Loading ...

Play interactive tourEdit tour

Analysis Report http://url8954.beamfox.io/ls/click?upn=vy54nEfxR7oFCJ7Xhv5PDi0qrh6-2B6v9vbwm9wDDQeqMTq29AvO6rJ5oANpI-2B2NiftFEZ9RAei1V3Q-2BxFVOiObu0pRlieznTzxk7cx53MEoxk2-2B9J1tzDpaOVoF-2F4QxQo1rgd97saoVdafM-2FvJVmI-2Bw-3D-3D8m3M_tBSJpZAWBIQyuSm7yh7kmPeWUJawOhW1qL9tm1BX23Kc7Z11Ru8DBZhAh-2FE7F2mwmd6AZYXbfjglcNMWLveLIX5vg5z1J3YLKW48gCtcUi71yEjXBYoQKbiGan-2FUIqh3OHDu0GNOfSVyMcsClml2ebDs2BXJn-2FSPDHqBUAE6Y1cjpsI5mtOQ1kwJeNtimeB52GBB1HaJ1PunDckOuHuDZYiUEMmXL2xfNjrKPx4Iu9MxkHETIfZaolp-2FCak94LJ83vJFXVqSyuIqWpQ528d7lY2SnS2XPOjSjtOt2H6YFHjyJQxwAmEe0ADRIP5S4DMGVY4Gz4mHtTPG00R9mkbsXIYR7v0Sy0D-2BFW43s6MCLeIk86zd7BhY6jgIG6AsUqG-2BBavjmsHptCisd1FhCUfUFsqxybq7-2FaJYRNZbjuKwcx-2BARpRIulGuPHQvcB-2B-2BhVARPtRi6aSy3I2VlkXIxum7Mn8NZJL166-2B1FGS0fpisG4FP1TigXR1EZf7-2F1OXq1YJzFoEx0OzM9MMM1xa8pEu6OUSbTJEPOAUC-2Faq-2F5HGImaF7258sOIfX6rXlhMEM5SFxA3h2UsS05AKPg3qNT0uEs7N0FaLxm1VBHjZzFNw9PYXvfLi-2FT3EIw-2BsS0Dr4wgJNPWWynzzXHxC9pNlAciuRdJu8ExyuByXsaYKQGwLwV10bKZxDhfLF859FAd-2BfvVQc7zOL5lcHBUARqviAKR-2Fg3xpQ4ubFVX9xskmLr4TKHLTTGouyUhkEy8mKopMjObcyeD3P7O

Overview

General Information

Sample URL:http://url8954.beamfox.io/ls/click?upn=vy54nEfxR7oFCJ7Xhv5PDi0qrh6-2B6v9vbwm9wDDQeqMTq29AvO6rJ5oANpI-2B2NiftFEZ9RAei1V3Q-2BxFVOiObu0pRlieznTzxk7cx53MEoxk2-2B9J1tzDpaOVoF-2F4QxQo1rgd97saoVdafM-2FvJVmI-2Bw-3D-3D8m3M_tBSJpZAWBIQyuSm7yh7kmPeWUJawOhW1qL9tm1BX23Kc7Z11Ru8DBZhAh-2FE7F2mwmd6AZYXbfjglcNMWLveLIX5vg5z1J3YLKW48gCtcUi71yEjXBYoQKbiGan-2FUIqh3OHDu0GNOfSVyMcsClml2ebDs2BXJn-2FSPDHqBUAE6Y1cjpsI5mtOQ1kwJeNtimeB52GBB1HaJ1PunDckOuHuDZYiUEMmXL2xfNjrKPx4Iu9MxkHETIfZaolp-2FCak94LJ83vJFXVqSyuIqWpQ528d7lY2SnS2XPOjSjtOt2H6YFHjyJQxwAmEe0ADRIP5S4DMGVY4Gz4mHtTPG00R9mkbsXIYR7v0Sy0D-2BFW43s6MCLeIk86zd7BhY6jgIG6AsUqG-2BBavjmsHptCisd1FhCUfUFsqxybq7-2FaJYRNZbjuKwcx-2BARpRIulGuPHQvcB-2B-2BhVARPtRi6aSy3I2VlkXIxum7Mn8NZJL166-2B1FGS0fpisG4FP1TigXR1EZf7-2F1OXq1YJzFoEx0OzM9MMM1xa8pEu6OUSbTJEPOAUC-2Faq-2F5HGImaF7258sOIfX6rXlhMEM5SFxA3h2UsS05AKPg3qNT0uEs7N0FaLxm1VBHjZzFNw9PYXvfLi-2FT3EIw-2BsS0Dr4wgJNPWWynzzXHxC9pNlAciuRdJu8ExyuByXsaYKQGwLwV10bKZxDhfLF859FAd-2BfvVQc7zOL5lcHBUARqviAKR-2Fg3xpQ4ubFVX9xskmLr4TKHLTTGouyUhkEy8mKopMjObcyeD3P7O
Analysis ID:339761

Most interesting Screenshot:

Errors
  • URL not reachable

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

No high impact signatures.

Classification

Startup

  • System is w10x64
  • iexplore.exe (PID: 7020 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 7064 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:7020 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
Source: global trafficHTTP traffic detected: GET /ls/click?upn=vy54nEfxR7oFCJ7Xhv5PDi0qrh6-2B6v9vbwm9wDDQeqMTq29AvO6rJ5oANpI-2B2NiftFEZ9RAei1V3Q-2BxFVOiObu0pRlieznTzxk7cx53MEoxk2-2B9J1tzDpaOVoF-2F4QxQo1rgd97saoVdafM-2FvJVmI-2Bw-3D-3D8m3M_tBSJpZAWBIQyuSm7yh7kmPeWUJawOhW1qL9tm1BX23Kc7Z11Ru8DBZhAh-2FE7F2mwmd6AZYXbfjglcNMWLveLIX5vg5z1J3YLKW48gCtcUi71yEjXBYoQKbiGan-2FUIqh3OHDu0GNOfSVyMcsClml2ebDs2BXJn-2FSPDHqBUAE6Y1cjpsI5mtOQ1kwJeNtimeB52GBB1HaJ1PunDckOuHuDZYiUEMmXL2xfNjrKPx4Iu9MxkHETIfZaolp-2FCak94LJ83vJFXVqSyuIqWpQ528d7lY2SnS2XPOjSjtOt2H6YFHjyJQxwAmEe0ADRIP5S4DMGVY4Gz4mHtTPG00R9mkbsXIYR7v0Sy0D-2BFW43s6MCLeIk86zd7BhY6jgIG6AsUqG-2BBavjmsHptCisd1FhCUfUFsqxybq7-2FaJYRNZbjuKwcx-2BARpRIulGuPHQvcB-2B-2BhVARPtRi6aSy3I2VlkXIxum7Mn8NZJL166-2B1FGS0fpisG4FP1TigXR1EZf7-2F1OXq1YJzFoEx0OzM9MMM1xa8pEu6OUSbTJEPOAUC-2Faq-2F5HGImaF7258sOIfX6rXlhMEM5SFxA3h2UsS05AKPg3qNT0uEs7N0FaLxm1VBHjZzFNw9PYXvfLi-2FT3EIw-2BsS0Dr4wgJNPWWynzzXHxC9pNlAciuRdJu8ExyuByXsaYKQGwLwV10bKZxDhfLF859FAd-2BfvVQc7zOL5lcHBUARqviAKR-2Fg3xpQ4ubFVX9xskmLr4TKHLTTGouyUhkEy8mKopMjObcyeD3P7O HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: url8954.beamfox.ioConnection: Keep-Alive
Source: unknownDNS traffic detected: queries for: url8954.beamfox.io
Source: {22EE95AB-5681-11EB-90EB-ECF4BBEA1588}.dat.1.dr, ~DFDE7BA4CA6119B33C.TMP.1.drString found in binary or memory: http://url8954.beamfox.io/ls/click?upn=vy54nEfxR7oFCJ7Xhv5PDi0qrh6-2B6v9vbwm9wDDQeqMTq29AvO6rJ5oANpI
Source: classification engineClassification label: unknown0.win@3/14@1/1
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{22EE95A9-5681-11EB-90EB-ECF4BBEA1588}.datJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DF35A6413E31433FBD.TMPJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknownProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:7020 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:7020 CREDAT:17410 /prefetch:2Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Masquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
http://url8954.beamfox.io/ls/click?upn=vy54nEfxR7oFCJ7Xhv5PDi0qrh6-2B6v9vbwm9wDDQeqMTq29AvO6rJ5oANpI-2B2NiftFEZ9RAei1V3Q-2BxFVOiObu0pRlieznTzxk7cx53MEoxk2-2B9J1tzDpaOVoF-2F4QxQo1rgd97saoVdafM-2FvJVmI-2Bw-3D-3D8m3M_tBSJpZAWBIQyuSm7yh7kmPeWUJawOhW1qL9tm1BX23Kc7Z11Ru8DBZhAh-2FE7F2mwmd6AZYXbfjglcNMWLveLIX5vg5z1J3YLKW48gCtcUi71yEjXBYoQKbiGan-2FUIqh3OHDu0GNOfSVyMcsClml2ebDs2BXJn-2FSPDHqBUAE6Y1cjpsI5mtOQ1kwJeNtimeB52GBB1HaJ1PunDckOuHuDZYiUEMmXL2xfNjrKPx4Iu9MxkHETIfZaolp-2FCak94LJ83vJFXVqSyuIqWpQ528d7lY2SnS2XPOjSjtOt2H6YFHjyJQxwAmEe0ADRIP5S4DMGVY4Gz4mHtTPG00R9mkbsXIYR7v0Sy0D-2BFW43s6MCLeIk86zd7BhY6jgIG6AsUqG-2BBavjmsHptCisd1FhCUfUFsqxybq7-2FaJYRNZbjuKwcx-2BARpRIulGuPHQvcB-2B-2BhVARPtRi6aSy3I2VlkXIxum7Mn8NZJL166-2B1FGS0fpisG4FP1TigXR1EZf7-2F1OXq1YJzFoEx0OzM9MMM1xa8pEu6OUSbTJEPOAUC-2Faq-2F5HGImaF7258sOIfX6rXlhMEM5SFxA3h2UsS05AKPg3qNT0uEs7N0FaLxm1VBHjZzFNw9PYXvfLi-2FT3EIw-2BsS0Dr4wgJNPWWynzzXHxC9pNlAciuRdJu8ExyuByXsaYKQGwLwV10bKZxDhfLF859FAd-2BfvVQc7zOL5lcHBUARqviAKR-2Fg3xpQ4ubFVX9xskmLr4TKHLTTGouyUhkEy8mKopMjObcyeD3P7O0%Avira URL Cloudsafe

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

SourceDetectionScannerLabelLink
url8954.beamfox.io0%VirustotalBrowse

URLs

SourceDetectionScannerLabelLink
http://url8954.beamfox.io/ls/click?upn=vy54nEfxR7oFCJ7Xhv5PDi0qrh6-2B6v9vbwm9wDDQeqMTq29AvO6rJ5oANpI0%Avira URL Cloudsafe

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
sendgrid.net
167.89.123.54
truefalse
    high
    url8954.beamfox.io
    unknown
    unknownfalseunknown

    URLs from Memory and Binaries

    NameSourceMaliciousAntivirus DetectionReputation
    http://url8954.beamfox.io/ls/click?upn=vy54nEfxR7oFCJ7Xhv5PDi0qrh6-2B6v9vbwm9wDDQeqMTq29AvO6rJ5oANpI{22EE95AB-5681-11EB-90EB-ECF4BBEA1588}.dat.1.dr, ~DFDE7BA4CA6119B33C.TMP.1.drfalse
    • Avira URL Cloud: safe
    unknown

    Contacted IPs

    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs

    Public

    IPDomainCountryFlagASNASN NameMalicious
    167.89.123.54
    unknownUnited States
    11377SENDGRIDUSfalse

    General Information

    Joe Sandbox Version:31.0.0 Red Diamond
    Analysis ID:339761
    Start date:14.01.2021
    Start time:16:56:15
    Joe Sandbox Product:CloudBasic
    Overall analysis duration:0h 2m 13s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:browseurl.jbs
    Sample URL:http://url8954.beamfox.io/ls/click?upn=vy54nEfxR7oFCJ7Xhv5PDi0qrh6-2B6v9vbwm9wDDQeqMTq29AvO6rJ5oANpI-2B2NiftFEZ9RAei1V3Q-2BxFVOiObu0pRlieznTzxk7cx53MEoxk2-2B9J1tzDpaOVoF-2F4QxQo1rgd97saoVdafM-2FvJVmI-2Bw-3D-3D8m3M_tBSJpZAWBIQyuSm7yh7kmPeWUJawOhW1qL9tm1BX23Kc7Z11Ru8DBZhAh-2FE7F2mwmd6AZYXbfjglcNMWLveLIX5vg5z1J3YLKW48gCtcUi71yEjXBYoQKbiGan-2FUIqh3OHDu0GNOfSVyMcsClml2ebDs2BXJn-2FSPDHqBUAE6Y1cjpsI5mtOQ1kwJeNtimeB52GBB1HaJ1PunDckOuHuDZYiUEMmXL2xfNjrKPx4Iu9MxkHETIfZaolp-2FCak94LJ83vJFXVqSyuIqWpQ528d7lY2SnS2XPOjSjtOt2H6YFHjyJQxwAmEe0ADRIP5S4DMGVY4Gz4mHtTPG00R9mkbsXIYR7v0Sy0D-2BFW43s6MCLeIk86zd7BhY6jgIG6AsUqG-2BBavjmsHptCisd1FhCUfUFsqxybq7-2FaJYRNZbjuKwcx-2BARpRIulGuPHQvcB-2B-2BhVARPtRi6aSy3I2VlkXIxum7Mn8NZJL166-2B1FGS0fpisG4FP1TigXR1EZf7-2F1OXq1YJzFoEx0OzM9MMM1xa8pEu6OUSbTJEPOAUC-2Faq-2F5HGImaF7258sOIfX6rXlhMEM5SFxA3h2UsS05AKPg3qNT0uEs7N0FaLxm1VBHjZzFNw9PYXvfLi-2FT3EIw-2BsS0Dr4wgJNPWWynzzXHxC9pNlAciuRdJu8ExyuByXsaYKQGwLwV10bKZxDhfLF859FAd-2BfvVQc7zOL5lcHBUARqviAKR-2Fg3xpQ4ubFVX9xskmLr4TKHLTTGouyUhkEy8mKopMjObcyeD3P7O
    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
    Number of analysed new started processes analysed:6
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Detection:UNKNOWN
    Classification:unknown0.win@3/14@1/1
    Cookbook Comments:
    • Adjust boot time
    • Enable AMSI
    • URL browsing timeout or error
    Warnings:
    Show All
    • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, ielowutil.exe, backgroundTaskHost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 52.147.198.201, 88.221.62.148, 51.104.139.180, 92.122.213.247, 92.122.213.194
    • Excluded domains from analysis (whitelisted): skypedataprdcoleus16.cloudapp.net, e11290.dspg.akamaiedge.net, go.microsoft.com, arc.msn.com.nsatc.net, blobcollector.events.data.trafficmanager.net, go.microsoft.com.edgekey.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, a1449.dscg2.akamai.net, arc.msn.com
    Errors:
    • URL not reachable

    Simulations

    Behavior and APIs

    No simulations

    Joe Sandbox View / Context

    IPs

    No context

    Domains

    No context

    ASN

    No context

    JA3 Fingerprints

    No context

    Dropped Files

    No context

    Created / dropped Files

    C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{22EE95A9-5681-11EB-90EB-ECF4BBEA1588}.dat
    Process:C:\Program Files\internet explorer\iexplore.exe
    File Type:Microsoft Word Document
    Category:dropped
    Size (bytes):30296
    Entropy (8bit):1.8531851320273574
    Encrypted:false
    SSDEEP:192:rJZyZWO2Wm9WWRtWpRifWDFRLRzMWXRDRBW8RZRDWYRsfWUFRaRjX:r/uqZU0TpaXSE
    MD5:D6A536331584087135074A8EAFFFDC5C
    SHA1:B1E2CEA416591A91E9B9570B9B47BAC30640DF0B
    SHA-256:DEE05F87055B36BA71B3F9CAFBA82935C4291D3716453787290D1D83B500F42D
    SHA-512:C7C8A6822DAE0D383C3CA6CEB546C4BD97DEA637E6E3C3DD90B6C48726F006A11C6F1F4EA78163BA8F0681B51868C76039DD13859A886AE1A72F2453846C49CD
    Malicious:false
    Reputation:low
    Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{22EE95AB-5681-11EB-90EB-ECF4BBEA1588}.dat
    Process:C:\Program Files\internet explorer\iexplore.exe
    File Type:Microsoft Word Document
    Category:dropped
    Size (bytes):26160
    Entropy (8bit):1.9943941486931855
    Encrypted:false
    SSDEEP:192:rcZHQu68kAFjB2skWSMhY00a8AgpG//Ng:rcw5hAhwYDhV0a85
    MD5:C240AA8952F215736903DD1F371A2179
    SHA1:FDF4A5792B89ED59046C3612332F61C4BCC7D33E
    SHA-256:562BD12874A833B50209FE30D38BD492137AC073B05FFC5047B3B3370AA6735D
    SHA-512:4484879D00E8A7CA679666D779C090F935C75E2C3E7AEE1ACCDCAB84A4438DB31CB8443512CF1AD56B1D663CAB710D0A0EA383F89EEDD585A989FA654E4980B8
    Malicious:false
    Reputation:low
    Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{22EE95AC-5681-11EB-90EB-ECF4BBEA1588}.dat
    Process:C:\Program Files\internet explorer\iexplore.exe
    File Type:Microsoft Word Document
    Category:dropped
    Size (bytes):16984
    Entropy (8bit):1.5640094799867574
    Encrypted:false
    SSDEEP:48:IwNhGcpr/6Gwpah7G4pQRGrapbSHrGQpK2G7HpRPxsTGIpG:rFZqQP6hBSHFAhTp4A
    MD5:996FB4B9E9EE2BE092BA39F4D72D5F2B
    SHA1:9A45F1F31B900916359D8E37825AD0625D4A789D
    SHA-256:13C76B3E4242489BA959A29111D18489F96DE932F11E238CFB3E895CF0FAB9D8
    SHA-512:9FD56872251E212CA1AB3D549FCEBD18DC947BF07DE04E840562FFE4501816A2AEC954E179FD7E76319BE22EE0B4BD71F72CA20550426F9C7AC1D0AF9C269DA5
    Malicious:false
    Reputation:low
    Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\http_400[1]
    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
    File Type:HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
    Category:downloaded
    Size (bytes):6410
    Entropy (8bit):3.863492220582535
    Encrypted:false
    SSDEEP:48:upUPinvV4VkBXvLuJyk5N9JXa5TI7kZ3GUsn3GFa7K083GJehBuU1kpd87KxnNst:ufbp69N9JcKktZs36a7x05h427Ow
    MD5:1960097B221E608A79D278C7959B3C59
    SHA1:10C261310CA68C5624185C4F6FEF8AF44EA6FBAF
    SHA-256:1BCAF35CA02140D731E6A3AE3D3D6A5EA49CE7E552728457F790919A540AEC78
    SHA-512:88A5AA0223462A576F07EEDC8182762C1E926B5B91163799FA4357B961ABA28AB94920479C993D30337A3814BE03430437DF9372F9D99743512E7F4152B0DE98
    Malicious:false
    Reputation:low
    IE Cache URL:res://ieframe.dll/http_400.htm
    Preview: .<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">....<html>.... <head>.. <link rel="stylesheet" type="text/css" href="ErrorPageTemplate.css" >.... <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.... <title>HTTP 400 Bad Request</title>.... <script src="errorPageStrings.js" language="javascript" type="text/javascript">.. </script>.. <script src="httpErrorPagesScripts.js" language="javascript" type="text/javascript">.. </script>.. </head>.... <body onLoad="javascript:initHomepage(); expandCollapse('infoBlockID', true); initGoBack(); initMoreInfo('infoBlockID');">.... <table width="730" cellpadding="0" cellspacing="0" border="0">.... Error title -->.. <tr>.. <td id="infoIconAlign" width="60" align="left" valign="top" rowspan="2">.. <img src="info_48.png" id="infoIcon" alt="Info icon">..
    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\info_48[1]
    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
    File Type:PNG image data, 47 x 48, 8-bit/color RGBA, non-interlaced
    Category:downloaded
    Size (bytes):4113
    Entropy (8bit):7.9370830126943375
    Encrypted:false
    SSDEEP:96:WNTJL8szf79M8FUjE39KJoUUuJPnvmKacs6Uq7qDMj1XPL:WNrzFoQSJPnvzs6rL
    MD5:5565250FCC163AA3A79F0B746416CE69
    SHA1:B97CC66471FCDEE07D0EE36C7FB03F342C231F8F
    SHA-256:51129C6C98A82EA491F89857C31146ECEC14C4AF184517450A7A20C699C84859
    SHA-512:E60EA153B0FECE4D311769391D3B763B14B9A140105A36A13DAD23C2906735EAAB9092236DEB8C68EF078E8864D6E288BEF7EF1731C1E9F1AD9B0170B95AC134
    Malicious:false
    Reputation:low
    IE Cache URL:res://ieframe.dll/info_48.png
    Preview: .PNG........IHDR.../...0.......#.....IDATx^...pUU..{....KB........!....F......jp.Q.......Vg.F..m.Q....{...,m.@.56D...&$d!.<..}....s..K9.....{............[./<..T..I.I..JR)).9.k.N.%.E.W^}....Po..............X..;.=.P......./...+...9./..s.....9..|.......*.7v.`..V.....-^.$S[[[......K..z......3..3....5 ...0.."/n/.c...&.{.ht..?....A..I{.n.....|....t......N}..%.v...:.E..i....`....a.k.mg.LX..fcFU.fO-..YEfd.}...~."......}l$....^.re..'^X..*}.?.^U.G..... .30...X......f[.l0.P`..KC...[..[..6....~..i..Q.|;x..T ..........s.5...n+.0..;...H#.2..#.M..m[^3x&E.Ya..\K..{[..M..g...yf0..~....M.]7..ZZZ:..a.O.G64]....9..l[..a....N,,.h......5...f*.y...}...BX{.G^...?.c.......s^..P.(..G...t.0.:.X.DCs.....]vf...py).........x..>-..Be.a...G...Y!...z...g.{....d.s.o.....%.x......R.W.....Z.b,....!..6Ub....U.qY(/v..m.a...4.`Qr\.E.G..a)..t..e.j.W........C<.1.....c..l1w....]3%....tR;.,..3..-.NW.5...t..H..h..D..b......M....)B..2J...)..o..m..M.t....wn./....+Wv....xkg..*..
    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\down[1]
    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
    File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
    Category:downloaded
    Size (bytes):748
    Entropy (8bit):7.249606135668305
    Encrypted:false
    SSDEEP:12:6v/7/2QeZ7HVJ6o6yiq1p4tSQfAVFcm6R2HkZuU4fB4CsY4NJlrvMezoW2uONroc:GeZ6oLiqkbDuU4fqzTrvMeBBlE
    MD5:C4F558C4C8B56858F15C09037CD6625A
    SHA1:EE497CC061D6A7A59BB66DEFEA65F9A8145BA240
    SHA-256:39E7DE847C9F731EAA72338AD9053217B957859DE27B50B6474EC42971530781
    SHA-512:D60353D3FBEA2992D96795BA30B20727B022B9164B2094B922921D33CA7CE1634713693AC191F8F5708954544F7648F4840BCD5B62CB6A032EF292A8B0E52A44
    Malicious:false
    Reputation:low
    IE Cache URL:res://ieframe.dll/down.png
    Preview: .PNG........IHDR...............ex....PLTE....W..W..W..W..W..W..W..W..W..W..W..W..W.U..............W..W.!Y.#Z.$\.'].<r.=s.P..Q..Q..U..o..p..r..x..z..~.............................................b.............................................................................................................................................................................................................$..s...7tRNS.a.o(,.s....e......q*...................................F.Z....IDATx^%.S..@.C..jm.mTk...m.?|;.y..S....F.t...,.......D.>..LpX=f.M...H4........=...=..xy.[h..7....7.....<.q.kH....#+....I..z.....'.ksC...X<.+..J>....%3BmqaV...h..Z._.:<.Y_jG...vN^.<>.Nu.u@.....M....?...1D.m~)s8..&....IEND.B`.
    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\errorPageStrings[1]
    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
    File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
    Category:downloaded
    Size (bytes):4720
    Entropy (8bit):5.164796203267696
    Encrypted:false
    SSDEEP:96:z9UUiqRxqH211CUIRgRLnRynjZbRXkRPRk6C87Apsat/5/+mhPcF+5g+mOQb7A9o:JsUOG1yNlX6ZzWpHOWLia16Cb7bk
    MD5:D65EC06F21C379C87040B83CC1ABAC6B
    SHA1:208D0A0BB775661758394BE7E4AFB18357E46C8B
    SHA-256:A1270E90CEA31B46432EC44731BF4400D22B38EB2855326BF934FE8F1B169A4F
    SHA-512:8A166D26B49A5D95AEA49BC649E5EA58786A2191F4D2ADAC6F5FBB7523940CE4482D6A2502AA870A931224F215CB2010A8C9B99A2C1820150E4D365CAB28299E
    Malicious:false
    Reputation:low
    IE Cache URL:res://ieframe.dll/errorPageStrings.js
    Preview: .//Split out for localization...var L_GOBACK_TEXT = "Go back to the previous page.";..var L_REFRESH_TEXT = "Refresh the page.";..var L_MOREINFO_TEXT = "More information";..var L_OFFLINE_USERS_TEXT = "For offline users";..var L_RELOAD_TEXT = "Retype the address.";..var L_HIDE_HOTKEYS_TEXT = "Hide tab shortcuts";..var L_SHOW_HOTKEYS_TEXT = "Show more tab shortcuts";..var L_CONNECTION_OFF_TEXT = "You are not connected to the Internet. Check your Internet connection.";..var L_CONNECTION_ON_TEXT = "It appears you are connected to the Internet, but you might want to try to reconnect to the Internet.";....//used by invalidcert.js and hstscerterror.js..var L_CertUnknownCA_TEXT = "Your PC doesn\u2019t trust this website\u2019s security certificate.";..var L_CertExpired_TEXT = "The website\u2019s security certificate is not yet valid or has expired.";..var L_CertCNMismatch_TEXT = "The hostname in the website\u2019s security certificate differs from the website you are trying to visit.";..var L
    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\background_gradient[1]
    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
    File Type:JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 1x800, frames 3
    Category:downloaded
    Size (bytes):453
    Entropy (8bit):5.019973044227213
    Encrypted:false
    SSDEEP:6:3llVuiPjlXJYhg5suRd8PImMo23C/kHrJ8yA/NIeYoWg78C/vTFvbKLAh3:V/XPYhiPRd8j7+9LoIrobtHTdbKi
    MD5:20F0110ED5E4E0D5384A496E4880139B
    SHA1:51F5FC61D8BF19100DF0F8AADAA57FCD9C086255
    SHA-256:1471693BE91E53C2640FE7BAEECBC624530B088444222D93F2815DFCE1865D5B
    SHA-512:5F52C117E346111D99D3B642926139178A80B9EC03147C00E27F07AAB47FE38E9319FE983444F3E0E36DEF1E86DD7C56C25E44B14EFDC3F13B45EDEDA064DB5A
    Malicious:false
    Reputation:low
    IE Cache URL:res://ieframe.dll/background_gradient.jpg
    Preview: ......JFIF.....d.d......Ducky.......P......Adobe.d................................................................................................................................................. ...............W..............................................................Qa.................................?......%.....x......s...Z.......j.T.wz.6...X.@... V.3tM...P@.u.%...m..D.25...T...F.........p......A..........BP..qD.(.........ntH.@......h?..
    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\httpErrorPagesScripts[1]
    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
    File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
    Category:downloaded
    Size (bytes):12105
    Entropy (8bit):5.451485481468043
    Encrypted:false
    SSDEEP:192:x20iniOciwd1BtvjrG8tAGGGVWnvyJVUrUiki3ayimi5ezLCvJG1gwm3z:xPini/i+1Btvjy815ZVUwiki3ayimi5f
    MD5:9234071287E637F85D721463C488704C
    SHA1:CCA09B1E0FBA38BA29D3972ED8DCECEFDEF8C152
    SHA-256:65CC039890C7CEB927CE40F6F199D74E49B8058C3F8A6E22E8F916AD90EA8649
    SHA-512:87D691987E7A2F69AD8605F35F94241AB7E68AD4F55AD384F1F0D40DC59FFD1432C758123661EE39443D624C881B01DCD228A67AFB8700FE5E66FC794A6C0384
    Malicious:false
    Reputation:low
    IE Cache URL:res://ieframe.dll/httpErrorPagesScripts.js
    Preview: ...function isExternalUrlSafeForNavigation(urlStr)..{..var regEx = new RegExp("^(http(s?)|ftp|file)://", "i");..return regEx.exec(urlStr);..}..function clickRefresh()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..window.location.replace(location.substring(poundIndex+1));..}..}..function navCancelInit()..{..var location = window.location.href;..var poundIndex = location.indexOf('#');..if (poundIndex != -1 && poundIndex+1 < location.length && isExternalUrlSafeForNavigation(location.substring(poundIndex+1)))..{..var bElement = document.createElement("A");..bElement.innerText = L_REFRESH_TEXT;..bElement.href = 'javascript:clickRefresh()';..navCancelContainer.appendChild(bElement);..}..else..{..var textNode = document.createTextNode(L_RELOAD_TEXT);..navCancelContainer.appendChild(textNode);..}..}..function getDisplayValue(elem
    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\ErrorPageTemplate[1]
    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
    File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
    Category:downloaded
    Size (bytes):2168
    Entropy (8bit):5.207912016937144
    Encrypted:false
    SSDEEP:24:5+j5xU5k5N0ndgvoyeP0yyiyQCDr3nowMVworDtX3orKxWxDnCMA0da+hieyuSQK:5Q5K5k5pvFehWrrarrZIrHd3FIQfOS6
    MD5:F4FE1CB77E758E1BA56B8A8EC20417C5
    SHA1:F4EDA06901EDB98633A686B11D02F4925F827BF0
    SHA-256:8D018639281B33DA8EB3CE0B21D11E1D414E59024C3689F92BE8904EB5779B5F
    SHA-512:62514AB345B6648C5442200A8E9530DFB88A0355E262069E0A694289C39A4A1C06C6143E5961074BFAC219949102A416C09733F24E8468984B96843DC222B436
    Malicious:false
    Reputation:low
    IE Cache URL:res://ieframe.dll/ErrorPageTemplate.css
    Preview: .body..{...font-family: "Segoe UI", "verdana", "arial";...background-image: url(background_gradient.jpg);...background-repeat: repeat-x;...background-color: #E8EAEF;...margin-top: 20px;...margin-left: 20px;...color: #575757;..}....body.securityError..{...font-family: "Segoe UI", "verdana" , "Arial";...background-image: url(background_gradient_red.jpg);...background-repeat: repeat-x;...background-color: #E8EAEF;...margin-top: 20px;...margin-left: 20px;..}....body.tabInfo..{...background-image: none;...background-color: #F4F4F4;..}.. ..a..{...color: rgb(19,112,171);.font-size: 1em;...font-weight: normal;...text-decoration: none;...margin-left: 0px;...vertical-align: top;..}....a:link, a:visited..{...color: rgb(19,112,171);...text-decoration: none;...vertical-align: top;..}....a:hover..{...color: rgb(7,74,229);...text-decoration: underline;..}....p..{...font-size: 0.9em;..}.....h1 /* used for Title */..{...color: #4465A2;...font-size: 1.1em;...font-weight: normal;...vertical-align
    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\bullet[1]
    Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
    File Type:PNG image data, 15 x 15, 8-bit colormap, non-interlaced
    Category:downloaded
    Size (bytes):447
    Entropy (8bit):7.304718288205936
    Encrypted:false
    SSDEEP:12:6v/71Cyt/JNTWxGdr+kZDWO7+4dKIv0b1GKuxu+R:/yBJNTqsSk9BTwE05su+R
    MD5:26F971D87CA00E23BD2D064524AEF838
    SHA1:7440BEFF2F4F8FABC9315608A13BF26CABAD27D9
    SHA-256:1D8E5FD3C1FD384C0A7507E7283C7FE8F65015E521B84569132A7EABEDC9D41D
    SHA-512:C62EB51BE301BB96C80539D66A73CD17CA2021D5D816233853A37DB72E04050271E581CC99652F3D8469B390003CA6C62DAD2A9D57164C620B7777AE99AA1B15
    Malicious:false
    Reputation:low
    IE Cache URL:res://ieframe.dll/bullet.png
    Preview: .PNG........IHDR...............ex....PLTE...(EkFRp&@e&@e)Af)AgANjBNjDNjDNj2Vv-Xz-Y{3XyC\}E_.2j.3l.8p.7q.;j.;l.Zj.\l.5o.7q.<..aw.<..dz.E...........1..@.7..~.....9..:.....A..B..E..9..:..a..c..b..g.#M.%O.#r.#s.%y.2..4..+..-..?..@..;..p..s...G..H..M.........z`....#tRNS................................../,....mIDATx^..C..`.......S....y'...05...|..k.X......*`.F.K....JQ..u.<.}.. ..[U..m....'r%.......yn.`.7F..).5..b..rX.T.....IEND.B`.
    C:\Users\user\AppData\Local\Temp\~DF35A6413E31433FBD.TMP
    Process:C:\Program Files\internet explorer\iexplore.exe
    File Type:data
    Category:dropped
    Size (bytes):13029
    Entropy (8bit):0.4766168938198961
    Encrypted:false
    SSDEEP:24:c9lLh9lLh9lIn9lIn9lo8Hs9lo8H89lW8H4wf:kBqoIWXWxW7
    MD5:FDBD330D89E7B0856A8A51E95D35C154
    SHA1:6D207BBA317F32B4D00490F143336E7242AFB850
    SHA-256:AF04478BD417BCEDCB6E80704473C4E29F0859D112BC43D9E33C587277B90720
    SHA-512:FE9890AA525DBA75E94749183BD6890A88BA57EC2F961167244318B8742F1FA31BD8CCE7CDBC771A9C56E746580E0A2F2FDED35B4602777776296B2FA837AD5F
    Malicious:false
    Reputation:low
    Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    C:\Users\user\AppData\Local\Temp\~DF4B8BA8D0B09C45E6.TMP
    Process:C:\Program Files\internet explorer\iexplore.exe
    File Type:data
    Category:dropped
    Size (bytes):25441
    Entropy (8bit):0.27918767598683664
    Encrypted:false
    SSDEEP:24:c9lLh9lLh9lIn9lIn9lRx/9lRJ9lTb9lTb9lSSU9lSSU9laAa/9laA:kBqoxxJhHWSVSEab
    MD5:AB889A32AB9ACD33E816C2422337C69A
    SHA1:1190C6B34DED2D295827C2A88310D10A8B90B59B
    SHA-256:4D6EC54B8D244E63B0F04FBE2B97402A3DF722560AD12F218665BA440F4CEFDA
    SHA-512:BD250855747BB4CEC61814D0E44F810156D390E3E9F120A12935EFDF80ACA33C4777AD66257CCA4E4003FEF0741692894980B9298F01C4CDD2D8A9C7BB522FB6
    Malicious:false
    Reputation:low
    Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    C:\Users\user\AppData\Local\Temp\~DFDE7BA4CA6119B33C.TMP
    Process:C:\Program Files\internet explorer\iexplore.exe
    File Type:data
    Category:dropped
    Size (bytes):36353
    Entropy (8bit):0.6607079035904379
    Encrypted:false
    SSDEEP:96:kBqoxKAuvScS+NTRwzr0e8G8AHAuslM/Z38EOX:kBqoxKAuqR+NTRwzr0a8AgpG/U
    MD5:B3F15B8433250D00B35E1B4E85DCB49A
    SHA1:77FEA4B12C4B9F0E7DB412A6E006F5FF1C5E86FB
    SHA-256:7B6534C3D024A5C9C04E5FEEEB3397C3CF05016F53948976672F063D22A2F267
    SHA-512:3145138A1EDFE20D8FB5DC971B187BCD24AB760B0C9350FCF060CC3F760E49E0104DACD6A95EBDF83FF6F85DD820C10BFA257763FCCD37C27709D72D6FFEEED1
    Malicious:false
    Reputation:low
    Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

    Static File Info

    No static file info

    Network Behavior

    Network Port Distribution

    TCP Packets

    TimestampSource PortDest PortSource IPDest IP
    Jan 14, 2021 16:57:03.234468937 CET4974280192.168.2.4167.89.123.54
    Jan 14, 2021 16:57:03.235538006 CET4974380192.168.2.4167.89.123.54
    Jan 14, 2021 16:57:03.366996050 CET8049742167.89.123.54192.168.2.4
    Jan 14, 2021 16:57:03.367136955 CET4974280192.168.2.4167.89.123.54
    Jan 14, 2021 16:57:03.367870092 CET8049743167.89.123.54192.168.2.4
    Jan 14, 2021 16:57:03.367974043 CET4974380192.168.2.4167.89.123.54
    Jan 14, 2021 16:57:03.368683100 CET4974280192.168.2.4167.89.123.54
    Jan 14, 2021 16:57:03.501274109 CET8049742167.89.123.54192.168.2.4
    Jan 14, 2021 16:57:03.502927065 CET8049742167.89.123.54192.168.2.4
    Jan 14, 2021 16:57:03.503120899 CET4974280192.168.2.4167.89.123.54

    UDP Packets

    TimestampSource PortDest PortSource IPDest IP
    Jan 14, 2021 16:56:57.853688955 CET6315353192.168.2.48.8.8.8
    Jan 14, 2021 16:56:57.901614904 CET53631538.8.8.8192.168.2.4
    Jan 14, 2021 16:56:58.670855045 CET5299153192.168.2.48.8.8.8
    Jan 14, 2021 16:56:58.718959093 CET53529918.8.8.8192.168.2.4
    Jan 14, 2021 16:57:01.177278996 CET5370053192.168.2.48.8.8.8
    Jan 14, 2021 16:57:01.225158930 CET53537008.8.8.8192.168.2.4
    Jan 14, 2021 16:57:02.006899118 CET5172653192.168.2.48.8.8.8
    Jan 14, 2021 16:57:02.073756933 CET53517268.8.8.8192.168.2.4
    Jan 14, 2021 16:57:02.255354881 CET5679453192.168.2.48.8.8.8
    Jan 14, 2021 16:57:02.303442001 CET53567948.8.8.8192.168.2.4
    Jan 14, 2021 16:57:03.111949921 CET5653453192.168.2.48.8.8.8
    Jan 14, 2021 16:57:03.147742033 CET5662753192.168.2.48.8.8.8
    Jan 14, 2021 16:57:03.198355913 CET53566278.8.8.8192.168.2.4
    Jan 14, 2021 16:57:03.215728998 CET53565348.8.8.8192.168.2.4
    Jan 14, 2021 16:57:03.961904049 CET5662153192.168.2.48.8.8.8
    Jan 14, 2021 16:57:04.012675047 CET53566218.8.8.8192.168.2.4
    Jan 14, 2021 16:57:05.254621029 CET6311653192.168.2.48.8.8.8
    Jan 14, 2021 16:57:05.302546024 CET53631168.8.8.8192.168.2.4
    Jan 14, 2021 16:57:06.185337067 CET6407853192.168.2.48.8.8.8
    Jan 14, 2021 16:57:06.236063004 CET53640788.8.8.8192.168.2.4
    Jan 14, 2021 16:57:07.119337082 CET6480153192.168.2.48.8.8.8
    Jan 14, 2021 16:57:07.167552948 CET53648018.8.8.8192.168.2.4
    Jan 14, 2021 16:57:07.947457075 CET6172153192.168.2.48.8.8.8
    Jan 14, 2021 16:57:07.996287107 CET53617218.8.8.8192.168.2.4
    Jan 14, 2021 16:57:09.974759102 CET5125553192.168.2.48.8.8.8
    Jan 14, 2021 16:57:10.025532007 CET53512558.8.8.8192.168.2.4
    Jan 14, 2021 16:57:21.320550919 CET6152253192.168.2.48.8.8.8
    Jan 14, 2021 16:57:21.371233940 CET53615228.8.8.8192.168.2.4
    Jan 14, 2021 16:57:24.457997084 CET5233753192.168.2.48.8.8.8
    Jan 14, 2021 16:57:24.515774965 CET53523378.8.8.8192.168.2.4

    DNS Queries

    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
    Jan 14, 2021 16:57:03.111949921 CET192.168.2.48.8.8.80x16f8Standard query (0)url8954.beamfox.ioA (IP address)IN (0x0001)

    DNS Answers

    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
    Jan 14, 2021 16:57:03.215728998 CET8.8.8.8192.168.2.40x16f8No error (0)url8954.beamfox.iosendgrid.netCNAME (Canonical name)IN (0x0001)
    Jan 14, 2021 16:57:03.215728998 CET8.8.8.8192.168.2.40x16f8No error (0)sendgrid.net167.89.123.54A (IP address)IN (0x0001)
    Jan 14, 2021 16:57:03.215728998 CET8.8.8.8192.168.2.40x16f8No error (0)sendgrid.net167.89.123.124A (IP address)IN (0x0001)
    Jan 14, 2021 16:57:03.215728998 CET8.8.8.8192.168.2.40x16f8No error (0)sendgrid.net167.89.118.83A (IP address)IN (0x0001)
    Jan 14, 2021 16:57:03.215728998 CET8.8.8.8192.168.2.40x16f8No error (0)sendgrid.net167.89.118.52A (IP address)IN (0x0001)

    HTTP Request Dependency Graph

    • url8954.beamfox.io

    HTTP Packets

    Session IDSource IPSource PortDestination IPDestination PortProcess
    0192.168.2.449742167.89.123.5480C:\Program Files (x86)\Internet Explorer\iexplore.exe
    TimestampkBytes transferredDirectionData
    Jan 14, 2021 16:57:03.368683100 CET66OUTGET /ls/click?upn=vy54nEfxR7oFCJ7Xhv5PDi0qrh6-2B6v9vbwm9wDDQeqMTq29AvO6rJ5oANpI-2B2NiftFEZ9RAei1V3Q-2BxFVOiObu0pRlieznTzxk7cx53MEoxk2-2B9J1tzDpaOVoF-2F4QxQo1rgd97saoVdafM-2FvJVmI-2Bw-3D-3D8m3M_tBSJpZAWBIQyuSm7yh7kmPeWUJawOhW1qL9tm1BX23Kc7Z11Ru8DBZhAh-2FE7F2mwmd6AZYXbfjglcNMWLveLIX5vg5z1J3YLKW48gCtcUi71yEjXBYoQKbiGan-2FUIqh3OHDu0GNOfSVyMcsClml2ebDs2BXJn-2FSPDHqBUAE6Y1cjpsI5mtOQ1kwJeNtimeB52GBB1HaJ1PunDckOuHuDZYiUEMmXL2xfNjrKPx4Iu9MxkHETIfZaolp-2FCak94LJ83vJFXVqSyuIqWpQ528d7lY2SnS2XPOjSjtOt2H6YFHjyJQxwAmEe0ADRIP5S4DMGVY4Gz4mHtTPG00R9mkbsXIYR7v0Sy0D-2BFW43s6MCLeIk86zd7BhY6jgIG6AsUqG-2BBavjmsHptCisd1FhCUfUFsqxybq7-2FaJYRNZbjuKwcx-2BARpRIulGuPHQvcB-2B-2BhVARPtRi6aSy3I2VlkXIxum7Mn8NZJL166-2B1FGS0fpisG4FP1TigXR1EZf7-2F1OXq1YJzFoEx0OzM9MMM1xa8pEu6OUSbTJEPOAUC-2Faq-2F5HGImaF7258sOIfX6rXlhMEM5SFxA3h2UsS05AKPg3qNT0uEs7N0FaLxm1VBHjZzFNw9PYXvfLi-2FT3EIw-2BsS0Dr4wgJNPWWynzzXHxC9pNlAciuRdJu8ExyuByXsaYKQGwLwV10bKZxDhfLF859FAd-2BfvVQc7zOL5lcHBUARqviAKR-2Fg3xpQ4ubFVX9xskmLr4TKHLTTGouyUhkEy8mKopMjObcyeD3P7O HTTP/1.1
    Accept: text/html, application/xhtml+xml, image/jxr, */*
    Accept-Language: en-US
    User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
    Accept-Encoding: gzip, deflate
    Host: url8954.beamfox.io
    Connection: Keep-Alive
    Jan 14, 2021 16:57:03.502927065 CET71INHTTP/1.1 400 Bad Request
    Server: nginx
    Date: Thu, 14 Jan 2021 15:57:03 GMT
    Content-Type: text/html; charset=utf-8
    Content-Length: 291
    Connection: keep-alive
    X-Robots-Tag: noindex, nofollow
    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 57 72 6f 6e 67 20 4c 69 6e 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 3c 68 31 3e 57 72 6f 6e 67 20 4c 69 6e 6b 3c 2f 68 31 3e 3c 70 3e 59 6f 75 20 68 61 76 65 20 63 6c 69 63 6b 65 64 20 6f 6e 20 61 6e 20 69 6e 76 61 6c 69 64 20 6c 69 6e 6b 2e 20 20 50 6c 65 61 73 65 20 6d 61 6b 65 20 73 75 72 65 20 74 68 61 74 20 79 6f 75 20 68 61 76 65 20 74 79 70 65 64 20 74 68 65 20 6c 69 6e 6b 20 63 6f 72 72 65 63 74 6c 79 2e 20 20 49 66 20 61 72 65 20 63 6f 70 79 69 6e 67 20 74 68 69 73 20 6c 69 6e 6b 20 66 72 6f 6d 20 61 20 6d 61 69 6c 20 72 65 61 64 65 72 20 70 6c 65 61 73 65 20 65 6e 73 75 72 65 20 74 68 61 74 20 79 6f 75 20 68 61 76 65 20 63 6f 70 69 65 64 20 61 6c 6c 20 74 68 65 20 6c 69 6e 65 73 20 69 6e 20 74 68 65 20 6c 69 6e 6b 2e 3c 2f 70 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e
    Data Ascii: <html><head><title>Wrong Link</title></head><body><h1>Wrong Link</h1><p>You have clicked on an invalid link. Please make sure that you have typed the link correctly. If are copying this link from a mail reader please ensure that you have copied all the lines in the link.</p></body></html>


    Code Manipulations

    Statistics

    CPU Usage

    Click to jump to process

    Memory Usage

    Click to jump to process

    Behavior

    Click to jump to process

    System Behavior

    General

    Start time:16:57:00
    Start date:14/01/2021
    Path:C:\Program Files\internet explorer\iexplore.exe
    Wow64 process (32bit):false
    Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
    Imagebase:0x7ff6d67f0000
    File size:823560 bytes
    MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low

    General

    Start time:16:57:01
    Start date:14/01/2021
    Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
    Wow64 process (32bit):true
    Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:7020 CREDAT:17410 /prefetch:2
    Imagebase:0x380000
    File size:822536 bytes
    MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low

    Disassembly

    Reset < >