Sample details: 5f9f71708cc554d022aa8200dfb7d5f8 --

Hashes
MD5: 5f9f71708cc554d022aa8200dfb7d5f8
SHA1: 517a9b7d42f73755cf6d4b69307eb126cf0bc3ac
SHA256: c617f9330be2690c872f29bdf035410ac6bd571bb6d4794bc97049924c0fded8
SSDEEP: 12288:TMXli5rmjZ5CO7JpHqZ/+H7npFHI9TIGV:Tbmj5JpKZc7pFHJGV
Details
File Type: PE32
Yara Hits
YRP/VC8_Microsoft_Corporation | YRP/Microsoft_Visual_Cpp_8 | YRP/IsPE32 | YRP/IsWindowsGUI | YRP/HasOverlay | YRP/HasRichSignature | YRP/domain | YRP/url | YRP/contentis_base64 | YRP/anti_dbg | YRP/keylogger | YRP/win_mutex | YRP/win_registry | YRP/win_files_operation | YRP/win_hook |
Source
http://134.0.117.224/1300/red.php
http://134.0.117.224/1300/1300.exe
http://www.kfzgutachten-berlin.eu/TempCont/r13.php
http://134.0.117.224/1300/1300.exe
Strings
          	            !This program cannot be run in DOS mode.
`.rdata
@.data
jXh@&A
t$<"u	3
>=Yt1j
< tK<	tG
j@j ^V
Y;=8&G
0SSSSS
0SSSSS
0SSSSS
0A@@Ju
Fh=0 G
URPQQh,
t"SS9]
v$;5<'G
PPPPPPPP
PPPPPPPP
;t$,v-
UQPXY]Y[
t+WWVPV
v	N+D$
memmove can be very useful......
The underlying type of the objects
CorExitProcess
runtime error 
TLOSS error
SING error
DOMAIN error
An application has made an attempt to load the C runtime library incorrectly.
Please contact the application's support team for more information.
- Attempt to use MSIL code from this assembly during native code initialization
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
- not enough space for locale information
- Attempt to initialize the CRT more than once.
This indicates a bug in your application.
- CRT not initialized
- unable to initialize heap
- not enough space for lowio initialization
- not enough space for stdio initialization
- pure virtual function call
- not enough space for _onexit/atexit table
- unable to open console device
- unexpected heap error
- unexpected multithread lock error
- not enough space for thread data
This application has requested the Runtime to terminate it in an unusual way.
Please contact the application's support team for more information.
- not enough space for environment
- not enough space for arguments
- floating point support not loaded
Microsoft Visual C++ Runtime Library
<program name unknown>
Runtime Error!
Program: 
EncodePointer
DecodePointer
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetProcessWindowStation
GetUserObjectInformationA
GetLastActivePopup
GetActiveWindow
MessageBoxA
USER32.DLL
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
HH:mm:ss
dddd, MMMM dd, yyyy
MM/dd/yy
December
November
October
September
August
February
January
Saturday
Friday
Thursday
Wednesday
Tuesday
Monday
Sunday
SunMonTueWedThuFriSat
JanFebMarAprMayJunJulAugSepOctNovDec
EndPaint
GetWindow
SetScrollPos
GetWindowTextW
GetWindowTextLengthW
EndDialog
GetNextDlgTabItem
IsWindow
DestroyWindow
CreateDialogIndirectParamW
GetDesktopWindow
SendDlgItemMessageW
SetDlgItemInt
SetDlgItemTextW
IsDialogMessageW
SetWindowTextW
GetDlgCtrlID
MoveWindow
ValidateRect
GetCursorPos
PeekMessageW
GetKeyState
IsWindowVisible
DispatchMessageW
TranslateMessage
CallNextHookEx
SetWindowsHookExW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
GetWindowPlacement
SystemParametersInfoA
CallWindowProcW
DefWindowProcW
SetScrollInfo
AdjustWindowRectEx
RegisterClassW
GetClassInfoW
GetClassInfoExW
CreateWindowExW
SetMenu
TrackPopupMenu
MapWindowPoints
GetMessagePos
GetMessageTime
GetTopWindow
GetForegroundWindow
GetClassNameW
GetClassLongW
WinHelpW
SendDlgItemMessageA
LoadIconW
PostQuitMessage
DestroyMenu
UnregisterClassW
GetSysColorBrush
LoadCursorW
USER32.dll
PrintDlgA
GetSaveFileNameA
GetOpenFileNameA
GetFileTitleA
ChooseFontA
ChooseColorA
GetOpenFileNameW
GetFileTitleW
GetSaveFileNameW
COMDLG32.dll
SHChangeNotify
ShellExecuteExW
SHGetFileInfoW
SHELL32.dll
RegSetValueExA
RegQueryValueExW
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExA
RegFlushKey
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
ADVAPI32.dll
ImageList_GetIconSize
_TrackMouseEvent
COMCTL32.dll
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VERSION.dll
GetProcAddress
GlobalAddAtomW
EnterCriticalSection
InitializeCriticalSection
DeleteCriticalSection
CreateDirectoryW
DeleteFileW
IsValidLocale
RaiseException
FreeResource
GlobalUnlock
GlobalLock
GlobalAlloc
LoadLibraryExW
GetTempPathW
GetTempFileNameW
GetTickCount
MoveFileExW
GetFileSize
GetCurrentProcess
FlushInstructionCache
GlobalFree
MulDiv
DeleteAtom
lstrlenA
GetCPInfo
GetLocaleInfoA
GetUserDefaultLCID
GetSystemTimeAsFileTime
FormatMessageW
MoveFileW
RemoveDirectoryW
GetSystemInfo
LocalFree
WritePrivateProfileStringW
GetPrivateProfileStringW
CreateFileW
IsBadWritePtr
lstrcmpW
CompareStringW
GlobalDeleteAtom
GlobalFindAtomW
GlobalSize
CopyFileW
SetThreadPriority
SuspendThread
CreateActCtxW
ReleaseActCtx
GetFileAttributesExW
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileAttributesW
GetFileSizeEx
GetFileTime
lstrcmpA
GetLocaleInfoW
GetSystemDefaultUILanguage
ConvertDefaultLocale
GetUserDefaultUILanguage
GetCurrentThread
GetPrivateProfileIntW
GetProfileIntW
GetThreadLocale
GlobalFlags
LocalAlloc
ResetEvent
UnlockFile
SetEndOfFile
DuplicateHandle
GetVolumeInformationW
GetFullPathNameW
SetErrorMode
GetWindowsDirectoryW
GetNumberFormatW
SetHandleCount
HeapCreate
HeapDestroy
QueryPerformanceCounter
OpenEventA
VirtualFree
UnhandledExceptionFilter
DeactivateActCtx
IsDebuggerPresent
IsProcessorFeaturePresent
OpenEventW
CreateMutexW
WaitForSingleObject
CreateNamedPipeW
GetCurrentProcessId
CreateEventW
ConnectNamedPipe
SetEvent
WaitForMultipleObjects
GetOverlappedResult
WriteFile
ReadFile
DisconnectNamedPipe
lstrlenW
GetVersionExW
GetCurrentDirectoryW
SetCurrentDirectoryW
FindResourceA
LeaveCriticalSection
HeapAlloc
CreateEventA
GetProcessHeap
HeapFree
CreateThread
CloseHandle
FindFirstFileW
FindNextFileW
FindClose
GetVersion
ActivateActCtx
GetLastError
GetACP
SetLastError
TerminateProcess
GetModuleHandleW
MultiByteToWideChar
LoadLibraryW
FreeLibrary
GetCurrentThreadId
lstrcpynW
ResumeThread
WideCharToMultiByte
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
SetEnvironmentVariableA
WriteConsoleW
EnumSystemLocalesA
GetConsoleMode
GetConsoleCP
GetStringTypeW
GetTimeZoneInformation
PeekNamedPipe
GetFileInformationByHandle
LCMapStringW
IsValidCodePage
GetOEMCP
GetCommandLineA
GetStartupInfoA
SetUnhandledExceptionFilter
ExitProcess
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
VirtualAlloc
HeapReAlloc
LoadLibraryA
InitializeCriticalSectionAndSpinCount
RtlUnwind
HeapSize
LCMapStringA
GetStringTypeA
KERNEL32.dll
bmwdB4
NB*)N1
X*"M1E
FP= T7m
o/$@oQ
-_5iq\
'!M.)YP
d6 /mk
5Zu9m9
3LiNM_B
i"~'Tv
FB54p}Q
\9Dq`wrt
hHgrnH)`
-Zmr=d
rJh\=*|
gl9Qy*
tdx~Pl
+?w#ISzae
Qj{`h?
$'f.Tu`E
Y)|$LQU
MTE5iCe
3y(k*rn
QoX8(f
72>]R	JP5
v?;@dN
~J?`Bd
EB4TxK]K
TPWw}.
J%<cC+l
vwML_E$yH
GAgsX!U
d<+ ~Z
Lu2K=`
_PXW_t
)Bxut8
8l,Nl5
	Vv=}t
g:t[Cc
&dm;O|8M
Le?		hB
X$Y(\5
^O)\nh
K^hBKY2c!%
U^>%9 
79HLA#
#T-xU.!
 5Vy,e
NHh%Vx
i!Q8m=
'NJ/m 
R>gZwp
+4k>Jy
dgGy	_vm
:>~>yZ
|) 8DD
D*Y8vR
|G>vTDT+
{Q752&
 `-*v~y
=6C:])%
~pwru*
%[3YZf
#g16c0
Mg$Ixv
9D-9AM
}y;*Y\
p=P^&h`/
zi)G@9
e_`6<ZU
|0%]*	',m
M6D(T/J
;[pC=5
whw%$O
[ s/W<
jmTin2
^-a$K`$2
Ka,%#:
eB$*dY%I
	W Ygb
UwO,Pp
9K]Ib"
/<`VFp
PaA93y
-, Kbg
I$(5Xg
4<c+nZ7
K#Qb+O
([Jok[
92k>8h
q ^qW0
4@F+>JL
Rr|wB+
gx:DeJ
P?~8+Q
O'/U`e 
aAl78m
wnT7yh|/
X&}1Gh
J7(?L'}
	C/`>+
_Z!Bc=
qPUkR\e)
z?@2RK
Ft)r=<f
pEEdqb
H!>;g[
#Y7wCA
)I]K&Hq
GRv.aw
fVZ$z*
O|$*"cS
ST,;Z0
!E/?3-
m7wC}p
p#opwx1&
DpE2%V
NHv#D^=
	F% iD`
Lr:2/~
mPg:Z<n
'+FY2=
ofax'6r
	{e.^zb4
X  iR&
hibWm/
^J.DZ"
]*&{/J
*Z]%lr
	zI$hE
 yH/0B
_Pejup
AgfY,q
UO+U%OF
)0j	-3
.Lknqv-
$$9aAn
lR|x<4
yyY>wx
~k/1@!
q.3aQk
JJrXOG
(L^fl6
7{mlp,
I@'],~
y7$xf<
<#|owp
1Vtj62
wWcBPU
yi!4kod
TlQQZR
U!V/u3L
TH&SZP
)hMyIH 
pPoU+dZ
qO.9;XM
C`R_n(M
^[+4I*
lm!" G
/C1-(o0
45Sdr,
/e8};e
*8KYv.
9cr]JrY
\{~/rg
\Cm"8I
DY?D!R
1N\c|'=
rACSY q
hx';P&J
]r(k<E
qWNxOL
zAFK~t
Q8x"$~"
{1Bu#Q1'm0
5S[<]K
@(FO#?AqG
t@QL( 
Do s\e
<=4AA@
PS/$to
_M*!(Q
d71F8La
@2^=r?
;c40>|w
lqJwOh
S`i;rC
_yNwFom
%|IpwT
"'`Ka 
mn/$7<
NDV$xaw
 b(Z8Xe
'n$BVK
$oGZzR
@5nx1U
`M+rOF(&w
y\n)Qfqg
=-E E6
`JZMl-{4:
E%]1 g
8HM0|Ib
w6d9|`K
NgeRu,
.C^-39rJ
ihNM%	!6
                          
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
                          
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
3/////////////////////111111111333333333333333333333333333333333333333333G
QQPPPPPPPPPPPPPPPPPPPPPPPPMMMMMMMMMMMMMMMMMMMMMMLK/
XXXXXXXXXW
|XWXXXXXXXXk
XXXXTXXXXX
}XTSXXXXXXXj
XX[innnnjh
{XW\ehhhhhes
XX^u{wwww{
jXSXXaw
XXYXXXXXXX
vaXWXX_v
XXXXXXXXXX
zbXWXXc
WXXqrrrrqr
zbXXXp
L        '
L########+
G########/
WXXnmooolo
~XUZlzvzbXXg
G#$$$$$$$0
WXXXXXXXXZ
eXTVXXXXXX
G$'''''''3
^X]]]XaX\]
i\XXXTX`~
F',,,,,,,7
D+///////7
?/44444449
3333$7
<.33333337
+++,(#6
7',,,,,,,/K
$$$#'#!3
7#'''''''+?M
P#######
 ########'@GM
P        
         0339
++'**+#
/--+++
						
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
  <trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
    <security>
      <requestedPrivileges>
        <requestedExecutionLevel level="asInvoker" uiAccess="false"></requestedExecutionLevel>
      </requestedPrivileges>
    </security>
  </trustInfo>
</assembly>
Greater Manchester1
Salford1
COMODO CA Limited1#0!
COMODO RSA Code Signing CA0
170108000000Z
180108235959Z0
SE1 8XD1
City of London1
London1)0'
 207 Waterloo Road Waterloo House1
Tubatton Ltd1
Administration1
Tubatton Ltd0
p//LHH
https://secure.comodo.net/CPS0C
2http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
2http://crt.comodoca.com/COMODORSACodeSigningCA.crt0$
http://ocsp.comodoca.com0
admin@tubatton.co.uk0
Greater Manchester1
Salford1
COMODO CA Limited1+0)
"COMODO RSA Certification Authority0
130509000000Z
280508235959Z0}1
Greater Manchester1
Salford1
COMODO CA Limited1#0!
COMODO RSA Code Signing CA0
;http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
/http://crt.comodoca.com/COMODORSAAddTrustCA.crt0$
http://ocsp.comodoca.com0
Greater Manchester1
Salford1
COMODO CA Limited1#0!
COMODO RSA Code Signing CA
20171117075934Z
Greater Manchester1
Salford1
COMODO CA Limited1,0*
#COMODO SHA-256 Time Stamping Signer
Salt Lake City1
The USERTRUST Network1!0
http://www.usertrust.com1
UTN-USERFirst-Object0
151231000000Z
190709184036Z0
Greater Manchester1
Salford1
COMODO CA Limited1,0*
#COMODO SHA-256 Time Stamping Signer0
fO\r6{
'1Oqtn
lZGfD{
1http://crl.usertrust.com/UTN-USERFirst-Object.crl05
http://ocsp.usertrust.com0
Salt Lake City1
The USERTRUST Network1!0
http://www.usertrust.com1
UTN-USERFirst-Object
171117075933Z0+