Windows Analysis Report SwFlsh32.exe

Overview

General Information

Sample Name: SwFlsh32.exe (renamed file extension from exe to dll)
Analysis ID: 551599
MD5: 4081fd95a87905a998b314f7bb4e8b14
SHA1: e9644e9686e3d5bc0f94099359520506722e601f
SHA256: 45f11d97a8ed1a9215e9c6c8d44335229e17bd63bb0a48abcc8c2a02dca241c4
Tags: exe
Infos:

Most interesting Screenshot:

Detection

Ursnif
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Yara detected Ursnif
System process connects to network (likely due to code injection or exploit)
Writes or reads registry keys via WMI
Found API chain indicative of debugger detection
Found evasive API chain (may stop execution after checking system information)
Sigma detected: Suspicious Call by Ordinal
Writes registry values via WMI
Uses 32bit PE files
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
IP address seen in connection with other malware
Creates a DirectInput object (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
PE file contains strange resources
Tries to load missing DLLs
Contains functionality to read the PEB
Found evasive API chain checking for process token information
Registers a DLL
PE / OLE file has an invalid certificate
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)

Classification

AV Detection:

barindex
Found malware configuration
Source: 00000003.00000002.869838537.0000000000970000.00000040.00000001.sdmp Malware Configuration Extractor: Ursnif {"RSA Public Key": "J2tupkpEmwiDtgnUr9Ay045RBWOknqF27OtCMHo9P0wt7xePkeF0Yw7SkOAe/bBUWcu7iFAXZv+ivYhdLAEcSCS83w8q+v2AoKPgsGB5dihFd/8Lhi4+6B/tzBf4Fq/RJNwIcJqfTiVtrwrCOLksgItKEw9rXKhj3kxyRjoNns31hg7v1oDY1su7lCIig4grcmj0bp5CCwMXrc8VKm74e/VR/gzd/h3JujvT4Vp+Q6fm7VIslgsRuLX3LwHKXOyQhctLu4phdWLNJYCTKSs8q2Zs03m/KuCPNEh29GpSG5HHbgvUPGeQRKg1vIYUbdroKTAJ8Y/E7VyGETolc1qYv1Vf5JpzZ04husbQ0MCU8KU=", "c2_domain": ["mmmmmm.bar", "mmmmmm.casa"], "botnet": "7575", "server": "50", "serpent_key": "BvKP2Vg5UX8gFGh2", "sleep_time": "1", "CONF_TIMEOUT": "20", "SetWaitableTimer_value": "0"}
Multi AV Scanner detection for submitted file
Source: SwFlsh32.dll Virustotal: Detection: 46% Perma Link
Source: SwFlsh32.dll Metadefender: Detection: 20% Perma Link
Source: SwFlsh32.dll ReversingLabs: Detection: 32%
Antivirus or Machine Learning detection for unpacked file
Source: 2.2.regsvr32.exe.10000000.3.unpack Avira: Label: TR/Crypt.XPACK.Gen8
Source: 3.1.rundll32.exe.10000000.0.unpack Avira: Label: TR/Crypt.XPACK.Gen8
Source: 4.2.rundll32.exe.10000000.3.unpack Avira: Label: TR/Crypt.XPACK.Gen8
Source: 4.1.rundll32.exe.10000000.0.unpack Avira: Label: TR/Crypt.XPACK.Gen8
Source: 0.2.loaddll32.exe.10000000.3.unpack Avira: Label: TR/Crypt.XPACK.Gen8
Source: 3.2.rundll32.exe.10000000.3.unpack Avira: Label: TR/Crypt.XPACK.Gen8

Cryptography:

barindex
Uses Microsoft's Enhanced Cryptographic Provider
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_034F4872 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,CryptDecrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError, 0_2_034F4872
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B94872 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,CryptDecrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError, 2_2_04B94872
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_00FA4872 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,CryptDecrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError, 3_2_00FA4872
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_051E4872 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,CryptDecrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError, 4_2_051E4872

Compliance:

barindex
Uses 32bit PE files
Source: SwFlsh32.dll Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior

Networking:

barindex
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49765 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49765 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49766 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49766 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49769 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49769 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49767 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49767 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49770 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49770 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49771 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49771 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49772 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49772 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49773 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49773 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49774 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49774 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49785 -> 162.255.119.219:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49785 -> 162.255.119.219:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49787 -> 198.54.117.215:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49787 -> 198.54.117.215:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49788 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49788 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49791 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49791 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49792 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49792 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49789 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49789 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49793 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49793 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49795 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49795 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49797 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49797 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49845 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49845 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49847 -> 162.255.119.219:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49847 -> 162.255.119.219:80
Source: Traffic Snort IDS: 1478 WEB-CGI swc access 192.168.2.6:49848 -> 162.255.119.219:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49848 -> 162.255.119.219:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49848 -> 162.255.119.219:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49852 -> 198.54.117.215:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49852 -> 198.54.117.215:80
Source: Traffic Snort IDS: 1478 WEB-CGI swc access 192.168.2.6:49857 -> 198.54.117.215:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49857 -> 198.54.117.215:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49857 -> 198.54.117.215:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49853 -> 198.54.117.215:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49853 -> 198.54.117.215:80
Source: Traffic Snort IDS: 1478 WEB-CGI swc access 192.168.2.6:49856 -> 198.54.117.215:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49856 -> 198.54.117.215:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49856 -> 198.54.117.215:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49858 -> 198.54.117.215:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49858 -> 198.54.117.215:80
Source: Traffic Snort IDS: 1478 WEB-CGI swc access 192.168.2.6:49860 -> 198.54.117.215:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49860 -> 198.54.117.215:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49860 -> 198.54.117.215:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49859 -> 198.54.117.215:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49859 -> 198.54.117.215:80
Source: Traffic Snort IDS: 1478 WEB-CGI swc access 192.168.2.6:49861 -> 198.54.117.215:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49861 -> 198.54.117.215:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49861 -> 198.54.117.215:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49862 -> 198.54.117.215:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49862 -> 198.54.117.215:80
Source: Traffic Snort IDS: 1478 WEB-CGI swc access 192.168.2.6:49864 -> 198.54.117.215:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49864 -> 198.54.117.215:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49864 -> 198.54.117.215:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49863 -> 198.54.117.215:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49863 -> 198.54.117.215:80
Source: Traffic Snort IDS: 1478 WEB-CGI swc access 192.168.2.6:49865 -> 198.54.117.215:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49865 -> 198.54.117.215:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49865 -> 198.54.117.215:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49868 -> 198.54.117.215:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49868 -> 198.54.117.215:80
Source: Traffic Snort IDS: 1478 WEB-CGI swc access 192.168.2.6:49870 -> 198.54.117.215:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49870 -> 198.54.117.215:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49870 -> 198.54.117.215:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49892 -> 162.255.119.219:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49898 -> 198.54.117.210:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49897 -> 198.54.117.210:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49900 -> 198.54.117.210:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49901 -> 198.54.117.210:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49905 -> 198.54.117.210:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49904 -> 198.54.117.210:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49906 -> 198.54.117.210:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49910 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49910 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49908 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49909 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49912 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49911 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49911 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49913 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49917 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49917 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49915 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49919 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49921 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49922 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49924 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49925 -> 162.255.119.219:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49925 -> 162.255.119.219:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49926 -> 162.255.119.219:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49926 -> 162.255.119.219:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49927 -> 162.255.119.219:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49927 -> 162.255.119.219:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49928 -> 198.54.117.212:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49928 -> 198.54.117.212:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49929 -> 198.54.117.216:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49929 -> 198.54.117.216:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49930 -> 198.54.117.216:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49930 -> 198.54.117.216:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49932 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49933 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49933 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49935 -> 162.255.119.219:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49936 -> 198.54.117.216:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49937 -> 198.54.117.212:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49937 -> 198.54.117.212:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49938 -> 198.54.117.216:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49938 -> 198.54.117.216:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49939 -> 198.54.117.216:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49941 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49942 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49942 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49943 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49944 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49935 -> 162.255.119.219:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49946 -> 198.54.117.216:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49947 -> 198.54.117.212:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49947 -> 198.54.117.212:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49948 -> 198.54.117.216:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49950 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49952 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49952 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49951 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49951 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033204 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M2 (_2F) 192.168.2.6:49953 -> 31.41.45.66:80
Source: Traffic Snort IDS: 2033203 ET TROJAN Ursnif Variant CnC Beacon - URI Struct M1 (_2B) 192.168.2.6:49953 -> 31.41.45.66:80
System process connects to network (likely due to code injection or exploit)
Source: C:\Windows\SysWOW64\rundll32.exe Network Connect: 31.41.45.66 80 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Domain query: mmmmmm.bar
Source: C:\Windows\SysWOW64\rundll32.exe Domain query: www.mmmmmm.casa
Source: C:\Windows\SysWOW64\rundll32.exe Network Connect: 162.255.119.219 80 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Network Connect: 198.54.117.212 80 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Domain query: mmmmmm.casa
Source: C:\Windows\SysWOW64\rundll32.exe Network Connect: 198.54.117.216 80 Jump to behavior
Internet Provider seen in connection with other malware
Source: Joe Sandbox View ASN Name: ASRELINKRU ASRELINKRU
Source: Joe Sandbox View ASN Name: NAMECHEAP-NETUS NAMECHEAP-NETUS
IP address seen in connection with other malware
Source: Joe Sandbox View IP Address: 198.54.117.210 198.54.117.210
Source: SwFlsh32.dll String found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: loaddll32.exe, 00000000.00000002.869935510.00000000013FB000.00000004.00000020.sdmp, regsvr32.exe, 00000002.00000002.871690172.000000000325B000.00000004.00000020.sdmp, regsvr32.exe, 00000002.00000003.648054115.0000000003260000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000003.647465029.0000000003260000.00000004.00000001.sdmp, rundll32.exe, 00000003.00000003.413679126.0000000000A62000.00000004.00000001.sdmp, rundll32.exe, 00000003.00000003.481393127.0000000000A52000.00000004.00000001.sdmp, rundll32.exe, 00000003.00000002.869953373.00000000009EA000.00000004.00000020.sdmp, rundll32.exe, 00000004.00000003.377498345.0000000003521000.00000004.00000001.sdmp, rundll32.exe, 00000004.00000003.482170353.0000000003512000.00000004.00000001.sdmp String found in binary or memory: http://mmmmmm.bar
Source: {5DB6AF90-73DB-11EC-90E5-ECF4BB2D2496}.dat.10.dr, ~DF584F6E0A1DD704BA.TMP.10.dr String found in binary or memory: http://mmmmmm.bar/drew/1QOwg_2FLZb/YxejGgbNFeCdhh/1gjuax4E3bxF4PQuVvUoz/mWe6jb2568sC8c53/IkV5WVtme_2
Source: ~DF2AF264C75EBCEA8B.TMP.45.dr, {AAFB84CF-73DB-11EC-90E5-ECF4BB2D2496}.dat.45.dr String found in binary or memory: http://mmmmmm.bar/drew/9kTn9nma9POHJpkr1Icf/OLGAIzVWdaryEbrg0Mm/vcdVt58PgZbFgFujCibxQS/kcDoJIO3wyYVp
Source: {99D3DE7D-73DB-11EC-90E5-ECF4BB2D2496}.dat.39.dr String found in binary or memory: http://mmmmmm.bar/drew/Ds1R78N_2Bgd/ksR5C2XbSKO/Yc7k5ktFVIid8i/gXsvixQHwiS_2FpA0dw3G/N_2Bpuch8xfCgVi
Source: {787ACDA5-73DB-11EC-90E5-ECF4BB2D2496}.dat.20.dr String found in binary or memory: http://mmmmmm.bar/drew/EvNJYH1hit_2B/S_2FBSev/L6PRTXShrXbJ8nSbnHyL3kk/rxSkNCwe_2/FwMR5MuV_2Fgl3qPB/c
Source: {787ACDA7-73DB-11EC-90E5-ECF4BB2D2496}.dat.20.dr, ~DFEFA0E4FB69B66F60.TMP.20.dr String found in binary or memory: http://mmmmmm.bar/drew/Htyh5S8h84hbP2LWKCnr_2B/LXaNEtu8OD/TOWxqpFfEELBfr4th/bCzBcRjTPZk7/6OgXjGc_2B_
Source: loaddll32.exe, 00000000.00000002.870103614.0000000001454000.00000004.00000020.sdmp, loaddll32.exe, 00000000.00000002.869913578.00000000013F0000.00000004.00000020.sdmp String found in binary or memory: http://mmmmmm.bar/drew/JYo2yh7o/xmmHqBu82xYT0h_2FY7FLhd/BDSs1jeYDH/q9Uyq_2F_2F5Uhp3O/kDGBT1_2BMID/BP
Source: {787ACDA9-73DB-11EC-90E5-ECF4BB2D2496}.dat.20.dr, ~DF5AFE25FDEA321026.TMP.20.dr String found in binary or memory: http://mmmmmm.bar/drew/PO9bW3Zv_2F/_2BA0kAKy74fTr/CqVufIf_2Fqxsh0iMOJ18/ApdxCWlx7O_2BNfd/RKvgigiK9hD
Source: regsvr32.exe, 00000002.00000002.871545750.0000000003246000.00000004.00000020.sdmp, regsvr32.exe, 00000002.00000002.871690172.000000000325B000.00000004.00000020.sdmp String found in binary or memory: http://mmmmmm.bar/drew/QBjwt7f9IP4GJ_2FI3i/c0aa6REvsF1jEZ9Gt73OXW/MtCcAk2KHvQUZ/TFCEWwi_/2FYGGLslYtr
Source: {99D3DE7F-73DB-11EC-90E5-ECF4BB2D2496}.dat.39.dr, ~DFECE1085EE4C694FA.TMP.39.dr String found in binary or memory: http://mmmmmm.bar/drew/QlXIpR0wndbmqlxV0/E1uaBwmWK3WR/XxTfKB75z9_/2F5qjg8wQ5TOnj/tny31CDfamMmuOmtnZ4
Source: loaddll32.exe, 00000000.00000003.532745537.0000000001473000.00000004.00000001.sdmp, {8A934126-73DB-11EC-90E5-ECF4BB2D2496}.dat.32.dr, ~DFB3283CE4740C455F.TMP.32.dr String found in binary or memory: http://mmmmmm.bar/drew/UW7u_2BFcze6Mn2V_/2F_2Ft6gfpjU/ji7Rx8VjY5w/9WflMmm_2Fmqb8/zBvQVjE0mqHlUZGMuEX
Source: {5DB6AF8E-73DB-11EC-90E5-ECF4BB2D2496}.dat.10.dr, ~DFBDA07BC0B99F7EB4.TMP.10.dr String found in binary or memory: http://mmmmmm.bar/drew/Wqqjeuz_2B3o/gTZon0hf6_2/BEGqKHLRv8jJbA/XiM_2F_2BLItgQ9_2FnkV/J37kJU5m548Ry5a
Source: rundll32.exe, 00000003.00000002.870070028.0000000000A4F000.00000004.00000020.sdmp, rundll32.exe, 00000003.00000002.869953373.00000000009EA000.00000004.00000020.sdmp String found in binary or memory: http://mmmmmm.bar/drew/X4p6u_2FetthGmAcz/bQsew8zG_2Fh/9P0GZIddIT6/tsqFDffw1JfZI9/7Wxh6S1430ERGHqXnGd
Source: {5DB6AF8C-73DB-11EC-90E5-ECF4BB2D2496}.dat.10.dr, ~DF2E9EF23EC6AEF09A.TMP.10.dr String found in binary or memory: http://mmmmmm.bar/drew/_2FqRGYaq3iNgnfYUBd/UHuyRkDahjgLnMh3n18sF3/AB_2B8MfNm8lr/WF50_2FD/4gDnApI5ztD
Source: loaddll32.exe, 00000000.00000003.740005035.0000000001466000.00000004.00000001.sdmp, loaddll32.exe, 00000000.00000002.869935510.00000000013FB000.00000004.00000020.sdmp String found in binary or memory: http://mmmmmm.bar/drew/b2TutLAUt/AAkTh80PEBTPVx2M0WWz/tHvwOMh8DE9FVgCx1wM/pJTiDXRlbJxqfbcaYjX5Aq/xCQ
Source: rundll32.exe, 00000003.00000002.869953373.00000000009EA000.00000004.00000020.sdmp String found in binary or memory: http://mmmmmm.bar/drew/eEhDmx0a4sdxsRnzPb9hc_2/BoO73Mi9GS/E9f2sOeyD62Bdbz85/pt5vTSpE5LaM/nbIIyujSEBL
Source: rundll32.exe, 00000003.00000002.870070028.0000000000A4F000.00000004.00000020.sdmp, rundll32.exe, 00000003.00000002.869953373.00000000009EA000.00000004.00000020.sdmp String found in binary or memory: http://mmmmmm.bar/drew/hM1upiDM4s78JFaPrfyW/3DWkoBXDYr7rgMt3xG_/2BGXIAeEHHsslby_2Fk_2B/XjQKcdsES34ik
Source: regsvr32.exe, 00000002.00000002.871888522.0000000003279000.00000004.00000020.sdmp, regsvr32.exe, 00000002.00000002.871690172.000000000325B000.00000004.00000020.sdmp String found in binary or memory: http://mmmmmm.bar/drew/lQpAWLPQsOn/iwi15YGVBnOQpx/ACCjrHfe7Wo0P5JvKHDja/8dIy_2F3W_2F273e/h_2BsxpS6fp
Source: rundll32.exe, 00000004.00000002.872734570.00000000034FE000.00000004.00000020.sdmp String found in binary or memory: http://mmmmmm.bar/drew/pqebeo2lGkpXDanz/ytpUleK_2FpNL5M/WaawzvJzKNJXUgj1ad/bF_2B89Mv/JS92dYGkqfVf3KA
Source: rundll32.exe, 00000004.00000002.873683904.00000000051CB000.00000004.00000010.sdmp String found in binary or memory: http://mmmmmm.bar/drew/pqebeo2lkpXDanz/ytpUleK_2FpNL5M/WaawzvJKNJXUgj1ad/bF_2B89M
Source: {99D3DE7B-73DB-11EC-90E5-ECF4BB2D2496}.dat.39.dr String found in binary or memory: http://mmmmmm.bar/drew/rYhpfv40P_2B7t/Bl8Jpz3HikWQQZ2Mkwk0t/ZQh_2BBYynk_2B4t/DqzVN_2FWUQJJOS/_2FaWtf
Source: regsvr32.exe, 00000002.00000002.871545750.0000000003246000.00000004.00000020.sdmp String found in binary or memory: http://mmmmmm.bar/drew/yX2jPs_2FJk7BOaoQtgEiU6/nNQbGh1LU5/204V5EdINWf_2Fd_2/Byf2ExfvNDDz/y_2Fb3qYGFh
Source: regsvr32.exe, 00000002.00000003.603899610.0000000003260000.00000004.00000001.sdmp String found in binary or memory: http://mmmmmm.casa
Source: rundll32.exe, 00000003.00000002.869953373.00000000009EA000.00000004.00000020.sdmp String found in binary or memory: http://mmmmmm.casa/
Source: rundll32.exe, 00000004.00000003.647377507.0000000003536000.00000004.00000001.sdmp String found in binary or memory: http://mmmmmm.casa/drew/34vM2Qz4NrxAJPso/55_2BO7dEpmqKKz/UfdYfTV2D9XUJnIX4u/wEi6o1JYk/kRFDZ6mK40EWls
Source: rundll32.exe, 00000004.00000002.872832088.0000000003522000.00000004.00000020.sdmp, rundll32.exe, 00000004.00000002.872734570.00000000034FE000.00000004.00000020.sdmp String found in binary or memory: http://mmmmmm.casa/drew/6V2kcoNh5zlkLfQFPc/BK1xvKoki/sI2xcD400Cdl5_2BfFpM/88ymBYA3Lf0RW9scFqJ/hZxCNo
Source: ~DF8B1684F7EAB925CF.TMP.32.dr, {8A934128-73DB-11EC-90E5-ECF4BB2D2496}.dat.32.dr String found in binary or memory: http://mmmmmm.casa/drew/8VlHKrhhwaO4MOJ/f3EmmfXBW3D8HUpBCo/swchfzgV4/yHkfNEa_2Fwt2XYdacLI/ABkGMMt3Hv
Source: rundll32.exe, 00000003.00000002.870070028.0000000000A4F000.00000004.00000020.sdmp, rundll32.exe, 00000003.00000002.869953373.00000000009EA000.00000004.00000020.sdmp String found in binary or memory: http://mmmmmm.casa/drew/Gbrj1v9f6rwpYUn6Y/0ESxqmC4O7HZ/1pIQZKpC23v/OvNjMXTiBqucS2/OdUDj2hxo5EF8I9teP
Source: {8A93412C-73DB-11EC-90E5-ECF4BB2D2496}.dat.32.dr, ~DF6BE4FBC691CAB6A8.TMP.32.dr String found in binary or memory: http://mmmmmm.casa/drew/HtkON_2B7z6GBNJYyD4I3/xRuj4RA80G1xgwTe/6DMbifikIm_2FM8/00fCpSw_2FispEHnQv/ay
Source: regsvr32.exe, 00000002.00000002.871545750.0000000003246000.00000004.00000020.sdmp String found in binary or memory: http://mmmmmm.casa/drew/IVKP_2B6ZQQkG6g5/gfowffZhbmtN_2B/GZbbScWLQtb1lACgnt/rBntiTQwT/saL_2BBlUn86jR
Source: loaddll32.exe, 00000000.00000003.595053007.0000000001473000.00000004.00000001.sdmp, loaddll32.exe, 00000000.00000003.594959193.0000000001473000.00000004.00000001.sdmp, ~DF635DEF1629836875.TMP.39.dr, {99D3DE79-73DB-11EC-90E5-ECF4BB2D2496}.dat.39.dr String found in binary or memory: http://mmmmmm.casa/drew/KIltLLac3s45S6I2s/_2B1Wqc_2B5c/EKy4c6iVcGr/roEVoEtc4s6KJG/LaHr2aqiVSiSI_2F6e
Source: regsvr32.exe, 00000002.00000002.871888522.0000000003279000.00000004.00000020.sdmp, regsvr32.exe, 00000002.00000002.871545750.0000000003246000.00000004.00000020.sdmp String found in binary or memory: http://mmmmmm.casa/drew/O89kIoYukkHw2iqX/AhMjsf0VV5QFYgZ/kFHoGSUTql5nMATTez/zlGIspUJ0/j76OVsrTt0Nd7s
Source: loaddll32.exe, 00000000.00000002.869935510.00000000013FB000.00000004.00000020.sdmp String found in binary or memory: http://mmmmmm.casa/drew/ObPEVjME/uTgl7EeI4pUIcVbTx37h32z/9JQSUI9yi4/tlbn0QAMwdOSinKCj/I_2FUWBt0Kof/e
Source: loaddll32.exe, 00000000.00000002.871350910.00000000034EA000.00000004.00000010.sdmp String found in binary or memory: http://mmmmmm.casa/drew/XywyoiTttJTDU8v/K3707uO1SfrgHYPfXh/Csk9b4vhf/8V4G3vJbaghQgc
Source: rundll32.exe, 00000003.00000002.870070028.0000000000A4F000.00000004.00000020.sdmp String found in binary or memory: http://mmmmmm.casa/drew/cD2Ewm7iGqMWPOkoVh2Hr/lSdxksgYA4mJEN42/6hG4ODNyYAH539U/3fuQQ5LlKDI4bM1b7W/id
Source: rundll32.exe, 00000004.00000002.872832088.0000000003522000.00000004.00000020.sdmp, rundll32.exe, 00000004.00000002.872734570.00000000034FE000.00000004.00000020.sdmp String found in binary or memory: http://mmmmmm.casa/drew/f6jKcEUOj8A64/WvqMDEXc/MwmCt7DFVgxdimBO2LgEA0N/ZNXLxEI3Zd/gyEG1BIXvosDrJ_2B/
Source: rundll32.exe, 00000003.00000002.869953373.00000000009EA000.00000004.00000020.sdmp String found in binary or memory: http://mmmmmm.casa/drew/iTPgFkMUiWF_2Fj_2BXJ/eLS5m_2F0RHDMK53bDw/qXYPEpap6CC0ju_2FKvxUJ/BgKiBRJZA0re
Source: ~DFE80EA9EDE4764E6F.TMP.32.dr, {8A93412A-73DB-11EC-90E5-ECF4BB2D2496}.dat.32.dr String found in binary or memory: http://mmmmmm.casa/drew/j7oozYYr4G/bYPRbLJriJS4feBdG/0xgI6EEeE0Qo/2gCtlKjoc_2/B1hFK5PzTlAsos/iTaAVzP
Source: {787ACDA3-73DB-11EC-90E5-ECF4BB2D2496}.dat.20.dr String found in binary or memory: http://mmmmmm.casa/drew/mcyTA6nYo7I3Lz/Gg0KywBZ6ZMcybQpO6oFh/a_2Bz7Cxc8W0bVI_/2BZNTvU_2FIySan/m_2FNy
Source: loaddll32.exe, 00000000.00000002.869935510.00000000013FB000.00000004.00000020.sdmp String found in binary or memory: http://mmmmmm.casa/drew/vdHEwGKNJDH5VthHkA9T/Z5WmkGRrBb11dvjiUNh/WxiZR4Pd4dpgWoud6Glfdx/X118IwtCBnG_
Source: SwFlsh32.dll String found in binary or memory: http://ocsp.thawte.com0
Source: SwFlsh32.dll String found in binary or memory: http://s.symcb.com/universal-root.crl0
Source: SwFlsh32.dll String found in binary or memory: http://s.symcd.com06
Source: SwFlsh32.dll String found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
Source: SwFlsh32.dll String found in binary or memory: http://s2.symcb.com0
Source: SwFlsh32.dll String found in binary or memory: http://sv.symcb.com/sv.crl0W
Source: SwFlsh32.dll String found in binary or memory: http://sv.symcb.com/sv.crt0
Source: SwFlsh32.dll String found in binary or memory: http://sv.symcd.com0&
Source: SwFlsh32.dll String found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
Source: SwFlsh32.dll String found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: SwFlsh32.dll String found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
Source: SwFlsh32.dll String found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: SwFlsh32.dll String found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: SwFlsh32.dll String found in binary or memory: http://ts-ocsp.ws.symantec.com0;
Source: SwFlsh32.dll String found in binary or memory: http://www.macromedia.com
Source: loaddll32.exe, 00000000.00000003.740049295.000000000147F000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.871455463.000000000323B000.00000004.00000020.sdmp, rundll32.exe, 00000003.00000002.870070028.0000000000A4F000.00000004.00000020.sdmp, rundll32.exe, 00000003.00000003.693044334.0000000000A4F000.00000004.00000001.sdmp, rundll32.exe, 00000003.00000002.869953373.00000000009EA000.00000004.00000020.sdmp, rundll32.exe, 00000004.00000002.872734570.00000000034FE000.00000004.00000020.sdmp String found in binary or memory: http://www.mmmmmm.casa/
Source: loaddll32.exe, 00000000.00000002.870103614.0000000001454000.00000004.00000020.sdmp String found in binary or memory: http://www.mmmmmm.casa/JYo2yh7o/xmmHqBu82xYT0h_2FY7FLhd/BDSs1jeYDH/q9Uyq_2F_2F5Uhp3O/kDGBT1_2BMID/BP
Source: loaddll32.exe, 00000000.00000002.869935510.00000000013FB000.00000004.00000020.sdmp String found in binary or memory: http://www.mmmmmm.casa/ZZq/Ef7PDUJU5SDC1JS1Awcb
Source: rundll32.exe, 00000004.00000002.872734570.00000000034FE000.00000004.00000020.sdmp String found in binary or memory: http://www.mmmmmm.casa/drew/34vM2Qz4NrxAJPso/55_2BO7dEpmqKKz/UfdYfTV2D9XUJnIX4u/wEi6o1JYk/kRFDZ6mK40
Source: regsvr32.exe, 00000002.00000002.871545750.0000000003246000.00000004.00000020.sdmp String found in binary or memory: http://www.mmmmmm.casa/drew/5Ri1
Source: regsvr32.exe, 00000002.00000002.871545750.0000000003246000.00000004.00000020.sdmp String found in binary or memory: http://www.mmmmmm.casa/drew/5Ri1ZRKiUj4KbdI8X3X/Jh19vlM5zKBKS9GzxSI_2F/EeCCCUkcTJxTJ/yjPTlmAW/SRBKYk
Source: rundll32.exe, 00000004.00000002.872734570.00000000034FE000.00000004.00000020.sdmp String found in binary or memory: http://www.mmmmmm.casa/drew/6V2kcoNh5zlkLfQFPc/BK1xvKoki/sI2xcD400Cdl5_2BfFpM/88ymBYA3Lf0RW9scFqJ/hZ
Source: rundll32.exe, 00000003.00000002.869953373.00000000009EA000.00000004.00000020.sdmp String found in binary or memory: http://www.mmmmmm.casa/drew/Gbrj1v9f6rwpYUn6Y/0ESxqmC4O7HZ/1pIQZKpC23v/OvNjMXTiBqucS2/OdUDj2hxo5EF8I
Source: regsvr32.exe, 00000002.00000002.871690172.000000000325B000.00000004.00000020.sdmp String found in binary or memory: http://www.mmmmmm.casa/drew/IVKP_2B6ZQQkG6g5/gfowffZhbmtN_2B/GZbbScWLQtb1lACgnt/rBntiTQwT/saL_2BBlUn
Source: regsvr32.exe, 00000002.00000002.871545750.0000000003246000.00000004.00000020.sdmp, regsvr32.exe, 00000002.00000002.871690172.000000000325B000.00000004.00000020.sdmp String found in binary or memory: http://www.mmmmmm.casa/drew/O89kIoYukkHw2iqX/AhMjsf0VV5QFYgZ/kFHoGSUTql5nMATTez/zlGIspUJ0/j76OVsrTt0
Source: loaddll32.exe, 00000000.00000003.740005035.0000000001466000.00000004.00000001.sdmp, loaddll32.exe, 00000000.00000002.869935510.00000000013FB000.00000004.00000020.sdmp String found in binary or memory: http://www.mmmmmm.casa/drew/ObPEVjME/uTgl7EeI4pUIcVbTx37h32z/9JQSUI9yi4/tlbn0QAMwdOSinKCj/I_2FUWBt0K
Source: rundll32.exe, 00000003.00000002.870070028.0000000000A4F000.00000004.00000020.sdmp String found in binary or memory: http://www.mmmmmm.casa/drew/cD2Ewm7iGqMWPOkoVh2Hr/lSdxksgYA4mJEN42/6hG4ODNyYAH539U/3fuQQ5LlKDI4bM1b7
Source: rundll32.exe, 00000004.00000002.872734570.00000000034FE000.00000004.00000020.sdmp String found in binary or memory: http://www.mmmmmm.casa/drew/f6jKcEUOj8A64/WvqMDEXc/MwmCt7DFVgxdimBO2LgEA0N/ZNXLxEI3Zd/gyEG1BIXvosDrJ
Source: rundll32.exe, 00000003.00000003.693044334.0000000000A4F000.00000004.00000001.sdmp String found in binary or memory: http://www.mmmmmm.casa/drew/iTPgFkMUiWF_2Fj_2BXJ/eLS5m_2F0RHDMK53bDw/qXYPEpap6CC0ju_2FKvxUJ/BgKiBRJZ
Source: loaddll32.exe, 00000000.00000002.870103614.0000000001454000.00000004.00000020.sdmp, loaddll32.exe, 00000000.00000002.869935510.00000000013FB000.00000004.00000020.sdmp String found in binary or memory: http://www.mmmmmm.casa/drew/vdHEwGKNJDH5VthHkA9T/Z5WmkGRrBb11dvjiUNh/WxiZR4Pd4dpgWoud6Glfdx/X118IwtC
Source: rundll32.exe, 00000003.00000002.870070028.0000000000A4F000.00000004.00000020.sdmp String found in binary or memory: http://www.mmmmmm.casa/f7
Source: rundll32.exe, 00000003.00000002.869953373.00000000009EA000.00000004.00000020.sdmp String found in binary or memory: http://www.mmmmmm.casa/x
Source: rundll32.exe, 00000003.00000002.869953373.00000000009EA000.00000004.00000020.sdmp String found in binary or memory: http://www.mmmmmm.casaEF8I9tePbbl/e0WI0OeHAABDBK_2/BGgWBLhnrCwIX2a/eY2i6bDO1XsEiKpdI_/2Ffj5yrES/XUkd
Source: SwFlsh32.dll String found in binary or memory: http://www.symauth.com/cps0(
Source: SwFlsh32.dll String found in binary or memory: http://www.symauth.com/rpa00
Source: SwFlsh32.dll String found in binary or memory: https://d.symcb.com/cps0%
Source: SwFlsh32.dll String found in binary or memory: https://d.symcb.com/rpa0
Source: SwFlsh32.dll String found in binary or memory: https://d.symcb.com/rpa0.
Source: unknown DNS traffic detected: queries for: mmmmmm.bar
Source: global traffic HTTP traffic detected: GET /drew/_2FqRGYaq3iNgnfYUBd/UHuyRkDahjgLnMh3n18sF3/AB_2B8MfNm8lr/WF50_2FD/4gDnApI5ztDswQT6fjW65Rc/8MlMyqf40d/OYMqyhdyGd1vn8BC_/2FCmHGeoqK5H/6a3W2Hnh7_2/FTBT4tro82LZZK/jBx_2BoXi6bJAkOt7vlQn/kou7T2J7XWftNrQG/syM1ToxLg0h4e74/4f8O3ZiP0I7VXDSeQS/TpcGBDm3s/sgldq9ogVR_2FlxXdUQt/h.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: mmmmmm.barConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /drew/Wqqjeuz_2B3o/gTZon0hf6_2/BEGqKHLRv8jJbA/XiM_2F_2BLItgQ9_2FnkV/J37kJU5m548Ry5aD/_2BaeC5gue46teo/Mz94QcIObLwkCmIFSe/AYyEx_2Ft/7flnx_2FeBMaKdb_2BZY/2QcUQ0KczFWXmzcms2u/KqZ09beQmNbj50XJX6IPpt/L8avESS6Nbmyi/27IxeLE_/2B4eudEcqYK8iUY7pnK_2BN/lez_2F9d6B/JO7dBHKHEfmL4H2lk/EeykEsbEse/f.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: mmmmmm.barConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /drew/1QOwg_2FLZb/YxejGgbNFeCdhh/1gjuax4E3bxF4PQuVvUoz/mWe6jb2568sC8c53/IkV5WVtme_2FISC/QrKvSVSdIRQPViUnPj/3Fw_2FGBy/ougDsh_2BOgImgeL_2FQ/ksdlSb4g_2Fwrah6M24/q_2B2b3zRP7YanP8WhJAas/H3R9cX2XSL2XN/g1is_2Fx/5fxgjLlEiN4fVMRrNvIC_2B/BMY9igRITe/bCdqDPjTj_2BNJVhj/TVNqqBqkq6Cf/FXwLJI8.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: mmmmmm.barConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /drew/Wqqjeuz_2B3o/gTZon0hf6_2/BEGqKHLRv8jJbA/XiM_2F_2BLItgQ9_2FnkV/J37kJU5m548Ry5aD/_2BaeC5gue46teo/Mz94QcIObLwkCmIFSe/AYyEx_2Ft/7flnx_2FeBMaKdb_2BZY/2QcUQ0KczFWXmzcms2u/KqZ09beQmNbj50XJX6IPpt/L8avESS6Nbmyi/27IxeLE_/2B4eudEcqYK8iUY7pnK_2BN/lez_2F9d6B/JO7dBHKHEfmL4H2lk/EeykEsbEse/f.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: mmmmmm.barConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /drew/Wqqjeuz_2B3o/gTZon0hf6_2/BEGqKHLRv8jJbA/XiM_2F_2BLItgQ9_2FnkV/J37kJU5m548Ry5aD/_2BaeC5gue46teo/Mz94QcIObLwkCmIFSe/AYyEx_2Ft/7flnx_2FeBMaKdb_2BZY/2QcUQ0KczFWXmzcms2u/KqZ09beQmNbj50XJX6IPpt/L8avESS6Nbmyi/27IxeLE_/2B4eudEcqYK8iUY7pnK_2BN/lez_2F9d6B/JO7dBHKHEfmL4H2lk/EeykEsbEse/f.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: mmmmmm.barConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /drew/Wqqjeuz_2B3o/gTZon0hf6_2/BEGqKHLRv8jJbA/XiM_2F_2BLItgQ9_2FnkV/J37kJU5m548Ry5aD/_2BaeC5gue46teo/Mz94QcIObLwkCmIFSe/AYyEx_2Ft/7flnx_2FeBMaKdb_2BZY/2QcUQ0KczFWXmzcms2u/KqZ09beQmNbj50XJX6IPpt/L8avESS6Nbmyi/27IxeLE_/2B4eudEcqYK8iUY7pnK_2BN/lez_2F9d6B/JO7dBHKHEfmL4H2lk/EeykEsbEse/f.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: mmmmmm.barConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /drew/Wqqjeuz_2B3o/gTZon0hf6_2/BEGqKHLRv8jJbA/XiM_2F_2BLItgQ9_2FnkV/J37kJU5m548Ry5aD/_2BaeC5gue46teo/Mz94QcIObLwkCmIFSe/AYyEx_2Ft/7flnx_2FeBMaKdb_2BZY/2QcUQ0KczFWXmzcms2u/KqZ09beQmNbj50XJX6IPpt/L8avESS6Nbmyi/27IxeLE_/2B4eudEcqYK8iUY7pnK_2BN/lez_2F9d6B/JO7dBHKHEfmL4H2lk/EeykEsbEse/f.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: mmmmmm.barConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /drew/Wqqjeuz_2B3o/gTZon0hf6_2/BEGqKHLRv8jJbA/XiM_2F_2BLItgQ9_2FnkV/J37kJU5m548Ry5aD/_2BaeC5gue46teo/Mz94QcIObLwkCmIFSe/AYyEx_2Ft/7flnx_2FeBMaKdb_2BZY/2QcUQ0KczFWXmzcms2u/KqZ09beQmNbj50XJX6IPpt/L8avESS6Nbmyi/27IxeLE_/2B4eudEcqYK8iUY7pnK_2BN/lez_2F9d6B/JO7dBHKHEfmL4H2lk/EeykEsbEse/f.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: mmmmmm.barConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /drew/Wqqjeuz_2B3o/gTZon0hf6_2/BEGqKHLRv8jJbA/XiM_2F_2BLItgQ9_2FnkV/J37kJU5m548Ry5aD/_2BaeC5gue46teo/Mz94QcIObLwkCmIFSe/AYyEx_2Ft/7flnx_2FeBMaKdb_2BZY/2QcUQ0KczFWXmzcms2u/KqZ09beQmNbj50XJX6IPpt/L8avESS6Nbmyi/27IxeLE_/2B4eudEcqYK8iUY7pnK_2BN/lez_2F9d6B/JO7dBHKHEfmL4H2lk/EeykEsbEse/f.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: mmmmmm.barConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /drew/mcyTA6nYo7I3Lz/Gg0KywBZ6ZMcybQpO6oFh/a_2Bz7Cxc8W0bVI_/2BZNTvU_2FIySan/m_2FNy1IRnoBB2dOL6/ewPhtQKmX/4vEptWmInKNSCCelbBJL/QsUTl3MG8W_2FUT5c4I/Wbyh4OWkqK5LNO5yhmAMAh/lEvQjX_2BglB2/ZgXdboWB/keU0AsD3UcwLpfPRqdjUowu/0EDp5luYWq/WPk0AaCP_2BNIdyuD/JX2Aa27OteSX/ayBPWZC0Qw7/E.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: mmmmmm.casaConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /drew/mcyTA6nYo7I3Lz/Gg0KywBZ6ZMcybQpO6oFh/a_2Bz7Cxc8W0bVI_/2BZNTvU_2FIySan/m_2FNy1IRnoBB2dOL6/ewPhtQKmX/4vEptWmInKNSCCelbBJL/QsUTl3MG8W_2FUT5c4I/Wbyh4OWkqK5LNO5yhmAMAh/lEvQjX_2BglB2/ZgXdboWB/keU0AsD3UcwLpfPRqdjUowu/0EDp5luYWq/WPk0AaCP_2BNIdyuD/JX2Aa27OteSX/ayBPWZC0Qw7/E.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateConnection: Keep-AliveHost: www.mmmmmm.casa
Source: global traffic HTTP traffic detected: GET /drew/PO9bW3Zv_2F/_2BA0kAKy74fTr/CqVufIf_2Fqxsh0iMOJ18/ApdxCWlx7O_2BNfd/RKvgigiK9hDa7_2/FbVDmbRn7bFA6hDIsg/qnhgHlt_2/Fn9gwy0xq3B1YpmIEOZM/i42uyk5dSn9gOG1Mrjl/gu0_2FGrgMcGgkRkxMvgEt/d2e52UUAd9X_2/FPiKiGt8/8igoSobBPUnwfzWxm1snqpo/33m84b1CoD/HFsz2OpMmuL6t_2Fc/dN61skszAki/D0m0Ko.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: mmmmmm.barConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /drew/EvNJYH1hit_2B/S_2FBSev/L6PRTXShrXbJ8nSbnHyL3kk/rxSkNCwe_2/FwMR5MuV_2Fgl3qPB/c6WKRAyG2mKK/EyMV4RPRN72/UBYRZyU7kLOVPK/eMDHC4ySlSv07nKtMx_2B/GdNtuquoq_2BZzhi/xfSg95Fx7okthXg/kTApiXXVCdgTGD_2Bz/_2Fp8iqr_/2BK8IeDoGoTnVf4v953h/YveRYe4a_2F0zB8eMbv/jnoXt_2BSI1PiRRfVToPJG/Eiyhp6P4/p.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: mmmmmm.barConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /drew/Htyh5S8h84hbP2LWKCnr_2B/LXaNEtu8OD/TOWxqpFfEELBfr4th/bCzBcRjTPZk7/6OgXjGc_2B_/2FAMgHsn7E9l6Q/B2WdGNnEZeMYZT3QqC9Nb/N3lrV5YafsC12ABW/3hwoiF9qB_2BZlH/icXT_2FOzkY5vJqst2/OVKX2yVdz/OWKBhlP93CQx3biHTKAg/kpFy9_2Fi1YHFZAcNn8/Dcq8SZvuWCYV0A8EYdfSFx/Y6Ue4WL_2FV7S/fsUD_2BIU/82.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: mmmmmm.barConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /drew/PO9bW3Zv_2F/_2BA0kAKy74fTr/CqVufIf_2Fqxsh0iMOJ18/ApdxCWlx7O_2BNfd/RKvgigiK9hDa7_2/FbVDmbRn7bFA6hDIsg/qnhgHlt_2/Fn9gwy0xq3B1YpmIEOZM/i42uyk5dSn9gOG1Mrjl/gu0_2FGrgMcGgkRkxMvgEt/d2e52UUAd9X_2/FPiKiGt8/8igoSobBPUnwfzWxm1snqpo/33m84b1CoD/HFsz2OpMmuL6t_2Fc/dN61skszAki/D0m0Ko.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: mmmmmm.barConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /drew/Htyh5S8h84hbP2LWKCnr_2B/LXaNEtu8OD/TOWxqpFfEELBfr4th/bCzBcRjTPZk7/6OgXjGc_2B_/2FAMgHsn7E9l6Q/B2WdGNnEZeMYZT3QqC9Nb/N3lrV5YafsC12ABW/3hwoiF9qB_2BZlH/icXT_2FOzkY5vJqst2/OVKX2yVdz/OWKBhlP93CQx3biHTKAg/kpFy9_2Fi1YHFZAcNn8/Dcq8SZvuWCYV0A8EYdfSFx/Y6Ue4WL_2FV7S/fsUD_2BIU/82.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: mmmmmm.barConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /drew/PO9bW3Zv_2F/_2BA0kAKy74fTr/CqVufIf_2Fqxsh0iMOJ18/ApdxCWlx7O_2BNfd/RKvgigiK9hDa7_2/FbVDmbRn7bFA6hDIsg/qnhgHlt_2/Fn9gwy0xq3B1YpmIEOZM/i42uyk5dSn9gOG1Mrjl/gu0_2FGrgMcGgkRkxMvgEt/d2e52UUAd9X_2/FPiKiGt8/8igoSobBPUnwfzWxm1snqpo/33m84b1CoD/HFsz2OpMmuL6t_2Fc/dN61skszAki/D0m0Ko.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: mmmmmm.barConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /drew/Htyh5S8h84hbP2LWKCnr_2B/LXaNEtu8OD/TOWxqpFfEELBfr4th/bCzBcRjTPZk7/6OgXjGc_2B_/2FAMgHsn7E9l6Q/B2WdGNnEZeMYZT3QqC9Nb/N3lrV5YafsC12ABW/3hwoiF9qB_2BZlH/icXT_2FOzkY5vJqst2/OVKX2yVdz/OWKBhlP93CQx3biHTKAg/kpFy9_2Fi1YHFZAcNn8/Dcq8SZvuWCYV0A8EYdfSFx/Y6Ue4WL_2FV7S/fsUD_2BIU/82.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: mmmmmm.barConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /drew/UW7u_2BFcze6Mn2V_/2F_2Ft6gfpjU/ji7Rx8VjY5w/9WflMmm_2Fmqb8/zBvQVjE0mqHlUZGMuEXTB/HEwR8WQpXxRM89oN/1cAqp1w8pPdeEz3/VIGd3IQjbLDnwpHP8K/7_2FeYyHT/464Qd9W8LhgOHL3Pj2aR/oq0Ng3p2PFGkfuSjaPw/_2BM_2BmxSzjLXgbDT3iEr/vDQWplVFAGepF/qn9lk8tr/bJ5cKP99gfc_2BeSGYfAwTs/d9FajJ_2F/2hdyIN.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: mmmmmm.barConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /drew/HtkON_2B7z6GBNJYyD4I3/xRuj4RA80G1xgwTe/6DMbifikIm_2FM8/00fCpSw_2FispEHnQv/ay_2F3gE3/oOYKJzhDJmDqsnndqRcm/WimAvUhteSw_2Fc93Cu/LsTVjCaCiit8lBp6cr3LHW/NUGnS2o0K1GIO/9DztPR6y/1wL4WK52CrQNl9GkBoK3y4y/0UMaajSHs_/2BFHmnnBnM3vSdJ5q/fZPNMnsQSSSV/F839oKXvjNu/zBM1z_2BEUjAtZ/n.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: mmmmmm.casaConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /drew/j7oozYYr4G/bYPRbLJriJS4feBdG/0xgI6EEeE0Qo/2gCtlKjoc_2/B1hFK5PzTlAsos/iTaAVzPWNav1dGzFBSySy/UxAr96PjZyJmtdFK/fjXwxJmbivWIGIY/yq5Vv8AYxEn49XkMGs/TubtjJpWE/75uowT9qAGrZ7hMQc0Ie/MC9oDaNtwMfoejZWEbQ/liHrTgwmRg6JEzsf_2FWS5/OEyBJ8_2Ft152/RzvfDI58/dRQYeFOH3wNaXYh/y.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: mmmmmm.casaConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /drew/8VlHKrhhwaO4MOJ/f3EmmfXBW3D8HUpBCo/swchfzgV4/yHkfNEa_2Fwt2XYdacLI/ABkGMMt3HvRTK_2Bqqu/gzjGRx7KB_2F1RoftA_2Fz/PEgtk6sAU_2FI/SoLiX7_2/F6nF3_2FX_2FL_2BPA9VAJE/2ti_2BjF22/eWsy2b94EnkcAywCn/SePiZqRhG0KC/J9h54_2FXsX/_2BAYiFGvma0Ov/TOZ2z9V2mUHL5ZKiKLNfv/GDzWsuuy7dOH1Ahu/VU35hjTe/i6_2F.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: mmmmmm.casaConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /drew/HtkON_2B7z6GBNJYyD4I3/xRuj4RA80G1xgwTe/6DMbifikIm_2FM8/00fCpSw_2FispEHnQv/ay_2F3gE3/oOYKJzhDJmDqsnndqRcm/WimAvUhteSw_2Fc93Cu/LsTVjCaCiit8lBp6cr3LHW/NUGnS2o0K1GIO/9DztPR6y/1wL4WK52CrQNl9GkBoK3y4y/0UMaajSHs_/2BFHmnnBnM3vSdJ5q/fZPNMnsQSSSV/F839oKXvjNu/zBM1z_2BEUjAtZ/n.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateConnection: Keep-AliveHost: www.mmmmmm.casa
Source: global traffic HTTP traffic detected: GET /drew/j7oozYYr4G/bYPRbLJriJS4feBdG/0xgI6EEeE0Qo/2gCtlKjoc_2/B1hFK5PzTlAsos/iTaAVzPWNav1dGzFBSySy/UxAr96PjZyJmtdFK/fjXwxJmbivWIGIY/yq5Vv8AYxEn49XkMGs/TubtjJpWE/75uowT9qAGrZ7hMQc0Ie/MC9oDaNtwMfoejZWEbQ/liHrTgwmRg6JEzsf_2FWS5/OEyBJ8_2Ft152/RzvfDI58/dRQYeFOH3wNaXYh/y.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateConnection: Keep-AliveHost: www.mmmmmm.casa
Source: global traffic HTTP traffic detected: GET /drew/8VlHKrhhwaO4MOJ/f3EmmfXBW3D8HUpBCo/swchfzgV4/yHkfNEa_2Fwt2XYdacLI/ABkGMMt3HvRTK_2Bqqu/gzjGRx7KB_2F1RoftA_2Fz/PEgtk6sAU_2FI/SoLiX7_2/F6nF3_2FX_2FL_2BPA9VAJE/2ti_2BjF22/eWsy2b94EnkcAywCn/SePiZqRhG0KC/J9h54_2FXsX/_2BAYiFGvma0Ov/TOZ2z9V2mUHL5ZKiKLNfv/GDzWsuuy7dOH1Ahu/VU35hjTe/i6_2F.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateConnection: Keep-AliveHost: www.mmmmmm.casa
Source: global traffic HTTP traffic detected: GET /drew/HtkON_2B7z6GBNJYyD4I3/xRuj4RA80G1xgwTe/6DMbifikIm_2FM8/00fCpSw_2FispEHnQv/ay_2F3gE3/oOYKJzhDJmDqsnndqRcm/WimAvUhteSw_2Fc93Cu/LsTVjCaCiit8lBp6cr3LHW/NUGnS2o0K1GIO/9DztPR6y/1wL4WK52CrQNl9GkBoK3y4y/0UMaajSHs_/2BFHmnnBnM3vSdJ5q/fZPNMnsQSSSV/F839oKXvjNu/zBM1z_2BEUjAtZ/n.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateConnection: Keep-AliveHost: www.mmmmmm.casa
Source: global traffic HTTP traffic detected: GET /drew/8VlHKrhhwaO4MOJ/f3EmmfXBW3D8HUpBCo/swchfzgV4/yHkfNEa_2Fwt2XYdacLI/ABkGMMt3HvRTK_2Bqqu/gzjGRx7KB_2F1RoftA_2Fz/PEgtk6sAU_2FI/SoLiX7_2/F6nF3_2FX_2FL_2BPA9VAJE/2ti_2BjF22/eWsy2b94EnkcAywCn/SePiZqRhG0KC/J9h54_2FXsX/_2BAYiFGvma0Ov/TOZ2z9V2mUHL5ZKiKLNfv/GDzWsuuy7dOH1Ahu/VU35hjTe/i6_2F.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateConnection: Keep-AliveHost: www.mmmmmm.casa
Source: global traffic HTTP traffic detected: GET /drew/HtkON_2B7z6GBNJYyD4I3/xRuj4RA80G1xgwTe/6DMbifikIm_2FM8/00fCpSw_2FispEHnQv/ay_2F3gE3/oOYKJzhDJmDqsnndqRcm/WimAvUhteSw_2Fc93Cu/LsTVjCaCiit8lBp6cr3LHW/NUGnS2o0K1GIO/9DztPR6y/1wL4WK52CrQNl9GkBoK3y4y/0UMaajSHs_/2BFHmnnBnM3vSdJ5q/fZPNMnsQSSSV/F839oKXvjNu/zBM1z_2BEUjAtZ/n.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateConnection: Keep-AliveHost: www.mmmmmm.casa
Source: global traffic HTTP traffic detected: GET /drew/8VlHKrhhwaO4MOJ/f3EmmfXBW3D8HUpBCo/swchfzgV4/yHkfNEa_2Fwt2XYdacLI/ABkGMMt3HvRTK_2Bqqu/gzjGRx7KB_2F1RoftA_2Fz/PEgtk6sAU_2FI/SoLiX7_2/F6nF3_2FX_2FL_2BPA9VAJE/2ti_2BjF22/eWsy2b94EnkcAywCn/SePiZqRhG0KC/J9h54_2FXsX/_2BAYiFGvma0Ov/TOZ2z9V2mUHL5ZKiKLNfv/GDzWsuuy7dOH1Ahu/VU35hjTe/i6_2F.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateConnection: Keep-AliveHost: www.mmmmmm.casa
Source: global traffic HTTP traffic detected: GET /drew/HtkON_2B7z6GBNJYyD4I3/xRuj4RA80G1xgwTe/6DMbifikIm_2FM8/00fCpSw_2FispEHnQv/ay_2F3gE3/oOYKJzhDJmDqsnndqRcm/WimAvUhteSw_2Fc93Cu/LsTVjCaCiit8lBp6cr3LHW/NUGnS2o0K1GIO/9DztPR6y/1wL4WK52CrQNl9GkBoK3y4y/0UMaajSHs_/2BFHmnnBnM3vSdJ5q/fZPNMnsQSSSV/F839oKXvjNu/zBM1z_2BEUjAtZ/n.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateConnection: Keep-AliveHost: www.mmmmmm.casa
Source: global traffic HTTP traffic detected: GET /drew/8VlHKrhhwaO4MOJ/f3EmmfXBW3D8HUpBCo/swchfzgV4/yHkfNEa_2Fwt2XYdacLI/ABkGMMt3HvRTK_2Bqqu/gzjGRx7KB_2F1RoftA_2Fz/PEgtk6sAU_2FI/SoLiX7_2/F6nF3_2FX_2FL_2BPA9VAJE/2ti_2BjF22/eWsy2b94EnkcAywCn/SePiZqRhG0KC/J9h54_2FXsX/_2BAYiFGvma0Ov/TOZ2z9V2mUHL5ZKiKLNfv/GDzWsuuy7dOH1Ahu/VU35hjTe/i6_2F.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateConnection: Keep-AliveHost: www.mmmmmm.casa
Source: global traffic HTTP traffic detected: GET /drew/HtkON_2B7z6GBNJYyD4I3/xRuj4RA80G1xgwTe/6DMbifikIm_2FM8/00fCpSw_2FispEHnQv/ay_2F3gE3/oOYKJzhDJmDqsnndqRcm/WimAvUhteSw_2Fc93Cu/LsTVjCaCiit8lBp6cr3LHW/NUGnS2o0K1GIO/9DztPR6y/1wL4WK52CrQNl9GkBoK3y4y/0UMaajSHs_/2BFHmnnBnM3vSdJ5q/fZPNMnsQSSSV/F839oKXvjNu/zBM1z_2BEUjAtZ/n.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateConnection: Keep-AliveHost: www.mmmmmm.casa
Source: global traffic HTTP traffic detected: GET /drew/8VlHKrhhwaO4MOJ/f3EmmfXBW3D8HUpBCo/swchfzgV4/yHkfNEa_2Fwt2XYdacLI/ABkGMMt3HvRTK_2Bqqu/gzjGRx7KB_2F1RoftA_2Fz/PEgtk6sAU_2FI/SoLiX7_2/F6nF3_2FX_2FL_2BPA9VAJE/2ti_2BjF22/eWsy2b94EnkcAywCn/SePiZqRhG0KC/J9h54_2FXsX/_2BAYiFGvma0Ov/TOZ2z9V2mUHL5ZKiKLNfv/GDzWsuuy7dOH1Ahu/VU35hjTe/i6_2F.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateConnection: Keep-AliveHost: www.mmmmmm.casa
Source: global traffic HTTP traffic detected: GET /drew/HtkON_2B7z6GBNJYyD4I3/xRuj4RA80G1xgwTe/6DMbifikIm_2FM8/00fCpSw_2FispEHnQv/ay_2F3gE3/oOYKJzhDJmDqsnndqRcm/WimAvUhteSw_2Fc93Cu/LsTVjCaCiit8lBp6cr3LHW/NUGnS2o0K1GIO/9DztPR6y/1wL4WK52CrQNl9GkBoK3y4y/0UMaajSHs_/2BFHmnnBnM3vSdJ5q/fZPNMnsQSSSV/F839oKXvjNu/zBM1z_2BEUjAtZ/n.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateConnection: Keep-AliveHost: www.mmmmmm.casa
Source: global traffic HTTP traffic detected: GET /drew/8VlHKrhhwaO4MOJ/f3EmmfXBW3D8HUpBCo/swchfzgV4/yHkfNEa_2Fwt2XYdacLI/ABkGMMt3HvRTK_2Bqqu/gzjGRx7KB_2F1RoftA_2Fz/PEgtk6sAU_2FI/SoLiX7_2/F6nF3_2FX_2FL_2BPA9VAJE/2ti_2BjF22/eWsy2b94EnkcAywCn/SePiZqRhG0KC/J9h54_2FXsX/_2BAYiFGvma0Ov/TOZ2z9V2mUHL5ZKiKLNfv/GDzWsuuy7dOH1Ahu/VU35hjTe/i6_2F.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateConnection: Keep-AliveHost: www.mmmmmm.casa
Source: global traffic HTTP traffic detected: GET /drew/HtkON_2B7z6GBNJYyD4I3/xRuj4RA80G1xgwTe/6DMbifikIm_2FM8/00fCpSw_2FispEHnQv/ay_2F3gE3/oOYKJzhDJmDqsnndqRcm/WimAvUhteSw_2Fc93Cu/LsTVjCaCiit8lBp6cr3LHW/NUGnS2o0K1GIO/9DztPR6y/1wL4WK52CrQNl9GkBoK3y4y/0UMaajSHs_/2BFHmnnBnM3vSdJ5q/fZPNMnsQSSSV/F839oKXvjNu/zBM1z_2BEUjAtZ/n.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateConnection: Keep-AliveHost: www.mmmmmm.casa
Source: global traffic HTTP traffic detected: GET /drew/8VlHKrhhwaO4MOJ/f3EmmfXBW3D8HUpBCo/swchfzgV4/yHkfNEa_2Fwt2XYdacLI/ABkGMMt3HvRTK_2Bqqu/gzjGRx7KB_2F1RoftA_2Fz/PEgtk6sAU_2FI/SoLiX7_2/F6nF3_2FX_2FL_2BPA9VAJE/2ti_2BjF22/eWsy2b94EnkcAywCn/SePiZqRhG0KC/J9h54_2FXsX/_2BAYiFGvma0Ov/TOZ2z9V2mUHL5ZKiKLNfv/GDzWsuuy7dOH1Ahu/VU35hjTe/i6_2F.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateConnection: Keep-AliveHost: www.mmmmmm.casa
Source: global traffic HTTP traffic detected: GET /drew/KIltLLac3s45S6I2s/_2B1Wqc_2B5c/EKy4c6iVcGr/roEVoEtc4s6KJG/LaHr2aqiVSiSI_2F6emUe/8f2byiiXmsgN0FOY/8Np4qve4hjQoEFD/XyOmPI51BshmpbifBl/PhnltLMaU/pytrkMPObO5JKeAX5_2B/oKM3XwsZzkfZrPMMA4b/Y3eQjnWspYCURHfqjDSMKR/4kDNd4ZxT1b9B/WruvkEy6/DAkBsWEQ0Q5FnusESy1UZQh/tGBZx.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: mmmmmm.casaConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /drew/KIltLLac3s45S6I2s/_2B1Wqc_2B5c/EKy4c6iVcGr/roEVoEtc4s6KJG/LaHr2aqiVSiSI_2F6emUe/8f2byiiXmsgN0FOY/8Np4qve4hjQoEFD/XyOmPI51BshmpbifBl/PhnltLMaU/pytrkMPObO5JKeAX5_2B/oKM3XwsZzkfZrPMMA4b/Y3eQjnWspYCURHfqjDSMKR/4kDNd4ZxT1b9B/WruvkEy6/DAkBsWEQ0Q5FnusESy1UZQh/tGBZx.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateConnection: Keep-AliveHost: www.mmmmmm.casa
Source: global traffic HTTP traffic detected: GET /drew/KIltLLac3s45S6I2s/_2B1Wqc_2B5c/EKy4c6iVcGr/roEVoEtc4s6KJG/LaHr2aqiVSiSI_2F6emUe/8f2byiiXmsgN0FOY/8Np4qve4hjQoEFD/XyOmPI51BshmpbifBl/PhnltLMaU/pytrkMPObO5JKeAX5_2B/oKM3XwsZzkfZrPMMA4b/Y3eQjnWspYCURHfqjDSMKR/4kDNd4ZxT1b9B/WruvkEy6/DAkBsWEQ0Q5FnusESy1UZQh/tGBZx.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateConnection: Keep-AliveHost: www.mmmmmm.casa
Source: global traffic HTTP traffic detected: GET /drew/KIltLLac3s45S6I2s/_2B1Wqc_2B5c/EKy4c6iVcGr/roEVoEtc4s6KJG/LaHr2aqiVSiSI_2F6emUe/8f2byiiXmsgN0FOY/8Np4qve4hjQoEFD/XyOmPI51BshmpbifBl/PhnltLMaU/pytrkMPObO5JKeAX5_2B/oKM3XwsZzkfZrPMMA4b/Y3eQjnWspYCURHfqjDSMKR/4kDNd4ZxT1b9B/WruvkEy6/DAkBsWEQ0Q5FnusESy1UZQh/tGBZx.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateConnection: Keep-AliveHost: www.mmmmmm.casa
Source: global traffic HTTP traffic detected: GET /drew/KIltLLac3s45S6I2s/_2B1Wqc_2B5c/EKy4c6iVcGr/roEVoEtc4s6KJG/LaHr2aqiVSiSI_2F6emUe/8f2byiiXmsgN0FOY/8Np4qve4hjQoEFD/XyOmPI51BshmpbifBl/PhnltLMaU/pytrkMPObO5JKeAX5_2B/oKM3XwsZzkfZrPMMA4b/Y3eQjnWspYCURHfqjDSMKR/4kDNd4ZxT1b9B/WruvkEy6/DAkBsWEQ0Q5FnusESy1UZQh/tGBZx.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateConnection: Keep-AliveHost: www.mmmmmm.casa
Source: global traffic HTTP traffic detected: GET /drew/KIltLLac3s45S6I2s/_2B1Wqc_2B5c/EKy4c6iVcGr/roEVoEtc4s6KJG/LaHr2aqiVSiSI_2F6emUe/8f2byiiXmsgN0FOY/8Np4qve4hjQoEFD/XyOmPI51BshmpbifBl/PhnltLMaU/pytrkMPObO5JKeAX5_2B/oKM3XwsZzkfZrPMMA4b/Y3eQjnWspYCURHfqjDSMKR/4kDNd4ZxT1b9B/WruvkEy6/DAkBsWEQ0Q5FnusESy1UZQh/tGBZx.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateConnection: Keep-AliveHost: www.mmmmmm.casa
Source: global traffic HTTP traffic detected: GET /drew/KIltLLac3s45S6I2s/_2B1Wqc_2B5c/EKy4c6iVcGr/roEVoEtc4s6KJG/LaHr2aqiVSiSI_2F6emUe/8f2byiiXmsgN0FOY/8Np4qve4hjQoEFD/XyOmPI51BshmpbifBl/PhnltLMaU/pytrkMPObO5JKeAX5_2B/oKM3XwsZzkfZrPMMA4b/Y3eQjnWspYCURHfqjDSMKR/4kDNd4ZxT1b9B/WruvkEy6/DAkBsWEQ0Q5FnusESy1UZQh/tGBZx.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateConnection: Keep-AliveHost: www.mmmmmm.casa
Source: global traffic HTTP traffic detected: GET /drew/KIltLLac3s45S6I2s/_2B1Wqc_2B5c/EKy4c6iVcGr/roEVoEtc4s6KJG/LaHr2aqiVSiSI_2F6emUe/8f2byiiXmsgN0FOY/8Np4qve4hjQoEFD/XyOmPI51BshmpbifBl/PhnltLMaU/pytrkMPObO5JKeAX5_2B/oKM3XwsZzkfZrPMMA4b/Y3eQjnWspYCURHfqjDSMKR/4kDNd4ZxT1b9B/WruvkEy6/DAkBsWEQ0Q5FnusESy1UZQh/tGBZx.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateConnection: Keep-AliveHost: www.mmmmmm.casa
Source: global traffic HTTP traffic detected: GET /drew/Ds1R78N_2Bgd/ksR5C2XbSKO/Yc7k5ktFVIid8i/gXsvixQHwiS_2FpA0dw3G/N_2Bpuch8xfCgVi1/3eGL4tTfu87yI4Z/rACMFcq5R63l94qyL6/vlcHhQXeo/qZgsx68QKpo4NqrCF1dk/3YcGWx7UmtRsKmeq5lv/FmW6DXf6X9uCJp_2B2ZKAh/Megb1iUdx9Asj/MGO0ybi4/dX_2BRtHGmdsAOkPpXzDf29/gLUzY5cO4Z/Axcxdm7bOXPwi/H.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: mmmmmm.barConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /drew/rYhpfv40P_2B7t/Bl8Jpz3HikWQQZ2Mkwk0t/ZQh_2BBYynk_2B4t/DqzVN_2FWUQJJOS/_2FaWtfbTjlBBgMhMk/405GTqbwj/DLVrqcPBLK3OU_2B5YkW/NfdWgV7ntKvAos8wcTJ/lj70qHp4Em0zMPinA_2BYb/YrcsOfvA5cCI_/2FwArLU4/kwV47_2Ft0B_2BSMsMg0c11/8bx_2F0s6i/XF9Vmsy5pH6_2FDZf/Pr14EuOYxzk9/eg_2FVXSSo5/Nagf3id_/2B1A0aF.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: mmmmmm.barConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /drew/Ds1R78N_2Bgd/ksR5C2XbSKO/Yc7k5ktFVIid8i/gXsvixQHwiS_2FpA0dw3G/N_2Bpuch8xfCgVi1/3eGL4tTfu87yI4Z/rACMFcq5R63l94qyL6/vlcHhQXeo/qZgsx68QKpo4NqrCF1dk/3YcGWx7UmtRsKmeq5lv/FmW6DXf6X9uCJp_2B2ZKAh/Megb1iUdx9Asj/MGO0ybi4/dX_2BRtHGmdsAOkPpXzDf29/gLUzY5cO4Z/Axcxdm7bOXPwi/H.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: mmmmmm.barConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /drew/QlXIpR0wndbmqlxV0/E1uaBwmWK3WR/XxTfKB75z9_/2F5qjg8wQ5TOnj/tny31CDfamMmuOmtnZ4BO/UrGwEYls5FZr9NOY/qBNRjkAx6JKLl3C/amPvvbpTDPW7l1_2BG/AkIItPcFA/_2BWYnRk9w6cYY0vPsq_/2Br9VFrr411VhgRrDxy/3F_2F7Vlikg4vzRKtAZQJk/l22Naqdec_2BZ/8xjrpB_2/BXmlJcOnZaQy5f8DKHbbt25/ZVw8ezvEsm/bjxITdWRcsoO365Ol39e8/c.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: mmmmmm.barConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /drew/rYhpfv40P_2B7t/Bl8Jpz3HikWQQZ2Mkwk0t/ZQh_2BBYynk_2B4t/DqzVN_2FWUQJJOS/_2FaWtfbTjlBBgMhMk/405GTqbwj/DLVrqcPBLK3OU_2B5YkW/NfdWgV7ntKvAos8wcTJ/lj70qHp4Em0zMPinA_2BYb/YrcsOfvA5cCI_/2FwArLU4/kwV47_2Ft0B_2BSMsMg0c11/8bx_2F0s6i/XF9Vmsy5pH6_2FDZf/Pr14EuOYxzk9/eg_2FVXSSo5/Nagf3id_/2B1A0aF.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: mmmmmm.barConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /drew/QlXIpR0wndbmqlxV0/E1uaBwmWK3WR/XxTfKB75z9_/2F5qjg8wQ5TOnj/tny31CDfamMmuOmtnZ4BO/UrGwEYls5FZr9NOY/qBNRjkAx6JKLl3C/amPvvbpTDPW7l1_2BG/AkIItPcFA/_2BWYnRk9w6cYY0vPsq_/2Br9VFrr411VhgRrDxy/3F_2F7Vlikg4vzRKtAZQJk/l22Naqdec_2BZ/8xjrpB_2/BXmlJcOnZaQy5f8DKHbbt25/ZVw8ezvEsm/bjxITdWRcsoO365Ol39e8/c.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: mmmmmm.barConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /drew/Ds1R78N_2Bgd/ksR5C2XbSKO/Yc7k5ktFVIid8i/gXsvixQHwiS_2FpA0dw3G/N_2Bpuch8xfCgVi1/3eGL4tTfu87yI4Z/rACMFcq5R63l94qyL6/vlcHhQXeo/qZgsx68QKpo4NqrCF1dk/3YcGWx7UmtRsKmeq5lv/FmW6DXf6X9uCJp_2B2ZKAh/Megb1iUdx9Asj/MGO0ybi4/dX_2BRtHGmdsAOkPpXzDf29/gLUzY5cO4Z/Axcxdm7bOXPwi/H.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: mmmmmm.barConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /drew/rYhpfv40P_2B7t/Bl8Jpz3HikWQQZ2Mkwk0t/ZQh_2BBYynk_2B4t/DqzVN_2FWUQJJOS/_2FaWtfbTjlBBgMhMk/405GTqbwj/DLVrqcPBLK3OU_2B5YkW/NfdWgV7ntKvAos8wcTJ/lj70qHp4Em0zMPinA_2BYb/YrcsOfvA5cCI_/2FwArLU4/kwV47_2Ft0B_2BSMsMg0c11/8bx_2F0s6i/XF9Vmsy5pH6_2FDZf/Pr14EuOYxzk9/eg_2FVXSSo5/Nagf3id_/2B1A0aF.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: mmmmmm.barConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /drew/QlXIpR0wndbmqlxV0/E1uaBwmWK3WR/XxTfKB75z9_/2F5qjg8wQ5TOnj/tny31CDfamMmuOmtnZ4BO/UrGwEYls5FZr9NOY/qBNRjkAx6JKLl3C/amPvvbpTDPW7l1_2BG/AkIItPcFA/_2BWYnRk9w6cYY0vPsq_/2Br9VFrr411VhgRrDxy/3F_2F7Vlikg4vzRKtAZQJk/l22Naqdec_2BZ/8xjrpB_2/BXmlJcOnZaQy5f8DKHbbt25/ZVw8ezvEsm/bjxITdWRcsoO365Ol39e8/c.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: mmmmmm.barConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /drew/9kTn9nma9POHJpkr1Icf/OLGAIzVWdaryEbrg0Mm/vcdVt58PgZbFgFujCibxQS/kcDoJIO3wyYVp/K54vFYEC/gSMgbh5hTjYukOrn_2FVtVO/kxbD7685pw/D6liknAe3SgFx3Zau/fgTRypCpGd6_/2BWwzsFNUTB/kStLFMMJ2IT7_2/BrT00EK5bT2hx2ArBEpna/rJhHQ0GHmwXcGhAL/bY32sGH8COFYlAi/7c_2BXCEC2TYVlC_2B/RMiaKI.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: mmmmmm.barConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /drew/9kTn9nma9POHJpkr1Icf/OLGAIzVWdaryEbrg0Mm/vcdVt58PgZbFgFujCibxQS/kcDoJIO3wyYVp/K54vFYEC/gSMgbh5hTjYukOrn_2FVtVO/kxbD7685pw/D6liknAe3SgFx3Zau/fgTRypCpGd6_/2BWwzsFNUTB/kStLFMMJ2IT7_2/BrT00EK5bT2hx2ArBEpna/rJhHQ0GHmwXcGhAL/bY32sGH8COFYlAi/7c_2BXCEC2TYVlC_2B/RMiaKI.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: mmmmmm.barConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /drew/9kTn9nma9POHJpkr1Icf/OLGAIzVWdaryEbrg0Mm/vcdVt58PgZbFgFujCibxQS/kcDoJIO3wyYVp/K54vFYEC/gSMgbh5hTjYukOrn_2FVtVO/kxbD7685pw/D6liknAe3SgFx3Zau/fgTRypCpGd6_/2BWwzsFNUTB/kStLFMMJ2IT7_2/BrT00EK5bT2hx2ArBEpna/rJhHQ0GHmwXcGhAL/bY32sGH8COFYlAi/7c_2BXCEC2TYVlC_2B/RMiaKI.jlk HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: mmmmmm.barConnection: Keep-Alive
Source: global traffic HTTP traffic detected: GET /drew/34vM2Qz4NrxAJPso/55_2BO7dEpmqKKz/UfdYfTV2D9XUJnIX4u/wEi6o1JYk/kRFDZ6mK40EWlsc6Lw5w/mDVFZVW_2F8m7wnjZkk/bWWghhS_2BpKqwr_2FiGlA/mVW8Mpa2fncUu/9kKvVeUJ/1ENXmn00HlfSkjkGGDRsgIQ/xo_2FicWeq/xi1wE7iI0t8C7Pb_2/B0cr_2Fh2Ic_/2BR5T0WLYrL/GDbKM8aDkZ5B8k/D7fVec54KHjYVnHWNjgpP/2UWjy_2BZuxTwv24/xnHIqz6W2/M.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: mmmmmm.casaConnection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /drew/5Ri1ZRKiUj4KbdI8X3X/Jh19vlM5zKBKS9GzxSI_2F/EeCCCUkcTJxTJ/yjPTlmAW/SRBKYkKZFvOHA4e8slv_2B6/sLkQXSK6LI/s0_2BnCvQV54waFnt/9tgrPrbqXj5k/QVIFNHGIBgE/RWfKnmy0BvALOE/25vpZVbkJbBKa_2B5YQxG/4FAVo0rUlWPdhkO0/sxn_2FX_2BnOQOo/3GUZiFJLlyne50XHpa/61qsG5vaM/AQ3AuwpegmAJLs_2FJdJ/D.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: mmmmmm.casaConnection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /drew/iTPgFkMUiWF_2Fj_2BXJ/eLS5m_2F0RHDMK53bDw/qXYPEpap6CC0ju_2FKvxUJ/BgKiBRJZA0reJ/M_2BEvg2/n0SUz7ABMgvByMjQHGo4C6V/y6up15FMoS/me3cGYElCp7gjn9mK/XokkgVSPvUEl/9Xh7nBhTNUv/Hu_2FLYCoGylTE/PAnBqftN_2BClsXZ5c30E/LSE6DqmQJKuNMLsT/jIeReNc_2FrwuiM/c415zPXdTdLNE1JVmB/3gOOzGBic4F_2/B.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: mmmmmm.casaConnection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /drew/34vM2Qz4NrxAJPso/55_2BO7dEpmqKKz/UfdYfTV2D9XUJnIX4u/wEi6o1JYk/kRFDZ6mK40EWlsc6Lw5w/mDVFZVW_2F8m7wnjZkk/bWWghhS_2BpKqwr_2FiGlA/mVW8Mpa2fncUu/9kKvVeUJ/1ENXmn00HlfSkjkGGDRsgIQ/xo_2FicWeq/xi1wE7iI0t8C7Pb_2/B0cr_2Fh2Ic_/2BR5T0WLYrL/GDbKM8aDkZ5B8k/D7fVec54KHjYVnHWNjgpP/2UWjy_2BZuxTwv24/xnHIqz6W2/M.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Connection: Keep-AliveCache-Control: no-cacheHost: www.mmmmmm.casa
Source: global traffic HTTP traffic detected: GET /drew/5Ri1ZRKiUj4KbdI8X3X/Jh19vlM5zKBKS9GzxSI_2F/EeCCCUkcTJxTJ/yjPTlmAW/SRBKYkKZFvOHA4e8slv_2B6/sLkQXSK6LI/s0_2BnCvQV54waFnt/9tgrPrbqXj5k/QVIFNHGIBgE/RWfKnmy0BvALOE/25vpZVbkJbBKa_2B5YQxG/4FAVo0rUlWPdhkO0/sxn_2FX_2BnOQOo/3GUZiFJLlyne50XHpa/61qsG5vaM/AQ3AuwpegmAJLs_2FJdJ/D.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Connection: Keep-AliveCache-Control: no-cacheHost: www.mmmmmm.casa
Source: global traffic HTTP traffic detected: GET /drew/iTPgFkMUiWF_2Fj_2BXJ/eLS5m_2F0RHDMK53bDw/qXYPEpap6CC0ju_2FKvxUJ/BgKiBRJZA0reJ/M_2BEvg2/n0SUz7ABMgvByMjQHGo4C6V/y6up15FMoS/me3cGYElCp7gjn9mK/XokkgVSPvUEl/9Xh7nBhTNUv/Hu_2FLYCoGylTE/PAnBqftN_2BClsXZ5c30E/LSE6DqmQJKuNMLsT/jIeReNc_2FrwuiM/c415zPXdTdLNE1JVmB/3gOOzGBic4F_2/B.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Connection: Keep-AliveCache-Control: no-cacheHost: www.mmmmmm.casa
Source: global traffic HTTP traffic detected: GET /drew/UcHkZ0zyn6/Z111QSnuhZwHA9u5g/50_2FWEacJHv/3p_2F8yIAef/sKVudtmV_2FktO/8kfLczXGNKLOYbNQ0CJxK/IUjB6xZDhET5KvS_/2BKHLj2IG24UviU/YGxO_2Fxh5C0etXHoJ/n0ikMD6vi/MceOS3R7A4WFRXnTRTW_/2BymlMaVnnMfugU8dCe/wuDikVnnZrVM7HhAvWP1ZM/3BPQVSd9Lkjc_/2BG3HCyN/XrrYdjbHzIQdM6mC57c8tVl/k.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: mmmmmm.barConnection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /drew/yX2jPs_2FJk7BOaoQtgEiU6/nNQbGh1LU5/204V5EdINWf_2Fd_2/Byf2ExfvNDDz/y_2Fb3qYGFh/SHRXx42ELD51Zr/XViRRzGoc_2F4jsc8S8bJ/kkycv_2BQtVp8DJR/58ep6_2B48AsJVM/1TJuRFxQ3h_2BgvPWU/76cupQFL1/gc_2FubwNTN_2Btz6mOf/SjHCTvdm4okJzy8v6JD/crLXxtBjvbV2b1S_2Flfq_/2Ba_2B_2F_2B_/2BuyHAC7/0QIAnvbOfT2cDi_2B_2FiQ/y.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: mmmmmm.barConnection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /drew/eEhDmx0a4sdxsRnzPb9hc_2/BoO73Mi9GS/E9f2sOeyD62Bdbz85/pt5vTSpE5LaM/nbIIyujSEBL/OmFR25OlsOla5R/ZGIaEVBjF1eXghMwWqveY/rQjeZF8gVJNH3wHy/B973Qo6ad87bmri/ALD9b8z1P4fLtB7RV6/Qjdo70DfW/fYp2gHONnSJbyqTal3v4/rek0g25YOLcyy_2F69M/9AiJkZF0rkPrM3t880NzXZ/UtPjpWudU/GCl.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: mmmmmm.barConnection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /drew/ObPEVjME/uTgl7EeI4pUIcVbTx37h32z/9JQSUI9yi4/tlbn0QAMwdOSinKCj/I_2FUWBt0Kof/eyVYoapjZjh/6Z9m96_2FiRZZq/Ef7PDUJU5SDC1JS1AwcbH/wQMnJUKA0IIbwi4C/FAIRf72ER0v7lod/lgatZ_2BAYH2QVOTor/mfaZi9AdI/vwqa913VT82YpdpouMjC/9nlGDg9K0WVIupxKjJ_/2B_2FQmERF6IRN4evAeoKu/OPglTmf_2/FSu.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: mmmmmm.casaConnection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /drew/ObPEVjME/uTgl7EeI4pUIcVbTx37h32z/9JQSUI9yi4/tlbn0QAMwdOSinKCj/I_2FUWBt0Kof/eyVYoapjZjh/6Z9m96_2FiRZZq/Ef7PDUJU5SDC1JS1AwcbH/wQMnJUKA0IIbwi4C/FAIRf72ER0v7lod/lgatZ_2BAYH2QVOTor/mfaZi9AdI/vwqa913VT82YpdpouMjC/9nlGDg9K0WVIupxKjJ_/2B_2FQmERF6IRN4evAeoKu/OPglTmf_2/FSu.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Connection: Keep-AliveCache-Control: no-cacheHost: www.mmmmmm.casa
Source: global traffic HTTP traffic detected: GET /drew/f6jKcEUOj8A64/WvqMDEXc/MwmCt7DFVgxdimBO2LgEA0N/ZNXLxEI3Zd/gyEG1BIXvosDrJ_2B/tzo4yrPGybpk/bOXL_2FI4Gk/Dwg0zBI5Va0Vew/VcHtlW2fI_2FlIG4qwYDf/sVWPXPhigWsxWApv/e6KTeVe4jfgkgxB/EAe8o_2FKB_2BS7oKI/ttidUeBuR/ahC5CzjXBQ27gn4y5cPQ/02CG5Yjo_2F7m4jIX1c/yngrPaQmQFL5UmA/13qwwD.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: mmmmmm.casaConnection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /drew/IVKP_2B6ZQQkG6g5/gfowffZhbmtN_2B/GZbbScWLQtb1lACgnt/rBntiTQwT/saL_2BBlUn86jR0XyTBo/7JNgQsItTPD2PHGzNKS/G1LTW9fRAA1zfD6_2FMiYB/dg960muYkdAwp/uG8HwcGL/8jG_2BjlGKWZrDL8vqOPVvC/htJk0fRuFB/CZluWe0HHNShwo8us/H7tsPluCA75g/aX_2F3vI3Tj/WjN30iGXtvxagL/uXBGZL_2FYgMxgH/PfB0165.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: mmmmmm.casaConnection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /drew/cD2Ewm7iGqMWPOkoVh2Hr/lSdxksgYA4mJEN42/6hG4ODNyYAH539U/3fuQQ5LlKDI4bM1b7W/idcaoqxrd/pMXyUBd_2BzEIdIc0JYN/k0d7ofrjRiaIIgn2d7z/QSRTFXDfwTpnog_2FhKWZ2/I464QiuD2zIxn/gdmKXI_2/Bo1ItO7W8SANyxbK0_2B_2B/wmE9_2BVQd/_2FAFT722G6qgOYAX/qZ8FCQq56b14/eJnNZN9d6mJ/4SYZznClo/p0BGlI.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: mmmmmm.casaConnection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /drew/f6jKcEUOj8A64/WvqMDEXc/MwmCt7DFVgxdimBO2LgEA0N/ZNXLxEI3Zd/gyEG1BIXvosDrJ_2B/tzo4yrPGybpk/bOXL_2FI4Gk/Dwg0zBI5Va0Vew/VcHtlW2fI_2FlIG4qwYDf/sVWPXPhigWsxWApv/e6KTeVe4jfgkgxB/EAe8o_2FKB_2BS7oKI/ttidUeBuR/ahC5CzjXBQ27gn4y5cPQ/02CG5Yjo_2F7m4jIX1c/yngrPaQmQFL5UmA/13qwwD.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Connection: Keep-AliveCache-Control: no-cacheHost: www.mmmmmm.casa
Source: global traffic HTTP traffic detected: GET /drew/IVKP_2B6ZQQkG6g5/gfowffZhbmtN_2B/GZbbScWLQtb1lACgnt/rBntiTQwT/saL_2BBlUn86jR0XyTBo/7JNgQsItTPD2PHGzNKS/G1LTW9fRAA1zfD6_2FMiYB/dg960muYkdAwp/uG8HwcGL/8jG_2BjlGKWZrDL8vqOPVvC/htJk0fRuFB/CZluWe0HHNShwo8us/H7tsPluCA75g/aX_2F3vI3Tj/WjN30iGXtvxagL/uXBGZL_2FYgMxgH/PfB0165.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Connection: Keep-AliveCache-Control: no-cacheHost: www.mmmmmm.casa
Source: global traffic HTTP traffic detected: GET /drew/cD2Ewm7iGqMWPOkoVh2Hr/lSdxksgYA4mJEN42/6hG4ODNyYAH539U/3fuQQ5LlKDI4bM1b7W/idcaoqxrd/pMXyUBd_2BzEIdIc0JYN/k0d7ofrjRiaIIgn2d7z/QSRTFXDfwTpnog_2FhKWZ2/I464QiuD2zIxn/gdmKXI_2/Bo1ItO7W8SANyxbK0_2B_2B/wmE9_2BVQd/_2FAFT722G6qgOYAX/qZ8FCQq56b14/eJnNZN9d6mJ/4SYZznClo/p0BGlI.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Connection: Keep-AliveCache-Control: no-cacheHost: www.mmmmmm.casa
Source: global traffic HTTP traffic detected: GET /drew/b2TutLAUt/AAkTh80PEBTPVx2M0WWz/tHvwOMh8DE9FVgCx1wM/pJTiDXRlbJxqfbcaYjX5Aq/xCQnCU6grrmEK/Ka7HR80A/TmWv25imPh8Z_2BcgVOt5nj/QijDrP3tT2/6YeGxMk3j75w8Aikb/RCKd7NWKWRFy/_2FNkg_2Bmn/kDUMQ77ACMzaRB/KgTon1Dhj_2B6os2nyWq3/jAJbWCr5_2BhSnCM/GMDLVwQOesflZEg/izlI5VZPkbeCb/R6.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: mmmmmm.barConnection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /drew/gX1_2FaI/PZ4luFioJpYPLuP8fVvt_2B/u_2B1y278F/NyvoV4yhw5FMBnKUz/nqgst_2BJTVr/gmszek7Tkgw/kY3_2Frm_2B9_2/Bt5smOqRl_2FbHG9pJMQ9/_2FSApE07JWo12ge/_2F2lc5upYPyphr/TuywFSg0WDyPNAgaSh/_2FSvG_2F/Irt_2BKEJPDAlX_2BG1S/CGpR1M06n3G6vhLO6R2/IxroSYxc7NGtcASjzUaI4b/fIQXTVLEVzFOr/XmDvptqg/KWMc56Q.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: mmmmmm.barConnection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /drew/lQpAWLPQsOn/iwi15YGVBnOQpx/ACCjrHfe7Wo0P5JvKHDja/8dIy_2F3W_2F273e/h_2BsxpS6fputhm/wuxSDq8Sf7QGBArKTZ/CdKlNGATu/ui4Mkodu0v0T4w8lKhmy/ng26rinL5x2u14eDyK_/2FNgnMT1wD4br8QPNmANVh/XK61cOpXKAAqL/6zR60_2F/4QMU_2FGCGZwdCOQ5jmMpGq/Ie0CxUzI16/H_2Fje_2FQKEcdhm_/2BUE_2FR/WxCH4QgM/jZM.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: mmmmmm.barConnection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /drew/hM1upiDM4s78JFaPrfyW/3DWkoBXDYr7rgMt3xG_/2BGXIAeEHHsslby_2Fk_2B/XjQKcdsES34ik/KzZh1W9x/wGh7y7hkYjEYiRmdk8ihMRh/wEuF5klCEc/N3ieIl5msFqHpr6e_/2BAkBe5SEk4L/PqlaOJaqYp2/r_2BNxFDTfZU3N/69EGFjEgSNPlZMLVgL6hR/Ck2ZFVOto0vLvnfh/AOtKkE_2B8SZijs/JwyVbX6V5aCtPQN9rn/_2BnFCD_2/F76.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: mmmmmm.barConnection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /drew/vdHEwGKNJDH5VthHkA9T/Z5WmkGRrBb11dvjiUNh/WxiZR4Pd4dpgWoud6Glfdx/X118IwtCBnG_2/B_2FIObD/HoDAL_2BFA8fwdPCks8bPvx/KOXH_2BIls/0Ry3fQgmhQH2tjL21/2VvKLDjxl_2B/D5jMgG7YliQ/d_2BQm9szBxhpm/DMhMK7yZ4LHz0oSIUsdVm/PE52_2F_2BI5AnjM/Vyp3_2BWfI5OR9d/6JhumiV_2BTYaEtfro/p8Q9LLFcC/ep5xT7x.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: mmmmmm.casaConnection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /drew/vdHEwGKNJDH5VthHkA9T/Z5WmkGRrBb11dvjiUNh/WxiZR4Pd4dpgWoud6Glfdx/X118IwtCBnG_2/B_2FIObD/HoDAL_2BFA8fwdPCks8bPvx/KOXH_2BIls/0Ry3fQgmhQH2tjL21/2VvKLDjxl_2B/D5jMgG7YliQ/d_2BQm9szBxhpm/DMhMK7yZ4LHz0oSIUsdVm/PE52_2F_2BI5AnjM/Vyp3_2BWfI5OR9d/6JhumiV_2BTYaEtfro/p8Q9LLFcC/ep5xT7x.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Connection: Keep-AliveCache-Control: no-cacheHost: www.mmmmmm.casa
Source: global traffic HTTP traffic detected: GET /drew/6V2kcoNh5zlkLfQFPc/BK1xvKoki/sI2xcD400Cdl5_2BfFpM/88ymBYA3Lf0RW9scFqJ/hZxCNouRVbWyD_2BA0kUFL/Azh_2F37QJ8w5/_2F_2BHJ/YF_2B05Ux0nGHzUMeX6_2Be/Gj4AjkO056/z7zfXvOS0Ck9ij1T9/ivOOUShQT_2F/O9VYsyMhlJb/T4tSNfoaQI67_2/FGgXNRDCGCG5WTW5VVa0g/XJjtgZS8MSjTGuOi/Remmz7x4_2BJS/95Bf3HvZ/j.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: mmmmmm.casaConnection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /drew/O89kIoYukkHw2iqX/AhMjsf0VV5QFYgZ/kFHoGSUTql5nMATTez/zlGIspUJ0/j76OVsrTt0Nd7sD_2F4b/bp9jUjPyXDdZc_2FK0v/dPnfT6KZCI_2F04UJ3vQAP/bumYKjymhbjDK/LPqhtKzi/PG6vU8VyOAfE3kJoq_2FnmQ/686tSvRTaO/HG7aazopIFs0YU1L8/w3MPLoFg4vJR/s_2F_2F3_2F/eZehSHb27f_2Ff/LvnuNMT1_2BI6YAzztnWs/g1WQ4.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: mmmmmm.casaConnection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /drew/Gbrj1v9f6rwpYUn6Y/0ESxqmC4O7HZ/1pIQZKpC23v/OvNjMXTiBqucS2/OdUDj2hxo5EF8I9tePbbl/e0WI0OeHAABDBK_2/BGgWBLhnrCwIX2a/eY2i6bDO1XsEiKpdI_/2Ffj5yrES/XUkdgF_2BtB7uvP86zoB/sUHzWtrofPT34R7CvQE/NrT4dtWcKFtgqYMAR1Chky/E9_2FFgkwTE3N/nmdTSRJk/40jKH8Kj7YfIW9Kkspchk3o/Mq7ak.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: mmmmmm.casaConnection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /drew/6V2kcoNh5zlkLfQFPc/BK1xvKoki/sI2xcD400Cdl5_2BfFpM/88ymBYA3Lf0RW9scFqJ/hZxCNouRVbWyD_2BA0kUFL/Azh_2F37QJ8w5/_2F_2BHJ/YF_2B05Ux0nGHzUMeX6_2Be/Gj4AjkO056/z7zfXvOS0Ck9ij1T9/ivOOUShQT_2F/O9VYsyMhlJb/T4tSNfoaQI67_2/FGgXNRDCGCG5WTW5VVa0g/XJjtgZS8MSjTGuOi/Remmz7x4_2BJS/95Bf3HvZ/j.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Connection: Keep-AliveCache-Control: no-cacheHost: www.mmmmmm.casa
Source: global traffic HTTP traffic detected: GET /drew/Gbrj1v9f6rwpYUn6Y/0ESxqmC4O7HZ/1pIQZKpC23v/OvNjMXTiBqucS2/OdUDj2hxo5EF8I9tePbbl/e0WI0OeHAABDBK_2/BGgWBLhnrCwIX2a/eY2i6bDO1XsEiKpdI_/2Ffj5yrES/XUkdgF_2BtB7uvP86zoB/sUHzWtrofPT34R7CvQE/NrT4dtWcKFtgqYMAR1Chky/E9_2FFgkwTE3N/nmdTSRJk/40jKH8Kj7YfIW9Kkspchk3o/Mq7ak.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Connection: Keep-AliveCache-Control: no-cacheHost: www.mmmmmm.casa
Source: global traffic HTTP traffic detected: GET /drew/O89kIoYukkHw2iqX/AhMjsf0VV5QFYgZ/kFHoGSUTql5nMATTez/zlGIspUJ0/j76OVsrTt0Nd7sD_2F4b/bp9jUjPyXDdZc_2FK0v/dPnfT6KZCI_2F04UJ3vQAP/bumYKjymhbjDK/LPqhtKzi/PG6vU8VyOAfE3kJoq_2FnmQ/686tSvRTaO/HG7aazopIFs0YU1L8/w3MPLoFg4vJR/s_2F_2F3_2F/eZehSHb27f_2Ff/LvnuNMT1_2BI6YAzztnWs/g1WQ4.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Connection: Keep-AliveCache-Control: no-cacheHost: www.mmmmmm.casa
Source: global traffic HTTP traffic detected: GET /drew/JYo2yh7o/xmmHqBu82xYT0h_2FY7FLhd/BDSs1jeYDH/q9Uyq_2F_2F5Uhp3O/kDGBT1_2BMID/BPHuX8lkP85/MSE547sPVJP5Pb/uwpVWJ0_2F5KAGhPt59PK/XFYRWXuuFJDH1RPV/x9jUEqFvAJ3Kl42/dFOyZtqdeFkK81krpt/W07rXA9LO/_2FsUQUJNXTJZ08M4MsS/eUndP8BPShJYYavS5w3/OjNnZSisYNeZZTRn2Bu4BT/d35KR5_2FpO/eKZ.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: mmmmmm.barConnection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /drew/X4p6u_2FetthGmAcz/bQsew8zG_2Fh/9P0GZIddIT6/tsqFDffw1JfZI9/7Wxh6S1430ERGHqXnGdSL/l2H1dC_2BJRz8P7u/WHLfWZFpRyuCPoH/N2btBoZMI6viPyh1IZ/3zpHhEkuK/H3QK2eSVqiaA4sXJAvW0/6PC2c0KwbRckfLHWg95/iUWpcL_2BkbYAUGuJiXEcw/5QgCHV4YQT1Aj/V_2FUI3k/q3ooEApLg6Zz6wvYePIaFqO/CEyO7MK.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: mmmmmm.barConnection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /drew/pqebeo2lGkpXDanz/ytpUleK_2FpNL5M/WaawzvJzKNJXUgj1ad/bF_2B89Mv/JS92dYGkqfVf3KAsztIp/rbZR9n25d8s1swM9G24/POlK7PosNEdgyRGUG2gH4G/osPJ_2FYmTltK/5jx6Pdhk/9DHJnQIClt_2FzdZ9oWmGhV/bMMH_2BIn1/yEJsp_2FrcbHarv5V/n7FSL8uXWBw2/H_2Bf_2Fn_2/BR1KjYbSHqEZ_2/FMDrsqXqBz9zvxWljk5WA/R1oCBo4gMgLTWO4D/t_2Bn0elq/j7rqu.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: mmmmmm.barConnection: Keep-AliveCache-Control: no-cache
Source: global traffic HTTP traffic detected: GET /drew/QBjwt7f9IP4GJ_2FI3i/c0aa6REvsF1jEZ9Gt73OXW/MtCcAk2KHvQUZ/TFCEWwi_/2FYGGLslYtrvGnKIPgnCCn_/2Be4qngLZL/h7wQZV7ZkmYTr30Ro/f_2BtcFeUACa/x0nXv3li_2B/U9eDD3JfhJK72O/jxeUvRycWfEceGRC3MXTy/drNOOIK_2FtdvF1i/AmMumpioN5_2FP1/gKQv6LB4vbHzJub1s1/spDN5cRuN/AMK9KBM6v3hgq0vZhZSY/2SvQy6L_2F1v3G9XnYH/lj5TD.jlk HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0)Host: mmmmmm.barConnection: Keep-AliveCache-Control: no-cache

Key, Mouse, Clipboard, Microphone and Screen Capturing:

barindex
Yara detected Ursnif
Source: Yara match File source: 00000002.00000003.375865630.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.375941264.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413490977.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377794576.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.375998345.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.375960218.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413537323.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.376010591.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370670581.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370609933.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370654960.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.456592499.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.873845107.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370682268.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377701167.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.525325990.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377849557.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.871575841.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.375719746.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413508620.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377869270.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377814213.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370731881.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413551793.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.375909820.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377887122.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.375980649.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.525785355.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413562057.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377730405.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.522435374.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370523422.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370634510.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370551319.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413469441.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413590499.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413446258.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.872902084.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.874384874.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377774023.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: loaddll32.exe PID: 6888, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: regsvr32.exe PID: 6916, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: rundll32.exe PID: 6928, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: rundll32.exe PID: 6936, type: MEMORYSTR
Creates a DirectInput object (often for capturing keystrokes)
Source: loaddll32.exe, 00000000.00000002.869935510.00000000013FB000.00000004.00000020.sdmp Binary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

E-Banking Fraud:

barindex
Yara detected Ursnif
Source: Yara match File source: 00000002.00000003.375865630.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.375941264.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413490977.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377794576.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.375998345.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.375960218.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413537323.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.376010591.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370670581.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370609933.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370654960.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.456592499.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.873845107.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370682268.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377701167.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.525325990.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377849557.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.871575841.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.375719746.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413508620.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377869270.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377814213.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370731881.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413551793.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.375909820.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377887122.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.375980649.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.525785355.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413562057.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377730405.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.522435374.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370523422.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370634510.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370551319.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413469441.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413590499.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413446258.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.872902084.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.874384874.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377774023.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: loaddll32.exe PID: 6888, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: regsvr32.exe PID: 6916, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: rundll32.exe PID: 6928, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: rundll32.exe PID: 6936, type: MEMORYSTR
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_034F4872 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,CryptDecrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError, 0_2_034F4872
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B94872 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,CryptDecrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError, 2_2_04B94872
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_00FA4872 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,CryptDecrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError, 3_2_00FA4872
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_051E4872 CryptAcquireContextW,memcpy,CryptImportKey,CryptSetKeyParam,memcpy,CryptEncrypt,CryptDecrypt,GetLastError,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,GetLastError, 4_2_051E4872

System Summary:

barindex
Writes or reads registry keys via WMI
Source: C:\Windows\System32\loaddll32.exe WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetStringValue
Source: C:\Windows\System32\loaddll32.exe WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
Source: C:\Windows\System32\loaddll32.exe WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
Source: C:\Windows\System32\loaddll32.exe WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
Source: C:\Windows\SysWOW64\regsvr32.exe WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetStringValue
Source: C:\Windows\SysWOW64\regsvr32.exe WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
Source: C:\Windows\SysWOW64\regsvr32.exe WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
Source: C:\Windows\SysWOW64\regsvr32.exe WMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
Writes registry values via WMI
Source: C:\Windows\System32\loaddll32.exe WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
Source: C:\Windows\System32\loaddll32.exe WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
Source: C:\Windows\System32\loaddll32.exe WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
Source: C:\Windows\SysWOW64\regsvr32.exe WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
Source: C:\Windows\SysWOW64\regsvr32.exe WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
Source: C:\Windows\SysWOW64\regsvr32.exe WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
Source: C:\Windows\SysWOW64\rundll32.exe WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
Source: C:\Windows\SysWOW64\rundll32.exe WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
Source: C:\Windows\SysWOW64\rundll32.exe WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
Source: C:\Windows\SysWOW64\rundll32.exe WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetDWORDValue
Source: C:\Windows\SysWOW64\rundll32.exe WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetBinaryValue
Source: C:\Windows\SysWOW64\rundll32.exe WMI Registry write: IWbemServices::ExecMethod - root\default : StdRegProv::SetStringValue
Uses 32bit PE files
Source: SwFlsh32.dll Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL
Detected potential crypto function
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_10002244 0_2_10002244
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_034F81DC 0_2_034F81DC
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_034F6C62 0_2_034F6C62
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_034F4EF3 0_2_034F4EF3
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B94EF3 2_2_04B94EF3
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B96C62 2_2_04B96C62
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B981DC 2_2_04B981DC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_00FA4EF3 3_2_00FA4EF3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_00FA6C62 3_2_00FA6C62
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_00FA81DC 3_2_00FA81DC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_1_10002244 3_1_10002244
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_051E81DC 4_2_051E81DC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_051E6C62 4_2_051E6C62
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_051E4EF3 4_2_051E4EF3
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_032F0DF9 4_2_032F0DF9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_032F0DF7 4_2_032F0DF7
Contains functionality to call native functions
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_10001F61 GetProcAddress,NtCreateSection,memset, 0_2_10001F61
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_10001077 SetThreadPriority,NtQuerySystemInformation,Sleep,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,GetLastError,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError, 0_2_10001077
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_100012BE NtMapViewOfSection, 0_2_100012BE
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_10002465 NtQueryVirtualMemory, 0_2_10002465
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_034F77BB NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose, 0_2_034F77BB
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_034F8401 NtQueryVirtualMemory, 0_2_034F8401
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B977BB NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose, 2_2_04B977BB
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B98401 NtQueryVirtualMemory, 2_2_04B98401
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_00FA77BB NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose, 3_2_00FA77BB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_00FA8401 NtQueryVirtualMemory, 3_2_00FA8401
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_1_10001077 SetThreadPriority,NtQuerySystemInformation,Sleep,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,GetLastError,WaitForSingleObject,GetExitCodeThread,CloseHandle,GetLastError,GetLastError, 3_1_10001077
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_1_100012BE NtMapViewOfSection, 3_1_100012BE
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_1_10001F61 GetProcAddress,NtCreateSection,memset, 3_1_10001F61
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_1_10002465 NtQueryVirtualMemory, 3_1_10002465
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_051E77BB NtOpenProcess,NtOpenProcessToken,NtQueryInformationToken,NtQueryInformationToken,NtQueryInformationToken,memcpy,NtClose,NtClose, 4_2_051E77BB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_051E8401 NtQueryVirtualMemory, 4_2_051E8401
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_032F0ABA NtProtectVirtualMemory, 4_2_032F0ABA
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_032F08B7 NtAllocateVirtualMemory, 4_2_032F08B7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_032F0880 NtAllocateVirtualMemory, 4_2_032F0880
Sample file is different than original file name gathered from version info
Source: SwFlsh32.dll Binary or memory string: OriginalFilenameSwFlsh32.exe4 vs SwFlsh32.dll
PE file contains strange resources
Source: SwFlsh32.dll Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: SwFlsh32.dll Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: SwFlsh32.dll Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: SwFlsh32.dll Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: SwFlsh32.dll Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: SwFlsh32.dll Static PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Tries to load missing DLLs
Source: C:\Windows\SysWOW64\regsvr32.exe Section loaded: sfc.dll Jump to behavior
PE / OLE file has an invalid certificate
Source: SwFlsh32.dll Static PE information: invalid certificate
Source: SwFlsh32.dll Virustotal: Detection: 46%
Source: SwFlsh32.dll Metadefender: Detection: 20%
Source: SwFlsh32.dll ReversingLabs: Detection: 32%
Source: SwFlsh32.dll Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: unknown Process created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\SwFlsh32.dll"
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SwFlsh32.dll",#1
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\SwFlsh32.dll
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SwFlsh32.dll",#1
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SwFlsh32.dll,DllRegisterServer
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:6328 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:6328 CREDAT:17414 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:6328 CREDAT:148484 /prefetch:2
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5320 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5320 CREDAT:17414 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5320 CREDAT:82946 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5320 CREDAT:17418 /prefetch:2
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:660 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:660 CREDAT:17414 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:660 CREDAT:82946 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:660 CREDAT:148482 /prefetch:2
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4976 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4976 CREDAT:17422 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4976 CREDAT:17424 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4976 CREDAT:345090 /prefetch:2
Source: unknown Process created: C:\Program Files\internet explorer\iexplore.exe "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5636 CREDAT:17410 /prefetch:2
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SwFlsh32.dll",#1 Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\SwFlsh32.dll Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SwFlsh32.dll,DllRegisterServer Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SwFlsh32.dll",#1 Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:6328 CREDAT:17410 /prefetch:2 Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:6328 CREDAT:17414 /prefetch:2 Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:6328 CREDAT:148484 /prefetch:2 Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5320 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5320 CREDAT:17414 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5320 CREDAT:82946 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5320 CREDAT:17418 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:660 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:660 CREDAT:17414 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:660 CREDAT:82946 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:660 CREDAT:148482 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4976 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4976 CREDAT:17422 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4976 CREDAT:17424 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4976 CREDAT:345090 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exe Process created: C:\Program Files (x86)\Internet Explorer\iexplore.exe "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5636 CREDAT:17410 /prefetch:2
Source: C:\Windows\System32\loaddll32.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32 Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{5DB6AF8A-73DB-11EC-90E5-ECF4BB2D2496}.dat Jump to behavior
Source: C:\Program Files\internet explorer\iexplore.exe File created: C:\Users\user\AppData\Local\Temp\~DF49CB3B88D34074CE.TMP Jump to behavior
Source: classification engine Classification label: mal100.troj.evad.winDLL@46/91@34/7
Source: C:\Program Files\internet explorer\iexplore.exe File read: C:\Users\desktop.ini Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_034F2AB4 CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle, 0_2_034F2AB4
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SwFlsh32.dll",#1
Source: C:\Windows\System32\loaddll32.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\loaddll32.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\System32\loaddll32.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe File read: C:\Windows\System32\drivers\etc\hosts Jump to behavior
Source: Window Recorder Window detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exe File opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll Jump to behavior

Data Obfuscation:

barindex
Uses code obfuscation techniques (call, push, ret)
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_10002233 push ecx; ret 0_2_10002243
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_1000C83B push esi; iretd 0_2_1000C83C
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_1000C14C push esi; iretd 0_2_1000C152
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_1000B95D push ds; iretd 0_2_1000B964
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_1000C470 push ds; retf 0_2_1000C480
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_1000C3C4 pushad ; ret 0_2_1000C3CD
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_100021E0 push ecx; ret 0_2_100021E9
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_034F81CB push ecx; ret 0_2_034F81DB
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_034F7DE0 push ecx; ret 0_2_034F7DE9
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B97DE0 push ecx; ret 2_2_04B97DE9
Source: C:\Windows\SysWOW64\regsvr32.exe Code function: 2_2_04B981CB push ecx; ret 2_2_04B981DB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_00FA7DE0 push ecx; ret 3_2_00FA7DE9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_2_00FA81CB push ecx; ret 3_2_00FA81DB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_1_10002233 push ecx; ret 3_1_10002243
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_1_1000C83B push esi; iretd 3_1_1000C83C
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_1_1000C470 push ds; retf 3_1_1000C480
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_1_1000C14C push esi; iretd 3_1_1000C152
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_1_1000B95D push ds; iretd 3_1_1000B964
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_1_1000C3C4 pushad ; ret 3_1_1000C3CD
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 3_1_100021E0 push ecx; ret 3_1_100021E9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_051E81CB push ecx; ret 4_2_051E81DB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_051E7DE0 push ecx; ret 4_2_051E7DE9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_032F0BFC push dword ptr [esp+0Ch]; ret 4_2_032F0C10
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_032F0BFC push dword ptr [esp+10h]; ret 4_2_032F0C56
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_032F0827 push dword ptr [ebp-00000284h]; ret 4_2_032F087F
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_032F0A66 push edx; ret 4_2_032F0B11
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_032F0ABA push edx; ret 4_2_032F0B11
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_032F08B7 push dword ptr [ebp-00000284h]; ret 4_2_032F0A65
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_032F08B7 push dword ptr [ebp-0000028Ch]; ret 4_2_032F0AB9
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_032F08B7 push edx; ret 4_2_032F0B11
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_032F08B7 push dword ptr [esp+10h]; ret 4_2_032F0BFB
Contains functionality to dynamically determine API calls
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_10001BE8 LoadLibraryA,GetProcAddress, 0_2_10001BE8
PE file contains an invalid checksum
Source: SwFlsh32.dll Static PE information: real checksum: 0xd1e4d should be: 0xdc1bc
Registers a DLL
Source: C:\Windows\System32\loaddll32.exe Process created: C:\Windows\SysWOW64\regsvr32.exe regsvr32.exe /s C:\Users\user\Desktop\SwFlsh32.dll

Hooking and other Techniques for Hiding and Protection:

barindex
Yara detected Ursnif
Source: Yara match File source: 00000002.00000003.375865630.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.375941264.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413490977.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377794576.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.375998345.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.375960218.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413537323.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.376010591.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370670581.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370609933.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370654960.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.456592499.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.873845107.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370682268.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377701167.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.525325990.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377849557.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.871575841.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.375719746.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413508620.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377869270.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377814213.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370731881.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413551793.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.375909820.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377887122.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.375980649.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.525785355.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413562057.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377730405.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.522435374.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370523422.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370634510.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370551319.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413469441.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413590499.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413446258.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.872902084.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.874384874.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377774023.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: loaddll32.exe PID: 6888, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: regsvr32.exe PID: 6916, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: rundll32.exe PID: 6928, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: rundll32.exe PID: 6936, type: MEMORYSTR
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Source: C:\Windows\System32\loaddll32.exe Registry key monitored for changes: HKEY_CURRENT_USER_Classes Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\regsvr32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Process information set: NOOPENFILEERRORBOX Jump to behavior

Malware Analysis System Evasion:

barindex
Found evasive API chain (may stop execution after checking system information)
Source: C:\Windows\System32\loaddll32.exe Evasive API call chain: NtQuerySystemInformation,DecisionNodes,Sleep
May sleep (evasive loops) to hinder dynamic analysis
Source: C:\Windows\SysWOW64\regsvr32.exe TID: 7012 Thread sleep time: -1773297476s >= -30000s Jump to behavior
Found evasive API chain checking for process token information
Source: C:\Windows\SysWOW64\rundll32.exe Check user administrative privileges: GetTokenInformation,DecisionNodes
Source: C:\Windows\SysWOW64\regsvr32.exe Check user administrative privileges: GetTokenInformation,DecisionNodes
Source: C:\Windows\System32\loaddll32.exe Check user administrative privileges: GetTokenInformation,DecisionNodes
Source: rundll32.exe, 00000003.00000002.870070028.0000000000A4F000.00000004.00000020.sdmp, rundll32.exe, 00000003.00000003.693044334.0000000000A4F000.00000004.00000001.sdmp Binary or memory string: Hyper-V RAWU,
Source: regsvr32.exe, 00000002.00000002.871690172.000000000325B000.00000004.00000020.sdmp Binary or memory string: Hyper-V RAWP
Source: loaddll32.exe, 00000000.00000002.870205496.0000000001472000.00000004.00000020.sdmp, loaddll32.exe, 00000000.00000002.870103614.0000000001454000.00000004.00000020.sdmp, loaddll32.exe, 00000000.00000003.740049295.000000000147F000.00000004.00000001.sdmp, regsvr32.exe, 00000002.00000002.871545750.0000000003246000.00000004.00000020.sdmp, rundll32.exe, 00000003.00000002.870070028.0000000000A4F000.00000004.00000020.sdmp, rundll32.exe, 00000003.00000003.693044334.0000000000A4F000.00000004.00000001.sdmp, rundll32.exe, 00000003.00000002.869953373.00000000009EA000.00000004.00000020.sdmp, rundll32.exe, 00000004.00000002.872734570.00000000034FE000.00000004.00000020.sdmp Binary or memory string: Hyper-V RAW
Source: regsvr32.exe, 00000002.00000003.648054115.0000000003260000.00000004.00000001.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll&
Source: rundll32.exe, 00000004.00000003.674775256.0000000003522000.00000004.00000001.sdmp, rundll32.exe, 00000004.00000002.872832088.0000000003522000.00000004.00000020.sdmp, rundll32.exe, 00000004.00000003.692829667.0000000003522000.00000004.00000001.sdmp Binary or memory string: Hyper-V RAW@
Source: loaddll32.exe, 00000000.00000003.695289667.0000000001473000.00000004.00000001.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll!
Source: regsvr32.exe, 00000002.00000002.871545750.0000000003246000.00000004.00000020.sdmp Binary or memory string: Hyper-V RAWB
Source: rundll32.exe, 00000004.00000003.647362296.0000000003522000.00000004.00000001.sdmp Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll

Anti Debugging:

barindex
Found API chain indicative of debugger detection
Source: C:\Windows\System32\loaddll32.exe Debugger detection routine: NtQueryInformationProcess or NtQuerySystemInformation, DecisionNodes, ExitProcess or Sleep
Contains functionality to dynamically determine API calls
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_10001BE8 LoadLibraryA,GetProcAddress, 0_2_10001BE8
Contains functionality to read the PEB
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_032F0B14 mov eax, dword ptr fs:[00000030h] 4_2_032F0B14
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_032F0BFC mov eax, dword ptr fs:[00000030h] 4_2_032F0BFC
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_032F0C57 mov eax, dword ptr fs:[00000030h] 4_2_032F0C57
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_032F08B7 mov eax, dword ptr fs:[00000030h] 4_2_032F08B7
Source: C:\Windows\SysWOW64\rundll32.exe Code function: 4_2_032F0CE8 mov eax, dword ptr fs:[00000030h] 4_2_032F0CE8

HIPS / PFW / Operating System Protection Evasion:

barindex
System process connects to network (likely due to code injection or exploit)
Source: C:\Windows\SysWOW64\rundll32.exe Network Connect: 31.41.45.66 80 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Domain query: mmmmmm.bar
Source: C:\Windows\SysWOW64\rundll32.exe Domain query: www.mmmmmm.casa
Source: C:\Windows\SysWOW64\rundll32.exe Network Connect: 162.255.119.219 80 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Network Connect: 198.54.117.212 80 Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exe Domain query: mmmmmm.casa
Source: C:\Windows\SysWOW64\rundll32.exe Network Connect: 198.54.117.216 80 Jump to behavior
Creates a process in suspended mode (likely to inject code)
Source: C:\Windows\SysWOW64\cmd.exe Process created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SwFlsh32.dll",#1 Jump to behavior
Source: loaddll32.exe, 00000000.00000002.870508088.0000000001A80000.00000002.00020000.sdmp, regsvr32.exe, 00000002.00000002.872251398.0000000003780000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.872955046.00000000031D0000.00000002.00020000.sdmp, rundll32.exe, 00000004.00000002.873084104.0000000003930000.00000002.00020000.sdmp Binary or memory string: Shell_TrayWnd
Source: loaddll32.exe, 00000000.00000002.870508088.0000000001A80000.00000002.00020000.sdmp, regsvr32.exe, 00000002.00000002.872251398.0000000003780000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.872955046.00000000031D0000.00000002.00020000.sdmp, rundll32.exe, 00000004.00000002.873084104.0000000003930000.00000002.00020000.sdmp Binary or memory string: Progman
Source: loaddll32.exe, 00000000.00000002.870508088.0000000001A80000.00000002.00020000.sdmp, regsvr32.exe, 00000002.00000002.872251398.0000000003780000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.872955046.00000000031D0000.00000002.00020000.sdmp, rundll32.exe, 00000004.00000002.873084104.0000000003930000.00000002.00020000.sdmp Binary or memory string: &Program Manager
Source: loaddll32.exe, 00000000.00000002.870508088.0000000001A80000.00000002.00020000.sdmp, regsvr32.exe, 00000002.00000002.872251398.0000000003780000.00000002.00020000.sdmp, rundll32.exe, 00000003.00000002.872955046.00000000031D0000.00000002.00020000.sdmp, rundll32.exe, 00000004.00000002.873084104.0000000003930000.00000002.00020000.sdmp Binary or memory string: Progmanlock

Language, Device and Operating System Detection:

barindex
Contains functionality to query CPU information (cpuid)
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_034F21BC cpuid 0_2_034F21BC
Source: C:\Windows\System32\loaddll32.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_10001DCF GetSystemTimeAsFileTime,_aulldiv,_snwprintf,CreateFileMappingW,GetLastError,GetLastError,MapViewOfFile,GetLastError,CloseHandle,GetLastError, 0_2_10001DCF
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_1000169C CreateEventA,GetVersion,GetCurrentProcessId,OpenProcess,GetLastError, 0_2_1000169C
Source: C:\Windows\System32\loaddll32.exe Code function: 0_2_034F21BC RtlAllocateHeap,GetUserNameW,RtlAllocateHeap,GetUserNameW,HeapFree,GetComputerNameW,GetComputerNameW,RtlAllocateHeap,GetComputerNameW,HeapFree, 0_2_034F21BC

Stealing of Sensitive Information:

barindex
Yara detected Ursnif
Source: Yara match File source: 00000002.00000003.375865630.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.375941264.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413490977.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377794576.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.375998345.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.375960218.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413537323.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.376010591.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370670581.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370609933.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370654960.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.456592499.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.873845107.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370682268.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377701167.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.525325990.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377849557.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.871575841.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.375719746.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413508620.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377869270.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377814213.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370731881.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413551793.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.375909820.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377887122.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.375980649.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.525785355.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413562057.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377730405.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.522435374.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370523422.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370634510.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370551319.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413469441.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413590499.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413446258.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.872902084.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.874384874.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377774023.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: loaddll32.exe PID: 6888, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: regsvr32.exe PID: 6916, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: rundll32.exe PID: 6928, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: rundll32.exe PID: 6936, type: MEMORYSTR

Remote Access Functionality:

barindex
Yara detected Ursnif
Source: Yara match File source: 00000002.00000003.375865630.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.375941264.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413490977.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377794576.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.375998345.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.375960218.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413537323.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.376010591.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370670581.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370609933.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370654960.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.456592499.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000002.873845107.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370682268.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377701167.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.525325990.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377849557.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000002.871575841.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.375719746.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413508620.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377869270.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377814213.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370731881.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413551793.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.375909820.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377887122.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.375980649.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000003.525785355.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413562057.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377730405.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.522435374.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370523422.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370634510.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000003.00000003.370551319.00000000050D8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413469441.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413590499.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000000.00000003.413446258.00000000039C8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000002.00000002.872902084.0000000005748000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000002.874384874.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: 00000004.00000003.377774023.00000000057F8000.00000004.00000040.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: loaddll32.exe PID: 6888, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: regsvr32.exe PID: 6916, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: rundll32.exe PID: 6928, type: MEMORYSTR
Source: Yara match File source: Process Memory Space: rundll32.exe PID: 6936, type: MEMORYSTR
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs