Loading ...

Play interactive tourEdit tour

Analysis Report http://www.youtube.com/api/stats/qoe?event=streamingstats&fmt=136&afmt=140&cpn=5DggZi95_9aw-qp-&ei=GQTIX_K_AciR8wSMoJj4Dw&el=detailpage&docid=EXTOcETE9uE&ns=yt&fexp=23735348,23744176,23748146,23804281,23839597,23856950,23857949,23858057,23868333,23882502,23884386,23890959,23895671,23911055,23915991,23918597,23932524,23934970,23942338,23942633,23944779,23946420,23948841,23950597,23951620,23958692,23961733,23967043,23969486,23969935,23970399,23970896,23970974,23973496,23974520,23976579,24631715,24631885,3300113,3300133,3300161,3313321,3316843,3318011,3318700,3318773,3319220,3320540,3329299,9449243&cl=344723416&live=dvr&seq=88&cbr=Chrome&cbrver=87.0.4280.66&c=WEB&cver=2.20201201.03.01&cplayer=UNIPLAYER&cos=Windows&cosver=10.0&bh=851.298:22.482,857.799:20.974,860.004:18.974&e2el=851.298:27.573,857.799:27.570&vps=860.004:PL&bwm=860.004:813153:11.755&bwe=860.004:1062927&bat=860.004:1:1&cmt=860.004:37236.227

Overview

General Information

Sample URL:http://www.youtube.com/api/stats/qoe?event=streamingstats&fmt=136&afmt=140&cpn=5DggZi95_9aw-qp-&ei=GQTIX_K_AciR8wSMoJj4Dw&el=detailpage&docid=EXTOcETE9uE&ns=yt&fexp=23735348,23744176,23748146,23804281,23839597,23856950,23857949,23858057,23868333,23882502,23884386,23890959,23895671,23911055,23915991,23918597,23932524,23934970,23942338,23942633,23944779,23946420,23948841,23950597,23951620,23958692,23961733,23967043,23969486,23969935,23970399,23970896,23970974,23973496,23974520,23976579,24631715,24631885,3300113,3300133,3300161,3313321,3316843,3318011,3318700,3318773,3319220,3320540,3329299,9449243&cl=344723416&live=dvr&seq=88&cbr=Chrome&cbrver=87.0.4280.66&c=WEB&cver=2.20201201.03.01&cplayer=UNIPLAYER&cos=Windows&cosver=10.0&bh=851.298:22.482,857.799:20.974,860.004:18.974&e2el=851.298:27.573,857.799:27.570&vps=860.004:PL&bwm=860.004:813153:11.755&bwe=860.004:1062927&bat=860.004:1:1&cmt=860.004:37236.227
Analysis ID:326176

Most interesting Screenshot:

Errors
  • URL not reachable

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

No high impact signatures.

Classification

Startup

  • System is w10x64
  • iexplore.exe (PID: 5268 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 852 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5268 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: ~DFD0DF95E4BDC04723.TMP.1.drString found in binary or memory: http://www.youtube.com/api/stats/qoe?event=streamingstats&fmt=136&afmt=140&cpn=5DggZi95_9aw-qp-&ei=GQTIX_K_AciR8wSMoJj4Dw&el=detailpage&docid=EXTOcETE9uE&ns=yt&fexp=23735348,23744176,23748146,23804281,23839597,23856950,23857949,23858057,23868333,23882502,23884386,23890959,23895671,23911055,23915991,23918597,23932524,23934970,23942338,23942633,23944779,23946420,23948841,23950597,23951620,23958692,23961733,23967043,23969486,23969935,23970399,23970896,23970974,23973496,23974520,23976579,24631715,24631885,3300113,3300133,3300161,3313321,3316843,3318011,3318700,3318773,3319220,3320540,3329299,9449243&cl=344723416&live=dvr&seq=88&cbr=Chrome&cbrver=87.0.4280.66&c=WEB&cver=2.20201201.03.01&cplayer=UNIPLAYER&cos=Windows&cosver=10.0&bh=851.298:22.482,857.799:20.974,860.004:18.974&e2el=851.298:27.573,857.799:27.570&vps=860.004:PL&bwm=860.004:813153:11.755&bwe=860.004:1062927&bat=860.004:1:1&cmt=860.004:37236.227 equals www.youtube.com (Youtube)
Source: {95CD7E6E-3547-11EB-90E4-ECF4BB862DED}.dat.1.drString found in binary or memory: http://www.youtube.com/api/stats/qoe?event=streamingstats&fmt=136&afmt=140&cpn=5DggZi95_9aw-qp-&ei=GQTIX_K_AciR8wSMoJj4Dw&el=detailpage&docid=EXTOcETE9uE&ns=yt&fexp=23735348,23744176,23748146,23804281,23839597,23856950,23857949,23858057,23868333,23882502,23884386,23890959,23895671,23911055,23915991,23918597,23932524,23934970,23942338,23942633,23944779,23946420,23948841,23950597,23951620,23958692,23961733,23967043,23969486,23969935,23970399,23970896,23970974,23973496,23974520,23976579,24631715,24631885,3300113,3300133,3300161,3313321,3316843,3318011,3318700,3318773,3319220,3320540,3329299,9449243&cl=344723416&live=dvr&seq=88&cbr=Chrome&cbrver=87.0.4280.66&c=WEB&cver=2.20201201.03.01&cplayer=UNIPLAYER&cos=Windows&cosver=10.0&bh=851.298:22.482,857.799:20.974,860.004:18.974&e2el=851.298:27.573,857.799:27.570&vps=860.004:PL&bwm=860.004:813153:11.755&bwe=860.004:1062927&bat=860.004:1:1&cmt=860.004:37236.227Root Entry equals www.youtube.com (Youtube)
Source: unknownDNS traffic detected: queries for: www.youtube.com
Source: ~DFD0DF95E4BDC04723.TMP.1.dr, {95CD7E6E-3547-11EB-90E4-ECF4BB862DED}.dat.1.drString found in binary or memory: http://www.youtube.com/api/stats/qoe?event=streamingstats&fmt=136&afmt=140&cpn=5DggZi95_9aw-qp-&ei=G
Source: classification engineClassification label: unknown0.win@3/13@1/0
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\HighJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DF333AC8DA59574C47.TMPJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknownProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5268 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5268 CREDAT:17410 /prefetch:2Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Masquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 326176 URL: http://www.youtube.com/api/... Startdate: 03/12/2020 Architecture: WINDOWS Score: 0 5 iexplore.exe 2 61 2->5         started        process3 7 iexplore.exe 38 5->7         started        dnsIp4 10 www.youtube.com 7->10

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
http://www.youtube.com/api/stats/qoe?event=streamingstats&fmt=136&afmt=140&cpn=5DggZi95_9aw-qp-&ei=GQTIX_K_AciR8wSMoJj4Dw&el=detailpage&docid=EXTOcETE9uE&ns=yt&fexp=23735348,23744176,23748146,23804281,23839597,23856950,23857949,23858057,23868333,23882502,23884386,23890959,23895671,23911055,23915991,23918597,23932524,23934970,23942338,23942633,23944779,23946420,23948841,23950597,23951620,23958692,23961733,23967043,23969486,23969935,23970399,23970896,23970974,23973496,23974520,23976579,24631715,24631885,3300113,3300133,3300161,3313321,3316843,3318011,3318700,3318773,3319220,3320540,3329299,9449243&cl=344723416&live=dvr&seq=88&cbr=Chrome&cbrver=87.0.4280.66&c=WEB&cver=2.20201201.03.01&cplayer=UNIPLAYER&cos=Windows&cosver=10.0&bh=851.298:22.482,857.799:20.974,860.004:18.974&e2el=851.298:27.573,857.799:27.570&vps=860.004:PL&bwm=860.004:813153:11.755&bwe=860.004:1062927&bat=860.004:1:1&cmt=860.004:37236.2270%VirustotalBrowse
http://www.youtube.com/api/stats/qoe?event=streamingstats&fmt=136&afmt=140&cpn=5DggZi95_9aw-qp-&ei=GQTIX_K_AciR8wSMoJj4Dw&el=detailpage&docid=EXTOcETE9uE&ns=yt&fexp=23735348,23744176,23748146,23804281,23839597,23856950,23857949,23858057,23868333,23882502,23884386,23890959,23895671,23911055,23915991,23918597,23932524,23934970,23942338,23942633,23944779,23946420,23948841,23950597,23951620,23958692,23961733,23967043,23969486,23969935,23970399,23970896,23970974,23973496,23974520,23976579,24631715,24631885,3300113,3300133,3300161,3313321,3316843,3318011,3318700,3318773,3319220,3320540,3329299,9449243&cl=344723416&live=dvr&seq=88&cbr=Chrome&cbrver=87.0.4280.66&c=WEB&cver=2.20201201.03.01&cplayer=UNIPLAYER&cos=Windows&cosver=10.0&bh=851.298:22.482,857.799:20.974,860.004:18.974&e2el=851.298:27.573,857.799:27.570&vps=860.004:PL&bwm=860.004:813153:11.755&bwe=860.004:1062927&bat=860.004:1:1&cmt=860.004:37236.2270%Avira URL Cloudsafe

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

No Antivirus matches

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
www.youtube.com
unknown
unknownfalse
    high

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    http://www.youtube.com/api/stats/qoe?event=streamingstats&fmt=136&afmt=140&cpn=5DggZi95_9aw-qp-&ei=G~DFD0DF95E4BDC04723.TMP.1.dr, {95CD7E6E-3547-11EB-90E4-ECF4BB862DED}.dat.1.drfalse
      high

      Contacted IPs

      No contacted IP infos

      General Information

      Joe Sandbox Version:31.0.0 Red Diamond
      Analysis ID:326176
      Start date:03.12.2020
      Start time:01:11:08
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 2m 6s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:browseurl.jbs
      Sample URL:http://www.youtube.com/api/stats/qoe?event=streamingstats&fmt=136&afmt=140&cpn=5DggZi95_9aw-qp-&ei=GQTIX_K_AciR8wSMoJj4Dw&el=detailpage&docid=EXTOcETE9uE&ns=yt&fexp=23735348,23744176,23748146,23804281,23839597,23856950,23857949,23858057,23868333,23882502,23884386,23890959,23895671,23911055,23915991,23918597,23932524,23934970,23942338,23942633,23944779,23946420,23948841,23950597,23951620,23958692,23961733,23967043,23969486,23969935,23970399,23970896,23970974,23973496,23974520,23976579,24631715,24631885,3300113,3300133,3300161,3313321,3316843,3318011,3318700,3318773,3319220,3320540,3329299,9449243&cl=344723416&live=dvr&seq=88&cbr=Chrome&cbrver=87.0.4280.66&c=WEB&cver=2.20201201.03.01&cplayer=UNIPLAYER&cos=Windows&cosver=10.0&bh=851.298:22.482,857.799:20.974,860.004:18.974&e2el=851.298:27.573,857.799:27.570&vps=860.004:PL&bwm=860.004:813153:11.755&bwe=860.004:1062927&bat=860.004:1:1&cmt=860.004:37236.227
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:4
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:UNKNOWN
      Classification:unknown0.win@3/13@1/0
      Cookbook Comments:
      • Adjust boot time
      • Enable AMSI
      • URL browsing timeout or error
      Warnings:
      Show All
      • Exclude process from analysis (whitelisted): ielowutil.exe, backgroundTaskHost.exe
      • Excluded IPs from analysis (whitelisted): 104.83.120.32, 142.250.74.206, 172.217.23.174, 172.217.22.78, 172.217.21.238, 216.58.205.238, 172.217.23.142, 172.217.18.14, 216.58.207.46, 172.217.16.206, 216.58.206.14, 172.217.22.14, 172.217.16.174, 172.217.23.110, 216.58.212.142, 172.217.22.46, 172.217.18.110, 104.42.151.234, 40.88.32.150, 51.104.144.132
      • Excluded domains from analysis (whitelisted): e11290.dspg.akamaiedge.net, skypedataprdcoleus15.cloudapp.net, youtube-ui.l.google.com, go.microsoft.com, arc.msn.com.nsatc.net, go.microsoft.com.edgekey.net, blobcollector.events.data.trafficmanager.net, watson.telemetry.microsoft.com, skypedataprdcolwus16.cloudapp.net, arc.msn.com
      Errors:
      • URL not reachable

      Simulations

      Behavior and APIs

      No simulations

      Joe Sandbox View / Context

      IPs

      No context

      Domains

      No context

      ASN

      No context

      JA3 Fingerprints

      No context

      Dropped Files

      No context

      Created / dropped Files

      C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{95CD7E6C-3547-11EB-90E4-ECF4BB862DED}.dat
      Process:C:\Program Files\internet explorer\iexplore.exe
      File Type:Microsoft Word Document
      Category:dropped
      Size (bytes):30296
      Entropy (8bit):1.854961295866747
      Encrypted:false
      SSDEEP:192:rFZGZa2f9WPtNnf0d6+M0SmTccHlfAdruX:rLiZfUVl1k9dp
      MD5:980A751404AD5F11EF740B81AE4784D6
      SHA1:B19BAB3C3BE9666AC146C0044C5521B6C659FAD5
      SHA-256:AB6B2EF8AF6BA380C72C2A191732D029BDBCCB0AE716A8E3EEBA07F4C0AB182F
      SHA-512:8B7DFB1F0C02FCCE9687186A4860B4F42BD5B01131C9EDCF0E206CE7FC29D6271D7953D5516C8A7D4000E9DC0385DB1875329BAA4A59F9FFB2ED9B715D663CAD
      Malicious:false
      Reputation:low
      Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{95CD7E6E-3547-11EB-90E4-ECF4BB862DED}.dat
      Process:C:\Program Files\internet explorer\iexplore.exe
      File Type:Microsoft Word Document
      Category:dropped
      Size (bytes):25940
      Entropy (8bit):1.9302740102735119
      Encrypted:false
      SSDEEP:96:rUZAQE6qBSWFjN20kWqMlYpSvsOhTl8IMsa8TRg:rUZAQE6qkWFjN20kWqMlYpWTi+/Rg
      MD5:918F61567ADC9F87EDDFF3ED0A596AD8
      SHA1:8ACABDA1221023BA37E3F3AD2076CBFAAFA48273
      SHA-256:59109C7D7A1621C458ACC8E3BC4C0857900E555AEF8A35BFB0E61F2AF04B5006
      SHA-512:93FBD2DB39299B919D309341C289F2614DFFCB3E0100168116AC3FAC7436D054BC60622C0A354999ADDB539B88C1B93E8CA1C5C54230A3DEAAC633245355895D
      Malicious:false
      Reputation:low
      Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{95CD7E6F-3547-11EB-90E4-ECF4BB862DED}.dat
      Process:C:\Program Files\internet explorer\iexplore.exe
      File Type:Microsoft Word Document
      Category:dropped
      Size (bytes):16984
      Entropy (8bit):1.5665473838269448
      Encrypted:false
      SSDEEP:48:IwsQhGcprdGwpaQhG4pQQGrapbSyrGQpKnG7HpRzsTGIpG:rFZHQU6uBSyFAGTz4A
      MD5:C2A9A2F14969140ADA687BC4167A6F2F
      SHA1:6F2E61442C95C79C3BF421B90BED02FA9FEC7684
      SHA-256:D4979410A66F848BA8C6FBF6B69DEC11D55C9A84B0831B4AAD54779AF47D1253
      SHA-512:EA87AFA0C5F7109A412602D837E6DA6F92DC6D4594028410F40802B4E45946798C2B19D14F72FA450C2A6FCD5F855BCCFC3983667D8DB4650C4A7B682237AC2F
      Malicious:false
      Reputation:low
      Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\background_gradient[1]
      Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
      File Type:JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 1x800, frames 3
      Category:downloaded
      Size (bytes):453
      Entropy (8bit):5.019973044227213
      Encrypted:false
      SSDEEP:6:3llVuiPjlXJYhg5suRd8PImMo23C/kHrJ8yA/NIeYoWg78C/vTFvbKLAh3:V/XPYhiPRd8j7+9LoIrobtHTdbKi
      MD5:20F0110ED5E4E0D5384A496E4880139B
      SHA1:51F5FC61D8BF19100DF0F8AADAA57FCD9C086255
      SHA-256:1471693BE91E53C2640FE7BAEECBC624530B088444222D93F2815DFCE1865D5B
      SHA-512:5F52C117E346111D99D3B642926139178A80B9EC03147C00E27F07AAB47FE38E9319FE983444F3E0E36DEF1E86DD7C56C25E44B14EFDC3F13B45EDEDA064DB5A
      Malicious:false
      Reputation:low
      IE Cache URL:res://ieframe.dll/background_gradient.jpg
      Preview: ......JFIF.....d.d......Ducky.......P......Adobe.d................................................................................................................................................. ...............W..............................................................Qa.................................?......%.....x......s...Z.......j.T.wz.6...X.@... V.3tM...P@.u.%...m..D.25...T...F.........p......A..........BP..qD.(.........ntH.@......h?..
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\errorPageStrings[1]
      Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
      File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
      Category:downloaded
      Size (bytes):4720
      Entropy (8bit):5.164796203267696
      Encrypted:false
      SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
      MD5:D65EC06F21C379C87040B83CC1ABAC6B
      SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
      SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
      SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
      Malicious:false
      Reputation:low
      IE Cache URL:res://ieframe.dll/errorPageStrings.js
      Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\ErrorPageTemplate[1]
      Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
      File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
      Category:downloaded
      Size (bytes):2168
      Entropy (8bit):5.207912016937144
      Encrypted:false
      SSDEEP:24:5+j5xU5k5N0ndgvoyeP0yyiyQCDr3nowMVworDtX3orKxWxDnCMA0da+hieyuSQK:5Q5K5k5pvFehWrrarrZIrHd3FIQfOS6
      MD5:F4FE1CB77E758E1BA56B8A8EC20417C5
      SHA1:F4EDA06901EDB98633A686B11D02F4925F827BF0
      SHA-256:8D018639281B33DA8EB3CE0B21D11E1D414E59024C3689F92BE8904EB5779B5F
      SHA-512:62514AB345B6648C5442200A8E9530DFB88A0355E262069E0A694289C39A4A1C06C6143E5961074BFAC219949102A416C09733F24E8468984B96843DC222B436
      Malicious:false
      Reputation:low
      IE Cache URL:res://ieframe.dll/ErrorPageTemplate.css
      Preview: .body..{...font-family: "Segoe UI", "verdana", "arial";...background-image: url(background_gradient.jpg);...background-repeat: repeat-x;...background-color: #E8EAEF;...margin-top: 20px;...margin-left: 20px;...color: #575757;..}....body.securityError..{...font-family: "Segoe UI", "verdana" , "Arial";...background-image: url(background_gradient_red.jpg);...background-repeat: repeat-x;...background-color: #E8EAEF;...margin-top: 20px;...margin-left: 20px;..}....body.tabInfo..{...background-image: none;...background-color: #F4F4F4;..}.. ..a..{...color: rgb(19,112,171);.font-size: 1em;...font-weight: normal;...text-decoration: none;...margin-left: 0px;...vertical-align: top;..}....a:link, a:visited..{...color: rgb(19,112,171);...text-decoration: none;...vertical-align: top;..}....a:hover..{...color: rgb(7,74,229);...text-decoration: underline;..}....p..{...font-size: 0.9em;..}.....h1 /* used for Title */..{...color: #4465A2;...font-size: 1.1em;...font-weight: normal;...vertical-align
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\bullet[1]
      Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
      File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
      Category:downloaded
      Size (bytes):447
      Entropy (8bit):7.304718288205936
      Encrypted:false
      SSDEEP:12:6v/71Cyt/JNTWxGdr+kZDWO7+4dKIv0b1GKuxu+R:/yBJNTqsSk9BTwE05su+R
      MD5:26F971D87CA00E23BD2D064524AEF838
      SHA1:7440BEFF2F4F8FABC9315608A13BF26CABAD27D9
      SHA-256:1D8E5FD3C1FD384C0A7507E7283C7FE8F65015E521B84569132A7EABEDC9D41D
      SHA-512:C62EB51BE301BB96C80539D66A73CD17CA2021D5D816233853A37DB72E04050271E581CC99652F3D8469B390003CA6C62DAD2A9D57164C620B7777AE99AA1B15
      Malicious:false
      Reputation:low
      IE Cache URL:res://ieframe.dll/bullet.png
      Preview: .PNG........IHDR...............ex....PLTE...(EkFRp&@e&@e)Af)AgANjBNjDNjDNj2Vv-Xz-Y{3XyC\}E_.2j.3l.8p.7q.;j.;l.Zj.\l.5o.7q.<..aw.<..dz.E...........1..@.7..~.....9..:.....A..B..E..9..:..a..c..b..g.#M.%O.#r.#s.%y.2..4..+..-..?..@..;..p..s...G..H..M.........z`....#tRNS................................../,....mIDATx^..C..`.......S....y'...05...|..k.X......*`.F.K....JQ..u.<.}.. ..[U..m....'r%.......yn.`.7F..).5..b..rX.T.....IEND.B`.
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\httpErrorPagesScripts[1]
      Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
      File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
      Category:downloaded
      Size (bytes):12105
      Entropy (8bit):5.451485481468043
      Encrypted:false
      SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
      MD5:9234071287E637F85D721463C488704C
      SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
      SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
      SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
      Malicious:false
      Reputation:low
      IE Cache URL:res://ieframe.dll/httpErrorPagesScripts.js
      Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\info_48[1]
      Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
      File Type:PNG image data, 47 x 48, 8-bit/color RGBA, non-interlaced
      Category:downloaded
      Size (bytes):4113
      Entropy (8bit):7.9370830126943375
      Encrypted:false
      SSDEEP:96:WNTJL8szf79M8FUjE39KJoUUuJPnvmKacs6Uq7qDMj1XPL:WNrzFoQSJPnvzs6rL
      MD5:5565250FCC163AA3A79F0B746416CE69
      SHA1:B97CC66471FCDEE07D0EE36C7FB03F342C231F8F
      SHA-256:51129C6C98A82EA491F89857C31146ECEC14C4AF184517450A7A20C699C84859
      SHA-512:E60EA153B0FECE4D311769391D3B763B14B9A140105A36A13DAD23C2906735EAAB9092236DEB8C68EF078E8864D6E288BEF7EF1731C1E9F1AD9B0170B95AC134
      Malicious:false
      Reputation:low
      IE Cache URL:res://ieframe.dll/info_48.png
      Preview: .PNG........IHDR.../...0.......#.....IDATx^...pUU..{....KB........!....F......jp.Q.......Vg.F..m.Q....{...,m.@.56D...&$d!.<..}....s..K9.....{............[./<..T..I.I..JR)).9.k.N.%.E.W^}....Po..............X..;.=.P......./...+...9./..s.....9..|.......*.7v.`..V.....-^.$S[[[......K..z......3..3....5 ...0.."/n/.c...&.{.ht..?....A..I{.n.....|....t......N}..%.v...:.E..i....`....a.k.mg.LX..fcFU.fO-..YEfd.}...~."......}l$....^.re..'^X..*}.?.^U.G..... .30...X......f[.l0.P`..KC...[..[..6....~..i..Q.|;x..T ..........s.5...n+.0..;...H#.2..#.M..m[^3x&E.Ya..\K..{[..M..g...yf0..~....M.]7..ZZZ:..a.O.G64]....9..l[..a....N,,.h......5...f*.y...}...BX{.G^...?.c.......s^..P.(..G...t.0.:.X.DCs.....]vf...py).........x..>-..Be.a...G...Y!...z...g.{....d.s.o.....%.x......R.W.....Z.b,....!..6Ub....U.qY(/v..m.a...4.`Qr\.E.G..a)..t..e.j.W........C<.1.....c..l1w....]3%....tR;.,..3..-.NW.5...t..H..h..D..b......M....)B..2J...)..o..m..M.t....wn./....+Wv....xkg..*..
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\navcancl[1]
      Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
      File Type:HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
      Category:downloaded
      Size (bytes):2713
      Entropy (8bit):4.1712007174415895
      Encrypted:false
      SSDEEP:24:r3avxU5hzsIVmVMeLmVMyHf63lboxMCLxvriN6LOAPAnQay78eLx5Tb87nVkEhML:upU0GVeLVGBXvrp4n/1a5TI7Ve/G79KX
      MD5:4BCFE9F8DB04948CDDB5E31FE6A7F984
      SHA1:42464C70FC16F3F361C2419751ACD57D51613CDF
      SHA-256:BEE0439FCF31DE76D6E2D7FD377A24A34AC8763D5BF4114DA5E1663009E24228
      SHA-512:BB0EF3D32310644285F4062AD5F27F30649C04C5A442361A5DBE3672BD8CB585160187070872A31D9F30B70397D81449623510365A371E73BDA580E00EEF0E4E
      Malicious:false
      Reputation:low
      IE Cache URL:res://ieframe.dll/navcancl.htm
      Preview: .<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">....<html>.... <head>.. <link rel="stylesheet" type="text/css" href="res://ieframe.dll/ErrorPageTemplate.css" />.... <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />.... <title>Navigation Canceled</title>.... <script src="res://ieframe.dll/errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="res://ieframe.dll/httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="javascript:navCancelInit(); ">.... <table width="730" cellpadding="0" cellspacing="0" border="0">.... Error title -->.. <tr>.. <td id="infoIconAlign" width="60" align="left" valign="top" rowspan="2">.. <img src="res://ieframe.dll/info_48.png" id="infoIcon" alt="Info icon">..
      C:\Users\user\AppData\Local\Temp\~DF333AC8DA59574C47.TMP
      Process:C:\Program Files\internet explorer\iexplore.exe
      File Type:data
      Category:dropped
      Size (bytes):13029
      Entropy (8bit):0.48033947188153875
      Encrypted:false
      SSDEEP:24:c9lLh9lLh9lIn9lIn9logDF9logJ9lWgf9GiDU9G/fMG/fKjDUj2:kBqoIgSgMgf9GiDU9G/fMG/fKjDUj2
      MD5:BFC451484EF1E6CBD11051F1B2ADFC96
      SHA1:D4FE921AF204CE366B5BB9CA950D6D314053ABE5
      SHA-256:90DADCDBA45AB839C19D93E88F6E0E5D242B55803D1DDA89E6886FE4D26481CA
      SHA-512:DBF58E5BF347CAC7123BF9B7E9ED9BCD3F08CB0C35D793212E010E9106ABE806E573415B6AE1C42358C99999EE5E9D1FA9AC0BA78620884399D5EE649084D194
      Malicious:false
      Reputation:low
      Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\AppData\Local\Temp\~DF4DE4A117A064BC60.TMP
      Process:C:\Program Files\internet explorer\iexplore.exe
      File Type:data
      Category:dropped
      Size (bytes):25441
      Entropy (8bit):0.27918767598683664
      Encrypted:false
      SSDEEP:24:c9lLh9lLh9lIn9lIn9lRx/9lRJ9lTb9lTb9lSSU9lSSU9laAa/9laA:kBqoxxJhHWSVSEab
      MD5:AB889A32AB9ACD33E816C2422337C69A
      SHA1:1190C6B34DED2D295827C2A88310D10A8B90B59B
      SHA-256:4D6EC54B8D244E63B0F04FBE2B97402A3DF722560AD12F218665BA440F4CEFDA
      SHA-512:BD250855747BB4CEC61814D0E44F810156D390E3E9F120A12935EFDF80ACA33C4777AD66257CCA4E4003FEF0741692894980B9298F01C4CDD2D8A9C7BB522FB6
      Malicious:false
      Reputation:low
      Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      C:\Users\user\AppData\Local\Temp\~DFD0DF95E4BDC04723.TMP
      Process:C:\Program Files\internet explorer\iexplore.exe
      File Type:data
      Category:dropped
      Size (bytes):36133
      Entropy (8bit):0.6079658115291952
      Encrypted:false
      SSDEEP:96:kBqoxKAuvScS+V75orySvsOhTl8IMsa8/:kBqoxKAuqR+V75oryWTi+L
      MD5:3B3ECCDCD3E9314CEE92B0F264A0AEE9
      SHA1:0E1FC1C23CE25D25820E8AAFD71C90E442E53F5C
      SHA-256:3BF8F8C9DA3771CD8E6039F4482C44CB7251F8FAE1CD9F05D3806D02183B7584
      SHA-512:AFBF75C09453F0914B2D2AA3FE6898278733B710BDFAE03BF2EB64F04A4E73AF79C34051F7EF6D31265114B0164AD1825C2777E96687523039CA2BA5EBCCBD44
      Malicious:false
      Reputation:low
      Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

      Static File Info

      No static file info

      Network Behavior

      Network Port Distribution

      UDP Packets

      TimestampSource PortDest PortSource IPDest IP
      Dec 3, 2020 01:11:55.508356094 CET6511053192.168.2.38.8.8.8
      Dec 3, 2020 01:11:55.545583010 CET53651108.8.8.8192.168.2.3
      Dec 3, 2020 01:11:56.539987087 CET5836153192.168.2.38.8.8.8
      Dec 3, 2020 01:11:56.584353924 CET53583618.8.8.8192.168.2.3
      Dec 3, 2020 01:12:04.670046091 CET6349253192.168.2.38.8.8.8
      Dec 3, 2020 01:12:04.697257042 CET53634928.8.8.8192.168.2.3
      Dec 3, 2020 01:12:05.815538883 CET6083153192.168.2.38.8.8.8
      Dec 3, 2020 01:12:05.851093054 CET53608318.8.8.8192.168.2.3
      Dec 3, 2020 01:12:07.531785011 CET6010053192.168.2.38.8.8.8
      Dec 3, 2020 01:12:07.558980942 CET53601008.8.8.8192.168.2.3
      Dec 3, 2020 01:12:09.478586912 CET5319553192.168.2.38.8.8.8
      Dec 3, 2020 01:12:09.506007910 CET53531958.8.8.8192.168.2.3
      Dec 3, 2020 01:12:13.126857042 CET5014153192.168.2.38.8.8.8
      Dec 3, 2020 01:12:13.154124975 CET53501418.8.8.8192.168.2.3
      Dec 3, 2020 01:12:13.772126913 CET5302353192.168.2.38.8.8.8
      Dec 3, 2020 01:12:13.799205065 CET53530238.8.8.8192.168.2.3
      Dec 3, 2020 01:12:15.984715939 CET4956353192.168.2.38.8.8.8
      Dec 3, 2020 01:12:16.011781931 CET53495638.8.8.8192.168.2.3
      Dec 3, 2020 01:12:16.626868963 CET5135253192.168.2.38.8.8.8
      Dec 3, 2020 01:12:16.653974056 CET53513528.8.8.8192.168.2.3

      DNS Queries

      TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
      Dec 3, 2020 01:11:56.539987087 CET192.168.2.38.8.8.80x7b60Standard query (0)www.youtube.comA (IP address)IN (0x0001)

      DNS Answers

      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
      Dec 3, 2020 01:11:56.584353924 CET8.8.8.8192.168.2.30x7b60No error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)

      Code Manipulations

      Statistics

      CPU Usage

      Click to jump to process

      Memory Usage

      Click to jump to process

      Behavior

      Click to jump to process

      System Behavior

      General

      Start time:01:11:54
      Start date:03/12/2020
      Path:C:\Program Files\internet explorer\iexplore.exe
      Wow64 process (32bit):false
      Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
      Imagebase:0x7ff6e9810000
      File size:823560 bytes
      MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low

      General

      Start time:01:11:55
      Start date:03/12/2020
      Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
      Wow64 process (32bit):true
      Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5268 CREDAT:17410 /prefetch:2
      Imagebase:0x200000
      File size:822536 bytes
      MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low

      Disassembly

      Reset < >