Loading ...

Play interactive tourEdit tour

Analysis Report https://www.soolitaire.com/dcc/index.php

Overview

General Information

Sample URL:https://www.soolitaire.com/dcc/index.php
Analysis ID:344919

Most interesting Screenshot:

Detection

HTMLPhisher
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Phishing site detected (based on shot template match)
Yara detected HtmlPhish_10
Yara detected HtmlPhish_7
Phishing site detected (based on image similarity)
Phishing site detected (based on logo template match)
HTML body contains low number of good links
HTML title does not match URL
Invalid T&C link found
Suspicious form URL found
Uses insecure TLS / SSL version for HTTPS connection

Classification

Startup

  • System is w10x64
  • iexplore.exe (PID: 6928 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 6980 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6928 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Dropped Files

SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\index[1].htmJoeSecurity_HtmlPhish_7Yara detected HtmlPhish_7Joe Security
    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\webmail[1].htmJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
      C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\microsoft[1].htmJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security
        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\office[1].htmJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security

          Sigma Overview

          No Sigma rule has matched

          Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Antivirus / Scanner detection for submitted sampleShow sources
          Source: https://www.soolitaire.com/dcc/index.phpSlashNext: detection malicious, Label: Fake Login Page type: Phishing & Social Engineering
          Source: https://www.soolitaire.com/dcc/index.phpUrlScan: detection malicious, Label: phishing brand: onedrivePerma Link
          Antivirus detection for URL or domainShow sources
          Source: https://www.soolitaire.com/dcc/microsoft.phpSlashNext: Label: Fake Login Page type: Phishing & Social Engineering
          Source: https://www.soolitaire.com/dcc/office.phpSlashNext: Label: Fake Login Page type: Phishing & Social Engineering
          Source: https://www.soolitaire.com/dcc/microsoft.phpUrlScan: Label: phishing brand: microsoftPerma Link
          Source: https://www.soolitaire.com/dcc/webmail.phpSlashNext: Label: Fake Login Page type: Phishing & Social Engineering
          Source: https://www.soolitaire.com/dcc/office.phpUrlScan: Label: phishing brand: office 365Perma Link
          Antivirus detection for dropped fileShow sources
          Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\index[1].htmAvira: detection malicious, Label: HTML/Infected.WebPage.Gen2

          Phishing:

          barindex
          Phishing site detected (based on shot template match)Show sources
          Source: https://www.soolitaire.com/dcc/index.phpMatcher: Template: microsoft matched
          Source: https://www.soolitaire.com/dcc/office.phpMatcher: Template: microsoft matched
          Yara detected HtmlPhish_10Show sources
          Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\webmail[1].htm, type: DROPPED
          Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\microsoft[1].htm, type: DROPPED
          Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\office[1].htm, type: DROPPED
          Yara detected HtmlPhish_7Show sources
          Source: Yara matchFile source: 899552.pages.csv, type: HTML
          Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\index[1].htm, type: DROPPED
          Phishing site detected (based on image similarity)Show sources
          Source: https://www.soolitaire.com/dcc/images/Onedrive-logo.pngMatcher: Found strong image similarity, brand: MicrosoftJump to dropped file
          Phishing site detected (based on logo template match)Show sources
          Source: https://www.soolitaire.com/dcc/microsoft.phpMatcher: Template: microsoft matched
          Source: https://www.soolitaire.com/dcc/office.phpMatcher: Template: onedrive matched
          Source: https://www.soolitaire.com/dcc/microsoft.phpHTTP Parser: Number of links: 0
          Source: https://www.soolitaire.com/dcc/office.phpHTTP Parser: Number of links: 1
          Source: https://www.soolitaire.com/dcc/webmail.phpHTTP Parser: Number of links: 0
          Source: https://www.soolitaire.com/dcc/microsoft.phpHTTP Parser: Number of links: 0
          Source: https://www.soolitaire.com/dcc/office.phpHTTP Parser: Number of links: 1
          Source: https://www.soolitaire.com/dcc/webmail.phpHTTP Parser: Number of links: 0
          Source: https://www.soolitaire.com/dcc/microsoft.phpHTTP Parser: Title: Sign in to your Microsoft account does not match URL
          Source: https://www.soolitaire.com/dcc/office.phpHTTP Parser: Title: One Drive does not match URL
          Source: https://www.soolitaire.com/dcc/webmail.phpHTTP Parser: Title: One Drive does not match URL
          Source: https://www.soolitaire.com/dcc/microsoft.phpHTTP Parser: Title: Sign in to your Microsoft account does not match URL
          Source: https://www.soolitaire.com/dcc/office.phpHTTP Parser: Title: One Drive does not match URL
          Source: https://www.soolitaire.com/dcc/webmail.phpHTTP Parser: Title: One Drive does not match URL
          Source: https://www.soolitaire.com/dcc/office.phpHTTP Parser: Invalid link: Terms of use
          Source: https://www.soolitaire.com/dcc/office.phpHTTP Parser: Invalid link: Privacy & Cookies
          Source: https://www.soolitaire.com/dcc/office.phpHTTP Parser: Invalid link: Terms of use
          Source: https://www.soolitaire.com/dcc/office.phpHTTP Parser: Invalid link: Privacy & Cookies
          Source: https://www.soolitaire.com/dcc/microsoft.phpHTTP Parser: Form action: emailcode/email.php
          Source: https://www.soolitaire.com/dcc/office.phpHTTP Parser: Form action: emailcode/email.php
          Source: https://www.soolitaire.com/dcc/webmail.phpHTTP Parser: Form action: emailcode/email.php
          Source: https://www.soolitaire.com/dcc/microsoft.phpHTTP Parser: Form action: emailcode/email.php
          Source: https://www.soolitaire.com/dcc/office.phpHTTP Parser: Form action: emailcode/email.php
          Source: https://www.soolitaire.com/dcc/webmail.phpHTTP Parser: Form action: emailcode/email.php
          Source: https://www.soolitaire.com/dcc/microsoft.phpHTTP Parser: No <meta name="author".. found
          Source: https://www.soolitaire.com/dcc/office.phpHTTP Parser: No <meta name="author".. found
          Source: https://www.soolitaire.com/dcc/webmail.phpHTTP Parser: No <meta name="author".. found
          Source: https://www.soolitaire.com/dcc/microsoft.phpHTTP Parser: No <meta name="author".. found
          Source: https://www.soolitaire.com/dcc/office.phpHTTP Parser: No <meta name="author".. found
          Source: https://www.soolitaire.com/dcc/webmail.phpHTTP Parser: No <meta name="author".. found
          Source: https://www.soolitaire.com/dcc/microsoft.phpHTTP Parser: No <meta name="copyright".. found
          Source: https://www.soolitaire.com/dcc/office.phpHTTP Parser: No <meta name="copyright".. found
          Source: https://www.soolitaire.com/dcc/webmail.phpHTTP Parser: No <meta name="copyright".. found
          Source: https://www.soolitaire.com/dcc/microsoft.phpHTTP Parser: No <meta name="copyright".. found
          Source: https://www.soolitaire.com/dcc/office.phpHTTP Parser: No <meta name="copyright".. found
          Source: https://www.soolitaire.com/dcc/webmail.phpHTTP Parser: No <meta name="copyright".. found

          Compliance:

          barindex
          Uses insecure TLS / SSL version for HTTPS connectionShow sources
          Source: unknownHTTPS traffic detected: 54.36.91.62:443 -> 192.168.2.4:49737 version: TLS 1.0
          Source: unknownHTTPS traffic detected: 54.36.91.62:443 -> 192.168.2.4:49748 version: TLS 1.0
          Uses new MSVCR DllsShow sources
          Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll
          Uses secure TLS version for HTTPS connectionsShow sources
          Source: unknownHTTPS traffic detected: 104.16.19.94:443 -> 192.168.2.4:49745 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.16.19.94:443 -> 192.168.2.4:49746 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 54.36.91.62:443 -> 192.168.2.4:49742 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 54.36.91.62:443 -> 192.168.2.4:49765 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 54.36.91.62:443 -> 192.168.2.4:49737 version: TLS 1.0
          Source: unknownHTTPS traffic detected: 54.36.91.62:443 -> 192.168.2.4:49748 version: TLS 1.0
          Source: unknownDNS traffic detected: queries for: www.soolitaire.com
          Source: fontawesome-webfont[1].eot.2.dr, font-awesome.min[1].css.2.drString found in binary or memory: http://fontawesome.io
          Source: font-awesome.min[1].css.2.drString found in binary or memory: http://fontawesome.io/license
          Source: fontawesome-webfont[1].eot.2.drString found in binary or memory: http://fontawesome.io/license/
          Source: fontawesome-webfont[1].eot.2.drString found in binary or memory: http://fontawesome.iohttp://fontawesome.iohttp://fontawesome.io/license/http://fontawesome.io/licens
          Source: webmail[1].htm.2.drString found in binary or memory: https://cdnjs.cloudflare.com/ajax/libs/tether/1.4.0/js/tether.min.js
          Source: webmail[1].htm.2.dr, index[1].htm.2.drString found in binary or memory: https://code.jquery.com/jquery-3.1.1.slim.min.js
          Source: style[1].css.2.drString found in binary or memory: https://fonts.googleapis.com/css?family=Open
          Source: css[1].css.2.drString found in binary or memory: https://fonts.gstatic.com/s/opensans/v18/mem5YaGs126MiZpBA-UN7rgOUuhv.woff)
          Source: css[1].css.2.drString found in binary or memory: https://fonts.gstatic.com/s/opensans/v18/mem5YaGs126MiZpBA-UN8rsOUuhv.woff)
          Source: css[1].css.2.drString found in binary or memory: https://fonts.gstatic.com/s/opensans/v18/mem5YaGs126MiZpBA-UN_r8OUuhv.woff)
          Source: css[1].css.2.drString found in binary or memory: https://fonts.gstatic.com/s/opensans/v18/mem5YaGs126MiZpBA-UNirkOUuhv.woff)
          Source: css[1].css.2.drString found in binary or memory: https://fonts.gstatic.com/s/opensans/v18/mem6YaGs126MiZpBA-UFUK0Zdcs.woff)
          Source: css[1].css.2.drString found in binary or memory: https://fonts.gstatic.com/s/opensans/v18/mem8YaGs126MiZpBA-UFVZ0d.woff)
          Source: css[1].css.2.drString found in binary or memory: https://fonts.gstatic.com/s/opensans/v18/memnYaGs126MiZpBA-UFUKW-U9hrIqU.woff)
          Source: css[1].css.2.drString found in binary or memory: https://fonts.gstatic.com/s/opensans/v18/memnYaGs126MiZpBA-UFUKWiUNhrIqU.woff)
          Source: css[1].css.2.drString found in binary or memory: https://fonts.gstatic.com/s/opensans/v18/memnYaGs126MiZpBA-UFUKWyV9hrIqU.woff)
          Source: css[1].css.2.drString found in binary or memory: https://fonts.gstatic.com/s/opensans/v18/memnYaGs126MiZpBA-UFUKXGUdhrIqU.woff)
          Source: bootstrap.min[1].js.2.dr, bootstrap.min[1].css.2.dr, bootstrap.min[1].js0.2.drString found in binary or memory: https://getbootstrap.com)
          Source: bootstrap.min[1].js.2.dr, bootstrap.min[1].css.2.drString found in binary or memory: https://github.com/twbs/bootstrap/blob/master/LICENSE)
          Source: bootstrap.min[1].js.2.dr, bootstrap.min[1].js0.2.drString found in binary or memory: https://github.com/twbs/bootstrap/graphs/contributors)
          Source: webmail[1].htm.2.drString found in binary or memory: https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0-alpha.6/css/bootstrap.min.css
          Source: webmail[1].htm.2.drString found in binary or memory: https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0-alpha.6/js/bootstrap.min.js
          Source: webmail[1].htm.2.drString found in binary or memory: https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css
          Source: microsoft[1].htm.2.drString found in binary or memory: https://signup.live.com
          Source: {F9E9CE38-609A-11EB-90EB-ECF4BBEA1588}.dat.1.drString found in binary or memory: https://www.soolitaire.com/dcc/index.php
          Source: {F9E9CE38-609A-11EB-90EB-ECF4BBEA1588}.dat.1.drString found in binary or memory: https://www.soolitaire.com/dcc/index.phpRoot
          Source: {F9E9CE38-609A-11EB-90EB-ECF4BBEA1588}.dat.1.drString found in binary or memory: https://www.soolitaire.com/dcc/index.phpr
          Source: {F9E9CE38-609A-11EB-90EB-ECF4BBEA1588}.dat.1.drString found in binary or memory: https://www.soolitaire.com/dcc/microsoft.php
          Source: {F9E9CE38-609A-11EB-90EB-ECF4BBEA1588}.dat.1.drString found in binary or memory: https://www.soolitaire.com/dcc/microsoft.phpBSign
          Source: ~DF3B883E258AEB335F.TMP.1.drString found in binary or memory: https://www.soolitaire.com/dcc/microsoft.phpz
          Source: {F9E9CE38-609A-11EB-90EB-ECF4BBEA1588}.dat.1.dr, ~DF3B883E258AEB335F.TMP.1.drString found in binary or memory: https://www.soolitaire.com/dcc/office.php
          Source: ~DF3B883E258AEB335F.TMP.1.drString found in binary or memory: https://www.soolitaire.com/dcc/office.phpUser
          Source: {F9E9CE38-609A-11EB-90EB-ECF4BBEA1588}.dat.1.dr, ~DF3B883E258AEB335F.TMP.1.drString found in binary or memory: https://www.soolitaire.com/dcc/webmail.php
          Source: ~DF3B883E258AEB335F.TMP.1.drString found in binary or memory: https://www.soolitaire.com/dcc/webmail.phpv
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
          Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
          Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
          Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
          Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
          Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
          Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
          Source: unknownHTTPS traffic detected: 104.16.19.94:443 -> 192.168.2.4:49745 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 104.16.19.94:443 -> 192.168.2.4:49746 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 54.36.91.62:443 -> 192.168.2.4:49742 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 54.36.91.62:443 -> 192.168.2.4:49765 version: TLS 1.2
          Source: classification engineClassification label: mal96.phis.win@3/40@5/3
          Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{F9E9CE36-609A-11EB-90EB-ECF4BBEA1588}.datJump to behavior
          Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DF7FE88D6B64492613.TMPJump to behavior
          Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
          Source: unknownProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6928 CREDAT:17410 /prefetch:2
          Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6928 CREDAT:17410 /prefetch:2
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Masquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or Information1Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

          Behavior Graph

          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          https://www.soolitaire.com/dcc/index.php0%Avira URL Cloudsafe
          https://www.soolitaire.com/dcc/index.php100%SlashNextFake Login Page type: Phishing & Social Engineering
          https://www.soolitaire.com/dcc/index.php100%UrlScanphishing brand: onedriveBrowse

          Dropped Files

          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\index[1].htm100%AviraHTML/Infected.WebPage.Gen2

          Unpacked PE Files

          No Antivirus matches

          Domains

          No Antivirus matches

          URLs

          SourceDetectionScannerLabelLink
          https://www.soolitaire.com/dcc/microsoft.php100%SlashNextFake Login Page type: Phishing & Social Engineering
          https://www.soolitaire.com/dcc/office.php100%SlashNextFake Login Page type: Phishing & Social Engineering
          https://www.soolitaire.com/dcc/microsoft.php100%UrlScanphishing brand: microsoftBrowse
          https://www.soolitaire.com/dcc/webmail.php100%SlashNextFake Login Page type: Phishing & Social Engineering
          https://www.soolitaire.com/dcc/office.php100%UrlScanphishing brand: office 365Browse
          https://www.soolitaire.com/dcc/office.phpUser0%Avira URL Cloudsafe
          http://fontawesome.iohttp://fontawesome.iohttp://fontawesome.io/license/http://fontawesome.io/licens0%Avira URL Cloudsafe
          https://www.soolitaire.com/dcc/microsoft.phpBSign0%Avira URL Cloudsafe
          https://getbootstrap.com)0%Avira URL Cloudsafe
          https://www.soolitaire.com/dcc/index.phpRoot0%Avira URL Cloudsafe
          https://www.soolitaire.com/dcc/webmail.phpv0%Avira URL Cloudsafe
          https://www.soolitaire.com/dcc/index.phpr0%Avira URL Cloudsafe
          https://www.soolitaire.com/dcc/microsoft.phpz0%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          cdnjs.cloudflare.com
          104.16.19.94
          truefalse
            high
            www.soolitaire.com
            54.36.91.62
            truefalse
              unknown
              code.jquery.com
              unknown
              unknownfalse
                high
                maxcdn.bootstrapcdn.com
                unknown
                unknownfalse
                  high

                  Contacted URLs

                  NameMaliciousAntivirus DetectionReputation
                  https://www.soolitaire.com/dcc/index.phptrue
                    unknown
                    https://www.soolitaire.com/dcc/office.phptrue
                    • 100%, UrlScan, Browse
                    • SlashNext: Fake Login Page type: Phishing & Social Engineering
                    unknown
                    https://www.soolitaire.com/dcc/microsoft.phptrue
                    • 100%, UrlScan, Browse
                    • SlashNext: Fake Login Page type: Phishing & Social Engineering
                    unknown
                    https://www.soolitaire.com/dcc/webmail.phptrue
                    • SlashNext: Fake Login Page type: Phishing & Social Engineering
                    unknown

                    URLs from Memory and Binaries

                    NameSourceMaliciousAntivirus DetectionReputation
                    https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0-alpha.6/css/bootstrap.min.csswebmail[1].htm.2.drfalse
                      high
                      http://fontawesome.iofontawesome-webfont[1].eot.2.dr, font-awesome.min[1].css.2.drfalse
                        high
                        https://www.soolitaire.com/dcc/office.phpUser~DF3B883E258AEB335F.TMP.1.drtrue
                        • Avira URL Cloud: safe
                        unknown
                        http://fontawesome.iohttp://fontawesome.iohttp://fontawesome.io/license/http://fontawesome.io/licensfontawesome-webfont[1].eot.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://signup.live.commicrosoft[1].htm.2.drfalse
                          high
                          https://www.soolitaire.com/dcc/microsoft.phpBSign{F9E9CE38-609A-11EB-90EB-ECF4BBEA1588}.dat.1.drtrue
                          • Avira URL Cloud: safe
                          unknown
                          https://www.soolitaire.com/dcc/webmail.php{F9E9CE38-609A-11EB-90EB-ECF4BBEA1588}.dat.1.dr, ~DF3B883E258AEB335F.TMP.1.drtrue
                          • SlashNext: Fake Login Page type: Phishing & Social Engineering
                          unknown
                          https://www.soolitaire.com/dcc/index.php{F9E9CE38-609A-11EB-90EB-ECF4BBEA1588}.dat.1.drtrue
                            unknown
                            http://fontawesome.io/licensefont-awesome.min[1].css.2.drfalse
                              high
                              http://fontawesome.io/license/fontawesome-webfont[1].eot.2.drfalse
                                high
                                https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.csswebmail[1].htm.2.drfalse
                                  high
                                  https://code.jquery.com/jquery-3.1.1.slim.min.jswebmail[1].htm.2.dr, index[1].htm.2.drfalse
                                    high
                                    https://github.com/twbs/bootstrap/graphs/contributors)bootstrap.min[1].js.2.dr, bootstrap.min[1].js0.2.drfalse
                                      high
                                      https://cdnjs.cloudflare.com/ajax/libs/tether/1.4.0/js/tether.min.jswebmail[1].htm.2.drfalse
                                        high
                                        https://getbootstrap.com)bootstrap.min[1].js.2.dr, bootstrap.min[1].css.2.dr, bootstrap.min[1].js0.2.drfalse
                                        • Avira URL Cloud: safe
                                        low
                                        https://www.soolitaire.com/dcc/index.phpRoot{F9E9CE38-609A-11EB-90EB-ECF4BBEA1588}.dat.1.drtrue
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://www.soolitaire.com/dcc/office.php{F9E9CE38-609A-11EB-90EB-ECF4BBEA1588}.dat.1.dr, ~DF3B883E258AEB335F.TMP.1.drtrue
                                        • 100%, UrlScan, Browse
                                        • SlashNext: Fake Login Page type: Phishing & Social Engineering
                                        unknown
                                        https://www.soolitaire.com/dcc/webmail.phpv~DF3B883E258AEB335F.TMP.1.drtrue
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://github.com/twbs/bootstrap/blob/master/LICENSE)bootstrap.min[1].js.2.dr, bootstrap.min[1].css.2.drfalse
                                          high
                                          https://www.soolitaire.com/dcc/microsoft.php{F9E9CE38-609A-11EB-90EB-ECF4BBEA1588}.dat.1.drtrue
                                          • 100%, UrlScan, Browse
                                          • SlashNext: Fake Login Page type: Phishing & Social Engineering
                                          unknown
                                          https://www.soolitaire.com/dcc/index.phpr{F9E9CE38-609A-11EB-90EB-ECF4BBEA1588}.dat.1.drtrue
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0-alpha.6/js/bootstrap.min.jswebmail[1].htm.2.drfalse
                                            high
                                            https://www.soolitaire.com/dcc/microsoft.phpz~DF3B883E258AEB335F.TMP.1.drtrue
                                            • Avira URL Cloud: safe
                                            unknown

                                            Contacted IPs

                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs

                                            Public

                                            IPDomainCountryFlagASNASN NameMalicious
                                            54.36.91.62
                                            unknownFrance
                                            16276OVHFRfalse
                                            104.16.19.94
                                            unknownUnited States
                                            13335CLOUDFLARENETUSfalse

                                            Private

                                            IP
                                            192.168.2.1

                                            General Information

                                            Joe Sandbox Version:31.0.0 Emerald
                                            Analysis ID:344919
                                            Start date:27.01.2021
                                            Start time:13:25:29
                                            Joe Sandbox Product:CloudBasic
                                            Overall analysis duration:0h 3m 55s
                                            Hypervisor based Inspection enabled:false
                                            Report type:light
                                            Cookbook file name:browseurl.jbs
                                            Sample URL:https://www.soolitaire.com/dcc/index.php
                                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                            Number of analysed new started processes analysed:8
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Detection:MAL
                                            Classification:mal96.phis.win@3/40@5/3
                                            Cookbook Comments:
                                            • Adjust boot time
                                            • Enable AMSI
                                            • Browsing link: https://www.soolitaire.com/dcc/office.php
                                            • Browsing link: https://www.soolitaire.com/dcc/microsoft.php
                                            • Browsing link: https://www.soolitaire.com/dcc/webmail.php
                                            Warnings:
                                            Show All
                                            • Exclude process from analysis (whitelisted): taskhostw.exe, BackgroundTransferHost.exe, ielowutil.exe, backgroundTaskHost.exe, svchost.exe
                                            • TCP Packets have been reduced to 100
                                            • Excluded IPs from analysis (whitelisted): 13.64.90.137, 52.147.198.201, 104.108.39.131, 209.197.3.24, 172.217.23.74, 172.217.23.131, 209.197.3.15, 51.104.139.180, 152.199.19.161, 52.155.217.156
                                            • Excluded domains from analysis (whitelisted): gstaticadssl.l.google.com, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, skypedataprdcolwus17.cloudapp.net, cds.s5x3j6q5.hwcdn.net, fonts.googleapis.com, arc.msn.com.nsatc.net, fonts.gstatic.com, ie9comview.vo.msecnd.net, displaycatalog.md.mp.microsoft.com.akadns.net, arc.msn.com, skypedataprdcoleus16.cloudapp.net, e11290.dspg.akamaiedge.net, iecvlist.microsoft.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, go.microsoft.com, blobcollector.events.data.trafficmanager.net, go.microsoft.com.edgekey.net, cds.j3z9t3p6.hwcdn.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, cs9.wpc.v0cdn.net
                                            • Report size getting too big, too many NtDeviceIoControlFile calls found.

                                            Simulations

                                            Behavior and APIs

                                            No simulations

                                            Joe Sandbox View / Context

                                            IPs

                                            No context

                                            Domains

                                            No context

                                            ASN

                                            No context

                                            JA3 Fingerprints

                                            No context

                                            Dropped Files

                                            No context

                                            Created / dropped Files

                                            C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{F9E9CE36-609A-11EB-90EB-ECF4BBEA1588}.dat
                                            Process:C:\Program Files\internet explorer\iexplore.exe
                                            File Type:Microsoft Word Document
                                            Category:dropped
                                            Size (bytes):30296
                                            Entropy (8bit):1.8523348576588183
                                            Encrypted:false
                                            SSDEEP:192:rbZlZ/2EN9WEVtEVifEoH5zME1dhBEU7DESsfE7HkjX:rtLuyUodGKxRax
                                            MD5:3603C0BE6EB9CE95DFA6892BA02154CC
                                            SHA1:01D5C4C7233CEF47D93E3B83474F6F51FA1E499D
                                            SHA-256:ADBC1297664487E643677592989DE2AB4B91B616A664268E2F4C41EFB1B62AEF
                                            SHA-512:A17497EB72C547E91BD297D1210C3C06EA2BE80E4A5D1C162920E6DB6A3BF5D040C541A085B067337D2B737B3CE2DA9F039B9C8810A920723A3D265FD37CC1D2
                                            Malicious:false
                                            Reputation:low
                                            Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{F9E9CE38-609A-11EB-90EB-ECF4BBEA1588}.dat
                                            Process:C:\Program Files\internet explorer\iexplore.exe
                                            File Type:Microsoft Word Document
                                            Category:dropped
                                            Size (bytes):63424
                                            Entropy (8bit):2.1484478388830164
                                            Encrypted:false
                                            SSDEEP:384:rsQUkDhEvG8i9VFM3nMucUBaApn14MJsXnXhKxjKkUFrRqJCZR:ik2cK90Vf
                                            MD5:185F82E8E390D8655AAACD0F9556905B
                                            SHA1:27A40A7004BDF97552EBD892A3C925EDD83B3BC9
                                            SHA-256:2DBA96469BC4A159683A94EC542B448EDED7B956A5E6F23C34A15C7BD883C21E
                                            SHA-512:F2D56CC2F2086AF058B3CC24B332D013196C8042459D70C8926A0FB6A61381FBC95C3195AE382B7ACFEE710D93A1010CAA04332DC50E03CA857F22226AB164D6
                                            Malicious:false
                                            Reputation:low
                                            Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{F9E9CE39-609A-11EB-90EB-ECF4BBEA1588}.dat
                                            Process:C:\Program Files\internet explorer\iexplore.exe
                                            File Type:Microsoft Word Document
                                            Category:dropped
                                            Size (bytes):16984
                                            Entropy (8bit):1.5664338622309757
                                            Encrypted:false
                                            SSDEEP:48:IwCGcpr8GwpaZG4pQRGrapbS4/rGQpK2G7HpRK/sTGIpG:r2Z0Q76hBS4/FAhTK/4A
                                            MD5:912BFC6CAFF4C85E0294DA29AD6B1CE1
                                            SHA1:DE1CD92D7373A056D43BA157C2C01E6719E10BF4
                                            SHA-256:625878DA31419229A8013FEF76DC0262F3204C55E64B83C8D69001D477EE6A69
                                            SHA-512:2AAD5A386C6FDADB3B18B5051BAF2BA1DBCABEEB805B56B891DF760F74B016E6C5BC9C8E3588B89FF58B06561B9DAA4E1EB933E7478F01C132F9D4BB0D52A96A
                                            Malicious:false
                                            Reputation:low
                                            Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\Onedrive-logo[1].png
                                            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            File Type:PNG image data, 170 x 114, 8-bit colormap, non-interlaced
                                            Category:downloaded
                                            Size (bytes):4423
                                            Entropy (8bit):7.924731439527259
                                            Encrypted:false
                                            SSDEEP:96:hYNgH0x07J2QQZHs6JKaDsZV3ZN/C+5bGUR3vUcmt1B3:INQEHx5Dcbal1d
                                            MD5:FFC68AE7FD5A2D7A7CEC7185717B6E88
                                            SHA1:ABBCEBC2E0794C8F30DF0035881D4405D3A1D69B
                                            SHA-256:4603EA1B2F9DF0C9D4F2A253C550FFBAF27EA2CB53ECDE4277B2ACF9DDE33979
                                            SHA-512:F90CABBC9E1F2A1F8386C9C6C51729FC6678D35EAD9C0B7C02D50E5413BA88F5BE0B45327761B0C4617D8D2A2109EEF887A1F486F919BF554A6089AF8ED5C236
                                            Malicious:false
                                            Reputation:low
                                            IE Cache URL:https://www.soolitaire.com/dcc/images/Onedrive-logo.png
                                            Preview: .PNG........IHDR.......r............PLTE..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................+.....tRNS.........8........=.UP0&..~!...hW+....J.u.....vkZ...dL?..............`[F...............C3................mk['"......pT.........|?!.........|m-...........WTPHB;94.............
                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\bootstrap.min[1].js
                                            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            File Type:ASCII text, with very long lines
                                            Category:downloaded
                                            Size (bytes):46653
                                            Entropy (8bit):5.34222480854161
                                            Encrypted:false
                                            SSDEEP:768:JVCgM5KXrrcsU0n3fEHVAqcy6jOD0Ydkg+/ONU65Z+o+fSNx7eXs/ZWSMEMGLle9:JVjMyrcsU0nvRJOhzGqNxi8/866
                                            MD5:0827A0BDCD9A917990EEE461A77DD33E
                                            SHA1:6107D146E54A67C9998230ABF839301575D05702
                                            SHA-256:FA421B6EBBD2FB474D3A3866409CE6C1EFD120B47FF256FFFB8F8F50D556D3D9
                                            SHA-512:B3E3C2B2CFC0458AD8EC9957D4A78CF09C660163317F10BC786CFE014D2104A7AAE3D2DA2F898B6CCB20FFF0385604D9E47E1C410D492BFECAB667993BBA727A
                                            Malicious:false
                                            Reputation:low
                                            IE Cache URL:https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0-alpha.6/js/bootstrap.min.js
                                            Preview: /*!. * Bootstrap v4.0.0-alpha.6 (https://getbootstrap.com). * Copyright 2011-2017 The Bootstrap Authors (https://github.com/twbs/bootstrap/graphs/contributors). * Licensed under MIT (https://github.com/twbs/bootstrap/blob/master/LICENSE). */.if("undefined"==typeof jQuery)throw new Error("Bootstrap's JavaScript requires jQuery. jQuery must be included before Bootstrap's JavaScript.");+function(t){var e=t.fn.jquery.split(" ")[0].split(".");if(e[0]<2&&e[1]<9||1==e[0]&&9==e[1]&&e[2]<1||e[0]>=4)throw new Error("Bootstrap's JavaScript requires at least jQuery v1.9.1 but less than v4.0.0")}(jQuery),+function(){function t(t,e){if(!t)throw new ReferenceError("this hasn't been initialised - super() hasn't been called");return!e||"object"!=typeof e&&"function"!=typeof e?t:e}function e(t,e){if("function"!=typeof e&&null!==e)throw new TypeError("Super expression must either be null or a function, not "+typeof e);t.prototype=Object.create(e&&e.prototype,{constructor:{value:t,enumerable:!1,writable:!
                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\fontawesome-webfont[1].eot
                                            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            File Type:Embedded OpenType (EOT), FontAwesome family
                                            Category:downloaded
                                            Size (bytes):165742
                                            Entropy (8bit):6.705073372195656
                                            Encrypted:false
                                            SSDEEP:3072:qbhEnD+IzsU9z9QJ6/P3Xe2iEiEPGFCMW1JVJG6wVTDsk6BmG6S1yKshojskO+b2:qenD+IzsU9z9QJ6/PO2FiEP2C/DVJG6I
                                            MD5:674F50D287A8C48DC19BA404D20FE713
                                            SHA1:D980C2CE873DC43AF460D4D572D441304499F400
                                            SHA-256:7BFCAB6DB99D5CFBF1705CA0536DDC78585432CC5FA41BBD7AD0F009033B2979
                                            SHA-512:C160D3D77E67EFF986043461693B2A831E1175F579490D7F0B411005EA81BD4F5850FF534F6721B727C002973F3F9027EA960FAC4317D37DB1D4CB53EC9D343A
                                            Malicious:false
                                            Reputation:low
                                            IE Cache URL:https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0/fonts/fontawesome-webfont.eot?
                                            Preview: n.................................LP........................Yx.....................F.o.n.t.A.w.e.s.o.m.e.....R.e.g.u.l.a.r...$.V.e.r.s.i.o.n. .4...7...0. .2.0.1.6.....F.o.n.t.A.w.e.s.o.m.e................PFFTMk.G.........GDEF.......p... OS/2.2z@...X...`cmap..:.........gasp.......h....glyf...M......L.head...-.......6hhea...........$hmtxEy..........loca...\........maxp.,.....8... name....gh....post......k....u.........xY_.<..........3.2.....3.2.................................................................'...............@.........i.........3.......3...s................................pyrs.@. ........................... .....p.....U.............................................]...............................................y...n.......................................2.......................................@...................................................................................................................................................z..............................
                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\index[1].htm
                                            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            File Type:HTML document, ASCII text
                                            Category:downloaded
                                            Size (bytes):2166
                                            Entropy (8bit):4.783348469787835
                                            Encrypted:false
                                            SSDEEP:48:4JvzHBDB6EVxh9UBuyptGQIVeeLYOOGnj:63T9UECErVLYk
                                            MD5:8E16ACA17D79C4A7BBC9A76A49119560
                                            SHA1:DC4D66B46EDCAC7E747F5923D8838C91818C33E7
                                            SHA-256:84F1D1FFDC036768FFEBA1BE92362DCF619E7CE6EC27500AB47844ED24FC4230
                                            SHA-512:8E177DE65CF480E390C93CB4FB623F581612B8B596C04C7513E728C5493F8249A47D8ADA89A0E1CEB034291C80A7FB1960DE718FF896A33019A223E09CF65482
                                            Malicious:true
                                            Yara Hits:
                                            • Rule: JoeSecurity_HtmlPhish_7, Description: Yara detected HtmlPhish_7, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\index[1].htm, Author: Joe Security
                                            Antivirus:
                                            • Antivirus: Avira, Detection: 100%
                                            Reputation:low
                                            IE Cache URL:https://www.soolitaire.com/dcc/index.php
                                            Preview: .<!DOCTYPE html>.<html lang="en">. <head>. Required meta tags -->. <meta charset="utf-8">. <meta http-equiv="content-type" content="text/html" />. <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">. <title>One Drive</title>.. Bootstrap CSS -->. <link rel="stylesheet" href="css/bootstrap.min.css">. <link rel="stylesheet" type="text/css" href="css/style.css">. jQuery first, then Tether, then Bootstrap JS. -->..</head>.<body>..<div class="onedrivepage">. <div class="container">. <div class="row">. <div class="col-md-3 col-lg-3 col-sm-3 col-xs-3">. </div>. <div class="col-md-6 col-lg-6 col-sm-6 col-xs-12">. <div class="onedriveform">. <div class="logo">. <img class="img-fluid" src="images/Onedrive-logo.png" alt="Onedrive-logo.png" />. </div>. <p>To read the document, please
                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\landing-devices-bg[1].jpg
                                            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1200x800, frames 3
                                            Category:downloaded
                                            Size (bytes):160872
                                            Entropy (8bit):7.983227926427131
                                            Encrypted:false
                                            SSDEEP:3072:2uSUXBjNQkwlonMsi5EixPv7LxYLHV0zXIHTQaihnyga+:2dUXN4lqLixPv7t2QXCQaid9
                                            MD5:55174EA1C3DF4966ED13D25A6223999D
                                            SHA1:FA1E418627CE2C16FF594A9615B1D53E5F676FFF
                                            SHA-256:C86C4A6731077F1994A8CAECCB1FC06477EA35A5B6ABBB4ABDE1D06B8EF9FF32
                                            SHA-512:BD5FB38C3BBCCD3F9C7E9E21DE86CD5C1846CF54406FB999649D76CD92D98214585BF00554FE44AE63B97EC9E30252D36CEDD39459A365ECF54E110911D8CEAD
                                            Malicious:false
                                            Reputation:low
                                            IE Cache URL:https://www.soolitaire.com/dcc/images/landing-devices-bg.jpg
                                            Preview: ......JFIF.............C....................................!*$..( ..%2%(,-/0/.#484.7*./....C....................................................................... .......................................................................................=... @..... ....'.W].8 @........ .......hS....A J.....s.....2j.l.!m..C..M& ...8..0.8... p`@..!.....;.......5..$0..!0.a"g#.UN.3.NT.D.L.D.sz.OO.y..D..b(.g!.|...o.9.8.WK..\....LK..@i.Y...N.M..56.mR./`.@...A..A.......(9...;,@......RET.n".....F....BT.8.Wf$_?...oAVd...M...`!...H.46...4...80 d8& d pL`HA..U...p.'?..$C... .....C.i...D......G/.S..../..M.D.is..3.5..0..5b...y.C.t.Z....".n5....m\..sb...B..................*.75.-.Q.....PEA..D.....e....@.r ..l.O..LLv..\.Y.U..F.....4...l..6.6........&$ @........=w....>../...j...17c;..^..|..l...(.....4..L6N...+:r.yW..Y..u\.N\.O2T....8^;.~..g..f.x.x...}.=.....qj..V)['.l........... @......V.L.....l...@(....R... N9.@.!Y.q|..d.)..y.q....)...h..l..&.a.0.h... @.....@...!......../
                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\memnYaGs126MiZpBA-UFUKW-U9hrIqU[1].woff
                                            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            File Type:Web Open Font Format, TrueType, length 17788, version 1.1
                                            Category:downloaded
                                            Size (bytes):17788
                                            Entropy (8bit):7.967181593577758
                                            Encrypted:false
                                            SSDEEP:384:Vp3UxvLq7eMDKdiXVYFbQk9YlD/XmhJGSiQ3L+CEW/9fE+QH:jgjq7ejOQMUeD/AGO6CB/98+QH
                                            MD5:92DA6F116D973BD334CF9B3AFDB29C4F
                                            SHA1:C7E59C92F4D8391276FB0A3A55528CF3965478E7
                                            SHA-256:49B6274BCCB5C6B31E20CEBB213D96197B522B1FB9C95B8649A0626EDB5BD9D8
                                            SHA-512:B3483F5137EAE074BDC95262B8C5D6049C4E7AF276F3EB1DDC3097ED3FBFB2C43110341B78E0B388E6B9B5D186168CD86DA324496CB08F909C60FEBFB3E207B9
                                            Malicious:false
                                            Reputation:low
                                            IE Cache URL:https://fonts.gstatic.com/s/opensans/v18/memnYaGs126MiZpBA-UFUKW-U9hrIqU.woff
                                            Preview: wOFF......E|......f.........................GDEF................GPOS................GSUB.......X...t...OS/2.......]...`....cmap...`.........X..cvt .......o........fpgm............s.ugasp...(...........#glyf...8..4...N.-.W.head..=0...6...6....hhea..=h..."...$....hmtx..=....8.....|&.loca..?.........P..maxp..A.... ... ....name..A..........8Gtpost..B........x.I..prep..D`.......@..R.........................................x...5.A......m."gW..`.L..&N".?.......IF....a.^...b1..................Uh."4...>..=x.%..@0...?.%.N.O:Zg..TjL...Bk..-.a ..5.j.F...`...^..3.V.P..P.4..c....[..]..9.... ..T(.q...x.\.!..q......#aff...#1Q@.'U..@5.".llt.Aa#.f|c.W.....'..X..!..C...ITPE.;..V.j......0. .L0E...Yd.mN....:.....F....GG.g.s,x.>0....v..I;o..<.$G9.\f2...e(}.IS2..uc]p.........M.x.c.a.g.c..$KY...e@.,..".9....x........3............e..=L.....`.Q..1.Q........uF.F[F}Fe........-.p....... ..x.TGw.F........)..)7.W..`*.j.-...=*'_..sI...2...O>....[tt....TK]..|...G..............^.m..=..x
                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\microbg[1].jpg
                                            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1920x1080, frames 3
                                            Category:downloaded
                                            Size (bytes):259416
                                            Entropy (8bit):7.9781594411712575
                                            Encrypted:false
                                            SSDEEP:6144:fCbqQ5UnngLOssLz8NL7c9Iw9uQdsAPJWN:foZqnnIIv8NHc9Iw9ugZi
                                            MD5:C58B50331BCDD1C2B4FFB5E7A456E08A
                                            SHA1:2D4E7108635F07451A2578D9F847BDC4023F279D
                                            SHA-256:2777ABE0312E6B49428D5D7F7F42E43AF620793F86F823F2E045968AFBDDDB63
                                            SHA-512:BC269C47452E49097C1CF91EA527408234263C7039FAEA08EE57F80E53FC6F813737C07FFF0731D40AB1AE2A9AFCACC1E1433F4A0C8A36F3860DC32FF42ED6A6
                                            Malicious:false
                                            Reputation:low
                                            IE Cache URL:https://www.soolitaire.com/dcc/images/microbg.jpg
                                            Preview: ......JFIF.............C.....................................%...#... , #&')*)..-0-(0%()(...C...........(...((((((((((((((((((((((((((((((((((((((((((((((((((......8........................................................................................$_..H..0.$ FH.....@`.....2P.....$Hc..T..TB.d1.. ..$.'.1.......V0....@..v...B.J........$.......@..Y.. .",.U$.T.!.@+.B..... .q...........@ ....(..U@...*"P@.@......J.L.6.@.0....D......D1....h..P.1..D...Y....T..@.`.I...C....1.#..`1.d....(.+.............f........@ ..,...A3.6%..%..!...(B.... ..@ .....B....@ .....V..."...J.$.@....$N$. ..0.&D........%(!....p.B....I1.!..H-.H.*.!$@@...............0......v....(..N..+.'h9........ ...#... ..V..X.....Q..!..V(@!..A..@ . ..@...H.. ....$.h!."...@%d@..........2$.., ......... ..`0Y..+..`..2J..!.....dU.T..c..d..A`.5......:..).:...t+..j.B@............L..$A.E .B...l.....$@ .P..)....B.......... ....D.*.....B.....f.Q..D..1.....2DR 0....0...8T....5c..bFJ.+..cY.0.C...B.BG.]9ZJ...j!.`0..Pp.0........ ..
                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\microsoftlogo[1].png
                                            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            File Type:PNG image data, 115 x 26, 8-bit colormap, non-interlaced
                                            Category:downloaded
                                            Size (bytes):697
                                            Entropy (8bit):7.573455613491714
                                            Encrypted:false
                                            SSDEEP:12:6v/7CZCVY4qjw64PjBxIpZDyGhCRGk0gOEsX09+tg+I/fux2KMiHxqDCDl3MAuk9:bZCVY4qjA7BGZDjhC0hVEKS+I+71RVCq
                                            MD5:E8F6445B7B7F0B26B63CD135E8BB3B3D
                                            SHA1:52C38CDD5696EE485D076F1B0FE40032B1BC608D
                                            SHA-256:089AA7FA65A4038B4AB9130D083E6BCC24B0E33F5018984EF1463B8516BC7993
                                            SHA-512:9AECE19461CF95558FA97EB0D7FB9D7CB5133FC31D651F76EA8B29986B4EBD1FB9D70B6D35DB13EFB9E27E0F6C71595D54B029E8673A37C39329450AF2898B76
                                            Malicious:false
                                            Reputation:low
                                            IE Cache URL:https://www.soolitaire.com/dcc/images/microsoftlogo.png
                                            Preview: .PNG........IHDR...s..........f.F...KPLTE...sss..3~........=..>...O3....N3.O4............{{{...................O3..$...)IDATH..... ....U........KhE;....[Z.....@..#m..,.g..I.->....-..._f..r.?..... 1.......+.L.&1LD..&.g.q...............D.j..=.b.{...I....7...+.....{......$.I.....4..m...B.Ef..v.....g3((c....r.......C'..]=.O.w...J$..3a..Dx.`.cY...1\..8k.IeZ.Z$...:..x..\.,.I.........-]^.g.1..8_Ke.D.......`b....a.KAr....y...p...U*3.+.%.`...za-.X8>.W..9g6..\0Q...7.....1R.(...bJ.:u..0.8.0.Po(.=N...)[s.1]..,........V.ucN..P.K.4~.LY;...#..A......Ll..*L.N..,D!_1C.U.Ju.........O.....C.JnO.^k/.).h.?....Pq..'..2.)c..?&.9.\..k.s.I.........q6..}`.S........U.....IEND.B`.
                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\office[1].png
                                            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            File Type:PNG image data, 512 x 512, 8-bit colormap, non-interlaced
                                            Category:downloaded
                                            Size (bytes):6290
                                            Entropy (8bit):7.704429943211795
                                            Encrypted:false
                                            SSDEEP:192:5PesVaBqtC11xXiQU2SrR9PDD+2p4SWnR3m4UMWx:Zwyi3iQZSrRBDHmfHUMe
                                            MD5:1AC039422D7C9CEE436B2CAE5C00BD8C
                                            SHA1:60D9B9A6E2DF337578C35472344F1387775046D8
                                            SHA-256:1500514ADF9E666A3D20530815DF881BC94812C6906A53BD4C216D051D18C372
                                            SHA-512:03B225379AD1B46E3AF9AA3218812AED61D70431B17D75842E3CD426DBD960E940FB8C127F8D9DF7251039034A43848CE3EB612ED7B98D9A69050AF7CE7B0D7B
                                            Malicious:false
                                            Reputation:low
                                            IE Cache URL:https://www.soolitaire.com/dcc/images/office.png
                                            Preview: .PNG........IHDR..............$.....PLTE....'..)..'..,..)..*..*..(..(..)..-..'..(..(..)..*..)..*..-..*..'..)..+..+..+..,..,..+..(..,..+..+..+..+..+..(..+..+..*..,..<.....8..'..:........zQ.......5..;..2..0.....8.....9..7..6.....@..2..I..5..F..P..B..8...........M..e5.0...q.\*.4..1.....c.X%.T .3..,........j..X..y.].oC.a0.../..+................~....-..wM.i;.:...........=.....sH....l?.5..........(...........7..2..;..;..*..0......)tRNS......................cVPA-...\jfsH..7z=.s;....IDATx...i..A...gfr..ksm...e2..$fF...[RH.$. l9.UTa.../...E.;..}......t....................................*...=..L4#...i..&.m................#...l%DA..].........=.zn.....hn.........q.v.....5....o..J!..,....]..5....n....n.iw]........M..r$....n.i....k..Z&R... ..]Q.....+.....5P.hq.....J..;:...Zv..A..M.\.._s.Q2Z.=.........Z...)......._........t.o..".&.,........RK$.%m...Cm{n.DQ...:0....$..)..7.v...@5\....n=.y.pU......UIY.:x...*.H...{.X%.Uc..>.X........>..K.x.....6.i.I.`......
                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\bootstrap.min[1].js
                                            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            File Type:ASCII text, with very long lines
                                            Category:downloaded
                                            Size (bytes):48944
                                            Entropy (8bit):5.272507874206726
                                            Encrypted:false
                                            SSDEEP:768:9VG5R15WbHVKZrycEHSYro34CrSLB6WU/6DqBf4l1B:9VIRuo53XiwWTvl1B
                                            MD5:14D449EB8876FA55E1EF3C2CC52B0C17
                                            SHA1:A9545831803B1359CFEED47E3B4D6BAE68E40E99
                                            SHA-256:E7ED36CEEE5450B4243BBC35188AFABDFB4280C7C57597001DE0ED167299B01B
                                            SHA-512:00D9069B9BD29AD0DAA0503F341D67549CCE28E888E1AFFD1A2A45B64A4C1BC460D81CFC4751857F991F2F4FB3D2572FD97FCA651BA0C2B0255530209B182F22
                                            Malicious:false
                                            Reputation:low
                                            IE Cache URL:https://www.soolitaire.com/dcc/js/bootstrap.min.js
                                            Preview: /*!. * Bootstrap v4.0.0 (https://getbootstrap.com). * Copyright 2011-2018 The Bootstrap Authors (https://github.com/twbs/bootstrap/graphs/contributors). * Licensed under MIT (https://github.com/twbs/bootstrap/blob/master/LICENSE). */.!function(t,e){"object"==typeof exports&&"undefined"!=typeof module?e(exports,require("jquery"),require("popper.js")):"function"==typeof define&&define.amd?define(["exports","jquery","popper.js"],e):e(t.bootstrap={},t.jQuery,t.Popper)}(this,function(t,e,n){"use strict";function i(t,e){for(var n=0;n<e.length;n++){var i=e[n];i.enumerable=i.enumerable||!1,i.configurable=!0,"value"in i&&(i.writable=!0),Object.defineProperty(t,i.key,i)}}function s(t,e,n){return e&&i(t.prototype,e),n&&i(t,n),t}function r(){return(r=Object.assign||function(t){for(var e=1;e<arguments.length;e++){var n=arguments[e];for(var i in n)Object.prototype.hasOwnProperty.call(n,i)&&(t[i]=n[i])}return t}).apply(this,arguments)}e=e&&e.hasOwnProperty("default")?e.default:e,n=n&&n.hasOwnProp
                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\memnYaGs126MiZpBA-UFUKWiUNhrIqU[1].woff
                                            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            File Type:Web Open Font Format, TrueType, length 17452, version 1.1
                                            Category:downloaded
                                            Size (bytes):17452
                                            Entropy (8bit):7.960788191365059
                                            Encrypted:false
                                            SSDEEP:384:gVRT8VGShcBuPgTnSzgEuY86rgt710WmLonjMKsZMQAZ:s3ShcBuASzgEuYPNn0nDRQAZ
                                            MD5:BF72679CA22E53320BEAEA090E8BB07D
                                            SHA1:F3BAA33E986EC10D6F0C8211A826242441D52CC7
                                            SHA-256:1E742589D91A4B7E3888284A43A73675F312D3D6C4E78B3B76EBC36292646100
                                            SHA-512:F8FFC70E2E187EFBC785A52959BB26F605FEFB904D27B73EA4E1012DCC35569A78144751F761AA30D7B4AB0E5951B91322EA322BAF792C18E359C2ED79BBAF6E
                                            Malicious:false
                                            Reputation:low
                                            IE Cache URL:https://fonts.gstatic.com/s/opensans/v18/memnYaGs126MiZpBA-UFUKWiUNhrIqU.woff
                                            Preview: wOFF......D,......eT........................GDEF................GPOS................GSUB.......X...t...OS/2.......]...`....cmap...`.........X..cvt .......b.....g.ifpgm...x........s.ugasp................glyf...(..3...NH7X..head..<....6...6..{.hhea..<T..."...$...ahmtx..<x...).....>/Sloca..>............maxp..@l... ... .x..name..@.........)/C.post..A........x.I..prep..C<...................................................x...5.A......m."gW..`.L..&N".?.......IF....a.^...b1..................Uh."4...>..=x.c`f9......u..1...<.f........................b.. 0t.vfPdP...M...C.G/S....|..K..6 .....t......x.\.!..q......#aff...#1Q@.'U..@5.".llt.Aa#.f|c.W.....'..X..!..C...ITPE.;..V.j......0. .L0E...Yd.mN....:.....F....GG.g.s,x.>0....v..I;o..<.$G9.\f2...e(}.IS2..uc]p.........M.x.c.a.g.c..$KY...e@.,q........x........3...........%..=.d.......#..6.e..L@6.3.e.....1._....#...x.TGw.F........)..)7.W..`*.j.-...=*'_..sI...2...O>....[tt....TK]..|...G..............^.m..=..x.q...+./].p
                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\memnYaGs126MiZpBA-UFUKWyV9hrIqU[1].woff
                                            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            File Type:Web Open Font Format, TrueType, length 17668, version 1.1
                                            Category:downloaded
                                            Size (bytes):17668
                                            Entropy (8bit):7.9576211916710635
                                            Encrypted:false
                                            SSDEEP:384:TQHZiJiLqdJVOpEbXHYV0cIeLg8hDHNbCqe+WQN:NWuV1X/eRHNbCqefQN
                                            MD5:793B1237017AEACD646FB80911425566
                                            SHA1:51E3023140BE407FD5FBFD27E0A5D2C30AE66F31
                                            SHA-256:5BB07410994C14D60F72CE3F6E19B172FCD7BC515F9BAEAF1F74C6CC2216E86A
                                            SHA-512:95C6644C1C1A2E369075D429E86736491451431C6046BA74545C0BF91C1CABEA1B1A4FCFD8FC5BB6A37269E4F80AF5B792BF80C968EC6A3B8B325F33EC66331D
                                            Malicious:false
                                            Reputation:low
                                            IE Cache URL:https://fonts.gstatic.com/s/opensans/v18/memnYaGs126MiZpBA-UFUKWyV9hrIqU.woff
                                            Preview: wOFF......E.......c.........................GDEF................GPOS................GSUB.......X...t...OS/2.......]...`~...cmap...`.........X..cvt .......^.....M..fpgm...t........~a..gasp...............#glyf... ..4...Lv$.#.head..<....6...6./{.hhea..=...."...$....hmtx..=4...@....}.K.loca..?t..........*maxp..A4... ... ....name..AT........*.D9post..BD.......x.I..prep..D........$...J........................................x...5.A......m."gW..`.L..&N".?.......IF....a.^...b1..................Uh."4...>..=x.%..@@.@.....T.2..Q.1dB...!.j@..}(../y..]...V....b.b.D#5/....(..v.p....'e.7.......@@?.9.....x.\.!..q......#aff...#1Q@.'U..@5.".llt.Aa#.f|c.W.....'..X..!..C...ITPE.;..V.j......0. .L0E...Yd.mN....:.....F....GG.g.s,x.>0....v..I;o..<.$G9.\f2...e(}.IS2..uc]p.........M.x.c.a.g.c.. .P...,..`....b`....C..D@$P..)._............a .p@.0.(.@.8. ..0....a8.............x.uTGw.F........)..)7.W.$`*.....G.Kz.)e....t.|.1.7...s.g...3.7mgf..~{1...s.3.S...co..o.~.Zy.u...kW.\.t...N
                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\microsoft[1].htm
                                            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            File Type:HTML document, UTF-8 Unicode text, with very long lines
                                            Category:downloaded
                                            Size (bytes):9024
                                            Entropy (8bit):5.166012612353405
                                            Encrypted:false
                                            SSDEEP:96:RL9O4DZ+Stb/jY+eo4hAryAes9mBYYQgWLDmvhGzoxLuPPDlcOyeBLYYnNdt72tR:x9ToSBjlevudl9nkwMx0NYYN/mma
                                            MD5:194A696F4791F00E3EE45EE623B297BA
                                            SHA1:D4C37DBF09D37E41FE3B1148759BB356428ED9FF
                                            SHA-256:B660C97B75CB903D7EC5D6C4E73163DC6CB8BB33508B630601777CF0ED33DF62
                                            SHA-512:DB91431F817E990CDD5195DA2E1394D3F8495B58175B1573F9BF7C4EC0F4ACFDDD9885C52CA3C666D4A5BAE83975E2203473444BC6EF5677436B84D4EEBEF2AC
                                            Malicious:true
                                            Yara Hits:
                                            • Rule: JoeSecurity_HtmlPhish_10, Description: Yara detected HtmlPhish_10, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\microsoft[1].htm, Author: Joe Security
                                            Reputation:low
                                            IE Cache URL:https://www.soolitaire.com/dcc/microsoft.php
                                            Preview: <!DOCTYPE html>.<html lang="en">. <head>. Required meta tags -->. <meta charset="utf-8">. <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">. <title>Sign in to your Microsoft account</title>.... <link rel="stylesheet" href="css/bootstrap.min.css">. Font Awesome CSS -->. <link rel="stylesheet" type="text/css" href="https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css">. Bootstrap CSS -->. <link rel="stylesheet" type="text/css" href="css/style.css">..</head>.<body>.<div class="wrap">..<div class="micro-bg">. .<div class="outer">. .<div class="middle">. ...<div class="inner">. .<div class="banner">. .<svg xmlns="http://www.w3.org/2000/svg" width="108" height="24" viewBox="0 0 108 24"><title>assets</title><path d="M44.836,4.6V18.4h-2.4V7.583H42.4L38.119,18.4H36.531L32.142,7.583h-.029V18.4H29.9V4.6h3.436L37.3,14.83h.058L41.545,4.6Zm2,1.049a1.268,1.268,0,0,1,
                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\officebg[1].jpg
                                            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, progressive, precision 8, 1420x1080, frames 3
                                            Category:downloaded
                                            Size (bytes):199781
                                            Entropy (8bit):7.986685505356506
                                            Encrypted:false
                                            SSDEEP:3072:GqroO3SvvO1a2DzHMuaXi8NHYpw97qefRS1XATbNr31uR+lGjcobBKTyl6XUV1:Uvv69Mlxpd5qXAThr31urDboT/q1
                                            MD5:058E25C4AA0FCCB6A280E543B4C108E8
                                            SHA1:05AF10D488E0651737E4AE510DF17DA2166463DA
                                            SHA-256:7A2C0B0E1E16041B12DD1A7D18438CEB14063C980799BAEE1D55CB2F04892777
                                            SHA-512:D98759E65DA318FD8092B5E03C9875FB782C7DBA4C01DD85FCACFA4E5747F2C105A96F04C9032F977554229D425CBBA9254692CB5AA4841F401BCC31A481FE7F
                                            Malicious:false
                                            Reputation:low
                                            IE Cache URL:https://www.soolitaire.com/dcc/images/officebg.jpg
                                            Preview: ......JFIF.............C...........................%!'&$!$#).;2),8,#$3F48=?BCB(1HMH@M;AB?...C...........?*$*??????????????????????????????????????????????????......8....".................................................................................X.>.....:...p..:....Q...Q.......b.[...Q.@.9.8t...).T..a......+....t...YC...;0+H.D...V......7Q........].P.............:........;.............t9..FH.T.93...qj-....*.."r..Wst.Pj.6.Q..J.....j0.c.....?@(S...........9.X.>jQ...}(...J_....../Dc.E.@.@9.8t+.Bxt..(...w...0.1@....(. a..(......[..>..=..;....u..v>~._.."...+..t.Wc<L&.(J . ........V..L. ..... ....:......s..0......`j..!'..?P...:..qX.....tf.L.5&...f.....&_T.O.jnf.K.S3..-I.7s.:fp.dQ:.e..9........(....8...............t.{.w..%F.F.A.FR..T......@.......B..s.................z>~.N............1....7P...0.8.HF.....>........N.w.t........:0....Kf......$..@O...j.....4`H..D.K...rk'.F..."'*Pi.8._....N.......{Q.3...dEp.K]....H.k...f.V$n.s.t8..!q..@..?...|.....>..q...y>....@...
                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\officelogo[1].png
                                            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            File Type:PNG image data, 163 x 75, 8-bit colormap, non-interlaced
                                            Category:downloaded
                                            Size (bytes):1223
                                            Entropy (8bit):7.435397013783005
                                            Encrypted:false
                                            SSDEEP:24:gidVU+bg/fKMNezOpBlETR/CjB3EUlKd1i4hDHm+IH7AsbX:gidVU+M/CisOTlzjB3EUlK/iqmrH7R
                                            MD5:8DB2ADD18C0D34794B35DEEE1FDC14DB
                                            SHA1:6E72801F98A832E9193A4D9F4389AEAE1E5233DD
                                            SHA-256:EFACCC2B190FCCE0F0AB41064D882FB4A701C6AED6B1035595A16138E32A0A50
                                            SHA-512:FC0FEC864045DE68E355E61E3DDAFB103BA5E2ABCD5838ECCB80AEB55200F4659719A15CF25E1BCEC1F631B0F4F4319F18C662E526714E9EBBF56131CC7AEA05
                                            Malicious:false
                                            Reputation:low
                                            IE Cache URL:https://www.soolitaire.com/dcc/images/officelogo.png
                                            Preview: .PNG........IHDR.......K.....+..]....PLTE....<..<..<..<..<..<..<..<..<..<..<..<..<..<..<..<..<..<..<..<..<..<..<..<..<..<..<..<..<..<..<..<..<..<..<..<..<..<..<..<..<..<..<..<..<..<..<..<..<........1tRNS..a....Y.+..}...p2...T...gJ!..v^.=9...D&.O..8.......IDATh...0.FCep@.AP..q.z.....B..V.-....?.....D...@ .......D3.&.3.5..).C...E...t...{..l}..r...?....c../.I/..e...\........{..#..5n.....r.r.......1........W.v....b}Lf.e."5.(H..a...K.?..rc........rG...m.>......X.%J.......gA..."?.........}...W...u....y..U..1cW..!........W.f...3....`...4....+..px(..Q.T.N......M...6.qeU..y.t........4X.5...........+...cs..8..-.U&h.n.._..w..i`..!....(a.}E.N(_o`L.78.l76..c......Zq.."2...b...n.'...".tkN..op..:..Gv..2.*.2.w..8...Z..A+.O..{G.E.....<.5w......G.1..j..`...k2.;juG....W.A..H...T...........3.i=v.g.!`5C..+.....1.Y(.g..X?.S4.v...C..EF<s\.Q.1..9Y.;...8...'.......}mUY......4{.........8%O.W@N8;z..9..g...o...#96.e...".3..vG..)Ug.]...G.O+Z...w.x../;&..8r.P...~.).8...b.
                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\style[1].css
                                            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            File Type:ASCII text
                                            Category:downloaded
                                            Size (bytes):10337
                                            Entropy (8bit):5.053529450520048
                                            Encrypted:false
                                            SSDEEP:192:4Sz3AzsAkFTF5tjlFTLqlHq0QU9esLF5zqH72V2LFs:4a34kFTFVFTmK0X9ZLFeRs
                                            MD5:D7E5A2610E445E4E5295375628B2840E
                                            SHA1:21B405254F363060EBC4D4204391F92921169FDC
                                            SHA-256:8979F584623E4307A42BD008D755C35456AF8CB96BEC89DD4FBEC47036E20184
                                            SHA-512:5B7411A8B6804B8181D3ED969C0356F101C2DC25A8B22BDDD84D96D554D0D83AD92592D18A38FE848B659D74A1566B4DB24BF8B4E296ECA8FB715E1F59A59645
                                            Malicious:false
                                            Reputation:low
                                            IE Cache URL:https://www.soolitaire.com/dcc/css/style.css
                                            Preview: @import url('https://fonts.googleapis.com/css?family=Open+Sans:300,300i,400,400i,600,600i,700,700i,800,800i');...wrap {..overflow:hidden;.}.a:hover,a:focus {..text-decoration:none;.}..btn:focus {..box-shadow: none;.}.img {..max-width:100%;.}..webmaillogo.{. text-align: center;.}..webmaillogo img.{. margin-top: 125px;.}..webmailloginform.{. width: 300px;. margin:20px auto;.}..orangeclr .input-group-addon.{. color: #ec6933;. border-color: #ec6933;.}..sgnup {. font-weight: 400;. color: #2872dd;. border-radius: 0;. padding: 0;. font-size: 13px;. margin-top: 15px;.}..onedrivepage.{..background: url("../images/landing-devices-bg.jpg");..background-repeat: no-repeat;..background-size: cover;.}..onedriveform .{..background: #0078d7;..padding: 20px 70px 50px 70px;..min-height: 100vh;.}..logo.{..text-align: center;.}..logo img.{..margin-top: 31px;.}..onedriveform p.{. font-family: 'Open Sans', sans-serif;. text-align: center;. color: #fff;. font-
                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9026IKNJ\webmaillogo[1].png
                                            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            File Type:PNG image data, 322 x 50, 8-bit colormap, non-interlaced
                                            Category:downloaded
                                            Size (bytes):2869
                                            Entropy (8bit):7.911258790344632
                                            Encrypted:false
                                            SSDEEP:48:zUrFP7iiGbmCytjS8WTZgoQWY+BCJdfJCSrUyGfwZAq53AQkvQg9wTIIs9:zUrd7JG8tOLTyoQj+B5SrUfe1pg9wTIh
                                            MD5:85F7EBDACD174413927BD4B787997558
                                            SHA1:B03207C7F3EA92E9EA0EBDC2F804947CC726965D
                                            SHA-256:E298D32D99708F56D68EF9CD0C44EC85910A4DF7552B5B2041FCAA48D5EE9742
                                            SHA-512:0806DCF23E25EF775838F30C919ABB18E49B889E24EC56FA1045EFE26406C595A13E98B437A6E0BF87A3EE66888D6B37A14825500D93C856973F4BB3C5F7818E
                                            Malicious:false
                                            Reputation:low
                                            IE Cache URL:https://www.soolitaire.com/dcc/images/webmaillogo.png
                                            Preview: .PNG........IHDR...B...2......&".....PLTE.i3.......t7.P.l........n3.m3.q3....|C...v:....Y.I........................y.b....e................T.x>.......}..........s.q..].M......i.......%.E...HIDATh..m{.@..gR...B"B.z."......#..ds...k...'..F...;>T...[..pX.s.....y.d?...s[..:\....P.1.h..~...)...T.5.....v.....(1.S.D....Lh[z`.W.mz.......%D.X"0..`..0)v..=..D....y..7..B.X..Z.`h.....\.t......*.d.:.G...r....X&&..`...c......K..."d...W...V...]....7jk...Eh.p..\..s..).~.....T......~+6..".uJx.<.x..k.q..pB.....*..u.%.6%.-.....?e9B#.odJ..Pl|Y.....:-...20..)#..$jm4...%l.fJ.I."{..W.{......\&.....*.,.p.pj.K.[...n.o'\.Z...\*4.Oz....%..r).C..v...8...#2.....<.a.z.IT[h^M...E./6..G^.._.v.~0ju..b..j..........k9..\..3.8..S.9...-.H..):O..~Sw....;).jr......K..F...~.m&u..iD...!0..j...o..>..i.2..P>mWG.{..!."..I...Rx..B[g.U.}s.g..s...o....G...)~...,.....1..$......<...b.`.....Qu...w5.X..].oQQ.%3*....~.=.%.1e....N..U..`@..m%....LR"K.#...:.8c*...D..._..
                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\css[1].css
                                            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            File Type:ASCII text
                                            Category:dropped
                                            Size (bytes):1887
                                            Entropy (8bit):5.187998229445049
                                            Encrypted:false
                                            SSDEEP:48:SY3QW9Y3QLZY3QxTGY3QC7Y3Qw6QOWGOLpOxTvOChOw6b:SYgW9YgLZYgxTGYgC7Ygw6QOWGOLpOxo
                                            MD5:7AD11B51C8A9918ADE502DA9DE063EFF
                                            SHA1:ABF598711588628073EE60E294F288AB76EA187A
                                            SHA-256:5A270BD50EF12A93ABAE711C806D6C59D58B0E0D2A9B3463A8268DC3D2EA6857
                                            SHA-512:6932EACAB01B2443439A31537BC694BB6F611473BE6FC702DBCA92BC2DE27736F2A363744F14CCCDE7C05E660ACCADDA66523E5068371EFBDD8551B2375458EA
                                            Malicious:false
                                            Reputation:low
                                            Preview: @font-face {. font-family: 'Open Sans';. font-style: italic;. font-weight: 300;. src: url(https://fonts.gstatic.com/s/opensans/v18/memnYaGs126MiZpBA-UFUKWyV9hrIqU.woff) format('woff');.}.@font-face {. font-family: 'Open Sans';. font-style: italic;. font-weight: 400;. src: url(https://fonts.gstatic.com/s/opensans/v18/mem6YaGs126MiZpBA-UFUK0Zdcs.woff) format('woff');.}.@font-face {. font-family: 'Open Sans';. font-style: italic;. font-weight: 600;. src: url(https://fonts.gstatic.com/s/opensans/v18/memnYaGs126MiZpBA-UFUKXGUdhrIqU.woff) format('woff');.}.@font-face {. font-family: 'Open Sans';. font-style: italic;. font-weight: 700;. src: url(https://fonts.gstatic.com/s/opensans/v18/memnYaGs126MiZpBA-UFUKWiUNhrIqU.woff) format('woff');.}.@font-face {. font-family: 'Open Sans';. font-style: italic;. font-weight: 800;. src: url(https://fonts.gstatic.com/s/opensans/v18/memnYaGs126MiZpBA-UFUKW-U9hrIqU.woff) format('woff');.}.@font-face {. font-family: 'Open Sans';. font-s
                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\mem5YaGs126MiZpBA-UN7rgOUuhv[1].woff
                                            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            File Type:Web Open Font Format, TrueType, length 18900, version 1.1
                                            Category:downloaded
                                            Size (bytes):18900
                                            Entropy (8bit):7.96514104643824
                                            Encrypted:false
                                            SSDEEP:384:nejx4dDcsFhu/3v79dEAUdH6XSw1fz9fKQm9LQNG/X1epB:ejadDrhYTf3Udaieza98Nbz
                                            MD5:1F85E92D8FF443980BC0F83AD7B23B60
                                            SHA1:EE8642C4FAE325BB460EC29C0C2C9AD8A4C7817D
                                            SHA-256:EA20E5DB3BA915C503173FAE268445FC2745FC9A5DCE2F58D47F5A355E1CDB18
                                            SHA-512:F34099C30F35F782C8BB2B92D7F44549013D90E9EEDE13816D4C7380147D5B2C8373CC4D858CDF3248AAA8A73948350340EE57DAE9734038FC80615848C7133E
                                            Malicious:false
                                            Reputation:low
                                            IE Cache URL:https://fonts.gstatic.com/s/opensans/v18/mem5YaGs126MiZpBA-UN7rgOUuhv.woff
                                            Preview: wOFF......I.......p.........................GDEF................GPOS................GSUB.......X...t...OS/2.......^...`....cmap...`.........X..cvt .......].....-..fpgm...t........s.ugasp................glyf...$..9...Y..(.head..A....6...6.%I.hhea..B,.......$.)..hmtx..BL..........O,loca..D`........9yfmaxp..F$... ... .q..name..FD........#.>.post..G4.......x.U..prep..H............k........................................x...5.A......m."gW..`.L..&N".?.......IF....a.^...b1..................Uh."4...>..=x.c`f.g......:....Q.B3_dHc.........................@`......../..?....^...... 9.8.m@J....w..!..x.\.!..q......#aff...#1Q@.'U..@5.".llt.Aa#.f|c.W.....'..X..!..C...ITPE.;..V.j......0. .L0E...Yd.mN....:.....F....GG.g.s,x.>0....v..I;o..<.$G9.\f2...e(}.IS2..uc]p.........M.x.c.a.g``..$KY...e@.,q@.j...o@<..O.H.t.................c .p@..........3lbd.....-.}.M...!...!....x.TGw.F........)..)7.W..`*.j.-...=*'_..sI...2...O>....[tt....TK]..|...G..............^.m..=..x.q...+./].p...
                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\mem5YaGs126MiZpBA-UN8rsOUuhv[1].woff
                                            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            File Type:Web Open Font Format, TrueType, length 19072, version 1.1
                                            Category:downloaded
                                            Size (bytes):19072
                                            Entropy (8bit):7.966673384993769
                                            Encrypted:false
                                            SSDEEP:384:UCwUC2nJxPRk+P/Qvm6DBM1W71wcdDmyBE+2fweE9m0aGuTeopiH:PJC2nJxP++P/36QWpwNyb2tqgk
                                            MD5:05EBDBE10796850F045FCD484F35788D
                                            SHA1:07744CFE76B8C37096443A6BCC3FBD04F93AD05B
                                            SHA-256:35EB714D45479FE35586513C7D372CED0AE3E26EB05883950BEA2669C6E802AA
                                            SHA-512:D4F293115640C05E3134D635AA077BC91BF35E80463C93C14646D97784CD9FC8D4CD4E10EEAA7BE621DBD9FA0DE5BE943328014ED505C217E61769F76BFA7F40
                                            Malicious:false
                                            Reputation:low
                                            IE Cache URL:https://fonts.gstatic.com/s/opensans/v18/mem5YaGs126MiZpBA-UN8rsOUuhv.woff
                                            Preview: wOFF......J.......p.........................GDEF................GPOS................GSUB.......X...t...OS/2.......^...`...vcmap...`.........X..cvt .......g.....o.[fpgm...|........s.ugasp... ...........#glyf...0..:"..Yr....head..BT...6...6....hhea..B........$....hmtx..B....*....#.C.loca..D.........n..maxp..F.... ... ....name..F.........%.@cpost..G........x.U..prep..Ip.......1..S........................................x...5.A......m."gW..`.L..&N".?.......IF....a.^...b1..................Uh."4...>..=x.c`f.cV``e``..j...(.../2.11s01qs.1s.01.400.300x......:.;380(...&.O.....)B..q>H.%.u..R``........x.\.!..q......#aff...#1Q@.'U..@5.".llt.Aa#.f|c.W.....'..X..!..C...ITPE.;..V.j......0. .L0E...Yd.mN....:.....F....GG.g.s,x.>0....v..I;o..<.$G9.\f2...e(}.IS2..uc]p.........M.x.c.a.g``..$K..(..`.e.a.a`....C..L..@t.............A..L..&..............1\gta.e....320.0...2.g.j...=...x.TGw.F........)..)7.W..`*.j.-...=*'_..sI...2...O>....[tt....TK]..|...G..............^.m..=..x.q...+.
                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\mem5YaGs126MiZpBA-UN_r8OUuhv[1].woff
                                            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            File Type:Web Open Font Format, TrueType, length 18668, version 1.1
                                            Category:downloaded
                                            Size (bytes):18668
                                            Entropy (8bit):7.969106009002288
                                            Encrypted:false
                                            SSDEEP:384:Wv4QHZChiRh3lwLOf8cWN78NXpcr6gBUA9CD/q4cOPZmPO:WvwhNOkvvxC7qnc
                                            MD5:A7622F60C56DDD5301549A786B54E6E6
                                            SHA1:D55574524345932DB3968C675E1AEA08C68A456F
                                            SHA-256:6E8A28A0638C920E5B76177E5F03BA94FCDEDD3E3ECD347C333D82876B51C9C0
                                            SHA-512:1A842E5EDFFFFBAE353AD16545D9886E3E176755F22B86ECCC9B8B010FC79DB7194B7C5518CC190BF5B78B332C7D542B70A6A53B3BAF23366708DF348C2C2D49
                                            Malicious:false
                                            Reputation:low
                                            IE Cache URL:https://fonts.gstatic.com/s/opensans/v18/mem5YaGs126MiZpBA-UN_r8OUuhv.woff
                                            Preview: wOFF......H.......n0........................GDEF................GPOS................GSUB.......X...t...OS/2.......^...`}...cmap...`.........X..cvt .......]........fpgm...t........~a..gasp...............#glyf... ..8...WP..M.head..@....6...6..F.hhea..A........$...chmtx..A8.........._{loca..CL........K.4&maxp..E.... ... ....name..E0........"c?Jpost..F........x.U..prep..G........:..]........................................x...5.A......m."gW..`.L..&N".?.......IF....a.^...b1..................Uh."4...>..=x.c`fig.a`e``..j...(.../2.1..`b.ffcfeabbi``Pg``..b.. 0t.vfp`P...M...C.G/S....|...=.6 .....m/....x.\.!..q......#aff...#1Q@.'U..@5.".llt.Aa#.f|c.W.....'..X..!..C...ITPE.;..V.j......0. .L0E...Yd.mN....:.....F....GG.g.s,x.>0....v..I;o..<.$G9.\f2...e(}.IS2..uc]p.........M.x.c.a.g.c..$K..$..`.g.e........ .......R.g......?......x.)d...........$...."....0.#.A@X..0......x.uTGw.F........)..)7.W.$`*.....G.Kz.)e....t.|.1.7...s.g...3.7mgf..~{1...s.3.S...co..o.~.Zy.u...kW.\.t...N
                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\mem5YaGs126MiZpBA-UNirkOUuhv[1].woff
                                            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            File Type:Web Open Font Format, TrueType, length 18696, version 1.1
                                            Category:downloaded
                                            Size (bytes):18696
                                            Entropy (8bit):7.96597476007567
                                            Encrypted:false
                                            SSDEEP:384:yeQHZsdOZKOIVrf0uvAxZEw5w7Yc3XGi/L6:dBbVwuvAYYw7THc
                                            MD5:449D681CD6006390E1BEE3C3A660430B
                                            SHA1:2A9777AFC07BF0BB4BB48F233ED7C4BCBDB60760
                                            SHA-256:57C79375B1419EE1D984F443CDA77C04B9B38C0BE5330B2D41D65103115FFD72
                                            SHA-512:8B8436670BB4D742AFA60ABA29D7A78F3788CBEF9353C2896AA492618CF1B22E9A0679972AB930E2F2D4732F3B979C023D25AA0FA86C813AC674524FD4ECA2BE
                                            Malicious:false
                                            Reputation:low
                                            IE Cache URL:https://fonts.gstatic.com/s/opensans/v18/mem5YaGs126MiZpBA-UNirkOUuhv.woff
                                            Preview: wOFF......I.......m.........................GDEF................GPOS................GSUB.......X...t...OS/2.......^...`.-..cmap...`.........X..cvt .......[.......4fpgm...p........~a..gasp................glyf......8...W.J.4.head..A....6...6...Mhhea..A<.......$...#hmtx..A\... .....lT.loca..C|........6..umaxp..E@... ... .t..name..E`........#.@Ppost..FP.......x.U..prep..H.........x..n........................................x...5.A......m."gW..`.L..&N".?.......IF....a.^...b1..................Uh."4...>..=x.c`fy.......:....Q.B3_dHc.........................@`........./..?....^...... 9. .m@J..........x.\.!..q......#aff...#1Q@.'U..@5.".llt.Aa#.f|c.W.....'..X..!..C...ITPE.;..V.j......0. .L0E...Yd.mN....:.....F....GG.g.s,x.>0....v..I;o..<.$G9.\f2...e(}.IS2..uc]p.........M.x.c.a.g.c..$KY...e@.,A.".m....x.......3......?.[.o...2...:...a..b.)@.Y.....v1.b4d...36 ..x.uTGw.F........)..)7.W.$`*.....G.Kz.)e....t.|.1.7...s.g...3.7mgf..~{1...s.3.S...co..o.~.Zy.u...kW.\.t...N.KG.
                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\mem6YaGs126MiZpBA-UFUK0Zdcs[1].woff
                                            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            File Type:Web Open Font Format, TrueType, length 17440, version 1.1
                                            Category:downloaded
                                            Size (bytes):17440
                                            Entropy (8bit):7.962704570077627
                                            Encrypted:false
                                            SSDEEP:384:2QHZz7pdg60gyjkXImq2+GTFGc+Hq8pMG2dKQWS:9HTyAYa+GIHzyKQX
                                            MD5:06B4BFDA4E139EAF3AB9872A6D66F42F
                                            SHA1:E5C5999D6AF4869BC60EEA92D1A8C328FB0E1378
                                            SHA-256:39EC493A5A688A85B60A1E889A22CFB93F23C900E0FDC0BE8AB8543DC9DAA783
                                            SHA-512:D6665B3CDD7E759D4A2B1BF916654A9C7FCA24ACBEBA1FB4A75668F5B451C7542B5683C097A6A62ACCE76B98694A4F6847CE2DC5193113D02200A04EC85A65B8
                                            Malicious:false
                                            Reputation:low
                                            IE Cache URL:https://fonts.gstatic.com/s/opensans/v18/mem6YaGs126MiZpBA-UFUK0Zdcs.woff
                                            Preview: wOFF......D ......d@........................GDEF................GPOS................GSUB.......X...t...OS/2.......]...`~l.=cmap...`.........X..cvt .......W........fpgm...l........~a..gasp...............#glyf......4...M..o*.head..< ...6...6..z.hhea..<X..."...$. ..hmtx..<|...*.....=A.loca..>.........\|.maxp..@h... ... ....name..@.........%`@.post..At.......x.I..prep..C0........T...........................................x...5.A......m."gW..`.L..&N".?.......IF....a.^...b1..................Uh."4...>..=x.c`f.f......:....Q.B3_dHcb```.fccfeabbi``P..x......:.;302(...&.O.....)B..q>H..u..R``..?i.....x.\.!..q......#aff...#1Q@.'U..@5.".llt.Aa#.f|c.W.....'..X..!..C...ITPE.;..V.j......0. .L0E...Yd.mN....:.....F....GG.g.s,x.>0....v..I;o..<.$G9.\f2...e(}.IS2..uc]p.........M.x.c.a.g.c..$KY...e@.,.."..........?.....g....Z...[..5..=.d.......p.a.C?C..L...FF~..,...x.uTGw.F........)..)7.W.$`*.....G.Kz.)e....t.|.1.7...s.g...3.7mgf..~{1...s.3.S...co..o.~.Zy.u...kW.\.t...N.KG.....
                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\mem8YaGs126MiZpBA-UFVZ0d[1].woff
                                            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            File Type:Web Open Font Format, TrueType, length 18100, version 1.1
                                            Category:downloaded
                                            Size (bytes):18100
                                            Entropy (8bit):7.962027637722169
                                            Encrypted:false
                                            SSDEEP:384:aHQHZuiZQFFIimUy1oml4hN2Vmw1Qa57YC74ObDDj08X0UJQiXc:1ZQT0UySml4bEmAP5EC7PbDH4U1M
                                            MD5:DE0869E324680C99EFA1250515B4B41C
                                            SHA1:8033A128504F11145EA791E481E3CF79DCD290E2
                                            SHA-256:81F0EC27796225EA29F9F1C7B74F083EDCD7BC97A09D5FC4E8D03C0134E62445
                                            SHA-512:CD616DB99B91C6CBF427969F715197D54287BAFA60C3B58B93FF7837C21A6AAC1A984451AEEB9E07FD5B1B0EC465FE020ACBE1BFF8320E1628E970DDF37B0F0E
                                            Malicious:false
                                            Reputation:low
                                            IE Cache URL:https://fonts.gstatic.com/s/opensans/v18/mem8YaGs126MiZpBA-UFVZ0d.woff
                                            Preview: wOFF......F.......i.........................GDEF................GPOS................GSUB.......X...t...OS/2.......^...`~]..cmap...`.........X..cvt .......Y.....M..fpgm...p........~a..gasp...............#glyf......6...S...]head..>....6...6..cphhea..>........$....hmtx..?...........[$loca..A4.........f..maxp..B.... ... ....name..C.........&:A.post..D........x.U..prep..E.........C...........................................x...5.A......m."gW..`.L..&N".?.......IF....a.^...b1..................Uh."4...>..=x.c`f..8.....u..1...<.f...................A......5....1...A.._6..".-..L.....Ar,......3..(....x.\.!..q......#aff...#1Q@.'U..@5.".llt.Aa#.f|c.W.....'..X..!..C...ITPE.;..V.j......0. .L0E...Yd.mN....:.....F....GG.g.s,x.>0....v..I;o..<.$G9.\f2...e(}.IS2..uc]p.........M.x.c.a.g.c..$KY...e@.,.."..........?....%.g....Z.....(".o..Y..Bu342.e......0..........M=.....x.uTGw.F........)..)7.W.$`*.....G.Kz.)e....t.|.1.7...s.g...3.7mgf..~{1...s.3.S...co..o.~.Zy.u...kW.\.t...N.KG.
                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\memnYaGs126MiZpBA-UFUKXGUdhrIqU[1].woff
                                            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            File Type:Web Open Font Format, TrueType, length 17492, version 1.1
                                            Category:downloaded
                                            Size (bytes):17492
                                            Entropy (8bit):7.957749340429713
                                            Encrypted:false
                                            SSDEEP:384:bQHZhYs3a6PsVt9W9Z3owyC3bSZjyVO9Gz8W6EaJQgacXcK1cDVQgx:gq6PMK9Z3WCyc5z6lnXcYcxQU
                                            MD5:56E5756B696615D6164A625E1BCB1A9E
                                            SHA1:E2AEF56F577DBB78254066B73C2D0FBE30B40AE0
                                            SHA-256:BB87838929C15E1D0A05693C375323B95B6B4690FE207D3639E3A432C44AEF35
                                            SHA-512:BB998858AB9DF11375B0844EA008D31ABE4377826F6BE73C6F1DDE2E85C6F9A0404FADFDA9C081318F2F59614A22A1CF7F32376B25232887EDE8C7FBA323CB12
                                            Malicious:false
                                            Reputation:low
                                            IE Cache URL:https://fonts.gstatic.com/s/opensans/v18/memnYaGs126MiZpBA-UFUKXGUdhrIqU.woff
                                            Preview: wOFF......DT......dD........................GDEF................GPOS................GSUB.......X...t...OS/2.......]...`.7.rcmap...`.........X..cvt .......^........fpgm...t........~a..gasp................glyf......4 ..M4.]2.head..<<...6...6..zghhea..<t..."...$.{.@hmtx..<....,.....V9Vloca..>..........rimaxp..@.... ... ....name..@.........,.G.post..A........x.I..prep..CT........x..%........................................x...5.A......m."gW..`.L..&N".?.......IF....a.^...b1..................Uh."4...>..=x.c`f........:....Q.B3_dHcb```.fgc.`abbi``P..x......:.;302(...&.O.....)B..q>H.%.u..R``..<......x.\.!..q......#aff...#1Q@.'U..@5.".llt.Aa#.f|c.W.....'..X..!..C...ITPE.;..V.j......0. .L0E...Yd.mN....:.....F....GG.g.s,x.>0....v..I;o..<.$G9.\f2...e(}.IS2..uc]p.........M.x.c.a.g.c..$KY...e@.,A.".m....x........3........[.o....=.d...u.a......S....G..3.b..h...."...x.uTGw.F........)..)7.W.$`*.....G.Kz.)e....t.|.1.7...s.g...3.7mgf..~{1...s.3.S...co..o.~.Zy.u...kW.\.t...N
                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\CS6IXJW6\tether.min[1].js
                                            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            File Type:ASCII text, with very long lines, with no line terminators
                                            Category:downloaded
                                            Size (bytes):24989
                                            Entropy (8bit):5.18502272346698
                                            Encrypted:false
                                            SSDEEP:768:1Jc67wdFbgDo6h+T7zMczQvoK/ww8l31g9CZQ5nAgM:zn74bsopz+AK/wM5Af
                                            MD5:ECDFD3DC464CEDA5F483BB5C96A6E3D2
                                            SHA1:CBDD0A2B2DD7A9CFC5DB3F33E34323AFA0CA55A3
                                            SHA-256:80BD626EB6D57112072A508EE4E5CE3C2FE5673FE0A5D029810033B24AAA5E9F
                                            SHA-512:1EC6758BDBE5A34D656DA7BE28897FFFA28FC6438EEB148F2363DE7EC6620BC2E6496F4A0D63182BD8E136A13D5EC6E31B2AE740067AB121EFB67475DAC24F8C
                                            Malicious:false
                                            Reputation:low
                                            IE Cache URL:https://cdnjs.cloudflare.com/ajax/libs/tether/1.4.0/js/tether.min.js
                                            Preview: !function(t,e){"function"==typeof define&&define.amd?define(e):"object"==typeof exports?module.exports=e(require,exports,module):t.Tether=e()}(this,function(t,e,o){"use strict";function i(t,e){if(!(t instanceof e))throw new TypeError("Cannot call a class as a function")}function n(t){var e=t.getBoundingClientRect(),o={};for(var i in e)o[i]=e[i];if(t.ownerDocument!==document){var r=t.ownerDocument.defaultView.frameElement;if(r){var s=n(r);o.top+=s.top,o.bottom+=s.top,o.left+=s.left,o.right+=s.left}}return o}function r(t){var e=getComputedStyle(t)||{},o=e.position,i=[];if("fixed"===o)return[t];for(var n=t;(n=n.parentNode)&&n&&1===n.nodeType;){var r=void 0;try{r=getComputedStyle(n)}catch(s){}if("undefined"==typeof r||null===r)return i.push(n),i;var a=r,f=a.overflow,l=a.overflowX,h=a.overflowY;/(auto|scroll)/.test(f+h+l)&&("absolute"!==o||["relative","absolute","fixed"].indexOf(r.position)>=0)&&i.push(n)}return i.push(t.ownerDocument.body),t.ownerDocument!==document&&i.push(t.ownerDocument
                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\bootstrap.min[1].css
                                            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            File Type:ASCII text, with very long lines
                                            Category:downloaded
                                            Size (bytes):144877
                                            Entropy (8bit):5.049937202697915
                                            Encrypted:false
                                            SSDEEP:1536:GcoqwrUPyDHU7c7TcDEBi82NcuSELL4d/+oENM6HN26Q:VoPgPard2oENM6HN26Q
                                            MD5:450FC463B8B1A349DF717056FBB3E078
                                            SHA1:895125A4522A3B10EE7ADA06EE6503587CBF95C5
                                            SHA-256:2C0F3DCFE93D7E380C290FE4AB838ED8CADFF1596D62697F5444BE460D1F876D
                                            SHA-512:93BF1ED5F6D8B34F53413A86EFD4A925D578C97ABC757EA871F3F46F340745E4126C48219D2E8040713605B64A9ECF7AD986AA8102F5EA5ECF9228801D962F5D
                                            Malicious:false
                                            Reputation:low
                                            IE Cache URL:https://www.soolitaire.com/dcc/css/bootstrap.min.css
                                            Preview: /*!. * Bootstrap v4.0.0 (https://getbootstrap.com). * Copyright 2011-2018 The Bootstrap Authors. * Copyright 2011-2018 Twitter, Inc.. * Licensed under MIT (https://github.com/twbs/bootstrap/blob/master/LICENSE). */:root{--blue:#007bff;--indigo:#6610f2;--purple:#6f42c1;--pink:#e83e8c;--red:#dc3545;--orange:#fd7e14;--yellow:#ffc107;--green:#28a745;--teal:#20c997;--cyan:#17a2b8;--white:#fff;--gray:#6c757d;--gray-dark:#343a40;--primary:#007bff;--secondary:#6c757d;--success:#28a745;--info:#17a2b8;--warning:#ffc107;--danger:#dc3545;--light:#f8f9fa;--dark:#343a40;--breakpoint-xs:0;--breakpoint-sm:576px;--breakpoint-md:768px;--breakpoint-lg:992px;--breakpoint-xl:1200px;--font-family-sans-serif:-apple-system,BlinkMacSystemFont,"Segoe UI",Roboto,"Helvetica Neue",Arial,sans-serif,"Apple Color Emoji","Segoe UI Emoji","Segoe UI Symbol";--font-family-monospace:SFMono-Regular,Menlo,Monaco,Consolas,"Liberation Mono","Courier New",monospace}*,::after,::before{box-sizing:border-box}html{font-family:sans
                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\bootstrap.min[2].css
                                            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            File Type:ASCII text, with very long lines
                                            Category:downloaded
                                            Size (bytes):150996
                                            Entropy (8bit):5.0354387423773845
                                            Encrypted:false
                                            SSDEEP:1536:JGz3B97sTS2k+PwQDEBi8d/g+oomA+iiHML6YVA30UtEMH2UtI:JGP7iA+jML6YVA30UtEMH2UtI
                                            MD5:7E923AD223E9F33E54D22E50CF2BCCE5
                                            SHA1:8B7CB193D70BB476DB06651C878DFCD1A7E1C0EE
                                            SHA-256:AEBF611C1438DC7EC748E9A6364C734066B34BF2A1C7E2FC6511ED784635B50E
                                            SHA-512:F7652E7FD2A079D9E39F11D51CE7EA1B95C9DD10418ECD386242FF090D61F8094108B5AEA462EFA8BCCA1441F9AEE42CC8F16265DECCC0E4D9B811718A73FBA2
                                            Malicious:false
                                            Reputation:low
                                            IE Cache URL:https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0-alpha.6/css/bootstrap.min.css
                                            Preview: /*!. * Bootstrap v4.0.0-alpha.6 (https://getbootstrap.com). * Copyright 2011-2017 The Bootstrap Authors. * Copyright 2011-2017 Twitter, Inc.. * Licensed under MIT (https://github.com/twbs/bootstrap/blob/master/LICENSE). *//*! normalize.css v5.0.0 | MIT License | github.com/necolas/normalize.css */html{font-family:sans-serif;line-height:1.15;-ms-text-size-adjust:100%;-webkit-text-size-adjust:100%}body{margin:0}article,aside,footer,header,nav,section{display:block}h1{font-size:2em;margin:.67em 0}figcaption,figure,main{display:block}figure{margin:1em 40px}hr{-webkit-box-sizing:content-box;box-sizing:content-box;height:0;overflow:visible}pre{font-family:monospace,monospace;font-size:1em}a{background-color:transparent;-webkit-text-decoration-skip:objects}a:active,a:hover{outline-width:0}abbr[title]{border-bottom:none;text-decoration:underline;text-decoration:underline dotted}b,strong{font-weight:inherit}b,strong{font-weight:bolder}code,kbd,samp{font-family:monospace,monospace;font-size:1em}
                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\font-awesome.min[1].css
                                            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            File Type:ASCII text, with very long lines
                                            Category:downloaded
                                            Size (bytes):31000
                                            Entropy (8bit):4.746143404849733
                                            Encrypted:false
                                            SSDEEP:384:wHu5yWeTUKW+KlkJ5de2UYDyVfwYUas2l8yQ/8dwmaU8G:wwlr+Klk3Yi+fwYUf2l8yQ/e9vf
                                            MD5:269550530CC127B6AA5A35925A7DE6CE
                                            SHA1:512C7D79033E3028A9BE61B540CF1A6870C896F8
                                            SHA-256:799AEB25CC0373FDEE0E1B1DB7AD6C2F6A0E058DFADAA3379689F583213190BD
                                            SHA-512:49F4E24E55FA924FAA8AD7DEBE5FFB2E26D439E25696DF6B6F20E7F766B50EA58EC3DBD61B6305A1ACACD2C80E6E659ACCEE4140F885B9C9E71008E9001FBF4B
                                            Malicious:false
                                            Reputation:low
                                            IE Cache URL:https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css
                                            Preview: /*!. * Font Awesome 4.7.0 by @davegandy - http://fontawesome.io - @fontawesome. * License - http://fontawesome.io/license (Font: SIL OFL 1.1, CSS: MIT License). */@font-face{font-family:'FontAwesome';src:url('../fonts/fontawesome-webfont.eot?v=4.7.0');src:url('../fonts/fontawesome-webfont.eot?#iefix&v=4.7.0') format('embedded-opentype'),url('../fonts/fontawesome-webfont.woff2?v=4.7.0') format('woff2'),url('../fonts/fontawesome-webfont.woff?v=4.7.0') format('woff'),url('../fonts/fontawesome-webfont.ttf?v=4.7.0') format('truetype'),url('../fonts/fontawesome-webfont.svg?v=4.7.0#fontawesomeregular') format('svg');font-weight:normal;font-style:normal}.fa{display:inline-block;font:normal normal normal 14px/1 FontAwesome;font-size:inherit;text-rendering:auto;-webkit-font-smoothing:antialiased;-moz-osx-font-smoothing:grayscale}.fa-lg{font-size:1.33333333em;line-height:.75em;vertical-align:-15%}.fa-2x{font-size:2em}.fa-3x{font-size:3em}.fa-4x{font-size:4em}.fa-5x{font-size:5em}.fa-fw{width:1.
                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\jquery-3.1.1.slim.min[1].js
                                            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            File Type:ASCII text, with very long lines
                                            Category:downloaded
                                            Size (bytes):69309
                                            Entropy (8bit):5.3700159283175415
                                            Encrypted:false
                                            SSDEEP:1536:dNhEyjjTikEJO4edXXe9J578go6MWXqcVhzLyB4Lw13sh2bTQKmPNsvDU8Cur:Dxcq0hzLZwpsYbIyvDU8Cur
                                            MD5:550DDFE84A114F79A767C087DF97F3BC
                                            SHA1:310BD0C04196573315C2E8446776685AC2961724
                                            SHA-256:FD222B36ABFC87A406283B8DA0B180E22ADEB7E9327AC0A41C6CD5514574B217
                                            SHA-512:B6A9146FFE380A32C89D48BAF900DD5E346B0D603B8AFCFAD070970E56BDC744E8A8B053C2EF8A3107F4A3C2BDD11EE470E05557F542FFEDE5FF54468EE186C4
                                            Malicious:false
                                            Reputation:low
                                            IE Cache URL:https://code.jquery.com/jquery-3.1.1.slim.min.js
                                            Preview: /*! jQuery v3.1.1 -ajax,-ajax/jsonp,-ajax/load,-ajax/parseXML,-ajax/script,-ajax/var/location,-ajax/var/nonce,-ajax/var/rquery,-ajax/xhr,-manipulation/_evalUrl,-event/ajax,-effects,-effects/animatedSelector,-effects/Tween,-deprecated | (c) jQuery Foundation | jquery.org/license */.!function(a,b){"use strict";"object"==typeof module&&"object"==typeof module.exports?module.exports=a.document?b(a,!0):function(a){if(!a.document)throw new Error("jQuery requires a window with a document");return b(a)}:b(a)}("undefined"!=typeof window?window:this,function(a,b){"use strict";var c=[],d=a.document,e=Object.getPrototypeOf,f=c.slice,g=c.concat,h=c.push,i=c.indexOf,j={},k=j.toString,l=j.hasOwnProperty,m=l.toString,n=m.call(Object),o={};function p(a,b){b=b||d;var c=b.createElement("script");c.text=a,b.head.appendChild(c).parentNode.removeChild(c)}var q="3.1.1 -ajax,-ajax/jsonp,-ajax/load,-ajax/parseXML,-ajax/script,-ajax/var/location,-ajax/var/nonce,-ajax/var/rquery,-ajax/xhr,-manipulation/_evalUrl,
                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\mail[1].png
                                            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            File Type:PNG image data, 100 x 87, 8-bit colormap, non-interlaced
                                            Category:downloaded
                                            Size (bytes):1106
                                            Entropy (8bit):7.176105528957688
                                            Encrypted:false
                                            SSDEEP:24:rTtaBegujKwSx2UKzpZtPcCdBR1uj7cxRqnwFT2C4z2MlNvM2NOYVrng:rTtWSwxKzpZvoExQwFJfKiyOYVLg
                                            MD5:D9F81CF593394338BD133AA77B0ECBAF
                                            SHA1:24AB26A812E74CBB08BB17E495F8852A3DF5A038
                                            SHA-256:2EBC65A696544B8D69ADE5F136250A9548D4BADF1B9AD459E63FF68E7A985C69
                                            SHA-512:28370A1CE7F1F3CA386187DF2FBADAE154E151DE5794913FD0DAE42B26545BE39E9A6E2C855F4EB3D267210768FF7AE7D15268C3BEDA53D88FE9AA878ECF0665
                                            Malicious:false
                                            Reputation:low
                                            IE Cache URL:https://www.soolitaire.com/dcc/images/mail.png
                                            Preview: .PNG........IHDR...d...W........e....PLTE................................................................................................................................................................wy....4tRNS.9......j...0!..........A.I<4.\.bN,'...|nfXFu.V.R6xs.....IDATh...r.@.E.k3c..(j...D3....[..P....b..K.L.......2..b...;@1./...C9.....s..w..d..P.9...........e.."..E3..A:;P.sf2..../..b..,..Z/Sd$..[..>@c...Jo:DF...<..h6N.c........'wr%..|..Z6.%....Gm...9pW.I?.'.Q.0.?....:..^G-.}........TE...2.|.?..2..!.Q....c..*!....R.9....*0c...xR..5.]V.$._.x^..t.'..o......;l<.rF...bE..'...F..$.m;.%h;v.!PC......!.C..F=.t9|....!.\.......^..^_.|......H...1..*_'!o*..g...!.2.&.K.F=.0....(Dc...-.L'..@.d.O..6nh....[..YJ.....\.nTH,.....qA\n.w.}..Dp.8E....OV..&.{..I..mi[..)0.K.....;M$.."C.O..h....l..C}.....c'.h......+....T...e2_kI..5^z......U...nv.r.t.t......U%....h[...M.RM.a.n}...y.n.$....T`$.[{V2K.V.6.lgOH..C...N..L.^.^tTF.....%..I..>.?..H4...@-....#./C>Bm.@..}I..D....=.....o
                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\office[1].htm
                                            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            File Type:HTML document, ASCII text
                                            Category:downloaded
                                            Size (bytes):5585
                                            Entropy (8bit):4.496936452744522
                                            Encrypted:false
                                            SSDEEP:96:Sx0EnNNK1BgtUaat+FeHOzSHLyUTLYebn:I9Ja+hqHYCn
                                            MD5:0CE621A259916A0D645FE792B2F1AC89
                                            SHA1:DCF47C8F6A011FA0DA90EDD0C47CC844D5C6E312
                                            SHA-256:5DBBF0AFC3757B2579818D009FD9936926CD1BD5C50F3DA1542F51BA57312440
                                            SHA-512:10C8531A73328C3B40BC3DE4DFCFEC15766C9F25767E8C62E7DB0AF9E1553FABF90729EBEFD21DE4617A36322449253F531028D1B44F9ACBC9193D384F6115B4
                                            Malicious:true
                                            Yara Hits:
                                            • Rule: JoeSecurity_HtmlPhish_10, Description: Yara detected HtmlPhish_10, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\office[1].htm, Author: Joe Security
                                            Reputation:low
                                            IE Cache URL:https://www.soolitaire.com/dcc/office.php
                                            Preview: <!DOCTYPE html>.<html lang="en">. <head>. Required meta tags -->. <meta charset="utf-8">. <meta http-equiv="content-type" content="text/html" />. <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">. <title>One Drive</title>.. Font Awesome CSS -->. <link rel="stylesheet" type="text/css" href="https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css">. Bootstrap CSS -->. <link rel="stylesheet" href="https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0-alpha.6/css/bootstrap.min.css" integrity="sha384-rwoIResjU2yc3z8GV/NPeZWAv56rSmLldC3R/AZzGRnGxQQKnKkoFVhFQhNUwEyJ" crossorigin="anonymous">. <link rel="stylesheet" type="text/css" href="css/style.css">..</head>.<body>. . <div class="officemail">. <div class="row">. <div class="col-md-8 col-lg-8 col-sm-8 col-xs-12">. <img class="img-fluid ofc" src="images/officebg.jpg" alt="Office">. </div>. <div class="c
                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\outlook[1].png
                                            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            File Type:PNG image data, 213 x 211, 8-bit colormap, non-interlaced
                                            Category:downloaded
                                            Size (bytes):1746
                                            Entropy (8bit):7.472505060810825
                                            Encrypted:false
                                            SSDEEP:48:lq3EkZ80zZgcSoWu+NIG208DXIbsXzVLp:qEGZgcMMGx8DYgXBp
                                            MD5:CACDEE9959D34380D727718FD02B3711
                                            SHA1:EB971467C555EA2299CC31018C8BC85F67DA59D7
                                            SHA-256:17F02FDB590800C9A21E2B6166F5F22CC54952D58897F09D8E82BB9195BC2071
                                            SHA-512:4F0A4BB3219BA1F9AAE6B527B9125FEE3327BDCA82142DFC23E6E6C5F4481065A221291A35BBCF1E35CFE9EE658AB22E4BC85DC58C17A2B95C5FC2846986FB66
                                            Malicious:false
                                            Reputation:low
                                            IE Cache URL:https://www.soolitaire.com/dcc/images/outlook.png
                                            Preview: .PNG........IHDR.............!......PLTE............................................................................................................................................................T...2tRNS...Ji.Gd.=.@....X.g...\:...aMC.....}!.u'.P.5.S...p*Gi2....IDATx...is.@...n......}.#.f...[t....qa...[.E.&O..A*.EQ.EQ.EQ.EQ.EQ.EQ.EQ.EQ.Y.U.....=.....aU..c...T..b.ztPu.;.ytPY.f..tP-....@U........ h..S....TVn.ytP9... ..s..h.......j\Z.D......j...A...#..B"...HE..HE*!R.*$R.J.T...TiQ.!.,...._.^%....4...2..ei...L.U..b.HG.k.N....V...4:W8.Q.1.V.Tmx./.I.../UeN.n*dN}.T...P...._..H...h......T]._]..q>.O...Cu.....s W.jU....p........"......BU..*..!..*S...P'.p...Q..~E.*i....E%.....U..>Q..j.B.q.%..q...T....j.Q.P..O....\..U.8j.JT...!2....KV.....*l......{....JF-..<Y...Q.t.OSL.....U.%*......OO,.-.H........E.-i....g.Y."U3|9.'...A.J..Q.W./..G5z.H.]...:%MA...%.t...BC|f..e...3.0.]._f-.QPMPeG.4..;....[.(u*.{.F.W..L...r.Q=P..{.8G.Y0..X..gMP.._.3@...u.*...[....@.j.c.Y.P!L..w.#a.
                                            C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\webmail[1].htm
                                            Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            File Type:HTML document, ASCII text
                                            Category:downloaded
                                            Size (bytes):4436
                                            Entropy (8bit):4.59653071835772
                                            Encrypted:false
                                            SSDEEP:48:mvzYDpTKL2pUDa6E1eeLYOOGpbTNmSzRWa8b1fsuae9utBkJgUhq0kekJL:SH0EALYebBrRWaA1fs9/L
                                            MD5:9A306FD2DFD85DA61D478F2FC79BCE22
                                            SHA1:24F5087DFF2307A143D5147BA684CFF46AB796C0
                                            SHA-256:2D5503A91A57FE123113C0C4E8FD6188C68B9F1022FDCC7D93174107E1362E61
                                            SHA-512:2793C0274DD95F73D5B40C50CB230A7CDE49E2CC5610445491CC045E98D38473B1649616F6BD1E46A1BB5B9E58BC379E036CE3F5198CAC3A50EE3507ABB8D345
                                            Malicious:true
                                            Yara Hits:
                                            • Rule: JoeSecurity_HtmlPhish_10, Description: Yara detected HtmlPhish_10, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OR0WKIO1\webmail[1].htm, Author: Joe Security
                                            Reputation:low
                                            IE Cache URL:https://www.soolitaire.com/dcc/webmail.php
                                            Preview: <!DOCTYPE html>.<html lang="en">. <head>. Required meta tags -->. <meta charset="utf-8">. <meta http-equiv="content-type" content="text/html" />. <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">. <title>One Drive</title>. <link rel="stylesheet" type="text/css" href="css/style.css">. Font Awesome CSS -->. <link rel="stylesheet" type="text/css" href="https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css">. Bootstrap CSS -->. <link rel="stylesheet" href="https://maxcdn.bootstrapcdn.com/bootstrap/4.0.0-alpha.6/css/bootstrap.min.css" integrity="sha384-rwoIResjU2yc3z8GV/NPeZWAv56rSmLldC3R/AZzGRnGxQQKnKkoFVhFQhNUwEyJ" crossorigin="anonymous">. jQuery first, then Tether, then Bootstrap JS. -->. <script src="https://code.jquery.com/jquery-3.1.1.slim.min.js" integrity="sha384-A7FZj7v+d/sdmMqp/nOQwliLvUsJfDHW+k9Omg/a/EheAdgtzNs3hpfag6Ed950n" crossorigin="anonymous"></script>. <s
                                            C:\Users\user\AppData\Local\Temp\~DF3B883E258AEB335F.TMP
                                            Process:C:\Program Files\internet explorer\iexplore.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):63779
                                            Entropy (8bit):0.9535991125313998
                                            Encrypted:false
                                            SSDEEP:384:kBqoxKAuqR+bVHuVVFMtMR7TiQTSpTMpvTUFK0lvre:le1H2oN+
                                            MD5:92BFE53E510CE62A483474ED2E2037E8
                                            SHA1:323FCD67A9DFCF555A591007AC8DBDBF0CD2E9A6
                                            SHA-256:C5244148C986645C6D1ADB84853075A2FD3D7F1C35EE6ACA502D9BC4D5324A44
                                            SHA-512:BD0891FF0D562F61D7BCC6E57D126A0512632F4A128767079BE9FC6FBA55CA5A905097B65956AB3931C3182E7EF35024C8C56B3DC4201D6E1931211B1017AD72
                                            Malicious:false
                                            Reputation:low
                                            Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            C:\Users\user\AppData\Local\Temp\~DF7FE88D6B64492613.TMP
                                            Process:C:\Program Files\internet explorer\iexplore.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):13029
                                            Entropy (8bit):0.476976974076122
                                            Encrypted:false
                                            SSDEEP:24:c9lLh9lLh9lIn9lIn9lo7S9lo7C9lW7YcfWgHmfmtkmtTdHmd3:kBqoI7d7b7YcfWgGfmtkmtTdGd3
                                            MD5:C49629F4CF187DE16A05612AED5EA4E5
                                            SHA1:7F358A2C425AC274918C5924398793D23F124BCC
                                            SHA-256:1D4A76AA929F4276ABB556D9EB4B6B6C5E0A9F271FEF4F52BAE95CF5ACD5B7B6
                                            SHA-512:5DA8BDA363B7BE571547F3BC6C2542D330939ACA1291382CD512B4C6C717AADF36D24CE8C49E097E99BD78AA8D8BB34A9F6F1F143C41F07316AB6F6F0C47B801
                                            Malicious:false
                                            Reputation:low
                                            Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            C:\Users\user\AppData\Local\Temp\~DFE8199C67ED2FB86C.TMP
                                            Process:C:\Program Files\internet explorer\iexplore.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):25441
                                            Entropy (8bit):0.27918767598683664
                                            Encrypted:false
                                            SSDEEP:24:c9lLh9lLh9lIn9lIn9lRx/9lRJ9lTb9lTb9lSSU9lSSU9laAa/9laA:kBqoxxJhHWSVSEab
                                            MD5:AB889A32AB9ACD33E816C2422337C69A
                                            SHA1:1190C6B34DED2D295827C2A88310D10A8B90B59B
                                            SHA-256:4D6EC54B8D244E63B0F04FBE2B97402A3DF722560AD12F218665BA440F4CEFDA
                                            SHA-512:BD250855747BB4CEC61814D0E44F810156D390E3E9F120A12935EFDF80ACA33C4777AD66257CCA4E4003FEF0741692894980B9298F01C4CDD2D8A9C7BB522FB6
                                            Malicious:false
                                            Reputation:low
                                            Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                                            Static File Info

                                            No static file info

                                            Network Behavior

                                            Network Port Distribution

                                            TCP Packets

                                            TimestampSource PortDest PortSource IPDest IP
                                            Jan 27, 2021 13:26:17.718825102 CET49735443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:17.719366074 CET49736443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:17.775979996 CET4434973554.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:17.776077986 CET49735443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:17.776340008 CET4434973654.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:17.776417017 CET49736443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:17.781043053 CET49735443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:17.781577110 CET49736443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:17.831578970 CET4434973554.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:17.831820011 CET4434973654.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:17.836606979 CET4434973554.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:17.836950064 CET4434973654.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:17.847059011 CET49737443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:17.849087954 CET49738443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:17.904480934 CET4434973754.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:17.904597998 CET49737443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:17.905209064 CET49737443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:17.905970097 CET4434973854.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:17.906117916 CET49738443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:17.906557083 CET49738443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:17.963799000 CET4434973854.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:17.964237928 CET4434973854.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:17.964993000 CET4434973754.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:17.965043068 CET4434973754.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:17.965081930 CET4434973754.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:17.965131044 CET49737443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:17.965186119 CET49737443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:17.966449976 CET49739443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:18.011398077 CET49737443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:18.017379045 CET49737443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:18.023787022 CET4434973954.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:18.023905993 CET49739443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:18.024193048 CET49739443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:18.070302010 CET4434973754.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:18.070549011 CET49737443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:18.081088066 CET4434973954.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:18.081609964 CET4434973954.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:18.107192993 CET4434973754.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:18.107350111 CET49737443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:18.153053045 CET49737443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:18.153984070 CET49740443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:18.154264927 CET49741443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:18.197213888 CET49742443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:18.209517002 CET4434974054.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:18.209604979 CET49740443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:18.209804058 CET4434974154.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:18.209899902 CET49741443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:18.212630033 CET49741443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:18.214173079 CET49740443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:18.214509964 CET4434973754.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:18.214553118 CET4434973754.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:18.214589119 CET4434973754.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:18.214621067 CET49737443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:18.214626074 CET4434973754.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:18.214651108 CET49737443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:18.214657068 CET49737443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:18.214658976 CET4434973754.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:18.214673042 CET49737443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:18.214694023 CET4434973754.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:18.214710951 CET49737443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:18.214730978 CET4434973754.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:18.214755058 CET49737443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:18.214766979 CET4434973754.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:18.214797974 CET49737443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:18.214831114 CET4434973754.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:18.214840889 CET49737443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:18.214873075 CET4434973754.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:18.214886904 CET49737443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:18.214939117 CET49737443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:18.220520020 CET49745443192.168.2.4104.16.19.94
                                            Jan 27, 2021 13:26:18.222148895 CET49746443192.168.2.4104.16.19.94
                                            Jan 27, 2021 13:26:18.253796101 CET4434974254.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:18.253911972 CET49742443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:18.254486084 CET49742443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:18.262298107 CET44349745104.16.19.94192.168.2.4
                                            Jan 27, 2021 13:26:18.262398005 CET49745443192.168.2.4104.16.19.94
                                            Jan 27, 2021 13:26:18.262967110 CET49745443192.168.2.4104.16.19.94
                                            Jan 27, 2021 13:26:18.263864994 CET44349746104.16.19.94192.168.2.4
                                            Jan 27, 2021 13:26:18.263968945 CET49746443192.168.2.4104.16.19.94
                                            Jan 27, 2021 13:26:18.264404058 CET49746443192.168.2.4104.16.19.94
                                            Jan 27, 2021 13:26:18.266438961 CET4434974054.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:18.267503977 CET4434974154.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:18.268739939 CET49747443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:18.268990993 CET49748443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:18.270798922 CET4434974154.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:18.272433996 CET4434974054.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:18.274138927 CET4434973754.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:18.274175882 CET4434973754.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:18.274214029 CET4434973754.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:18.274240017 CET49737443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:18.274250984 CET4434973754.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:18.274259090 CET49737443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:18.274264097 CET49737443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:18.274298906 CET4434973754.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:18.274303913 CET49737443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:18.274342060 CET4434973754.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:18.274350882 CET49737443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:18.274374962 CET4434973754.36.91.62192.168.2.4
                                            Jan 27, 2021 13:26:18.274390936 CET49737443192.168.2.454.36.91.62
                                            Jan 27, 2021 13:26:18.274426937 CET49737443192.168.2.454.36.91.62

                                            UDP Packets

                                            TimestampSource PortDest PortSource IPDest IP
                                            Jan 27, 2021 13:26:14.019872904 CET5585453192.168.2.48.8.8.8
                                            Jan 27, 2021 13:26:14.067768097 CET53558548.8.8.8192.168.2.4
                                            Jan 27, 2021 13:26:15.433824062 CET6454953192.168.2.48.8.8.8
                                            Jan 27, 2021 13:26:15.483618021 CET53645498.8.8.8192.168.2.4
                                            Jan 27, 2021 13:26:16.317596912 CET6315353192.168.2.48.8.8.8
                                            Jan 27, 2021 13:26:16.367424011 CET53631538.8.8.8192.168.2.4
                                            Jan 27, 2021 13:26:16.665602922 CET5299153192.168.2.48.8.8.8
                                            Jan 27, 2021 13:26:16.723537922 CET53529918.8.8.8192.168.2.4
                                            Jan 27, 2021 13:26:17.535893917 CET5370053192.168.2.48.8.8.8
                                            Jan 27, 2021 13:26:17.584023952 CET53537008.8.8.8192.168.2.4
                                            Jan 27, 2021 13:26:17.635962963 CET5172653192.168.2.48.8.8.8
                                            Jan 27, 2021 13:26:17.707586050 CET53517268.8.8.8192.168.2.4
                                            Jan 27, 2021 13:26:18.161783934 CET5679453192.168.2.48.8.8.8
                                            Jan 27, 2021 13:26:18.163912058 CET5653453192.168.2.48.8.8.8
                                            Jan 27, 2021 13:26:18.209611893 CET53567948.8.8.8192.168.2.4
                                            Jan 27, 2021 13:26:18.211688995 CET53565348.8.8.8192.168.2.4
                                            Jan 27, 2021 13:26:18.371474981 CET5662753192.168.2.48.8.8.8
                                            Jan 27, 2021 13:26:18.432734013 CET53566278.8.8.8192.168.2.4
                                            Jan 27, 2021 13:26:18.490683079 CET5662153192.168.2.48.8.8.8
                                            Jan 27, 2021 13:26:18.542937040 CET53566218.8.8.8192.168.2.4
                                            Jan 27, 2021 13:26:18.767081022 CET6311653192.168.2.48.8.8.8
                                            Jan 27, 2021 13:26:18.815690041 CET53631168.8.8.8192.168.2.4
                                            Jan 27, 2021 13:26:20.069786072 CET6407853192.168.2.48.8.8.8
                                            Jan 27, 2021 13:26:20.129201889 CET53640788.8.8.8192.168.2.4
                                            Jan 27, 2021 13:26:21.261374950 CET6480153192.168.2.48.8.8.8
                                            Jan 27, 2021 13:26:21.319602966 CET53648018.8.8.8192.168.2.4
                                            Jan 27, 2021 13:26:22.117683887 CET6172153192.168.2.48.8.8.8
                                            Jan 27, 2021 13:26:22.174006939 CET53617218.8.8.8192.168.2.4
                                            Jan 27, 2021 13:26:22.964860916 CET5125553192.168.2.48.8.8.8
                                            Jan 27, 2021 13:26:23.015542984 CET53512558.8.8.8192.168.2.4
                                            Jan 27, 2021 13:26:24.223505974 CET6152253192.168.2.48.8.8.8
                                            Jan 27, 2021 13:26:24.274307966 CET53615228.8.8.8192.168.2.4
                                            Jan 27, 2021 13:26:25.525665045 CET5233753192.168.2.48.8.8.8
                                            Jan 27, 2021 13:26:25.573643923 CET53523378.8.8.8192.168.2.4
                                            Jan 27, 2021 13:26:26.337537050 CET5504653192.168.2.48.8.8.8
                                            Jan 27, 2021 13:26:26.385483027 CET53550468.8.8.8192.168.2.4
                                            Jan 27, 2021 13:26:33.944498062 CET4961253192.168.2.48.8.8.8
                                            Jan 27, 2021 13:26:34.018203974 CET53496128.8.8.8192.168.2.4
                                            Jan 27, 2021 13:26:37.711481094 CET4928553192.168.2.48.8.8.8
                                            Jan 27, 2021 13:26:37.759380102 CET53492858.8.8.8192.168.2.4
                                            Jan 27, 2021 13:26:38.847789049 CET5060153192.168.2.48.8.8.8
                                            Jan 27, 2021 13:26:38.898540974 CET53506018.8.8.8192.168.2.4
                                            Jan 27, 2021 13:26:46.643136024 CET6087553192.168.2.48.8.8.8
                                            Jan 27, 2021 13:26:46.695880890 CET53608758.8.8.8192.168.2.4
                                            Jan 27, 2021 13:26:47.248191118 CET5644853192.168.2.48.8.8.8
                                            Jan 27, 2021 13:26:47.306602955 CET53564488.8.8.8192.168.2.4
                                            Jan 27, 2021 13:26:47.631294012 CET6087553192.168.2.48.8.8.8
                                            Jan 27, 2021 13:26:47.694925070 CET53608758.8.8.8192.168.2.4
                                            Jan 27, 2021 13:26:48.240264893 CET5644853192.168.2.48.8.8.8
                                            Jan 27, 2021 13:26:48.288196087 CET53564488.8.8.8192.168.2.4
                                            Jan 27, 2021 13:26:48.646116018 CET6087553192.168.2.48.8.8.8
                                            Jan 27, 2021 13:26:48.697031021 CET53608758.8.8.8192.168.2.4
                                            Jan 27, 2021 13:26:49.383085012 CET5644853192.168.2.48.8.8.8
                                            Jan 27, 2021 13:26:49.431013107 CET53564488.8.8.8192.168.2.4
                                            Jan 27, 2021 13:26:50.662966013 CET6087553192.168.2.48.8.8.8
                                            Jan 27, 2021 13:26:50.714313984 CET53608758.8.8.8192.168.2.4
                                            Jan 27, 2021 13:26:51.396102905 CET5644853192.168.2.48.8.8.8
                                            Jan 27, 2021 13:26:51.445755959 CET53564488.8.8.8192.168.2.4
                                            Jan 27, 2021 13:26:51.901257038 CET5917253192.168.2.48.8.8.8
                                            Jan 27, 2021 13:26:51.994246960 CET53591728.8.8.8192.168.2.4
                                            Jan 27, 2021 13:26:52.464706898 CET6242053192.168.2.48.8.8.8
                                            Jan 27, 2021 13:26:52.525413036 CET53624208.8.8.8192.168.2.4
                                            Jan 27, 2021 13:26:53.009659052 CET6057953192.168.2.48.8.8.8
                                            Jan 27, 2021 13:26:53.071546078 CET53605798.8.8.8192.168.2.4
                                            Jan 27, 2021 13:26:53.452567101 CET5018353192.168.2.48.8.8.8
                                            Jan 27, 2021 13:26:53.509219885 CET53501838.8.8.8192.168.2.4

                                            DNS Queries

                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                            Jan 27, 2021 13:26:17.635962963 CET192.168.2.48.8.8.80xd8e7Standard query (0)www.soolitaire.comA (IP address)IN (0x0001)
                                            Jan 27, 2021 13:26:18.161783934 CET192.168.2.48.8.8.80xaeafStandard query (0)code.jquery.comA (IP address)IN (0x0001)
                                            Jan 27, 2021 13:26:18.163912058 CET192.168.2.48.8.8.80x7614Standard query (0)cdnjs.cloudflare.comA (IP address)IN (0x0001)
                                            Jan 27, 2021 13:26:33.944498062 CET192.168.2.48.8.8.80x1fa7Standard query (0)www.soolitaire.comA (IP address)IN (0x0001)
                                            Jan 27, 2021 13:26:37.711481094 CET192.168.2.48.8.8.80xed95Standard query (0)maxcdn.bootstrapcdn.comA (IP address)IN (0x0001)

                                            DNS Answers

                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                            Jan 27, 2021 13:26:17.707586050 CET8.8.8.8192.168.2.40xd8e7No error (0)www.soolitaire.com54.36.91.62A (IP address)IN (0x0001)
                                            Jan 27, 2021 13:26:18.209611893 CET8.8.8.8192.168.2.40xaeafNo error (0)code.jquery.comcds.s5x3j6q5.hwcdn.netCNAME (Canonical name)IN (0x0001)
                                            Jan 27, 2021 13:26:18.211688995 CET8.8.8.8192.168.2.40x7614No error (0)cdnjs.cloudflare.com104.16.19.94A (IP address)IN (0x0001)
                                            Jan 27, 2021 13:26:18.211688995 CET8.8.8.8192.168.2.40x7614No error (0)cdnjs.cloudflare.com104.16.18.94A (IP address)IN (0x0001)
                                            Jan 27, 2021 13:26:34.018203974 CET8.8.8.8192.168.2.40x1fa7No error (0)www.soolitaire.com54.36.91.62A (IP address)IN (0x0001)
                                            Jan 27, 2021 13:26:37.759380102 CET8.8.8.8192.168.2.40xed95No error (0)maxcdn.bootstrapcdn.comcds.j3z9t3p6.hwcdn.netCNAME (Canonical name)IN (0x0001)

                                            HTTPS Packets

                                            TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                            Jan 27, 2021 13:26:17.965081930 CET54.36.91.62443192.168.2.449737CN=soolitaire.com CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=USCN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Sun Nov 29 19:13:21 CET 2020 Thu Mar 17 17:40:46 CET 2016Sat Feb 27 19:13:21 CET 2021 Wed Mar 17 17:40:46 CET 2021769,49162-49161-49172-49171-53-47-10,0-10-11-35-23-24-65281,29-23-24,039471ac5187bebcd6ba638a9ad176102
                                            CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Thu Mar 17 17:40:46 CET 2016Wed Mar 17 17:40:46 CET 2021
                                            Jan 27, 2021 13:26:18.306524038 CET104.16.19.94443192.168.2.449745CN=sni.cloudflaressl.com, O="Cloudflare, Inc.", L=San Francisco, ST=CA, C=US CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEWed Oct 21 02:00:00 CEST 2020 Mon Jan 27 13:48:08 CET 2020Thu Oct 21 01:59:59 CEST 2021 Wed Jan 01 00:59:59 CET 2025771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-16-23-24-65281,29-23-24,09e10692f1b7f78228b2d4e424db3a98c
                                            CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEMon Jan 27 13:48:08 CET 2020Wed Jan 01 00:59:59 CET 2025
                                            Jan 27, 2021 13:26:18.307235956 CET104.16.19.94443192.168.2.449746CN=sni.cloudflaressl.com, O="Cloudflare, Inc.", L=San Francisco, ST=CA, C=US CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEWed Oct 21 02:00:00 CEST 2020 Mon Jan 27 13:48:08 CET 2020Thu Oct 21 01:59:59 CEST 2021 Wed Jan 01 00:59:59 CET 2025771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-16-23-24-65281,29-23-24,09e10692f1b7f78228b2d4e424db3a98c
                                            CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=USCN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IEMon Jan 27 13:48:08 CET 2020Wed Jan 01 00:59:59 CET 2025
                                            Jan 27, 2021 13:26:18.315469027 CET54.36.91.62443192.168.2.449742CN=soolitaire.com CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=USCN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Sun Nov 29 19:13:21 CET 2020 Thu Mar 17 17:40:46 CET 2016Sat Feb 27 19:13:21 CET 2021 Wed Mar 17 17:40:46 CET 2021771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-16-23-24-65281,29-23-24,09e10692f1b7f78228b2d4e424db3a98c
                                            CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Thu Mar 17 17:40:46 CET 2016Wed Mar 17 17:40:46 CET 2021
                                            Jan 27, 2021 13:26:18.388084888 CET54.36.91.62443192.168.2.449748CN=soolitaire.com CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=USCN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Sun Nov 29 19:13:21 CET 2020 Thu Mar 17 17:40:46 CET 2016Sat Feb 27 19:13:21 CET 2021 Wed Mar 17 17:40:46 CET 2021769,49162-49161-49172-49171-53-47-10,0-10-11-35-23-24-65281,29-23-24,039471ac5187bebcd6ba638a9ad176102
                                            CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Thu Mar 17 17:40:46 CET 2016Wed Mar 17 17:40:46 CET 2021
                                            Jan 27, 2021 13:26:34.142241955 CET54.36.91.62443192.168.2.449765CN=soolitaire.com CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=USCN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Sun Nov 29 19:13:21 CET 2020 Thu Mar 17 17:40:46 CET 2016Sat Feb 27 19:13:21 CET 2021 Wed Mar 17 17:40:46 CET 2021771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,037f463bf4616ecd445d4a1937da06e19
                                            CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Thu Mar 17 17:40:46 CET 2016Wed Mar 17 17:40:46 CET 2021

                                            Code Manipulations

                                            Statistics

                                            Behavior

                                            Click to jump to process

                                            System Behavior

                                            General

                                            Start time:13:27:10
                                            Start date:27/01/2021
                                            Path:C:\Program Files\internet explorer\iexplore.exe
                                            Wow64 process (32bit):false
                                            Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                                            Imagebase:0x7ff636800000
                                            File size:823560 bytes
                                            MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:low

                                            General

                                            Start time:13:27:11
                                            Start date:27/01/2021
                                            Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                            Wow64 process (32bit):true
                                            Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6928 CREDAT:17410 /prefetch:2
                                            Imagebase:0x1280000
                                            File size:822536 bytes
                                            MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:low

                                            Disassembly

                                            Reset < >