Loading ...

Play interactive tourEdit tour

Windows Analysis Report ixGWwYWQOV.exe

Overview

General Information

Sample Name:ixGWwYWQOV.exe
Analysis ID:481298
MD5:6c4e1328230fd65c2c8232e7b9f838ae
SHA1:9cfbf6477457d26555e37ad3717cccd3aadc7dbe
SHA256:31941577d287f7445f2791c78da17ffcd54baee40acf61dc0ff27a3f1d5253e6
Tags:exeGozi
Infos:

Most interesting Screenshot:

Detection

Ursnif Ursnif v3
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Ursnif
Multi AV Scanner detection for submitted file
Detected unpacking (changes PE section rights)
Yara detected Ursnif
Writes or reads registry keys via WMI
Writes registry values via WMI
Machine Learning detection for sample
Performs DNS queries to domains with low reputation
Uses 32bit PE files
Antivirus or Machine Learning detection for unpacked file
PE file contains an invalid checksum
PE file contains strange resources
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
PE / OLE file has an invalid certificate
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)

Classification

Process Tree

  • System is w10x64
  • ixGWwYWQOV.exe (PID: 5244 cmdline: 'C:\Users\user\Desktop\ixGWwYWQOV.exe' MD5: 6C4E1328230FD65C2C8232E7B9F838AE)
  • iexplore.exe (PID: 6264 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 6312 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6264 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • iexplore.exe (PID: 5452 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 5608 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5452 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000003.299620365.0000000003510000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
    00000000.00000003.299260696.0000000003510000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
      00000000.00000003.299197344.0000000003510000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
        00000000.00000003.298965891.0000000003510000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
          00000000.00000003.300025842.0000000003510000.00000004.00000040.sdmpJoeSecurity_UrsnifYara detected UrsnifJoe Security
            Click to see the 29 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            0.3.ixGWwYWQOV.exe.da9d7c.0.raw.unpackJoeSecurity_Ursnifv3Yara detected UrsnifJoe Security
              0.2.ixGWwYWQOV.exe.1000000.0.unpackJoeSecurity_Ursnifv3Yara detected UrsnifJoe Security

                Sigma Overview

                No Sigma rule has matched

                Jbx Signature Overview

                Click to jump to signature section

                Show All Signature Results

                AV Detection:

                barindex
                Multi AV Scanner detection for submitted fileShow sources
                Source: ixGWwYWQOV.exeVirustotal: Detection: 21%Perma Link
                Source: ixGWwYWQOV.exeReversingLabs: Detection: 26%
                Machine Learning detection for sampleShow sources
                Source: ixGWwYWQOV.exeJoe Sandbox ML: detected
                Source: 0.2.ixGWwYWQOV.exe.1000000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen7
                Source: 0.3.ixGWwYWQOV.exe.da9d7c.0.unpackAvira: Label: TR/Patched.Ren.Gen
                Source: ixGWwYWQOV.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll
                Source: Binary string: c:\Muchwin\WorkWhich\centstring\shinegray\WanthumanMarket.pdb source: ixGWwYWQOV.exe

                Networking:

                barindex
                Performs DNS queries to domains with low reputationShow sources
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: haverit.xyz
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: haverit.xyz
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: haverit.xyz
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeDNS query: haverit.xyz
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeDNS query: haverit.xyz
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: haverit.xyz
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: haverit.xyz
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeDNS query: haverit.xyz
                Source: unknownDNS traffic detected: query: haverit.xyz replaycode: Server failure (2)
                Source: unknownDNS traffic detected: query: haverit.xyz replaycode: Name error (3)
                Source: msapplication.xml0.14.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xeca8a590,0x01d7a69e</date><accdate>0xeca8a590,0x01d7a69e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
                Source: msapplication.xml0.14.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xeca8a590,0x01d7a69e</date><accdate>0xeca8a590,0x01d7a69e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
                Source: msapplication.xml5.14.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xecafcbfa,0x01d7a69e</date><accdate>0xecafcbfa,0x01d7a69e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
                Source: msapplication.xml5.14.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xecafcbfa,0x01d7a69e</date><accdate>0xecafcbfa,0x01d7a69e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
                Source: msapplication.xml7.14.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xecafcbfa,0x01d7a69e</date><accdate>0xecafcbfa,0x01d7a69e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
                Source: msapplication.xml7.14.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xecafcbfa,0x01d7a69e</date><accdate>0xecafcbfa,0x01d7a69e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
                Source: ixGWwYWQOV.exe, 00000000.00000003.299926777.0000000003510000.00000004.00000040.sdmpString found in binary or memory: http://%s=%s&file://&os=%u.%u_%u_%u_x%uindex.html;
                Source: ixGWwYWQOV.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                Source: ixGWwYWQOV.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                Source: ixGWwYWQOV.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                Source: ixGWwYWQOV.exeString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                Source: ixGWwYWQOV.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
                Source: ixGWwYWQOV.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                Source: ixGWwYWQOV.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                Source: ixGWwYWQOV.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                Source: ixGWwYWQOV.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                Source: ixGWwYWQOV.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
                Source: ixGWwYWQOV.exeString found in binary or memory: http://ocsp.comodoca.com0
                Source: ixGWwYWQOV.exeString found in binary or memory: http://ocsp.digicert.com0C
                Source: ixGWwYWQOV.exeString found in binary or memory: http://ocsp.digicert.com0O
                Source: ixGWwYWQOV.exeString found in binary or memory: http://ocsp.sectigo.com0
                Source: msapplication.xml.14.drString found in binary or memory: http://www.amazon.com/
                Source: ixGWwYWQOV.exeString found in binary or memory: http://www.digicert.com/CPS0
                Source: msapplication.xml1.14.drString found in binary or memory: http://www.google.com/
                Source: msapplication.xml2.14.drString found in binary or memory: http://www.live.com/
                Source: msapplication.xml3.14.drString found in binary or memory: http://www.nytimes.com/
                Source: msapplication.xml4.14.drString found in binary or memory: http://www.reddit.com/
                Source: msapplication.xml5.14.drString found in binary or memory: http://www.twitter.com/
                Source: msapplication.xml6.14.drString found in binary or memory: http://www.wikipedia.com/
                Source: msapplication.xml7.14.drString found in binary or memory: http://www.youtube.com/
                Source: ixGWwYWQOV.exeString found in binary or memory: https://haverit.xyz
                Source: ~DFB8A0D879113F03C7.TMP.28.drString found in binary or memory: https://haverit.xyz/index.htm
                Source: {16F18D8A-1292-11EC-90E6-ECF4BB82F7E0}.dat.14.drString found in binary or memory: https://haverit.xyz/index.htmRoot
                Source: {16F18D8A-1292-11EC-90E6-ECF4BB82F7E0}.dat.14.drString found in binary or memory: https://haverit.xyz/index.htmdex.htm
                Source: ixGWwYWQOV.exeString found in binary or memory: https://sectigo.com/CPS0
                Source: ixGWwYWQOV.exeString found in binary or memory: https://www.digicert.com/CPS0
                Source: unknownDNS traffic detected: queries for: haverit.xyz

                Key, Mouse, Clipboard, Microphone and Screen Capturing:

                barindex
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 0.3.ixGWwYWQOV.exe.da9d7c.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.ixGWwYWQOV.exe.1000000.0.unpack, type: UNPACKEDPE
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 00000000.00000003.299620365.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299260696.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299197344.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.298965891.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.300025842.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.300187569.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299926777.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299677009.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299128367.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.298447630.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.298720367.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299959474.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.522375595.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299054889.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.300165850.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299450851.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299720559.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.298639407.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.298803166.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.298555276.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.300135492.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.300105036.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299988986.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299384530.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299782953.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299827410.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.298884838.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.300078539.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.300048451.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299508546.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299863512.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299563221.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299326737.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: ixGWwYWQOV.exe PID: 5244, type: MEMORYSTR

                E-Banking Fraud:

                barindex
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 0.3.ixGWwYWQOV.exe.da9d7c.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.ixGWwYWQOV.exe.1000000.0.unpack, type: UNPACKEDPE
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 00000000.00000003.299620365.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299260696.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299197344.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.298965891.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.300025842.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.300187569.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299926777.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299677009.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299128367.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.298447630.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.298720367.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299959474.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.522375595.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299054889.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.300165850.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299450851.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299720559.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.298639407.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.298803166.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.298555276.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.300135492.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.300105036.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299988986.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299384530.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299782953.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299827410.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.298884838.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.300078539.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.300048451.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299508546.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299863512.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299563221.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299326737.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: ixGWwYWQOV.exe PID: 5244, type: MEMORYSTR

                System Summary:

                barindex
                Writes or reads registry keys via WMIShow sources
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetDWORDValue
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                Writes registry values via WMIShow sources
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeWMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
                Source: ixGWwYWQOV.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                Source: ixGWwYWQOV.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: ixGWwYWQOV.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: ixGWwYWQOV.exeStatic PE information: invalid certificate
                Source: ixGWwYWQOV.exeVirustotal: Detection: 21%
                Source: ixGWwYWQOV.exeReversingLabs: Detection: 26%
                Source: ixGWwYWQOV.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
                Source: unknownProcess created: C:\Users\user\Desktop\ixGWwYWQOV.exe 'C:\Users\user\Desktop\ixGWwYWQOV.exe'
                Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6264 CREDAT:17410 /prefetch:2
                Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5452 CREDAT:17410 /prefetch:2
                Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6264 CREDAT:17410 /prefetch:2
                Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5452 CREDAT:17410 /prefetch:2
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{674B6698-EE92-11D0-AD71-00C04FD8FDFF}\InprocServer32
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeMutant created: \Sessions\1\BaseNamedObjects\Local\1978EE24-ED7A-8F95-C655-46BAE5CC03A0
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : select * from win32_process
                Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{16F18D88-1292-11EC-90E6-ECF4BB82F7E0}.datJump to behavior
                Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user~1\AppData\Local\Temp\~DFA52BA84DB18EF3E4.TMPJump to behavior
                Source: classification engineClassification label: mal88.troj.evad.winEXE@7/29@8/0
                Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll
                Source: ixGWwYWQOV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: ixGWwYWQOV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: ixGWwYWQOV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: ixGWwYWQOV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: ixGWwYWQOV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: ixGWwYWQOV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: ixGWwYWQOV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: c:\Muchwin\WorkWhich\centstring\shinegray\WanthumanMarket.pdb source: ixGWwYWQOV.exe
                Source: ixGWwYWQOV.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: ixGWwYWQOV.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: ixGWwYWQOV.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: ixGWwYWQOV.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: ixGWwYWQOV.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                Data Obfuscation:

                barindex
                Detected unpacking (changes PE section rights)Show sources
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeUnpacked PE file: 0.2.ixGWwYWQOV.exe.1000000.0.unpack .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.bss:W;.reloc:R;
                Source: ixGWwYWQOV.exeStatic PE information: real checksum: 0xe48d2 should be: 0xe2eb8
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeCode function: 0_3_0351198A push ds; retf
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeCode function: 0_3_0351198A push ds; retf
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeCode function: 0_3_0351198A push ds; retf
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeCode function: 0_3_0351198A push ds; retf
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeCode function: 0_3_0351198A push ds; retf
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeCode function: 0_3_0351198A push ds; retf
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeCode function: 0_3_0351198A push ds; retf
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeCode function: 0_3_0351198A push ds; retf
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeCode function: 0_3_0351198A push ds; retf
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeCode function: 0_3_0351198A push ds; retf
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeCode function: 0_3_0351198A push ds; retf
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeCode function: 0_3_0351198A push ds; retf
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeCode function: 0_3_0351198A push ds; retf
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeCode function: 0_3_0351198A push ds; retf
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeCode function: 0_3_0351198A push ds; retf
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeCode function: 0_3_0351198A push ds; retf
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeCode function: 0_3_0351198A push ds; retf
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeCode function: 0_3_0351198A push ds; retf
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeCode function: 0_3_0351198A push ds; retf
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeCode function: 0_3_0351198A push ds; retf
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeCode function: 0_3_0351198A push ds; retf
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeCode function: 0_3_0351198A push ds; retf
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeCode function: 0_3_0351198A push ds; retf
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeCode function: 0_3_0351198A push ds; retf
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeCode function: 0_3_0351198A push ds; retf
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeCode function: 0_3_0351198A push ds; retf
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeCode function: 0_3_0351198A push ds; retf
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeCode function: 0_3_0351198A push ds; retf
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeCode function: 0_3_0351198A push ds; retf
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeCode function: 0_3_0351198A push ds; retf
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeCode function: 0_3_0351198A push ds; retf
                Source: initial sampleStatic PE information: section name: .text entropy: 6.85142443524

                Hooking and other Techniques for Hiding and Protection:

                barindex
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 0.3.ixGWwYWQOV.exe.da9d7c.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.ixGWwYWQOV.exe.1000000.0.unpack, type: UNPACKEDPE
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 00000000.00000003.299620365.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299260696.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299197344.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.298965891.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.300025842.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.300187569.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299926777.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299677009.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299128367.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.298447630.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.298720367.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299959474.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.522375595.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299054889.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.300165850.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299450851.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299720559.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.298639407.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.298803166.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.298555276.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.300135492.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.300105036.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299988986.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299384530.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299782953.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299827410.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.298884838.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.300078539.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.300048451.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299508546.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299863512.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299563221.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299326737.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: ixGWwYWQOV.exe PID: 5244, type: MEMORYSTR
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exe TID: 6492Thread sleep time: -30000s >= -30000s
                Source: ixGWwYWQOV.exe, 00000000.00000002.521402829.0000000001100000.00000002.00020000.sdmpBinary or memory string: uProgram Manager
                Source: ixGWwYWQOV.exe, 00000000.00000002.521402829.0000000001100000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                Source: ixGWwYWQOV.exe, 00000000.00000002.521402829.0000000001100000.00000002.00020000.sdmpBinary or memory string: Progman
                Source: ixGWwYWQOV.exe, 00000000.00000002.521402829.0000000001100000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
                Source: C:\Users\user\Desktop\ixGWwYWQOV.exeWMI Queries: IWbemServices::ExecQuery - root\securitycenter2 : select * from antispywareproduct

                Stealing of Sensitive Information:

                barindex
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 0.3.ixGWwYWQOV.exe.da9d7c.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.ixGWwYWQOV.exe.1000000.0.unpack, type: UNPACKEDPE
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 00000000.00000003.299620365.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299260696.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299197344.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.298965891.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.300025842.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.300187569.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299926777.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299677009.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299128367.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.298447630.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.298720367.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299959474.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.522375595.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299054889.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.300165850.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299450851.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299720559.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.298639407.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.298803166.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.298555276.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.300135492.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.300105036.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299988986.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299384530.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299782953.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299827410.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.298884838.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.300078539.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.300048451.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299508546.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299863512.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299563221.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299326737.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: ixGWwYWQOV.exe PID: 5244, type: MEMORYSTR

                Remote Access Functionality:

                barindex
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 0.3.ixGWwYWQOV.exe.da9d7c.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.ixGWwYWQOV.exe.1000000.0.unpack, type: UNPACKEDPE
                Yara detected UrsnifShow sources
                Source: Yara matchFile source: 00000000.00000003.299620365.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299260696.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299197344.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.298965891.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.300025842.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.300187569.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299926777.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299677009.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299128367.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.298447630.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.298720367.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299959474.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.522375595.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299054889.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.300165850.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299450851.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299720559.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.298639407.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.298803166.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.298555276.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.300135492.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.300105036.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299988986.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299384530.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299782953.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299827410.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.298884838.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.300078539.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.300048451.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299508546.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299863512.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299563221.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000003.299326737.0000000003510000.00000004.00000040.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: ixGWwYWQOV.exe PID: 5244, type: MEMORYSTR

                Mitre Att&ck Matrix

                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid AccountsWindows Management Instrumentation211Path InterceptionProcess Injection2Masquerading1OS Credential DumpingQuery Registry1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion1LSASS MemorySecurity Software Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Process Injection2Security Account ManagerVirtualization/Sandbox Evasion1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information2NTDSProcess Discovery1Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware Packing12LSA SecretsRemote System Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain CredentialsFile and Directory Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncSystem Information Discovery3Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

                Behavior Graph

                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 481298 Sample: ixGWwYWQOV.exe Startdate: 10/09/2021 Architecture: WINDOWS Score: 88 25 Multi AV Scanner detection for submitted file 2->25 27 Yara detected Ursnif 2->27 29 Yara detected  Ursnif 2->29 31 2 other signatures 2->31 6 ixGWwYWQOV.exe 2->6         started        10 iexplore.exe 1 73 2->10         started        12 iexplore.exe 1 50 2->12         started        process3 dnsIp4 19 haverit.xyz 6->19 33 Detected unpacking (changes PE section rights) 6->33 35 Performs DNS queries to domains with low reputation 6->35 37 Writes or reads registry keys via WMI 6->37 39 Writes registry values via WMI 6->39 14 iexplore.exe 29 10->14         started        17 iexplore.exe 29 12->17         started        signatures5 process6 dnsIp7 21 haverit.xyz 14->21 23 haverit.xyz 17->23

                Screenshots

                Thumbnails

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                windows-stand

                Antivirus, Machine Learning and Genetic Malware Detection

                Initial Sample

                SourceDetectionScannerLabelLink
                ixGWwYWQOV.exe22%VirustotalBrowse
                ixGWwYWQOV.exe27%ReversingLabsWin32.Trojan.Ursnif
                ixGWwYWQOV.exe100%Joe Sandbox ML

                Dropped Files

                No Antivirus matches

                Unpacked PE Files

                SourceDetectionScannerLabelLinkDownload
                0.2.ixGWwYWQOV.exe.1000000.0.unpack100%AviraTR/Crypt.XPACK.Gen7Download File
                0.3.ixGWwYWQOV.exe.da9d7c.0.unpack100%AviraTR/Patched.Ren.GenDownload File

                Domains

                No Antivirus matches

                URLs

                SourceDetectionScannerLabelLink
                https://haverit.xyz/index.htm0%Avira URL Cloudsafe
                https://sectigo.com/CPS00%URL Reputationsafe
                http://ocsp.sectigo.com00%URL Reputationsafe
                https://haverit.xyz/index.htmdex.htm0%Avira URL Cloudsafe
                http://%s=%s&file://&os=%u.%u_%u_%u_x%uindex.html;0%Avira URL Cloudsafe
                http://www.wikipedia.com/0%URL Reputationsafe
                https://haverit.xyz0%Avira URL Cloudsafe
                http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
                http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%URL Reputationsafe
                https://haverit.xyz/index.htmRoot0%Avira URL Cloudsafe

                Domains and IPs

                Contacted Domains

                NameIPActiveMaliciousAntivirus DetectionReputation
                haverit.xyz
                unknown
                unknowntrue
                  unknown

                  URLs from Memory and Binaries

                  NameSourceMaliciousAntivirus DetectionReputation
                  https://haverit.xyz/index.htm~DFB8A0D879113F03C7.TMP.28.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.nytimes.com/msapplication.xml3.14.drfalse
                    high
                    https://sectigo.com/CPS0ixGWwYWQOV.exefalse
                    • URL Reputation: safe
                    unknown
                    http://ocsp.sectigo.com0ixGWwYWQOV.exefalse
                    • URL Reputation: safe
                    unknown
                    https://haverit.xyz/index.htmdex.htm{16F18D8A-1292-11EC-90E6-ECF4BB82F7E0}.dat.14.drfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://%s=%s&file://&os=%u.%u_%u_%u_x%uindex.html;ixGWwYWQOV.exe, 00000000.00000003.299926777.0000000003510000.00000004.00000040.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://www.youtube.com/msapplication.xml7.14.drfalse
                      high
                      http://www.wikipedia.com/msapplication.xml6.14.drfalse
                      • URL Reputation: safe
                      unknown
                      http://www.amazon.com/msapplication.xml.14.drfalse
                        high
                        https://haverit.xyzixGWwYWQOV.exefalse
                        • Avira URL Cloud: safe
                        unknown
                        http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0sixGWwYWQOV.exefalse
                        • URL Reputation: safe
                        unknown
                        http://www.live.com/msapplication.xml2.14.drfalse
                          high
                          http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#ixGWwYWQOV.exefalse
                          • URL Reputation: safe
                          unknown
                          http://www.reddit.com/msapplication.xml4.14.drfalse
                            high
                            http://www.twitter.com/msapplication.xml5.14.drfalse
                              high
                              https://haverit.xyz/index.htmRoot{16F18D8A-1292-11EC-90E6-ECF4BB82F7E0}.dat.14.drfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.google.com/msapplication.xml1.14.drfalse
                                high

                                Contacted IPs

                                No contacted IP infos

                                General Information

                                Joe Sandbox Version:33.0.0 White Diamond
                                Analysis ID:481298
                                Start date:10.09.2021
                                Start time:16:50:33
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:0h 6m 35s
                                Hypervisor based Inspection enabled:false
                                Report type:light
                                Sample file name:ixGWwYWQOV.exe
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                Number of analysed new started processes analysed:31
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • HDC enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Detection:MAL
                                Classification:mal88.troj.evad.winEXE@7/29@8/0
                                EGA Information:Failed
                                HDC Information:Failed
                                HCA Information:
                                • Successful, ratio: 100%
                                • Number of executed functions: 0
                                • Number of non-executed functions: 0
                                Cookbook Comments:
                                • Adjust boot time
                                • Enable AMSI
                                • Found application associated with file extension: .exe
                                Warnings:
                                Show All
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, BackgroundTransferHost.exe, ielowutil.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                                • Excluded IPs from analysis (whitelisted): 23.211.4.86, 20.82.210.154, 23.203.80.193, 93.184.221.240, 20.199.120.151, 20.54.110.249, 40.112.88.60, 80.67.82.235, 80.67.82.211, 152.199.19.161, 20.199.120.182
                                • Excluded domains from analysis (whitelisted): iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, wu.azureedge.net, e11290.dspg.akamaiedge.net, iecvlist.microsoft.com, wns.notify.trafficmanager.net, go.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, wu.wpc.apr-52dd2.edgecastdns.net, client.wns.windows.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ie9comview.vo.msecnd.net, wu.ec.azureedge.net, wu-shim.trafficmanager.net, neu-displaycatalogrp.useroor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, vip3-wns2-par02p.wns.notify.trafficmanager.net, ris.api.iris.microsoft.com, go.microsoft.com.edgekey.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, cs9.wpc.v0cdn.net
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.

                                Simulations

                                Behavior and APIs

                                TimeTypeDescription
                                16:52:14API Interceptor2x Sleep call for process: ixGWwYWQOV.exe modified

                                Joe Sandbox View / Context

                                IPs

                                No context

                                Domains

                                No context

                                ASN

                                No context

                                JA3 Fingerprints

                                No context

                                Dropped Files

                                No context

                                Created / dropped Files

                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{16F18D88-1292-11EC-90E6-ECF4BB82F7E0}.dat
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:Microsoft Word Document
                                Category:dropped
                                Size (bytes):29272
                                Entropy (8bit):1.7737306665376058
                                Encrypted:false
                                SSDEEP:192:rjZoZE2yhWyRtyCifykzV7zMyXzDL6pHBycvUpB:rloTyQyjyrylyXAyx
                                MD5:781F276B44A8E17354185949A21D8C3C
                                SHA1:9654B76E8FD3D9AC6AC7AE4051986AFB1F2181A5
                                SHA-256:7841062D570F0D1B8524354E8536641B2374CB5510784C3C938C1073F959D108
                                SHA-512:12793FD515D79C6ED1BC7AC785737CD22E5AB4227A49990A728132AE8895BD8467D325D23BBEF27CD90BDDC095847AD19C44D69910F0953E51B6E321D70595F8
                                Malicious:false
                                Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{3D493850-1292-11EC-90E6-ECF4BB82F7E0}.dat
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:Microsoft Word Document
                                Category:dropped
                                Size (bytes):29272
                                Entropy (8bit):1.765517080326876
                                Encrypted:false
                                SSDEEP:48:IwJGcprAGwpLIhG/ap8xGIpcqJWGvnZpvqNGoiqAUPqp9q3Go4eqAU8qAUzpmqDR:rPZIZIl2zWgztaifXB/zMind6vzBjQpB
                                MD5:EEC80F35B63DB711708504028E912724
                                SHA1:48C8921EDE35B83A0FA78B5ADA20CC3125443AF0
                                SHA-256:63FC13C9B966AA62963E2829CD77144C25CEF4BFD26228CBEF809215BCDF2DA3
                                SHA-512:DD2C3D2E061F35504FA584E6B8FD171B28C3A39833359A044642580EF8C28EEE556E01AAAB2784C4B85CBCEAA190C6A6396B2D943B4EEE900F24D41986CBA07E
                                Malicious:false
                                Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{16F18D8A-1292-11EC-90E6-ECF4BB82F7E0}.dat
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:Microsoft Word Document
                                Category:dropped
                                Size (bytes):26240
                                Entropy (8bit):1.6609542346766522
                                Encrypted:false
                                SSDEEP:48:IwjGcpr6GwpaHG4pQzGrapbSeGQpBVohGHHpcVGWTGUp8VoGzYpmVkzGopOjkyD8:rZZiQp6XBS2jVoc2VGmWVsMVYkjaVjAA
                                MD5:D15C7DCCA03F662ABBA13326034EE2CC
                                SHA1:E6649D0C5BF0A723BD5B1F5BFD8250AD2CAACF74
                                SHA-256:C0B23A85A1C4FAB1B4BA0F537136BA217F555E791B8459D84811CD91516DAF57
                                SHA-512:C83788F35BFE661EDC8FD8734CE9FD12A312FB15F7B619F452B2FAE0C2F0F072486228F71326DCC5EEB15C18ED8B76C04329F6788E1B81159BFD9193E8ACCE50
                                Malicious:false
                                Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{3D493852-1292-11EC-90E6-ECF4BB82F7E0}.dat
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:Microsoft Word Document
                                Category:modified
                                Size (bytes):26240
                                Entropy (8bit):1.6546105666555921
                                Encrypted:false
                                SSDEEP:48:IwJGcprcGwpawG4pQEhGrapbSUGQpBzWGHHpcPTGUp8n5GzYpmbQ6GopO5yDXGqg:rPZUQw6ExBSMjzV2ZWnXMcikwV5A
                                MD5:E7E83814597FBC0CEA7CB06FD76819FB
                                SHA1:C6ADB3DF64FD6CB745C1310EC2265D1A0DC8403D
                                SHA-256:F3675A3785D1A56496077919D4C9A05ADF3C6BCAB01421A821F67340E73BF51C
                                SHA-512:B382BC73466A0E8971DCA5A6A2FCF362ABFD294BD8A13E3A83D87CE930E11FB2027132D8146B6B0CE8C8D912BD18B8B4865DC235FF9F9244D7962150FE7DD2EE
                                Malicious:false
                                Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-17529550060\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):660
                                Entropy (8bit):5.0265966732661065
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxOEuDE/ADE/1nWimI002EtM3MHdNMNxOEuDE/ADE/1nWimI00OYVbkEty:2d6NxOM/z/1SZHKd6NxOM/z/1SZ7xb
                                MD5:41F6EBBA395AE38837406560C6D36607
                                SHA1:5D5A9FD4CCBE24EBF26058FF7045AE11FE96912C
                                SHA-256:B410B865AE942AD7D0EEAD7334E30628AB8E9FFCDFB0EB65DA248C267208B45D
                                SHA-512:E10C08054D51B6847CAD29BE0C99DCBD124DC2EC443CE6BB3FF83E9B3F7653CFD90184E4B38D96DBEE8C6DD0AC06571EB2DB76C98FB67BA786F392B9AEB3BCAF
                                Malicious:false
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xecafcbfa,0x01d7a69e</date><accdate>0xecafcbfa,0x01d7a69e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xecafcbfa,0x01d7a69e</date><accdate>0xecafcbfa,0x01d7a69e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18270793970\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):657
                                Entropy (8bit):5.078646596942958
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxe2kci1nWimI002EtM3MHdNMNxe2kci1nWimI00OYkak6EtMb:2d6NxrPi1SZHKd6NxrPi1SZ7Ja7b
                                MD5:F40F5D67C662A19AD2D73B468506F6D9
                                SHA1:F6A86DCC1295C78D9D815107576B39D004CC8DEE
                                SHA-256:1E3D604C498576E68B98F2CA2F8B40E7429B8BD2853099595B186B0C966530B0
                                SHA-512:B16427C940CC602F88F6D976B250A8C5D6AC28A9574D86E270F302E40DCEF8BFED73FE4C21218D70AF79B33D7D5071ED057885338040279E2C5EB66079E2B216
                                Malicious:false
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0xeca8a590,0x01d7a69e</date><accdate>0xeca8a590,0x01d7a69e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0xeca8a590,0x01d7a69e</date><accdate>0xeca8a590,0x01d7a69e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Amazon.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-21706820\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):666
                                Entropy (8bit):5.040746518556224
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxvLuDE/ADE/1nWimI002EtM3MHdNMNxvLuDE/ADE/1nWimI00OYmZEtMb:2d6NxvR/z/1SZHKd6NxvR/z/1SZ7Zb
                                MD5:C084CB65CEF16B602B09FA59AF50CA7F
                                SHA1:341568119C29118A98053312E1596F218E57E685
                                SHA-256:FDDF4CAA2768775E2192885C58252FF7F052B523F110B01FA3A8F03D8E04F294
                                SHA-512:540FF71D9F5DEEE230DE927EA5F7A05D7C3C0BF799702ED7477657338506FF8C9A4A15B94482849604D47CBB2845E49565F2B62C8B2D700E72AD99935AB48F1F
                                Malicious:false
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0xecafcbfa,0x01d7a69e</date><accdate>0xecafcbfa,0x01d7a69e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0xecafcbfa,0x01d7a69e</date><accdate>0xecafcbfa,0x01d7a69e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Wikipedia.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):651
                                Entropy (8bit):5.0417849545777695
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxiuDE/ADE/1nWimI002EtM3MHdNMNxiuDE/ADE/1nWimI00OYd5EtMb:2d6Nx2/z/1SZHKd6Nx2/z/1SZ7qjb
                                MD5:EF04CC90833F2413FFB863B6EE9E8A02
                                SHA1:9DFA53752370EA2DE0F3F94BB59973748B82BF53
                                SHA-256:1EAB68F9529D0F7556A7A3C94C23A54FD5BA8C2A6C58E60660672E2342F6D2C5
                                SHA-512:088FFD247D89316BD4E376FD336B9C02475E4FA20F5158C9F00D929C313500BB75DB23675A03EE36CADC85DE199E2A7DBE524DE636FA34F4B22151525C9D4D8E
                                Malicious:false
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0xecafcbfa,0x01d7a69e</date><accdate>0xecafcbfa,0x01d7a69e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0xecafcbfa,0x01d7a69e</date><accdate>0xecafcbfa,0x01d7a69e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Live.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6757900\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:modified
                                Size (bytes):660
                                Entropy (8bit):5.057678286753301
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxhGwuDE/ADE/1nWimI002EtM3MHdNMNxhGwuDE/ADE/1nWimI00OY8K0z:2d6NxQA/z/1SZHKd6NxQA/z/1SZ7RKa/
                                MD5:D76D335B10470B164C89B77313127F0E
                                SHA1:164F978A7F68DFC91FFEF7E68C8B7FAC49CE1A70
                                SHA-256:C2410A372EED63231E11F0240D2F271A8896B0D445CA1141DB9F86696FFA6DA7
                                SHA-512:DA4C2E74DE3ED9B13FCA67C8C180D86FFA0C3F9D8B50C24F7F63F7D12A3EE3BD33DA93BBD3EBB4ADFBF75E7AA7810A53876CC5B26E51249A21DED51BBD4D5848
                                Malicious:false
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xecafcbfa,0x01d7a69e</date><accdate>0xecafcbfa,0x01d7a69e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xecafcbfa,0x01d7a69e</date><accdate>0xecafcbfa,0x01d7a69e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8760897390\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):657
                                Entropy (8bit):5.029742539991567
                                Encrypted:false
                                SSDEEP:12:TMHdNMNx0nuDE/ADE/1nWimI002EtM3MHdNMNx0nuDE/ADE/1nWimI00OYxEtMb:2d6Nx0F/z/1SZHKd6Nx0F/z/1SZ7+b
                                MD5:98F3FE72EE82FE7E0809F0B4821002FE
                                SHA1:2D4E09A7782E1A111E359BB2875C44425E2D663C
                                SHA-256:C6DD72E42B44A085A47821C6DACDD392D6F3CD3CC5E50252E2ADABC269A2B492
                                SHA-512:E2D82BB8F5BA0A680573FB3F359F4085058E2B0B4F49C28BFE438EE9A1BFC63591683B8625E4340277CB90168290D18E89979A37E7A8CC4D4DBE9328F7A9DCA3
                                Malicious:false
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0xecafcbfa,0x01d7a69e</date><accdate>0xecafcbfa,0x01d7a69e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0xecafcbfa,0x01d7a69e</date><accdate>0xecafcbfa,0x01d7a69e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Reddit.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):660
                                Entropy (8bit):5.066694970514444
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxxuDE/ADE/1nWimI002EtM3MHdNMNxxuDE/ADE/1nWimI00OY6Kq5EtMb:2d6Nxr/z/1SZHKd6Nxr/z/1SZ7Xb
                                MD5:E27832EBF5F063985F12DBD31670842D
                                SHA1:382D352A9DC3D1DA9619FF2422F3E9FA175D867E
                                SHA-256:B11EA1FC8D2FAA73CF746C854E0EF310E439947C3312CA0D61863CB0544904B9
                                SHA-512:47A7C5C3D965C887F3296128822878944FED1B999914E80A4117A70251D2769B1341D92BFCAB9FA04610B7B514A154EC2FFB0FBD3FA66C9A98D834C192576767
                                Malicious:false
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0xecafcbfa,0x01d7a69e</date><accdate>0xecafcbfa,0x01d7a69e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0xecafcbfa,0x01d7a69e</date><accdate>0xecafcbfa,0x01d7a69e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\NYTimes.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20332743330\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):663
                                Entropy (8bit):5.066617002549845
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxcci1nWimI002EtM3MHdNMNxcci1nWimI00OYVEtMb:2d6Nx3i1SZHKd6Nx3i1SZ7Gb
                                MD5:98F5F73CF2EE738F3D3641DB83398EF0
                                SHA1:854C595288333709B6B0C4DBF70D405FCDE621AF
                                SHA-256:4EAA1438F49007B9D30C9AF00DFEDF4CD3FE00C29E8A29B9B8F1ED162ECF0202
                                SHA-512:7D526E6A9F91095AE2F7EE28AB306A990EB6DE63BB869E5745349BDF7BFDE781CBE347D14F5C5E821269C06647B4EBC330A1EB625DD8E3B2DDF63AE022D7ADCB
                                Malicious:false
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xeca8a590,0x01d7a69e</date><accdate>0xeca8a590,0x01d7a69e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xeca8a590,0x01d7a69e</date><accdate>0xeca8a590,0x01d7a69e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin8215062560\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):657
                                Entropy (8bit):5.0543220403445765
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxfnci1nWimI002EtM3MHdNMNxfnci1nWimI00OYe5EtMb:2d6Nxki1SZHKd6Nxki1SZ7Fjb
                                MD5:DDD8A7424249B413E6AC1A01E3843FC1
                                SHA1:E9C076045981074FDFBAD957DD418C9F3DA0CE94
                                SHA-256:BDBCA3540F5D55B65F1F719482CA9252E4C26D7318CAA39F2B3B3F2B1AE7D991
                                SHA-512:A3C76D1B4548266E6341CD7D1F7B34974341ED8F35A3B3460D874CBD5F7E9823D77341B33534D54ADC911776B99FC6AF942663CFCD250F9B8159C106530A7FC8
                                Malicious:false
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0xeca8a590,0x01d7a69e</date><accdate>0xeca8a590,0x01d7a69e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0xeca8a590,0x01d7a69e</date><accdate>0xeca8a590,0x01d7a69e</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Google.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0MX4YUS9\down[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
                                Category:dropped
                                Size (bytes):748
                                Entropy (8bit):7.249606135668305
                                Encrypted:false
                                SSDEEP:12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
                                MD5:C4F558C4C8B56858F15C09037CD6625A
                                SHA1:EE497CC061D6A7A59BB66DEFEA65F9A8145BA240
                                SHA-256:39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781
                                SHA-512:D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44
                                Malicious:false
                                Preview: .PNG........IHDR...............ex....PLTE....W..W..W..W..W..W..W..W..W..W..W..W..W.U..............W..W.!Y.#Z.$\.'].<r.=s.P..Q..Q..U..o..p..r..x..z..~.............................................b.............................................................................................................................................................................................................$..s...7tRNS.a.o(,.s....e......q*...................................F.Z....IDATx^%.S..@.C..jm.mTk...m.?|;.y..S....F.t...,.......D.>..LpX=f.M...H4........=...=..xy.[h..7....7.....<.q.kH....#+....I..z.....'.ksC...X<.+..J>....%3BmqaV...h..Z._.:<.Y_jG...vN^.<>.Nu.u@.....M....?...1D.m~)s8..&....IEND.B`.
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2K7JPOQS\NewErrorPageTemplate[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1612
                                Entropy (8bit):4.869554560514657
                                Encrypted:false
                                SSDEEP:24:5Y0bQ573pHpACtUZtJD0lFBopZleqw87xTe4D8FaFJ/Doz9AtjJgbCzg:5m73jcJqQep89TEw7Uxkk
                                MD5:DFEABDE84792228093A5A270352395B6
                                SHA1:E41258C9576721025926326F76063C2305586F76
                                SHA-256:77B138AB5D0A90FF04648C26ADDD5E414CC178165E3B54A4CB3739DA0F58E075
                                SHA-512:E256F603E67335151BB709294749794E2E3085F4063C623461A0B3DECBCCA8E620807B707EC9BCBE36DCD7D639C55753DA0495BE85B4AE5FB6BFC52AB4B284FD
                                Malicious:false
                                Preview: .body..{.. background-repeat: repeat-x;.. background-color: white;.. font-family: "Segoe UI", "verdana", "arial";.. margin: 0em;.. color: #1f1f1f;..}.....mainContent..{.. margin-top:80px;.. width: 700px;.. margin-left: 120px;.. margin-right: 120px;..}.....title..{.. color: #54b0f7;.. font-size: 36px;.. font-weight: 300;.. line-height: 40px;.. margin-bottom: 24px;.. font-family: "Segoe UI", "verdana";.. position: relative;..}.....errorExplanation..{.. color: #000000;.. font-size: 12pt;.. font-family: "Segoe UI", "verdana", "arial";.. text-decoration: none;..}.....taskSection..{.. margin-top: 20px;.. margin-bottom: 28px;.. position: relative; ..}.....tasks..{.. color: #000000;.. font-family: "Segoe UI", "verdana";.. font-weight:200;.. font-size: 12pt;..}....li..{.. margin-top: 8px;..}.....diagnoseButton..{.. outline: none;.. font-size: 9pt;..}.....launchInternetOptionsButton..{.. outline: none;
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2K7JPOQS\dnserror[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):2997
                                Entropy (8bit):4.4885437940628465
                                Encrypted:false
                                SSDEEP:48:u7u5V4VyhhV2lFUW29vj0RkpNc7KpAP8Rra:vIlJ6G7Ao8Ra
                                MD5:2DC61EB461DA1436F5D22BCE51425660
                                SHA1:E1B79BCAB0F073868079D807FAEC669596DC46C1
                                SHA-256:ACDEB4966289B6CE46ECC879531F85E9C6F94B718AAB521D38E2E00F7F7F7993
                                SHA-512:A88BECB4FBDDC5AFC55E4DC0135AF714A3EEC4A63810AE5A989F2CECB824A686165D3CEDB8CBD8F35C7E5B9F4136C29DEA32736AABB451FE8088B978B493AC6D
                                Malicious:false
                                Preview: .<!DOCTYPE HTML>..<html>.. <head>.. <link rel="stylesheet" type="text/css" href="NewErrorPageTemplate.css" >.. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.. <title>Can&rsquo;t reach this page</title>.. <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="getInfo(); initMoreInfo('infoBlockID');">.. <div id="contentContainer" class="mainContent">.. <div id="mainTitle" class="title">Can&rsquo;t reach this page</div>.. <div class="taskSection" id="taskSection">.. <ul id="cantDisplayTasks" class="tasks">.. <li id="task1-1">Make sure the web address <span id="webpage" class="webpageURL"></span>is correct</li>.. <li id="task1-2">Search for this site on Bing</li>..
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2K7JPOQS\errorPageStrings[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):4720
                                Entropy (8bit):5.164796203267696
                                Encrypted:false
                                SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
                                MD5:D65EC06F21C379C87040B83CC1ABAC6B
                                SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
                                SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
                                SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
                                Malicious:false
                                Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\dnserror[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):2997
                                Entropy (8bit):4.4885437940628465
                                Encrypted:false
                                SSDEEP:48:u7u5V4VyhhV2lFUW29vj0RkpNc7KpAP8Rra:vIlJ6G7Ao8Ra
                                MD5:2DC61EB461DA1436F5D22BCE51425660
                                SHA1:E1B79BCAB0F073868079D807FAEC669596DC46C1
                                SHA-256:ACDEB4966289B6CE46ECC879531F85E9C6F94B718AAB521D38E2E00F7F7F7993
                                SHA-512:A88BECB4FBDDC5AFC55E4DC0135AF714A3EEC4A63810AE5A989F2CECB824A686165D3CEDB8CBD8F35C7E5B9F4136C29DEA32736AABB451FE8088B978B493AC6D
                                Malicious:false
                                Preview: .<!DOCTYPE HTML>..<html>.. <head>.. <link rel="stylesheet" type="text/css" href="NewErrorPageTemplate.css" >.. <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.. <title>Can&rsquo;t reach this page</title>.. <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="getInfo(); initMoreInfo('infoBlockID');">.. <div id="contentContainer" class="mainContent">.. <div id="mainTitle" class="title">Can&rsquo;t reach this page</div>.. <div class="taskSection" id="taskSection">.. <ul id="cantDisplayTasks" class="tasks">.. <li id="task1-1">Make sure the web address <span id="webpage" class="webpageURL"></span>is correct</li>.. <li id="task1-2">Search for this site on Bing</li>..
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\down[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
                                Category:dropped
                                Size (bytes):748
                                Entropy (8bit):7.249606135668305
                                Encrypted:false
                                SSDEEP:12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
                                MD5:C4F558C4C8B56858F15C09037CD6625A
                                SHA1:EE497CC061D6A7A59BB66DEFEA65F9A8145BA240
                                SHA-256:39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781
                                SHA-512:D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44
                                Malicious:false
                                Preview: .PNG........IHDR...............ex....PLTE....W..W..W..W..W..W..W..W..W..W..W..W..W.U..............W..W.!Y.#Z.$\.'].<r.=s.P..Q..Q..U..o..p..r..x..z..~.............................................b.............................................................................................................................................................................................................$..s...7tRNS.a.o(,.s....e......q*...................................F.Z....IDATx^%.S..@.C..jm.mTk...m.?|;.y..S....F.t...,.......D.>..LpX=f.M...H4........=...=..xy.[h..7....7.....<.q.kH....#+....I..z.....'.ksC...X<.+..J>....%3BmqaV...h..Z._.:<.Y_jG...vN^.<>.Nu.u@.....M....?...1D.m~)s8..&....IEND.B`.
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6M6D1PMD\httpErrorPagesScripts[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):12105
                                Entropy (8bit):5.451485481468043
                                Encrypted:false
                                SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
                                MD5:9234071287E637F85D721463C488704C
                                SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
                                SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
                                SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
                                Malicious:false
                                Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VAHFWDJC\NewErrorPageTemplate[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1612
                                Entropy (8bit):4.869554560514657
                                Encrypted:false
                                SSDEEP:24:5Y0bQ573pHpACtUZtJD0lFBopZleqw87xTe4D8FaFJ/Doz9AtjJgbCzg:5m73jcJqQep89TEw7Uxkk
                                MD5:DFEABDE84792228093A5A270352395B6
                                SHA1:E41258C9576721025926326F76063C2305586F76
                                SHA-256:77B138AB5D0A90FF04648C26ADDD5E414CC178165E3B54A4CB3739DA0F58E075
                                SHA-512:E256F603E67335151BB709294749794E2E3085F4063C623461A0B3DECBCCA8E620807B707EC9BCBE36DCD7D639C55753DA0495BE85B4AE5FB6BFC52AB4B284FD
                                Malicious:false
                                Preview: .body..{.. background-repeat: repeat-x;.. background-color: white;.. font-family: "Segoe UI", "verdana", "arial";.. margin: 0em;.. color: #1f1f1f;..}.....mainContent..{.. margin-top:80px;.. width: 700px;.. margin-left: 120px;.. margin-right: 120px;..}.....title..{.. color: #54b0f7;.. font-size: 36px;.. font-weight: 300;.. line-height: 40px;.. margin-bottom: 24px;.. font-family: "Segoe UI", "verdana";.. position: relative;..}.....errorExplanation..{.. color: #000000;.. font-size: 12pt;.. font-family: "Segoe UI", "verdana", "arial";.. text-decoration: none;..}.....taskSection..{.. margin-top: 20px;.. margin-bottom: 28px;.. position: relative; ..}.....tasks..{.. color: #000000;.. font-family: "Segoe UI", "verdana";.. font-weight:200;.. font-size: 12pt;..}....li..{.. margin-top: 8px;..}.....diagnoseButton..{.. outline: none;.. font-size: 9pt;..}.....launchInternetOptionsButton..{.. outline: none;
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VAHFWDJC\errorPageStrings[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):4720
                                Entropy (8bit):5.164796203267696
                                Encrypted:false
                                SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
                                MD5:D65EC06F21C379C87040B83CC1ABAC6B
                                SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
                                SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
                                SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
                                Malicious:false
                                Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\VAHFWDJC\httpErrorPagesScripts[1]
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):12105
                                Entropy (8bit):5.451485481468043
                                Encrypted:false
                                SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
                                MD5:9234071287E637F85D721463C488704C
                                SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
                                SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
                                SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
                                Malicious:false
                                Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
                                C:\Users\user\AppData\Local\Temp\JavaDeployReg.log
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:modified
                                Size (bytes):89
                                Entropy (8bit):4.440534734931472
                                Encrypted:false
                                SSDEEP:3:oVXUpfYV2IqAW8JOGXnEpfYV2Ign:o9UpQMqEpQ+
                                MD5:3FB5291B91C6AD22FE8A57C77D1DA276
                                SHA1:FD32C99851C94D34211AF3A8A7ABDFA4AA6020DA
                                SHA-256:0200729CA3A7B9971CF7D91AFCCE662C3DE0EB3D1D39ADFEA5573C5CB9FFF7FF
                                SHA-512:D6EA7206A2DE140A13CF22AD27D8192FC8AEFD99A7680AAF54D87A4D5C1B83A63F3E5D6028E314F29750BC9A003DF9D6D93CDFAB2DA1AF21192EDA2AA47956BB
                                Malicious:false
                                Preview: [2021/09/10 16:53:06.933] Latest deploy version: ..[2021/09/10 16:53:06.933] 11.211.2 ..
                                C:\Users\user\AppData\Local\Temp\~DFA52BA84DB18EF3E4.TMP
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):12933
                                Entropy (8bit):0.40900281620806456
                                Encrypted:false
                                SSDEEP:12:c9lCg5/9lCgeK9l26an9l26an9l8fRI9l8fRY9lTqy+Nnv:c9lLh9lLh9lIn9lIn9loI9loY9lWy+Rv
                                MD5:27159C71B39BC35A35D2AE2C5A352055
                                SHA1:1FBC9B88A786399AD1B1035C76078774D02208FE
                                SHA-256:8918194C84939FC06E43C122CCF625F1DA6EE0236899A094AB0BD7353FD029F7
                                SHA-512:B3835117CCD31DB497CFE62192E4BE4104EE2F2CDD89A124399AD5C1A250CE35B3EF035A81700489C987D766232139AF622A3879A528D8C67F70B1FC1A576CFF
                                Malicious:false
                                Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Local\Temp\~DFB8A0D879113F03C7.TMP
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):38737
                                Entropy (8bit):0.36876329153462023
                                Encrypted:false
                                SSDEEP:48:kBqoxKAuvScS+U50e3bIbw5yDZ5yDb5yDU:kBqoxKAuvScS+S0e3Ecoyf
                                MD5:DA3A6AC514DF883080CA2F98F007442D
                                SHA1:A0F2645B6F930E1BF23A38C1DAA8CF69CE97C324
                                SHA-256:0AD20F9438A75BE483BD3D252FFD3DFD950399E49CE76FD297BCDB28566AE3FF
                                SHA-512:6E1DBFC069DC58262CE3E151271067A48408A82378305F7CDA9FF78C32B57989D470CFC6E3AE5739DAEF42AB086B2D44E33931A96EB45497E3AAE6BFEDC6ED1D
                                Malicious:false
                                Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Local\Temp\~DFE1308D1C5805163F.TMP
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):12933
                                Entropy (8bit):0.4069783134723913
                                Encrypted:false
                                SSDEEP:24:c9lLh9lLh9lIn9lIn9loW9loG9lWLJEMmJQ:kBqoIRXV
                                MD5:A7480C3C91FF1C3922B399950A67A23B
                                SHA1:498201767377A978E524B08196D9C4EE8FD9EE76
                                SHA-256:D895686EAD90A5AB9D2B7888E2C5D4B832D8231973565EC8371F38FE0AADB994
                                SHA-512:E9F104A71F271AF42D7CF1C94BB22F967F01B513DEC227C66A0C17E867474CC5D94B0EF96E545BBAC13206AA9C01DEAE69BDDA008F4A81C5E22C6F51FD87E4BA
                                Malicious:false
                                Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Local\Temp\~DFE30A9991DB7FBF1E.TMP
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):38737
                                Entropy (8bit):0.372600979825686
                                Encrypted:false
                                SSDEEP:48:kBqoxKAuvScS+V1VbVZVIVkIVkwjkyDZjkyDbjkyDU:kBqoxKAuvScS+V1VbVZVIVLVjj1j3jg
                                MD5:8F7B57036A1806980D21B85DA312515A
                                SHA1:1F4282A80509BAAB6EA569DFEC656B0F7A9A519E
                                SHA-256:2380DDA787E183076CFFD1944757975B10F5DB8685EEEEB40EF8E199D723AB61
                                SHA-512:5127D50ACF7464057C9023859FD70BC5FFC590B46C84ED59B9FB9F1D99CCB8191F5E114C5AA952A1EA8AC6F81EE9963AF0D30634706E73BAAF1537F9AD023448
                                Malicious:false
                                Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                                Static File Info

                                General

                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Entropy (8bit):6.614457028856633
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:ixGWwYWQOV.exe
                                File size:901960
                                MD5:6c4e1328230fd65c2c8232e7b9f838ae
                                SHA1:9cfbf6477457d26555e37ad3717cccd3aadc7dbe
                                SHA256:31941577d287f7445f2791c78da17ffcd54baee40acf61dc0ff27a3f1d5253e6
                                SHA512:062c9fa2241227752ead4f15d05e3c3df8f685538765e527f4929ed3e94f3f37f89f60764b531a0c935e878b7710ea4174ae6f9b48e7c8aa8066176e57fdf733
                                SSDEEP:24576:P9PsA9vHAYobFGQdRLylSk61LXXhtxvZPmtk1/GqgLGT:wYWJk61bRrZPmWGGT
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......9..D}...}...}....{q......{t.n....{u.~...}...........x....{w.v....#u.|....{i.G....{s.|....{v.|...Rich}..........................

                                File Icon

                                Icon Hash:f0b0e8e4e4e8b2dc

                                Static PE Info

                                General

                                Entrypoint:0x1005725
                                Entrypoint Section:.text
                                Digitally signed:true
                                Imagebase:0x1000000
                                Subsystem:windows gui
                                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                DLL Characteristics:TERMINAL_SERVER_AWARE, NX_COMPAT
                                Time Stamp:0x55E85856 [Thu Sep 3 14:25:26 2015 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:6
                                OS Version Minor:0
                                File Version Major:6
                                File Version Minor:0
                                Subsystem Version Major:6
                                Subsystem Version Minor:0
                                Import Hash:6e09f5ea9222053b840f418fc7379964

                                Authenticode Signature

                                Signature Valid:false
                                Signature Issuer:CN=Sectigo RSA Code Signing CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
                                Signature Validation Error:No signature was present in the subject
                                Error Number:-2146762496
                                Not Before, Not After
                                • 4/12/2021 5:00:00 PM 4/13/2022 4:59:59 PM
                                Subject Chain
                                • CN=FORTH PROPERTY LTD, O=FORTH PROPERTY LTD, L=Edinburgh, C=GB
                                Version:3
                                Thumbprint MD5:8AB6A86211EE700AA961C3292ADB312D
                                Thumbprint SHA-1:A533DFA7E6AED2A9FFBE41FCEC5A8927A6EAFBBB
                                Thumbprint SHA-256:9E0611728595A506CC2A55486FDD88ECA0971EF0B08F74CB3B3B6F5F6F3C7E27
                                Serial:239664C12BAEB5A6D787912888051392

                                Entrypoint Preview

                                Instruction
                                call 00007F3308B7AFD0h
                                jmp 00007F3308B73EE5h
                                push 00000014h
                                push 0108A9F8h
                                call 00007F3308B78EBAh
                                call 00007F3308B746BBh
                                movzx esi, ax
                                push 00000002h
                                call 00007F3308B7AF63h
                                pop ecx
                                mov eax, 00005A4Dh
                                cmp word ptr [01000000h], ax
                                je 00007F3308B73EE6h
                                xor ebx, ebx
                                jmp 00007F3308B73F15h
                                mov eax, dword ptr [0100003Ch]
                                cmp dword ptr [eax+01000000h], 00004550h
                                jne 00007F3308B73ECDh
                                mov ecx, 0000010Bh
                                cmp word ptr [eax+01000018h], cx
                                jne 00007F3308B73EBFh
                                xor ebx, ebx
                                cmp dword ptr [eax+01000074h], 0Eh
                                jbe 00007F3308B73EEBh
                                cmp dword ptr [eax+010000E8h], ebx
                                setne bl
                                mov dword ptr [ebp-1Ch], ebx
                                call 00007F3308B78E0Dh
                                test eax, eax
                                jne 00007F3308B73EEAh
                                push 0000001Ch
                                call 00007F3308B74007h
                                pop ecx
                                call 00007F3308B7A2CBh
                                test eax, eax
                                jne 00007F3308B73EEAh
                                push 00000010h
                                call 00007F3308B73FF6h
                                pop ecx
                                call 00007F3308B7AFDCh
                                and dword ptr [ebp-04h], 00000000h
                                call 00007F3308B7A8C7h
                                test eax, eax
                                jns 00007F3308B73EEAh
                                push 0000001Bh
                                call 00007F3308B73FDCh
                                pop ecx
                                call dword ptr [0106A19Ch]
                                mov dword ptr [010AC3A8h], eax
                                call 00007F3308B7AFF7h
                                mov dword ptr [01097A94h], eax
                                call 00007F3308B7ABB4h
                                test eax, eax
                                jns 00007F3308B73EEAh

                                Data Directories

                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x8ccf80x8c.rdata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xad0000x41028.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0xda0000x2348.rsrc
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xef0000x4d50.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x6a3b00x38.rdata
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x879400x40.rdata
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x6a0000x328.rdata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                Sections

                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x681b90x68200False0.623956613896data6.85142443524IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                .rdata0x6a0000x23f8a0x24000False0.64170328776data6.36645327435IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .data0x8e0000x1e3ac0x7a00False0.527792008197data6.51367686644IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                .rsrc0xad0000x410280x41200False0.240744211852data5.36312234805IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0xef0000x4d500x4e00False0.730168269231data6.65913941378IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                Resources

                                NameRVASizeTypeLanguageCountry
                                RT_ICON0xad4340x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0EnglishUnited States
                                RT_ICON0xbdc5c0x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 16580607, next used block 4294917888EnglishUnited States
                                RT_ICON0xc1e840x25a8dataEnglishUnited States
                                RT_ICON0xc442c0x10a8dataEnglishUnited States
                                RT_ICON0xc54d40x988dataEnglishUnited States
                                RT_ICON0xc5e5c0x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                                RT_ICON0xc62c40x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0EnglishUnited States
                                RT_ICON0xd6aec0x94a8dataEnglishUnited States
                                RT_ICON0xdff940x5488dataEnglishUnited States
                                RT_ICON0xe541c0x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 254, next used block 520093696EnglishUnited States
                                RT_ICON0xe96440x25a8dataEnglishUnited States
                                RT_ICON0xebbec0x10a8dataEnglishUnited States
                                RT_ICON0xecc940x988dataEnglishUnited States
                                RT_ICON0xed61c0x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                                RT_STRING0xeda840xbcdataEnglishUnited States
                                RT_STRING0xedb400x150dataEnglishUnited States
                                RT_GROUP_ICON0xedc900x76dataEnglishUnited States
                                RT_GROUP_ICON0xedd080x5adataEnglishUnited States
                                RT_VERSION0xedd640x2c4dataEnglishUnited States

                                Imports

                                DLLImport
                                KERNEL32.dllGetLastError, VirtualProtectEx, LoadLibraryA, OpenMutexA, SetConsoleOutputCP, DeviceIoControl, GetModuleFileNameA, CloseHandle, DeleteFileA, WriteConsoleW, SetStdHandle, GetStringTypeW, LoadLibraryW, WaitForMultipleObjectsEx, GetStartupInfoA, GetConsoleMode, GetConsoleCP, FlushFileBuffers, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetLocaleInfoW, LCMapStringW, CompareStringW, GetTimeFormatW, GetDateFormatW, GetCPInfo, GetOEMCP, GetACP, IsValidCodePage, HeapReAlloc, CreateProcessA, Sleep, GetTickCount, SetFilePointerEx, GetCurrentProcess, UnregisterWaitEx, QueryDepthSList, InterlockedFlushSList, InterlockedPushEntrySList, InterlockedPopEntrySList, InitializeSListHead, ReleaseSemaphore, SetProcessAffinityMask, VirtualProtect, VirtualFree, VirtualAlloc, GetVersionExW, GetModuleHandleA, FreeLibraryAndExitThread, FreeLibrary, GetThreadTimes, OutputDebugStringW, FatalAppExitA, SetConsoleCtrlHandler, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCurrentProcessId, QueryPerformanceCounter, GetFileType, HeapSize, GetProcessHeap, GetModuleFileNameW, WriteFile, GetStdHandle, WideCharToMultiByte, MultiByteToWideChar, AreFileApisANSI, GetModuleHandleExW, ExitProcess, IsDebuggerPresent, UnregisterWait, RegisterWaitForSingleObject, SetThreadAffinityMask, GetProcessAffinityMask, GetNumaHighestNodeNumber, DeleteTimerQueueTimer, ChangeTimerQueueTimer, CreateTimerQueueTimer, GetLogicalProcessorInformation, GetThreadPriority, SetThreadPriority, SwitchToThread, SignalObjectAndWait, WaitForSingleObjectEx, SetEvent, DuplicateHandle, WaitForSingleObject, GetCurrentThread, GetCurrentThreadId, GetExitCodeThread, GetSystemTimeAsFileTime, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, HeapAlloc, EncodePointer, DecodePointer, GetCommandLineA, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, SetLastError, InitializeCriticalSectionAndSpinCount, CreateEventW, TerminateProcess, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetModuleHandleW, GetProcAddress, CreateSemaphoreW, CreateThread, ExitThread, LoadLibraryExW, RaiseException, RtlUnwind, HeapFree, TryEnterCriticalSection, CreateTimerQueue, RtlCaptureStackBackTrace, CreateFileW
                                USER32.dllSetWindowTextA, CallNextHookEx, LoadBitmapA, GetClassInfoExA, EnumWindows, GetIconInfo, IsDialogMessageA, GetWindowLongA, CreateWindowExA, ReleaseDC, DefWindowProcA, CheckDlgButton, SendMessageA
                                ole32.dllOleUninitialize, CoUninitialize, CoSuspendClassObjects, OleSetContainedObject, StgCreateDocfile, OleInitialize, CoInitialize
                                COMCTL32.dllImageList_LoadImageA, PropertySheetA, CreatePropertySheetPageA
                                WINSPOOL.DRVDeletePortA, SetPrinterDataA, DeleteFormA, SetPortA, SetPrinterDataExA, AddMonitorA, ScheduleJob, AddPrinterConnectionA, ReadPrinter, AddPrinterDriverA, GetPrinterDataA, ResetPrinterA, PrinterMessageBoxA, DeletePrintProcessorA, GetPrinterDriverDirectoryA, OpenPrinterA, AddPortA, ConfigurePortA, GetPrinterDataExA, GetJobA, AddPrinterDriverExA, ClosePrinter, DeletePrinterDataExA, DeletePrinterConnectionA, DeletePrintProvidorA, StartPagePrinter, AbortPrinter, GetPrintProcessorDirectoryA, StartDocPrinterA, GetPrinterA, AddPrinterA, DeletePrinter, DeleteMonitorA, GetPrinterDriverA, AddFormA, DeletePrinterDriverA, AddPrintProcessorA, AddPrintProvidorA, SetFormA, GetFormA, DeletePrinterDataA, AddJobA, FlushPrinter, DeletePrinterDriverExA, SetJobA, FindClosePrinterChangeNotification, DeletePrinterKeyA
                                sfc.dllSfcIsFileProtected

                                Version Infos

                                DescriptionData
                                LegalCopyright(C) 2011 Helpwould Use Corporation. All rights reserved.
                                FileVersion14.1.55.63
                                CompanyNameHelpwould Use Corporation
                                ProductNameDeathice
                                ProductVersion14.1.55.63
                                FileDescriptionDeathice The Certain
                                Translation0x0409 0x04b0

                                Possible Origin

                                Language of compilation systemCountry where language is spokenMap
                                EnglishUnited States

                                Network Behavior

                                Network Port Distribution

                                UDP Packets

                                TimestampSource PortDest PortSource IPDest IP
                                Sep 10, 2021 16:51:40.573520899 CEST5871753192.168.2.78.8.8.8
                                Sep 10, 2021 16:51:40.610841990 CEST53587178.8.8.8192.168.2.7
                                Sep 10, 2021 16:51:55.885852098 CEST5976253192.168.2.78.8.8.8
                                Sep 10, 2021 16:51:55.918626070 CEST53597628.8.8.8192.168.2.7
                                Sep 10, 2021 16:52:01.382412910 CEST5432953192.168.2.78.8.8.8
                                Sep 10, 2021 16:52:01.418695927 CEST53543298.8.8.8192.168.2.7
                                Sep 10, 2021 16:52:03.141858101 CEST5805253192.168.2.78.8.8.8
                                Sep 10, 2021 16:52:03.177349091 CEST53580528.8.8.8192.168.2.7
                                Sep 10, 2021 16:52:03.186640024 CEST5400853192.168.2.78.8.8.8
                                Sep 10, 2021 16:52:03.225603104 CEST53540088.8.8.8192.168.2.7
                                Sep 10, 2021 16:52:03.230904102 CEST5945153192.168.2.78.8.8.8
                                Sep 10, 2021 16:52:03.264877081 CEST53594518.8.8.8192.168.2.7
                                Sep 10, 2021 16:52:14.641695023 CEST5291453192.168.2.78.8.8.8
                                Sep 10, 2021 16:52:14.685658932 CEST53529148.8.8.8192.168.2.7
                                Sep 10, 2021 16:52:14.922570944 CEST6456953192.168.2.78.8.8.8
                                Sep 10, 2021 16:52:14.951818943 CEST53645698.8.8.8192.168.2.7
                                Sep 10, 2021 16:52:17.049742937 CEST5281653192.168.2.78.8.8.8
                                Sep 10, 2021 16:52:17.087002039 CEST53528168.8.8.8192.168.2.7
                                Sep 10, 2021 16:52:17.856461048 CEST5078153192.168.2.78.8.8.8
                                Sep 10, 2021 16:52:17.893305063 CEST53507818.8.8.8192.168.2.7
                                Sep 10, 2021 16:52:18.457825899 CEST5423053192.168.2.78.8.8.8
                                Sep 10, 2021 16:52:18.491482973 CEST53542308.8.8.8192.168.2.7
                                Sep 10, 2021 16:52:19.022087097 CEST5491153192.168.2.78.8.8.8
                                Sep 10, 2021 16:52:19.043278933 CEST4995853192.168.2.78.8.8.8
                                Sep 10, 2021 16:52:19.091794968 CEST53499588.8.8.8192.168.2.7
                                Sep 10, 2021 16:52:19.092389107 CEST53549118.8.8.8192.168.2.7
                                Sep 10, 2021 16:52:19.436826944 CEST5086053192.168.2.78.8.8.8
                                Sep 10, 2021 16:52:19.470040083 CEST53508608.8.8.8192.168.2.7
                                Sep 10, 2021 16:52:20.123020887 CEST5045253192.168.2.78.8.8.8
                                Sep 10, 2021 16:52:20.161089897 CEST53504528.8.8.8192.168.2.7
                                Sep 10, 2021 16:52:20.906326056 CEST5973053192.168.2.78.8.8.8
                                Sep 10, 2021 16:52:20.941890955 CEST53597308.8.8.8192.168.2.7
                                Sep 10, 2021 16:52:21.624568939 CEST5931053192.168.2.78.8.8.8
                                Sep 10, 2021 16:52:21.656949997 CEST53593108.8.8.8192.168.2.7
                                Sep 10, 2021 16:52:21.772166014 CEST5191953192.168.2.78.8.8.8
                                Sep 10, 2021 16:52:21.807044029 CEST53519198.8.8.8192.168.2.7
                                Sep 10, 2021 16:52:22.836007118 CEST6429653192.168.2.78.8.8.8
                                Sep 10, 2021 16:52:22.868335009 CEST53642968.8.8.8192.168.2.7
                                Sep 10, 2021 16:52:23.952742100 CEST5668053192.168.2.78.8.8.8
                                Sep 10, 2021 16:52:23.980393887 CEST53566808.8.8.8192.168.2.7
                                Sep 10, 2021 16:52:24.747281075 CEST5882053192.168.2.78.8.8.8
                                Sep 10, 2021 16:52:24.781394958 CEST53588208.8.8.8192.168.2.7
                                Sep 10, 2021 16:52:24.870857000 CEST6098353192.168.2.78.8.8.8
                                Sep 10, 2021 16:52:24.905440092 CEST53609838.8.8.8192.168.2.7
                                Sep 10, 2021 16:52:27.195291996 CEST4924753192.168.2.78.8.8.8
                                Sep 10, 2021 16:52:27.227996111 CEST53492478.8.8.8192.168.2.7
                                Sep 10, 2021 16:52:31.451698065 CEST5228653192.168.2.78.8.8.8
                                Sep 10, 2021 16:52:31.476509094 CEST53522868.8.8.8192.168.2.7
                                Sep 10, 2021 16:52:32.458856106 CEST5228653192.168.2.78.8.8.8
                                Sep 10, 2021 16:52:32.483449936 CEST53522868.8.8.8192.168.2.7
                                Sep 10, 2021 16:52:33.475199938 CEST5228653192.168.2.78.8.8.8
                                Sep 10, 2021 16:52:33.500422955 CEST53522868.8.8.8192.168.2.7
                                Sep 10, 2021 16:52:35.505440950 CEST5228653192.168.2.78.8.8.8
                                Sep 10, 2021 16:52:35.530186892 CEST53522868.8.8.8192.168.2.7
                                Sep 10, 2021 16:52:37.399751902 CEST5606453192.168.2.78.8.8.8
                                Sep 10, 2021 16:52:37.432456017 CEST53560648.8.8.8192.168.2.7
                                Sep 10, 2021 16:52:39.505847931 CEST5228653192.168.2.78.8.8.8
                                Sep 10, 2021 16:52:39.530540943 CEST53522868.8.8.8192.168.2.7
                                Sep 10, 2021 16:52:47.902530909 CEST6374453192.168.2.78.8.8.8
                                Sep 10, 2021 16:52:47.938299894 CEST53637448.8.8.8192.168.2.7
                                Sep 10, 2021 16:52:59.171778917 CEST6145753192.168.2.78.8.8.8
                                Sep 10, 2021 16:52:59.207562923 CEST53614578.8.8.8192.168.2.7
                                Sep 10, 2021 16:53:05.250263929 CEST5836753192.168.2.78.8.8.8
                                Sep 10, 2021 16:53:05.283351898 CEST53583678.8.8.8192.168.2.7
                                Sep 10, 2021 16:53:05.785952091 CEST6059953192.168.2.78.8.8.8
                                Sep 10, 2021 16:53:05.824147940 CEST53605998.8.8.8192.168.2.7
                                Sep 10, 2021 16:53:06.845170021 CEST5957153192.168.2.78.8.8.8
                                Sep 10, 2021 16:53:06.889399052 CEST53595718.8.8.8192.168.2.7
                                Sep 10, 2021 16:53:07.855437994 CEST5268953192.168.2.78.8.8.8
                                Sep 10, 2021 16:53:07.891165972 CEST53526898.8.8.8192.168.2.7
                                Sep 10, 2021 16:53:07.898761988 CEST5029053192.168.2.78.8.8.8
                                Sep 10, 2021 16:53:07.936516047 CEST53502908.8.8.8192.168.2.7
                                Sep 10, 2021 16:53:07.977636099 CEST6042753192.168.2.78.8.8.8
                                Sep 10, 2021 16:53:08.011830091 CEST53604278.8.8.8192.168.2.7
                                Sep 10, 2021 16:53:12.489298105 CEST5620953192.168.2.78.8.8.8
                                Sep 10, 2021 16:53:12.524621964 CEST53562098.8.8.8192.168.2.7
                                Sep 10, 2021 16:53:31.157160044 CEST5958253192.168.2.78.8.8.8
                                Sep 10, 2021 16:53:31.197542906 CEST53595828.8.8.8192.168.2.7

                                DNS Queries

                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                Sep 10, 2021 16:52:03.141858101 CEST192.168.2.78.8.8.80xa6b8Standard query (0)haverit.xyzA (IP address)IN (0x0001)
                                Sep 10, 2021 16:52:03.186640024 CEST192.168.2.78.8.8.80x6aebStandard query (0)haverit.xyzA (IP address)IN (0x0001)
                                Sep 10, 2021 16:52:03.230904102 CEST192.168.2.78.8.8.80xb2a1Standard query (0)haverit.xyzA (IP address)IN (0x0001)
                                Sep 10, 2021 16:52:14.641695023 CEST192.168.2.78.8.8.80xee60Standard query (0)haverit.xyzA (IP address)IN (0x0001)
                                Sep 10, 2021 16:52:24.870857000 CEST192.168.2.78.8.8.80xb3d7Standard query (0)haverit.xyzA (IP address)IN (0x0001)
                                Sep 10, 2021 16:53:07.855437994 CEST192.168.2.78.8.8.80x1a4bStandard query (0)haverit.xyzA (IP address)IN (0x0001)
                                Sep 10, 2021 16:53:07.898761988 CEST192.168.2.78.8.8.80x74aStandard query (0)haverit.xyzA (IP address)IN (0x0001)
                                Sep 10, 2021 16:53:07.977636099 CEST192.168.2.78.8.8.80xbd05Standard query (0)haverit.xyzA (IP address)IN (0x0001)

                                DNS Answers

                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                Sep 10, 2021 16:52:03.177349091 CEST8.8.8.8192.168.2.70xa6b8Name error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                                Sep 10, 2021 16:52:03.225603104 CEST8.8.8.8192.168.2.70x6aebName error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                                Sep 10, 2021 16:52:03.264877081 CEST8.8.8.8192.168.2.70xb2a1Server failure (2)haverit.xyznonenoneA (IP address)IN (0x0001)
                                Sep 10, 2021 16:52:14.685658932 CEST8.8.8.8192.168.2.70xee60Name error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                                Sep 10, 2021 16:52:24.905440092 CEST8.8.8.8192.168.2.70xb3d7Name error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                                Sep 10, 2021 16:53:07.891165972 CEST8.8.8.8192.168.2.70x1a4bName error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                                Sep 10, 2021 16:53:07.936516047 CEST8.8.8.8192.168.2.70x74aName error (3)haverit.xyznonenoneA (IP address)IN (0x0001)
                                Sep 10, 2021 16:53:08.011830091 CEST8.8.8.8192.168.2.70xbd05Name error (3)haverit.xyznonenoneA (IP address)IN (0x0001)

                                Code Manipulations

                                Statistics

                                Behavior

                                Click to jump to process

                                System Behavior

                                General

                                Start time:16:51:33
                                Start date:10/09/2021
                                Path:C:\Users\user\Desktop\ixGWwYWQOV.exe
                                Wow64 process (32bit):true
                                Commandline:'C:\Users\user\Desktop\ixGWwYWQOV.exe'
                                Imagebase:0x1000000
                                File size:901960 bytes
                                MD5 hash:6C4E1328230FD65C2C8232E7B9F838AE
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.299620365.0000000003510000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.299260696.0000000003510000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.299197344.0000000003510000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.298965891.0000000003510000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.300025842.0000000003510000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.300187569.0000000003510000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.299926777.0000000003510000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.299677009.0000000003510000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.299128367.0000000003510000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.298447630.0000000003510000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.298720367.0000000003510000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.299959474.0000000003510000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000002.522375595.0000000003510000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.299054889.0000000003510000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.300165850.0000000003510000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.299450851.0000000003510000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.299720559.0000000003510000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.298639407.0000000003510000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.298803166.0000000003510000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.298555276.0000000003510000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.300135492.0000000003510000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.300105036.0000000003510000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.299988986.0000000003510000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.299384530.0000000003510000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.299782953.0000000003510000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.299827410.0000000003510000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.298884838.0000000003510000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.300078539.0000000003510000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.300048451.0000000003510000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.299508546.0000000003510000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.299863512.0000000003510000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.299563221.0000000003510000.00000004.00000040.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Ursnif, Description: Yara detected Ursnif, Source: 00000000.00000003.299326737.0000000003510000.00000004.00000040.sdmp, Author: Joe Security
                                Reputation:low

                                General

                                Start time:16:52:00
                                Start date:10/09/2021
                                Path:C:\Program Files\internet explorer\iexplore.exe
                                Wow64 process (32bit):false
                                Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                                Imagebase:0x7ff663720000
                                File size:823560 bytes
                                MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:16:52:01
                                Start date:10/09/2021
                                Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                Wow64 process (32bit):true
                                Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6264 CREDAT:17410 /prefetch:2
                                Imagebase:0xca0000
                                File size:822536 bytes
                                MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high

                                General

                                Start time:16:53:05
                                Start date:10/09/2021
                                Path:C:\Program Files\internet explorer\iexplore.exe
                                Wow64 process (32bit):false
                                Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                                Imagebase:0x7ff663720000
                                File size:823560 bytes
                                MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language

                                General

                                Start time:16:53:06
                                Start date:10/09/2021
                                Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                Wow64 process (32bit):true
                                Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5452 CREDAT:17410 /prefetch:2
                                Imagebase:0xca0000
                                File size:822536 bytes
                                MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language

                                Disassembly

                                Code Analysis

                                Reset < >