512:9C49AB44924492BA5A88A10CBB9A481E305ABF31FE26A799C8CC330C71AA24D7B6E13DFB2800B69C07EC856C89CC60B7FB49F058BD76699663C9723A9A0A00C2
                              Malicious:false
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x84ba93b3,0x01d7a668</date><accdate>0x84ba93b3,0x01d7a668</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x84ba93b3,0x01d7a668</date><accdate>0x84ba93b3,0x01d7a668</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin8215062560\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):656
                              Entropy (8bit):5.1120973056125765
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxfnIvJevbnWimI002EtM3MHdNMNxfnIvJevbnWimI00OVbe5EtMb:2d6NxOGbSZHKd6NxOGbSZ7Vijb
                              MD5:8707B064A8987BA430C2BDEEC66D090A
                              SHA1:BE33B934CAE29FAD8B0CA3D26A658560DBD9409A
                              SHA-256:2632B113DE1FC5C0EAFAAADB7D7565509EB8B2876752DABEC9352C5006C8CD77
                              SHA-512:71054E414AE0861208CD35B4EB0E3B453F61409A68E92BC275054B508B8A09864E0ECF89B986F9369391BA7AB1ADB178EA5ABBB9DC3F8D7044D4D658FB01695F
                              Malicious:false
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0x84ba93b3,0x01d7a668</date><accdate>0x84ba93b3,0x01d7a668</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0x84ba93b3,0x01d7a668</date><accdate>0x84ba93b3,0x01d7a668</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Google.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3Y2ADQKS\NewErrorPageTemplate[1]
                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1612
                              Entropy (8bit):4.869554560514657
                              Encrypted:false
                              SSDEEP:24:5Y0bQ573pHpACtUZtJD0lFBopZleqw87xTe4D8FaFJ/Doz9AtjJgbCzg:5m73jcJqQep89TEw7Uxkk
                              MD5:DFEABDE84792228093A5A270352395B6
                              SHA1:E41258C9576721025926326F76063C2305586F76
                              SHA-256:77B138AB5D0A90FF04648C26ADDD5E414CC178165E3B54A4CB3739DA0F58E075
                              SHA-512:E256F603E67335151BB709294749794E2E3085F4063C623461A0B3DECBCCA8E620807B707EC9BCBE36DCD7D639C55753DA0495BE85B4AE5FB6BFC52AB4B284FD
                              Malicious:false
                              Preview: .body..{.. background-repeat: repeat-x;.. background-color: white;.. font-family: "Segoe UI", "verdana", "arial";.. margin: 0em;.. color: #1f1f1f;..}.....mainContent..{.. margin-top:80px;.. width: 700px;.. margin-left: 120px;.. margin-right: 120px;..}.....title..{.. color: #54b0f7;.. font-size: 36px;.. font-weight: 300;.. line-height: 40px;.. margin-bottom: 24px;.. font-family: "Segoe UI", "verdana";.. position: relative;..}.....errorExplanation..{.. color: #000000;.. font-size: 12pt;.. font-family: "Segoe UI", "verdana", "arial";.. text-decoration: none;..}.....taskSection..{.. margin-top: 20px;.. margin-bottom: 28px;.. position: relative; ..}.....tasks..{.. color: #000000;.. font-family: "Segoe UI", "verdana";.. font-weight:200;.. font-size: 12pt;..}....li..{.. margin-top: 8px;..}.....diagnoseButton..{.. outline: none;.. font-size: 9pt;..}.....launchInternetOptionsButton..{.. outline: none;
                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3Y2ADQKS\down[1]
                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
                              Category:dropped
                              Size (bytes):748
                              Entropy (8bit):7.249606135668305
                              Encrypted:false
                              SSDEEP:12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
                              MD5:C4F558C4C8B56858F15C09037CD6625A
                              SHA1:EE497CC061D6A7A59BB66DEFEA65F9A8145BA240
                              SHA-256:39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781
                              SHA-512:D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44
                              Malicious:false
                              Preview: .PNG........IHDR...............ex....PLTE....W..W..W..W..W..W..W..W..W..W..W..W..W.U..............W..W.!Y.#Z.$\.'].<r.=s.P..Q..Q..U..o..p..r..x..z..~.............................................b.............................................................................................................................................................................................................$..s...7tRNS.a.o(,.s....e......q*...................................F.Z....IDATx^%.S..@.C..jm.mTk...m.?|;.y..S....F.t...,.......D.>..LpX=f.M...H4........=...=..xy.[h..7....7.....<.q.kH....#+....I..z.....'.ksC...X<.+..J>....%3BmqaV...h..Z._.:<.Y_jG...vN^.<>.Nu.u@.....M....?...1D.m~)s8..&....IEND.B`.
                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3Y2ADQKS\errorPageStrings[1]
                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):4720
                              Entropy (8bit):5.164796203267696
                              Encrypted:false
                              SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
                              MD5:D65EC06F21C379C87040B83CC1ABAC6B
                              SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
                              SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
                              SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
                              Malicious:false
                              Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9QTQHWWN\NewErrorPageTemplate[1]
                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):1612
                              Entropy (8bit):4.869554560514657
                              Encrypted:false
                              SSDEEP:24:5Y0bQ573pHpACtUZtJD0lFBopZleqw87xTe4D8FaFJ/Doz9AtjJgbCzg:5m73jcJqQep89TEw7Uxkk
                              MD5:DFEABDE84792228093A5A270352395B6
                              SHA1:E41258C9576721025926326F76063C2305586F76
                              SHA-256:77B138AB5D0A90FF04648C26ADDD5E414CC178165E3B54A4CB3739DA0F58E075
                              SHA-512:E256F603E67335151BB709294749794E2E3085F4063C623461A0B3DECBCCA8E620807B707EC9BCBE36DCD7D639C55753DA0495BE85B4AE5FB6BFC52AB4B284FD
                              Malicious:false
                              Preview: .body..{.. background-repeat: repeat-x;.. background-color: white;.. font-family: "Segoe UI", "verdana", "arial";.. margin: 0em;.. color: #1f1f1f;..}.....mainContent..{.. margin-top:80px;.. width: 700px;.. margin-left: 120px;.. margin-right: 120px;..}.....title..{.. color: #54b0f7;.. font-size: 36px;.. font-weight: 300;.. line-height: 40px;.. margin-bottom: 24px;.. font-family: "Segoe UI", "verdana";.. position: relative;..}.....errorExplanation..{.. color: #000000;.. font-size: 12pt;.. font-family: "Segoe UI", "verdana", "arial";.. text-decoration: none;..}.....taskSection..{.. margin-top: 20px;.. margin-bottom: 28px;.. position: relative; ..}.....tasks..{.. color: #000000;.. font-family: "Segoe UI", "verdana";.. font-weight:200;.. font-size: 12pt;..}....li..{.. margin-top: 8px;..}.....diagnoseButton..{.. outline: none;.. font-size: 9pt;..}.....launchInternetOptionsButton..{.. outline: none;
                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9QTQHWWN\dnserror[1]
                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              File Type:HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):2997
                              Entropy (8bit):4.4885437940628465
                              Encrypted:false
                              SSDEEP:48:u7u5V4VyhhV2lFUW29vj0RkpNc7KpAP8Rra:vIlJ6G7Ao8Ra
                              MD5:2DC61EB461DA1436F5D22BCE51425660
                              SHA1:E1B79BCAB0F073868079D807FAEC669596DC46C1
                              SHA-256:ACDEB4966289B6CE46ECC879531F85E9C6F94B718AAB521D38E2E00F7F7F7993
                              SHA-512:A88BECB4FBDDC5AFC55E4DC0135AF714A3EEC4A63810AE5A989F2CECB824A686165D3CEDB8CBD8F35C7E5B9F4136C29DEA32736AABB451FE8088B978B493AC6D
                              Malicious:false
                              Preview: .<!DOCTYPE HTML>..<html>.. <head>.. <link rel="stylesheet" type="text/css" href="NewErrorPageTemplate.css" >.. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.. <title>Can&rsquo;t reach this page</title>.. <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="getInfo(); initMoreInfo('infoBlockID');">.. <div id="contentContainer" class="mainContent">.. <div id="mainTitle" class="title">Can&rsquo;t reach this page</div>.. <div class="taskSection" id="taskSection">.. <ul id="cantDisplayTasks" class="tasks">.. <li id="task1-1">Make sure the web address <span id="webpage" class="webpageURL"></span>is correct</li>.. <li id="task1-2">Search for this site on Bing</li>..
                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9QTQHWWN\down[1]
                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
                              Category:dropped
                              Size (bytes):748
                              Entropy (8bit):7.249606135668305
                              Encrypted:false
                              SSDEEP:12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
                              MD5:C4F558C4C8B56858F15C09037CD6625A
                              SHA1:EE497CC061D6A7A59BB66DEFEA65F9A8145BA240
                              SHA-256:39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781
                              SHA-512:D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44
                              Malicious:false
                              Preview: .PNG........IHDR...............ex....PLTE....W..W..W..W..W..W..W..W..W..W..W..W..W.U..............W..W.!Y.#Z.$\.'].<r.=s.P..Q..Q..U..o..p..r..x..z..~.............................................b.............................................................................................................................................................................................................$..s...7tRNS.a.o(,.s....e......q*...................................F.Z....IDATx^%.S..@.C..jm.mTk...m.?|;.y..S....F.t...,.......D.>..LpX=f.M...H4........=...=..xy.[h..7....7.....<.q.kH....#+....I..z.....'.ksC...X<.+..J>....%3BmqaV...h..Z._.:<.Y_jG...vN^.<>.Nu.u@.....M....?...1D.m~)s8..&....IEND.B`.
                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9QTQHWWN\httpErrorPagesScripts[1]
                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):12105
                              Entropy (8bit):5.451485481468043
                              Encrypted:false
                              SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
                              MD5:9234071287E637F85D721463C488704C
                              SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
                              SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
                              SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
                              Malicious:false
                              Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\G62TDH9B\dnserror[1]
                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              File Type:HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):2997
                              Entropy (8bit):4.4885437940628465
                              Encrypted:false
                              SSDEEP:48:u7u5V4VyhhV2lFUW29vj0RkpNc7KpAP8Rra:vIlJ6G7Ao8Ra
                              MD5:2DC61EB461DA1436F5D22BCE51425660
                              SHA1:E1B79BCAB0F073868079D807FAEC669596DC46C1
                              SHA-256:ACDEB4966289B6CE46ECC879531F85E9C6F94B718AAB521D38E2E00F7F7F7993
                              SHA-512:A88BECB4FBDDC5AFC55E4DC0135AF714A3EEC4A63810AE5A989F2CECB824A686165D3CEDB8CBD8F35C7E5B9F4136C29DEA32736AABB451FE8088B978B493AC6D
                              Malicious:false
                              Preview: .<!DOCTYPE HTML>..<html>.. <head>.. <link rel="stylesheet" type="text/css" href="NewErrorPageTemplate.css" >.. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.. <title>Can&rsquo;t reach this page</title>.. <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="getInfo(); initMoreInfo('infoBlockID');">.. <div id="contentContainer" class="mainContent">.. <div id="mainTitle" class="title">Can&rsquo;t reach this page</div>.. <div class="taskSection" id="taskSection">.. <ul id="cantDisplayTasks" class="tasks">.. <li id="task1-1">Make sure the web address <span id="webpage" class="webpageURL"></span>is correct</li>.. <li id="task1-2">Search for this site on Bing</li>..
                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OTUW0Q90\errorPageStrings[1]
                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):4720
                              Entropy (8bit):5.164796203267696
                              Encrypted:false
                              SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
                              MD5:D65EC06F21C379C87040B83CC1ABAC6B
                              SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
                              SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
                              SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
                              Malicious:false
                              Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OTUW0Q90\httpErrorPagesScripts[1]
                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):12105
                              Entropy (8bit):5.451485481468043
                              Encrypted:false
                              SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
                              MD5:9234071287E637F85D721463C488704C
                              SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
                              SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
                              SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
                              Malicious:false
                              Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
                              C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:modified
                              Size (bytes):89
                              Entropy (8bit):4.386818790536793
                              Encrypted:false
                              SSDEEP:3:oVXUpOWjdAW8JOGXnEpOWjXn:o9UpOWj7qEpOWjX
                              MD5:768C11161FC6B1E1E76625F65EFA5F70
                              SHA1:2A2F4C101834F16E0899CFF1DFDB7C722A1FF9CF
                              SHA-256:1E5AF62802BF3934F288296AC5AEDB9132672AB16F67A6700195F9E17858A53E
                              SHA-512:36E89D3AB8ED174EC1D11A7740FFE717CD8B876BDD0F6D0276DBF8268ECBD18F643C696514780F304960FCC6FD51C81629619607F2A8164C230B8A881C1DBC7A
                              Malicious:false
                              Preview: [2021/09/10 10:23:39.185] Latest deploy version: ..[2021/09/10 10:23:39.185] 11.211.2 ..
                              C:\Users\user\AppData\Local\Temp\~DF2A3A7A2351617C42.TMP
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):38737
                              Entropy (8bit):0.3707502063402793
                              Encrypted:false
                              SSDEEP:48:kBqoxKAuvScS+pHVE4I4wCyDZCyDbCyDU:kBqoxKAuvScS+pHVEnvjxi
                              MD5:D34A8B2E234300326FAFB1CF2638C744
                              SHA1:AE4AC3AEE8ABD3C1CE4A1A2745ED8C896AF7188D
                              SHA-256:888015566900740B3A92646A8004989B365FEAD11EAB3CFC9F83E867ED07FA86
                              SHA-512:16D4BF1CAE3D852A9DD3612E7320A2008D1C992F719803D9ABFA040AB4EC53A0C89DE54964BEA0674BB5E156A73ADF0FFD9DCE7F83C6E779D94DA737A8AC37A5
                              Malicious:false
                              Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Temp\~DF6949C95B3A0F3EDF.TMP
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):12933
                              Entropy (8bit):0.408360662279047
                              Encrypted:false
                              SSDEEP:24:c9lLh9lLh9lIn9lIn9loh69lohq9lWh11tT:kBqoIhlhThzN
                              MD5:59BAB24C6F061156C7934A9FC9EF6DEA
                              SHA1:B25A6033913B2922FA2434C99D0803DB9E3D8303
                              SHA-256:99787AE1D91102A2C30209C2E75E6980EEAFF8925F5051614838C694823EC81F
                              SHA-512:C73A985FD1D22516A7E979564E3D778D511087FBA4B5D00FAC0FF9D8EBC37BF697A8D5F03AD6752000BF05DA2A7BAF2A267CEE83DE9F2F170F0CA67E7A4B433B
                              Malicious:false
                              Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Temp\~DF922DBE2E8FFEAC90.TMP
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):38737
                              Entropy (8bit):0.37075142312029424
                              Encrypted:false
                              SSDEEP:48:kBqoxKAuvScS+iEOnrIrwVyDZVyDbVyDU:kBqoxKAuvScS+iEOnUME+r
                              MD5:DAAD6982DBCE1CF69C6D3E8BF0E599FF
                              SHA1:6FB52EB3C1565658C73464BA0710F185C3463478
                              SHA-256:620CCCDD4C07FEBD380CF58486E838E5B466E01610A6C07A0DC15798C6AAFE24
                              SHA-512:F98E12D6915D197D805CECC39D1C91EE7209D2D0A0CC8A946FCBBE9CC5C914E573114F5065CA6C13FE8C5BACBCB6F60D9ED3C1DA3AC13E903669094053184583
                              Malicious:false
                              Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Temp\~DFFFC0064E6ABA1F29.TMP
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):12933
                              Entropy (8bit):0.4092170793343569
                              Encrypted:false
                              SSDEEP:24:c9lLh9lLh9lIn9lIn9lo99lod9lWa1I15l:kBqoIm41
                              MD5:34200DA4FCF7CD7AB3A9D754BE730ECB
                              SHA1:0513D3C6266CB247E249DB2D9AD53DF6B2FB8742
                              SHA-256:A154C2017185AAD748EEBE531B534D1188793824D31BC1432464CA4F05AF6965
                              SHA-512:A822FB6F13EC44B96C42E0E1D3E16C633BB5B47C4D96B2AACEFC6608B163E526D369F13B933E93D20CA15DA790F7C88E33A8A900A427E248A46D5AF3A858AB82
                              Malicious:false
                              Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                              Static File Info

                              General

                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Entropy (8bit):6.614443427216059
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.96%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:qMROoJ.exe
                              File size:901960
                              MD5:a9ea51f7e1691524abf0d910b79daf9e
                              SHA1:e62e10856d92fe0309730fba2aa1b4d7283089db
                              SHA256:7b9333217f38f9730ac3fdddb68e57daea342b9a985d07a6453adeea702424b7
                              SHA512:16b4253a915480ca7d7137cd7ab004a064137ef6d8ce58d465c2f1c96e058c530dec71fd81ecce3bf545ca2ecba4d4d5d29a3258847028302f02f2f0dfb5f0c7
                              SSDEEP:24576:D9PsA9vHAYobFGQdRHylSk61LXXhtxvZXmtk1/GqgLGl:cYKJk61bRrZXmWGGl
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-..;i..hi..hi..h..xhk..h..}h~..h..|hj..hi..h...h.i.hl..h..~hb..h..|hh..h..`hS..h..zhh..h...hh..hRichi..h.......................

                              File Icon

                              Icon Hash:f0b0e8e4e4e8b2dc

                              Static PE Info

                              General

                              Entrypoint:0x1005725
                              Entrypoint Section:.text
                              Digitally signed:true
                              Imagebase:0x1000000
                              Subsystem:windows gui
                              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                              DLL Characteristics:TERMINAL_SERVER_AWARE, NX_COMPAT
                              Time Stamp:0x55E85856 [Thu Sep 3 14:25:26 2015 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:6
                              OS Version Minor:0
                              File Version Major:6
                              File Version Minor:0
                              Subsystem Version Major:6
                              Subsystem Version Minor:0
                              Import Hash:41ef1b155e6156718ba0d7eb8995e137

                              Authenticode Signature

                              Signature Valid:false
                              Signature Issuer:CN=Sectigo RSA Code Signing CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
                              Signature Validation Error:No signature was present in the subject
                              Error Number:-2146762496
                              Not Before, Not After
                              • 4/12/2021 5:00:00 PM 4/13/2022 4:59:59 PM
                              Subject Chain
                              • CN=FORTH PROPERTY LTD, O=FORTH PROPERTY LTD, L=Edinburgh, C=GB
                              Version:3
                              Thumbprint MD5:8AB6A86211EE700AA961C3292ADB312D
                              Thumbprint SHA-1:A533DFA7E6AED2A9FFBE41FCEC5A8927A6EAFBBB
                              Thumbprint SHA-256:9E0611728595A506CC2A55486FDD88ECA0971EF0B08F74CB3B3B6F5F6F3C7E27
                              Serial:239664C12BAEB5A6D787912888051392

                              Entrypoint Preview

                              Instruction
                              call 00007F410CC195B0h
                              jmp 00007F410CC124C5h
                              push 00000014h
                              push 0108A9F8h
                              call 00007F410CC1749Ah
                              call 00007F410CC12C9Bh
                              movzx esi, ax
                              push 00000002h
                              call 00007F410CC19543h
                              pop ecx
                              mov eax, 00005A4Dh
                              cmp word ptr [01000000h], ax
                              je 00007F410CC124C6h
                              xor ebx, ebx
                              jmp 00007F410CC124F5h
                              mov eax, dword ptr [0100003Ch]
                              cmp dword ptr [eax+01000000h], 00004550h
                              jne 00007F410CC124ADh
                              mov ecx, 0000010Bh
                              cmp word ptr [eax+01000018h], cx
                              jne 00007F410CC1249Fh
                              xor ebx, ebx
                              cmp dword ptr [eax+01000074h], 0Eh
                              jbe 00007F410CC124CBh
                              cmp dword ptr [eax+010000E8h], ebx
                              setne bl
                              mov dword ptr [ebp-1Ch], ebx
                              call 00007F410CC173EDh
                              test eax, eax
                              jne 00007F410CC124CAh
                              push 0000001Ch
                              call 00007F410CC125E7h
                              pop ecx
                              call 00007F410CC188ABh
                              test eax, eax
                              jne 00007F410CC124CAh
                              push 00000010h
                              call 00007F410CC125D6h
                              pop ecx
                              call 00007F410CC195BCh
                              and dword ptr [ebp-04h], 00000000h
                              call 00007F410CC18EA7h
                              test eax, eax
                              jns 00007F410CC124CAh
                              push 0000001Bh
                              call 00007F410CC125BCh
                              pop ecx
                              call dword ptr [0106A19Ch]
                              mov dword ptr [010AC3A8h], eax
                              call 00007F410CC195D7h
                              mov dword ptr [01097A94h], eax
                              call 00007F410CC19194h
                              test eax, eax
                              jns 00007F410CC124CAh

                              Data Directories

                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x8ccf80x8c.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xad0000x41028.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0xda0000x2348.rsrc
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xef0000x4d50.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x6a3b00x38.rdata
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x879400x40.rdata
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x6a0000x328.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                              Sections

                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x681b90x68200False0.623956613896data6.85141670338IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                              .rdata0x6a0000x23f8a0x24000False0.641696506076data6.36645327435IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0x8e0000x1e3ac0x7a00False0.527792008197data6.51367686644IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                              .rsrc0xad0000x410280x41200False0.240744211852data5.36312234805IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0xef0000x4d500x4e00False0.730168269231data6.65913941378IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                              Resources

                              NameRVASizeTypeLanguageCountry
                              RT_ICON0xad4340x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0EnglishUnited States
                              RT_ICON0xbdc5c0x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 16580607, next used block 4294917888EnglishUnited States
                              RT_ICON0xc1e840x25a8dataEnglishUnited States
                              RT_ICON0xc442c0x10a8dataEnglishUnited States
                              RT_ICON0xc54d40x988dataEnglishUnited States
                              RT_ICON0xc5e5c0x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                              RT_ICON0xc62c40x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0EnglishUnited States
                              RT_ICON0xd6aec0x94a8dataEnglishUnited States
                              RT_ICON0xdff940x5488dataEnglishUnited States
                              RT_ICON0xe541c0x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 254, next used block 520093696EnglishUnited States
                              RT_ICON0xe96440x25a8dataEnglishUnited States
                              RT_ICON0xebbec0x10a8dataEnglishUnited States
                              RT_ICON0xecc940x988dataEnglishUnited States
                              RT_ICON0xed61c0x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                              RT_STRING0xeda840xbcdataEnglishUnited States
                              RT_STRING0xedb400x150dataEnglishUnited States
                              RT_GROUP_ICON0xedc900x76dataEnglishUnited States
                              RT_GROUP_ICON0xedd080x5adataEnglishUnited States
                              RT_VERSION0xedd640x2c4dataEnglishUnited States

                              Imports

                              DLLImport
                              KERNEL32.dllGetLastError, VirtualProtectEx, LoadLibraryA, OpenMutexA, SetConsoleOutputCP, DeviceIoControl, GetModuleFileNameA, CloseHandle, DeleteFileA, WriteConsoleW, SetStdHandle, GetStringTypeW, LoadLibraryW, WaitForMultipleObjectsEx, GetStartupInfoA, GetConsoleMode, GetConsoleCP, FlushFileBuffers, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetLocaleInfoW, LCMapStringW, CompareStringW, GetTimeFormatW, GetDateFormatW, GetCPInfo, GetOEMCP, GetACP, IsValidCodePage, HeapReAlloc, CreateProcessA, Sleep, GetTickCount, SetFilePointerEx, GetCurrentProcess, UnregisterWaitEx, QueryDepthSList, InterlockedFlushSList, InterlockedPushEntrySList, InterlockedPopEntrySList, InitializeSListHead, ReleaseSemaphore, SetProcessAffinityMask, VirtualProtect, VirtualFree, VirtualAlloc, GetVersionExW, GetModuleHandleA, FreeLibraryAndExitThread, FreeLibrary, GetThreadTimes, OutputDebugStringW, FatalAppExitA, SetConsoleCtrlHandler, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCurrentProcessId, QueryPerformanceCounter, GetFileType, HeapSize, GetProcessHeap, GetModuleFileNameW, WriteFile, GetStdHandle, WideCharToMultiByte, MultiByteToWideChar, AreFileApisANSI, GetModuleHandleExW, ExitProcess, IsDebuggerPresent, UnregisterWait, RegisterWaitForSingleObject, SetThreadAffinityMask, GetProcessAffinityMask, GetNumaHighestNodeNumber, DeleteTimerQueueTimer, ChangeTimerQueueTimer, CreateTimerQueueTimer, GetLogicalProcessorInformation, GetThreadPriority, SetThreadPriority, SwitchToThread, SignalObjectAndWait, WaitForSingleObjectEx, SetEvent, DuplicateHandle, WaitForSingleObject, GetCurrentThread, GetCurrentThreadId, GetExitCodeThread, GetSystemTimeAsFileTime, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, HeapAlloc, EncodePointer, DecodePointer, GetCommandLineA, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, SetLastError, InitializeCriticalSectionAndSpinCount, CreateEventW, TerminateProcess, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetModuleHandleW, GetProcAddress, CreateSemaphoreW, CreateThread, ExitThread, LoadLibraryExW, RaiseException, RtlUnwind, HeapFree, TryEnterCriticalSection, CreateTimerQueue, RtlCaptureStackBackTrace, CreateFileW
                              USER32.dllSetWindowTextA, CallNextHookEx, LoadBitmapA, GetClassInfoExA, EnumWindows, GetIconInfo, IsDialogMessageA, GetWindowLongA, CreateWindowExA, ReleaseDC, DefWindowProcA, CheckDlgButton, SendMessageA
                              ole32.dllCoUninitialize, OleSetContainedObject, OleInitialize, CoSuspendClassObjects, OleUninitialize, StgCreateDocfile, CoInitialize
                              COMCTL32.dllImageList_LoadImageA, PropertySheetA, CreatePropertySheetPageA
                              WINSPOOL.DRVDeletePortA, SetPrinterDataA, DeleteFormA, SetPortA, SetPrinterDataExA, AddMonitorA, ScheduleJob, AddPrinterConnectionA, ReadPrinter, AddPrinterDriverA, GetPrinterDataA, ResetPrinterA, PrinterMessageBoxA, DeletePrintProcessorA, GetPrinterDriverDirectoryA, OpenPrinterA, AddPortA, ConfigurePortA, GetPrinterDataExA, GetJobA, AddPrinterDriverExA, ClosePrinter, DeletePrinterDataExA, DeletePrinterConnectionA, DeletePrintProvidorA, StartPagePrinter, AbortPrinter, GetPrintProcessorDirectoryA, StartDocPrinterA, GetPrinterA, AddPrinterA, DeletePrinter, DeleteMonitorA, GetPrinterDriverA, AddFormA, DeletePrinterDriverA, AddPrintProcessorA, AddPrintProvidorA, SetFormA, GetFormA, DeletePrinterDataA, AddJobA, FlushPrinter, DeletePrinterDriverExA, SetJobA, FindClosePrinterChangeNotification, DeletePrinterKeyA
                              sfc.dllSfcIsFileProtected

                              Version Infos

                              DescriptionData
                              LegalCopyright(C) 2011 Helpwould Use Corporation. All rights reserved.
                              FileVersion14.1.55.63
                              CompanyNameHelpwould Use Corporation
                              ProductNameDeathice
                              ProductVersion14.1.55.63
                              FileDescriptionDeathice The Certain
                              Translation0x0409 0x04b0

                              Possible Origin

                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States

                              Network Behavior

                              Network Port Distribution

                              UDP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              Sep 10, 2021 10:22:34.383321047 CEST6134653192.168.2.68.8.8.8
                              Sep 10, 2021 10:22:34.411827087 CEST53613468.8.8.8192.168.2.6
                              Sep 10, 2021 10:22:35.857095957 CEST5177453192.168.2.68.8.8.8
                              Sep 10, 2021 10:22:35.882103920 CEST53517748.8.8.8192.168.2.6
                              Sep 10, 2021 10:22:35.889744997 CEST5602353192.168.2.68.8.8.8
                              Sep 10, 2021 10:22:35.914598942 CEST53560238.8.8.8192.168.2.6
                              Sep 10, 2021 10:22:37.299608946 CEST5838453192.168.2.68.8.8.8
                              Sep 10, 2021 10:22:37.342854977 CEST53583848.8.8.8192.168.2.6
                              Sep 10, 2021 10:22:47.125092030 CEST6026153192.168.2.68.8.8.8
                              Sep 10, 2021 10:22:47.161473036 CEST53602618.8.8.8192.168.2.6
                              Sep 10, 2021 10:22:57.660783052 CEST5606153192.168.2.68.8.8.8
                              Sep 10, 2021 10:22:57.693717957 CEST53560618.8.8.8192.168.2.6
                              Sep 10, 2021 10:23:01.359128952 CEST5833653192.168.2.68.8.8.8
                              Sep 10, 2021 10:23:01.423032045 CEST53583368.8.8.8192.168.2.6
                              Sep 10, 2021 10:23:02.228138924 CEST5378153192.168.2.68.8.8.8
                              Sep 10, 2021 10:23:02.277550936 CEST53537818.8.8.8192.168.2.6
                              Sep 10, 2021 10:23:02.786932945 CEST5406453192.168.2.68.8.8.8
                              Sep 10, 2021 10:23:02.818659067 CEST53540648.8.8.8192.168.2.6
                              Sep 10, 2021 10:23:03.142703056 CEST5281153192.168.2.68.8.8.8
                              Sep 10, 2021 10:23:03.172487020 CEST53528118.8.8.8192.168.2.6
                              Sep 10, 2021 10:23:03.666423082 CEST5529953192.168.2.68.8.8.8
                              Sep 10, 2021 10:23:03.693470955 CEST53552998.8.8.8192.168.2.6
                              Sep 10, 2021 10:23:03.847940922 CEST6374553192.168.2.68.8.8.8
                              Sep 10, 2021 10:23:03.880991936 CEST53637458.8.8.8192.168.2.6
                              Sep 10, 2021 10:23:04.150223017 CEST5005553192.168.2.68.8.8.8
                              Sep 10, 2021 10:23:04.183187008 CEST53500558.8.8.8192.168.2.6
                              Sep 10, 2021 10:23:04.460748911 CEST6137453192.168.2.68.8.8.8
                              Sep 10, 2021 10:23:04.491720915 CEST53613748.8.8.8192.168.2.6
                              Sep 10, 2021 10:23:04.752162933 CEST5033953192.168.2.68.8.8.8
                              Sep 10, 2021 10:23:04.784918070 CEST53503398.8.8.8192.168.2.6
                              Sep 10, 2021 10:23:05.428771019 CEST6330753192.168.2.68.8.8.8
                              Sep 10, 2021 10:23:05.456361055 CEST53633078.8.8.8192.168.2.6
                              Sep 10, 2021 10:23:05.463634968 CEST6137453192.168.2.68.8.8.8
                              Sep 10, 2021 10:23:05.500566959 CEST53613748.8.8.8192.168.2.6
                              Sep 10, 2021 10:23:06.266515970 CEST4969453192.168.2.68.8.8.8
                              Sep 10, 2021 10:23:06.293809891 CEST53496948.8.8.8192.168.2.6
                              Sep 10, 2021 10:23:06.510461092 CEST6137453192.168.2.68.8.8.8
                              Sep 10, 2021 10:23:06.546000957 CEST53613748.8.8.8192.168.2.6
                              Sep 10, 2021 10:23:06.797967911 CEST5498253192.168.2.68.8.8.8
                              Sep 10, 2021 10:23:06.831012964 CEST53549828.8.8.8192.168.2.6
                              Sep 10, 2021 10:23:08.557707071 CEST6137453192.168.2.68.8.8.8
                              Sep 10, 2021 10:23:08.593396902 CEST53613748.8.8.8192.168.2.6
                              Sep 10, 2021 10:23:12.605595112 CEST6137453192.168.2.68.8.8.8
                              Sep 10, 2021 10:23:12.642954111 CEST53613748.8.8.8192.168.2.6
                              Sep 10, 2021 10:23:14.853615046 CEST5001053192.168.2.68.8.8.8
                              Sep 10, 2021 10:23:14.882498026 CEST53500108.8.8.8192.168.2.6
                              Sep 10, 2021 10:23:35.485574007 CEST6371853192.168.2.68.8.8.8
                              Sep 10, 2021 10:23:35.521574974 CEST53637188.8.8.8192.168.2.6
                              Sep 10, 2021 10:23:38.199752092 CEST6211653192.168.2.68.8.8.8
                              Sep 10, 2021 10:23:38.237025023 CEST53621168.8.8.8192.168.2.6
                              Sep 10, 2021 10:23:39.388670921 CEST6381653192.168.2.68.8.8.8
                              Sep 10, 2021 10:23:39.422930002 CEST53638168.8.8.8192.168.2.6
                              Sep 10, 2021 10:23:39.427891016 CEST5501453192.168.2.68.8.8.8
                              Sep 10, 2021 10:23:39.461796045 CEST53550148.8.8.8192.168.2.6
                              Sep 10, 2021 10:23:39.468439102 CEST6220853192.168.2.68.8.8.8
                              Sep 10, 2021 10:23:39.505053043 CEST53622088.8.8.8192.168.2.6
                              Sep 10, 2021 10:23:48.122762918 CEST5757453192.168.2.68.8.8.8
                              Sep 10, 2021 10:23:48.172099113 CEST53575748.8.8.8192.168.2.6
                              Sep 10, 2021 10:23:51.098311901 CEST5181853192.168.2.68.8.8.8
                              Sep 10, 2021 10:23:51.136373997 CEST53518188.8.8.8192.168.2.6

                              DNS Queries

                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                              Sep 10, 2021 10:22:35.857095957 CEST192.168.2.68.8.8.80xba1eStandard query (0)haverit.xyzA (IP address)IN (0x0001)
                              Sep 10, 2021 10:22:35.889744997 CEST192.168.2.68.8.8.80xe877Standard query (0)haverit.xyzA (IP address)IN (0x0001)
                              Sep 10, 2021 10:22:47.125092030 CEST192.168.2.68.8.8.80x9cb8Standard query (0)haverit.xyzA (IP address)IN (0x0001)
                              Sep 10, 2021 10:22:57.660783052 CEST192.168.2.68.8.8.80x1e8eStandard query (0)haverit.xyzA (IP address)IN (0x0001)
                              Sep 10, 2021 10:23:39.388670921 CEST192.168.2.68.8.8.80x2a6aStandard query (0)haverit.xyzA (IP address)IN (0x0001)
                              Sep 10, 2021 10:23:39.427891016 CEST192.168.2.68.8.8.80xa20fStandard query (0)haverit.xyzA (IP address)IN (0x0001)
                              Sep 10, 2021 10:23:39.468439102 CEST192.168.2.68.8.8.80x5460Standard query (0)haverit.xyzA (IP address)IN (0x0001)

                              DNS Answers

                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                              Sep 10, 2021 10:22:35.882103920 CEST8.8.8.8192.168.2.60xba1eName error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                              Sep 10, 2021 10:22:35.914598942 CEST8.8.8.8192.168.2.60xe877Name error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                              Sep 10, 2021 10:22:47.161473036 CEST8.8.8.8192.168.2.60x9cb8Name error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                              Sep 10, 2021 10:22:57.693717957 CEST8.8.8.8192.168.2.60x1e8eName error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                              Sep 10, 2021 10:23:39.422930002 CEST8.8.8.8192.168.2.60x2a6aName error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                              Sep 10, 2021 10:23:39.461796045 CEST8.8.8.8192.168.2.60xa20fName error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                              Sep 10, 2021 10:23:39.505053043 CEST8.8.8.8192.168.2.60x5460Name error (3)haverit.xyznonenoneA (IP address)IN (0x0001)

                              Code Manipulations

                              Statistics

                              CPU Usage

                              Click to jump to process

                              Memory Usage

                              Click to jump to process

                              Behavior

                              Click to jump to process

                              System Behavior

                              General

                              Start time:10:22:10
                              Start date:10/09/2021
                              Path:C:\Users\user\Desktop\qMROoJ.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Users\user\Desktop\qMROoJ.exe'
                              Imagebase:0x1000000
                              File size:901960 bytes
                              MD5 hash:A9EA51F7E1691524ABF0D910B79DAF9E
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.380136818.0000000003680000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.380681935.0000000003680000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.381031036.0000000003680000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.381667904.0000000003680000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.381609527.0000000003680000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.381098376.0000000003680000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.380826374.0000000003680000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.381456584.0000000003680000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.380954582.0000000003680000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.381283033.0000000003680000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.381792101.0000000003680000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.381513326.0000000003680000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.381725556.0000000003680000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000002.606917729.0000000003680000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.381223984.0000000003680000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.379920263.0000000003680000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.381641073.0000000003680000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.381783120.0000000003680000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.380238117.0000000003680000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.380038613.0000000003680000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.381573847.0000000003680000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.381770851.0000000003680000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.380416686.0000000003680000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.380893206.0000000003680000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.380519571.0000000003680000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.381690336.0000000003680000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.381152025.0000000003680000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.380754604.0000000003680000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.381401291.0000000003680000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.381344804.0000000003680000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.381754017.0000000003680000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.380600806.0000000003680000.00000004.00000040.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000001.00000003.380334227.0000000003680000.00000004.00000040.sdmp, Author: Joe Security
                              Reputation:low

                              General

                              Start time:10:22:34
                              Start date:10/09/2021
                              Path:C:\Program Files\internet explorer\iexplore.exe
                              Wow64 process (32bit):false
                              Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                              Imagebase:0x7ff721e20000
                              File size:823560 bytes
                              MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:10:22:34
                              Start date:10/09/2021
                              Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6084 CREDAT:17410 /prefetch:2
                              Imagebase:0x140000
                              File size:822536 bytes
                              MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:10:23:37
                              Start date:10/09/2021
                              Path:C:\Program Files\internet explorer\iexplore.exe
                              Wow64 process (32bit):false
                              Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                              Imagebase:0x7ff721e20000
                              File size:823560 bytes
                              MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              General

                              Start time:10:23:38
                              Start date:10/09/2021
                              Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6536 CREDAT:17410 /prefetch:2
                              Imagebase:0x140000
                              File size:822536 bytes
                              MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high

                              Disassembly

                              Code Analysis

                              Reset < >