Loading ...

Play interactive tourEdit tour

Analysis Report http://www.emailing.nespresso.com/r/?id=h769639fb,5102ea95,508b93ed&p1=l-at.club/ca/fr/unsubscribe?cmp=ZGxhbmVAaW5ub3ZpYS5jb20=&t=43412431243232383631323824465224323032312D30322D3033&c=323232353734

Overview

General Information

Sample URL:http://www.emailing.nespresso.com/r/?id=h769639fb,5102ea95,508b93ed&p1=l-at.club/ca/fr/unsubscribe?cmp=ZGxhbmVAaW5ub3ZpYS5jb20=&t=43412431243232383631323824465224323032312D30322D3033&c=323232353734
Analysis ID:358570
Infos:

Most interesting Screenshot:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Phishing site detected (based on shot template match)

Classification

Startup

  • System is w10x64
  • iexplore.exe (PID: 3352 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 5812 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:3352 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

Phishing:

barindex
Phishing site detected (based on shot template match)Show sources
Source: https://l-at.club/main/Matcher: Template: matched

Compliance:

barindex
Uses new MSVCR DllsShow sources
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
Uses secure TLS version for HTTPS connectionsShow sources
Source: unknownHTTPS traffic detected: 192.236.154.154:443 -> 192.168.2.3:49718 version: TLS 1.2
Source: unknownHTTPS traffic detected: 192.236.154.154:443 -> 192.168.2.3:49719 version: TLS 1.2
Source: msapplication.xml0.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xf20d35f7,0x01d70bfe</date><accdate>0xf20d35f7,0x01d70bfe</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml0.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xf20d35f7,0x01d70bfe</date><accdate>0xf20d35f7,0x01d70bfe</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml5.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xf20f985b,0x01d70bfe</date><accdate>0xf20f985b,0x01d70bfe</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml5.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xf20f985b,0x01d70bfe</date><accdate>0xf20f985b,0x01d70bfe</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml7.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xf211faae,0x01d70bfe</date><accdate>0xf211faae,0x01d70bfe</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: msapplication.xml7.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xf211faae,0x01d70bfe</date><accdate>0xf211faae,0x01d70bfe</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: unknownDNS traffic detected: queries for: www.emailing.nespresso.com
Source: msapplication.xml.1.drString found in binary or memory: http://www.amazon.com/
Source: KFOmCnqEu92Fr1Mu4mxP[1].ttf.3.dr, KFOlCnqEu92Fr1MmEU9fBBc9[1].ttf.3.dr, KFOlCnqEu92Fr1MmYUtfBBc9[1].ttf.3.drString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: msapplication.xml1.1.drString found in binary or memory: http://www.google.com/
Source: msapplication.xml2.1.drString found in binary or memory: http://www.live.com/
Source: msapplication.xml3.1.drString found in binary or memory: http://www.nytimes.com/
Source: msapplication.xml4.1.drString found in binary or memory: http://www.reddit.com/
Source: msapplication.xml5.1.drString found in binary or memory: http://www.twitter.com/
Source: msapplication.xml6.1.drString found in binary or memory: http://www.wikipedia.com/
Source: msapplication.xml7.1.drString found in binary or memory: http://www.youtube.com/
Source: recaptcha__en[1].js.3.drString found in binary or memory: https://developers.google.com/recaptcha/docs/faq#are-there-any-qps-or-daily-limits-on-my-use-of-reca
Source: recaptcha__en[1].js.3.drString found in binary or memory: https://developers.google.com/recaptcha/docs/faq#localhost_support
Source: recaptcha__en[1].js.3.drString found in binary or memory: https://developers.google.com/recaptcha/docs/faq#my-computer-or-network-may-be-sending-automated-que
Source: bootstrap.min[1].css.3.drString found in binary or memory: https://getbootstrap.com/)
Source: bootstrap.min[1].css.3.drString found in binary or memory: https://github.com/twbs/bootstrap/blob/master/LICENSE)
Source: {1B44EFEA-77F2-11EB-90E4-ECF4BB862DED}.dat.1.drString found in binary or memory: https://l-at.club/ca/fr/unsubscribe?cmp=ZGxhbmVAaW5ub3ZpYS5jb20=&t=434124312432323836313238244652243
Source: {1B44EFEA-77F2-11EB-90E4-ECF4BB862DED}.dat.1.drString found in binary or memory: https://l-at.club/main/
Source: ~DF9CBFC16E69B9A4A0.TMP.1.drString found in binary or memory: https://l-at.club/main/unsubscribe?cmp=ZGxhbmVAaW5ub3ZpYS5jb20=&t=4341243124323238363132382446522432
Source: {1B44EFEA-77F2-11EB-90E4-ECF4BB862DED}.dat.1.drString found in binary or memory: https://l-at.club/mainr/unsubscribe?cmp=ZGxhbmVAaW5ub3ZpYS5jb20=&t=434124312432323836313238244652243
Source: recaptcha__en[1].js.3.drString found in binary or memory: https://play.google.com/log?format=json&hasfast=true
Source: main[1].htm.3.drString found in binary or memory: https://stackpath.bootstrapcdn.com/bootstrap/4.3.1/css/bootstrap.min.css
Source: recaptcha__en[1].js.3.drString found in binary or memory: https://support.google.com/recaptcha
Source: recaptcha__en[1].js.3.drString found in binary or memory: https://support.google.com/recaptcha#6262736
Source: recaptcha__en[1].js.3.drString found in binary or memory: https://support.google.com/recaptcha/#6175971
Source: recaptcha__en[1].js.3.drString found in binary or memory: https://support.google.com/recaptcha/?hl=en#6223828
Source: recaptcha__en[1].js.3.drString found in binary or memory: https://www.google.com/log?format=json&hasfast=true
Source: main[1].htm.3.drString found in binary or memory: https://www.google.com/recaptcha/api.js
Source: anchor[1].htm.3.dr, bframe[1].htm.3.dr, api[1].js.3.dr, recaptcha__en[1].js.3.drString found in binary or memory: https://www.google.com/recaptcha/api2/
Source: {1B44EFEA-77F2-11EB-90E4-ECF4BB862DED}.dat.1.drString found in binary or memory: https://www.google.com/recaptcha/api2/anchor?ar=1&k=6Lff6mUaAAAAAEgSfmnyB3bQ-kBmtx8ar1m3-EaI&co=aHR0
Source: {1B44EFEA-77F2-11EB-90E4-ECF4BB862DED}.dat.1.drString found in binary or memory: https://www.google.com/recaptcha/api2/bframe?hl=en&v=jxFQ7RQ9s9HTGKeWcoa6UQdD&k=6Lff6mUaAAAAAEgSfmny
Source: anchor[1].htm.3.dr, bframe[1].htm.3.dr, webworker[1].js.3.dr, api[1].js.3.drString found in binary or memory: https://www.gstatic.com/recaptcha/releases/jxFQ7RQ9s9HTGKeWcoa6UQdD/recaptcha__en.js
Source: anchor[1].htm.3.dr, bframe[1].htm.3.drString found in binary or memory: https://www.gstatic.com/recaptcha/releases/jxFQ7RQ9s9HTGKeWcoa6UQdD/styles__ltr.css
Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownHTTPS traffic detected: 192.236.154.154:443 -> 192.168.2.3:49718 version: TLS 1.2
Source: unknownHTTPS traffic detected: 192.236.154.154:443 -> 192.168.2.3:49719 version: TLS 1.2
Source: classification engineClassification label: mal48.phis.win@3/31@4/2
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\HighJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DFB3C93A62F3F868D4.TMPJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknownProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:3352 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:3352 CREDAT:17410 /prefetch:2Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Masquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
http://www.emailing.nespresso.com/r/?id=h769639fb,5102ea95,508b93ed&p1=l-at.club/ca/fr/unsubscribe?cmp=ZGxhbmVAaW5ub3ZpYS5jb20=&t=43412431243232383631323824465224323032312D30322D3033&c=3232323537340%Avira URL Cloudsafe

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

SourceDetectionScannerLabelLink
https://l-at.club/mainr/unsubscribe?cmp=ZGxhbmVAaW5ub3ZpYS5jb20=&t=4341243124323238363132382446522430%Avira URL Cloudsafe
https://l-at.club/main/unsubscribe?cmp=ZGxhbmVAaW5ub3ZpYS5jb20=&t=43412431243232383631323824465224320%Avira URL Cloudsafe
https://l-at.club/ca/fr/unsubscribe?cmp=ZGxhbmVAaW5ub3ZpYS5jb20=&t=4341243124323238363132382446522430%Avira URL Cloudsafe
http://www.wikipedia.com/0%URL Reputationsafe
http://www.wikipedia.com/0%URL Reputationsafe
http://www.wikipedia.com/0%URL Reputationsafe

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
l-at.club
192.236.154.154
truefalse
    unknown
    stackpath.bootstrapcdn.com
    unknown
    unknownfalse
      high
      www.emailing.nespresso.com
      unknown
      unknownfalse
        high
        favicon.ico
        unknown
        unknownfalse
          unknown

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          https://l-at.club/main/true
            unknown

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            http://www.apache.org/licenses/LICENSE-2.0KFOmCnqEu92Fr1Mu4mxP[1].ttf.3.dr, KFOlCnqEu92Fr1MmEU9fBBc9[1].ttf.3.dr, KFOlCnqEu92Fr1MmYUtfBBc9[1].ttf.3.drfalse
              high
              http://www.nytimes.com/msapplication.xml3.1.drfalse
                high
                https://l-at.club/mainr/unsubscribe?cmp=ZGxhbmVAaW5ub3ZpYS5jb20=&t=434124312432323836313238244652243{1B44EFEA-77F2-11EB-90E4-ECF4BB862DED}.dat.1.drfalse
                • Avira URL Cloud: safe
                unknown
                https://stackpath.bootstrapcdn.com/bootstrap/4.3.1/css/bootstrap.min.cssmain[1].htm.3.drfalse
                  high
                  http://www.youtube.com/msapplication.xml7.1.drfalse
                    high
                    https://l-at.club/main/unsubscribe?cmp=ZGxhbmVAaW5ub3ZpYS5jb20=&t=4341243124323238363132382446522432~DF9CBFC16E69B9A4A0.TMP.1.drtrue
                    • Avira URL Cloud: safe
                    unknown
                    https://l-at.club/main/{1B44EFEA-77F2-11EB-90E4-ECF4BB862DED}.dat.1.drtrue
                      unknown
                      https://github.com/twbs/bootstrap/blob/master/LICENSE)bootstrap.min[1].css.3.drfalse
                        high
                        https://l-at.club/ca/fr/unsubscribe?cmp=ZGxhbmVAaW5ub3ZpYS5jb20=&t=434124312432323836313238244652243{1B44EFEA-77F2-11EB-90E4-ECF4BB862DED}.dat.1.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.wikipedia.com/msapplication.xml6.1.drfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.amazon.com/msapplication.xml.1.drfalse
                          high
                          http://www.live.com/msapplication.xml2.1.drfalse
                            high
                            https://getbootstrap.com/)bootstrap.min[1].css.3.drfalse
                              high
                              http://www.reddit.com/msapplication.xml4.1.drfalse
                                high
                                http://www.twitter.com/msapplication.xml5.1.drfalse
                                  high

                                  Contacted IPs

                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs

                                  Public

                                  IPDomainCountryFlagASNASN NameMalicious
                                  192.236.154.154
                                  unknownUnited States
                                  54290HOSTWINDSUSfalse

                                  Private

                                  IP
                                  192.168.2.1

                                  General Information

                                  Joe Sandbox Version:31.0.0 Emerald
                                  Analysis ID:358570
                                  Start date:25.02.2021
                                  Start time:21:18:05
                                  Joe Sandbox Product:CloudBasic
                                  Overall analysis duration:0h 2m 45s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:browseurl.jbs
                                  Sample URL:http://www.emailing.nespresso.com/r/?id=h769639fb,5102ea95,508b93ed&p1=l-at.club/ca/fr/unsubscribe?cmp=ZGxhbmVAaW5ub3ZpYS5jb20=&t=43412431243232383631323824465224323032312D30322D3033&c=323232353734
                                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                  Number of analysed new started processes analysed:9
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Detection:MAL
                                  Classification:mal48.phis.win@3/31@4/2
                                  Cookbook Comments:
                                  • Adjust boot time
                                  • Enable AMSI
                                  Warnings:
                                  Show All
                                  • Exclude process from analysis (whitelisted): taskhostw.exe, ielowutil.exe, backgroundTaskHost.exe, svchost.exe
                                  • Excluded IPs from analysis (whitelisted): 104.42.151.234, 104.43.193.48, 168.61.161.212, 52.255.188.83, 88.221.62.148, 2.23.155.240, 2.23.155.248, 216.58.206.36, 209.197.3.15, 216.58.208.163, 172.217.18.99, 51.104.139.180, 152.199.19.161, 184.30.20.56
                                  • Excluded domains from analysis (whitelisted): gstaticadssl.l.google.com, arc.msn.com.nsatc.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, e11290.dspg.akamaiedge.net, iecvlist.microsoft.com, go.microsoft.com, www.google.com, watson.telemetry.microsoft.com, www.gstatic.com, prod.fs.microsoft.com.akadns.net, fs.microsoft.com, fonts.gstatic.com, ie9comview.vo.msecnd.net, skypedataprdcolcus17.cloudapp.net, e1723.g.akamaiedge.net, skypedataprdcolcus15.cloudapp.net, ksd-generic.nespresso.com.edgesuite.net, skypedataprdcoleus17.cloudapp.net, a1903.ksd.akamai.net, blobcollector.events.data.trafficmanager.net, go.microsoft.com.edgekey.net, cds.j3z9t3p6.hwcdn.net, skypedataprdcolwus16.cloudapp.net, cs9.wpc.v0cdn.net
                                  • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                  • VT rate limit hit for: http://www.emailing.nespresso.com/r/?id=h769639fb,5102ea95,508b93ed&p1=l-at.club/ca/fr/unsubscribe?cmp=ZGxhbmVAaW5ub3ZpYS5jb20=&t=43412431243232383631323824465224323032312D30322D3033&c=323232353734

                                  Simulations

                                  Behavior and APIs

                                  No simulations

                                  Joe Sandbox View / Context

                                  IPs

                                  No context

                                  Domains

                                  No context

                                  ASN

                                  No context

                                  JA3 Fingerprints

                                  No context

                                  Dropped Files

                                  No context

                                  Created / dropped Files

                                  C:\Users\user\AppData\Local\Microsoft\Internet Explorer\DOMStore\HWE62H4P\www.google[1].xml
                                  Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:dropped
                                  Size (bytes):112
                                  Entropy (8bit):4.924692401319578
                                  Encrypted:false
                                  SSDEEP:3:D90aK1ryRtFwsW+pEeAqeSfjTBOKYYn91QahaIAqSQVSwoaKb:JFK1rUFy+pEeAq11aaMlQVeb
                                  MD5:1468AA83832E822902A99980397CFCA8
                                  SHA1:BDA4964C15CC025B4855F050041CF47FACE92583
                                  SHA-256:6737466BF8D8653D90A00A9A0AF93854ACD8037EF31809F9CFD610A7F0B90030
                                  SHA-512:89DF0F3AD0560242CFA3936FF921FC2C3CD70C8A0BAD9347834179753CFF3F7DF2745A84B104250A306A0570A8C125E20AD3628FD2D50A8F4B10F0EEAAB20DEC
                                  Malicious:false
                                  Reputation:low
                                  Preview: <root></root><root><item name="rc::a" value="MXlzcmdydzF6c3BkZg==" ltime="3755872304" htime="30870526" /></root>
                                  C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{1B44EFE8-77F2-11EB-90E4-ECF4BB862DED}.dat
                                  Process:C:\Program Files\internet explorer\iexplore.exe
                                  File Type:Microsoft Word Document
                                  Category:dropped
                                  Size (bytes):30296
                                  Entropy (8bit):1.8621426508880636
                                  Encrypted:false
                                  SSDEEP:96:rXZ0Zl2jWimktimFfimkdMiY/biY8JiY8QfiY8SsX:rXZ0Zl2jWmtLfadMnznAn3fn7sX
                                  MD5:D63F36214B00ACEEDC9B1CA4A15A4D2A
                                  SHA1:E2371F5692A185CF0C576050FC08CA6A32C2A655
                                  SHA-256:1ABE756FEB2ED4846A1A5E94B6CA6F39BF740B8F88DF017C684EAD947F6F9334
                                  SHA-512:D3A03EE298E5CA1E00E7C2A1C21ADF2562D3314D60B12CCB0F68E5FAC5872A1A1E2B5AFE962BABD318668988D1F50205D080BC639D203BB3C72682968728BE1B
                                  Malicious:false
                                  Reputation:low
                                  Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{1B44EFEA-77F2-11EB-90E4-ECF4BB862DED}.dat
                                  Process:C:\Program Files\internet explorer\iexplore.exe
                                  File Type:Microsoft Word Document
                                  Category:dropped
                                  Size (bytes):34848
                                  Entropy (8bit):2.4231076540930254
                                  Encrypted:false
                                  SSDEEP:192:rBZCQd6vkfjN29WtMxf8hzDLKy5L5p5gZcXwyyAl+/Z9LXJUT3cauHmH8Hcg:rHvIsbEU+18dDOcwyJk/XMs74O3
                                  MD5:120952B03BFB929313BA4449E2F20C5F
                                  SHA1:86AFA29B8829D13179E5CEF23F2B73DCA592EE9F
                                  SHA-256:6BA5351DC7F26F26321E1061655DBE0C699F4CC870C459E3EEBF4481D09B32C0
                                  SHA-512:AE2839BB51FC69EE202DFAD0355386098DFE9C7E3AE56890E2747FA555FF72C01A6965E8BEA87F31950AFD16939B5AAD08A604B86AA96707B5998F8437481CF2
                                  Malicious:false
                                  Reputation:low
                                  Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{1B44EFEB-77F2-11EB-90E4-ECF4BB862DED}.dat
                                  Process:C:\Program Files\internet explorer\iexplore.exe
                                  File Type:Microsoft Word Document
                                  Category:dropped
                                  Size (bytes):16984
                                  Entropy (8bit):1.5634546007704513
                                  Encrypted:false
                                  SSDEEP:48:IwxGcpr4Gwpa5G4pQB7GrapbSgeGQpKLKxG7HpRoTGIpG:rHZgQb6tBSTALKgTsA
                                  MD5:B52F5317D641ADC0E7AD801A11B701D5
                                  SHA1:243778556170D9580542939FD183DF60901B0D33
                                  SHA-256:2C5AA1CE7F703B184A0ECD15649484A3AFFCE0D03D96A0853A409D9477BAD7E5
                                  SHA-512:6F28663EB3D07857ACB78B13D032F46929A3B767A318047C66894B95459837257A4C4550DF8C248FAEE41E41361B1C441D7377EAC4CC07804299FA4E83A36B83
                                  Malicious:false
                                  Reputation:low
                                  Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-17529550060\msapplication.xml
                                  Process:C:\Program Files\internet explorer\iexplore.exe
                                  File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):656
                                  Entropy (8bit):5.088469533452867
                                  Encrypted:false
                                  SSDEEP:12:TMHdNMNxOEMInnWimI002EtM3MHdNMNxOEMInnWimI00ObVbkEtMb:2d6NxOkSZHKd6NxOkSZ76b
                                  MD5:8500EAC46430E2BFF8E9824D0B8EE428
                                  SHA1:CFDFEA6D558AA3338FCDF7235AAA7807CD091D0D
                                  SHA-256:8626DE0FEFA2F8E2E9C214EE11CE1C13C66D3FC96AC0B39527A27FECCA44EEFE
                                  SHA-512:79B942C5669870E7CB408280B2F2F88EA22C6806CF3EC907512F7AAB9C184CB5305B6C4147C2287B2EC3641C6DF88AC4C20B871441A785E49CFD39430901B320
                                  Malicious:false
                                  Reputation:low
                                  Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xf20f985b,0x01d70bfe</date><accdate>0xf20f985b,0x01d70bfe</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xf20f985b,0x01d70bfe</date><accdate>0xf20f985b,0x01d70bfe</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig>..
                                  C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18270793970\msapplication.xml
                                  Process:C:\Program Files\internet explorer\iexplore.exe
                                  File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):653
                                  Entropy (8bit):5.087353591930678
                                  Encrypted:false
                                  SSDEEP:12:TMHdNMNxe2kMuFEuFTnWimI002EtM3MHdNMNxe2kMuFEuFTnWimI00Obkak6EtMb:2d6NxrsFVFTSZHKd6NxrsFVFTSZ7Aa7b
                                  MD5:FE2E892847C9E5CE1265844A1AE951E1
                                  SHA1:CD12F0F33F513F239AE4853DB3FD9AC1598D68F9
                                  SHA-256:02C6B5951652759146FF41D306A3C337EDFD44947A3295B0906536AFE8DF99BE
                                  SHA-512:C27D066BE2B3307EDD4A545D15731055A30341F65511390EE4D92AD9B5CC2073484709AE99832F3FE96D06A80C4ECE08775FA91230188B61D1F96D91F5DE45E3
                                  Malicious:false
                                  Reputation:low
                                  Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0xf20ad39b,0x01d70bfe</date><accdate>0xf20ad39b,0x01d70bfe</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0xf20ad39b,0x01d70bfe</date><accdate>0xf20ad39b,0x01d70bfe</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Amazon.url"/></tile></msapplication></browserconfig>..
                                  C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-21706820\msapplication.xml
                                  Process:C:\Program Files\internet explorer\iexplore.exe
                                  File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):662
                                  Entropy (8bit):5.096926394407079
                                  Encrypted:false
                                  SSDEEP:12:TMHdNMNxvLMInnWimI002EtM3MHdNMNxvLMIsVTnWimI00ObmZEtMb:2d6NxvhSZHKd6NxvCVTSZ7mb
                                  MD5:4F06798A38BC009A3B803FCFA7DF6E8A
                                  SHA1:B4165596385327D2441D81195647EA8CBBB95455
                                  SHA-256:87B81913AB881E4B2CABC5C57E65BFD3B58C7E48596A1CA446E110E783F8A9C4
                                  SHA-512:9568415B3410289E1E082E9CC3DDAA2E5AE65F425A5125ED8D534D333D6BCFD7517B7A82A3F7D395C2E705DEC83B437050326A987DA8B867E39A59495E613E80
                                  Malicious:false
                                  Reputation:low
                                  Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0xf20f985b,0x01d70bfe</date><accdate>0xf20f985b,0x01d70bfe</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0xf20f985b,0x01d70bfe</date><accdate>0xf211faae,0x01d70bfe</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Wikipedia.url"/></tile></msapplication></browserconfig>..
                                  C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml
                                  Process:C:\Program Files\internet explorer\iexplore.exe
                                  File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):647
                                  Entropy (8bit):5.074855524064207
                                  Encrypted:false
                                  SSDEEP:12:TMHdNMNxiMrEnWimI002EtM3MHdNMNxiMrEnWimI00Obd5EtMb:2d6NxcSZHKd6NxcSZ7Jjb
                                  MD5:86B7A4E148F5C92C410BBE04D4084F34
                                  SHA1:E6E788BD8D826060FC74A6C214F807B145A774DA
                                  SHA-256:898F0466D9A8B2ED7C93694F9C9EFA51CD63A28CAC5ABD544D7BF179C21AED5D
                                  SHA-512:C65A0FAE6D5D14F4EC4541F8FC3590E0CD08FCC2E8DEEBF0AE3487283F003A59A9814B9DA43E69CDBE2D0468D6E5FDF60D2C3BAB28E8C3363A56FE367E725C32
                                  Malicious:false
                                  Reputation:low
                                  Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0xf20d35f7,0x01d70bfe</date><accdate>0xf20d35f7,0x01d70bfe</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0xf20d35f7,0x01d70bfe</date><accdate>0xf20d35f7,0x01d70bfe</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Live.url"/></tile></msapplication></browserconfig>..
                                  C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6757900\msapplication.xml
                                  Process:C:\Program Files\internet explorer\iexplore.exe
                                  File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):656
                                  Entropy (8bit):5.053720281126493
                                  Encrypted:false
                                  SSDEEP:12:TMHdNMNxhGwMsVEsVTnWimI002EtM3MHdNMNxhGwMsVEsVTnWimI00Ob8K075Ety:2d6NxQOVpVTSZHKd6NxQOVpVTSZ7YKa/
                                  MD5:9791DE3A0696FEBDCF9349DE6E77EEC7
                                  SHA1:30E0D941EA002A6E3411E60B16D14630C2A69BAB
                                  SHA-256:D590481D560239D6C94F63791A9B9ABDA7A2CD34139EF564F812A641A1DEAEB5
                                  SHA-512:6BE5CF6777740077ABC52B9766513D575B75082BC61776EA84DEBF5D86CB9973ACA4A6E47B51F47D22B32F238B5C422ABB0FB03C9E00E56EFD161C44430FABEE
                                  Malicious:false
                                  Reputation:low
                                  Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xf211faae,0x01d70bfe</date><accdate>0xf211faae,0x01d70bfe</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xf211faae,0x01d70bfe</date><accdate>0xf211faae,0x01d70bfe</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig>..
                                  C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8760897390\msapplication.xml
                                  Process:C:\Program Files\internet explorer\iexplore.exe
                                  File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):653
                                  Entropy (8bit):5.091613367800503
                                  Encrypted:false
                                  SSDEEP:12:TMHdNMNx0nMInnWimI002EtM3MHdNMNx0nMInnWimI00ObxEtMb:2d6Nx0VSZHKd6Nx0VSZ7nb
                                  MD5:E9D21605EBE8878205E0C5A7FF5953BC
                                  SHA1:CFDE4C5B026D6B98EA97227B88CA1DD7D6B1F973
                                  SHA-256:8BC0AD9E83A8490AAFA5102D0F150591B235B421450E5B819C4D73285172AA3A
                                  SHA-512:0BF422C337C6E5A452F7E4BA0BA0B1762142A8E698FB83FAB7BF9C93AF58545DE65E6B05C9BD437977EF6FF99C20D6179926D9F30D418B3AAFB75B295837305A
                                  Malicious:false
                                  Reputation:low
                                  Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0xf20f985b,0x01d70bfe</date><accdate>0xf20f985b,0x01d70bfe</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0xf20f985b,0x01d70bfe</date><accdate>0xf20f985b,0x01d70bfe</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Reddit.url"/></tile></msapplication></browserconfig>..
                                  C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml
                                  Process:C:\Program Files\internet explorer\iexplore.exe
                                  File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):656
                                  Entropy (8bit):5.128893234723564
                                  Encrypted:false
                                  SSDEEP:12:TMHdNMNxxMInnWimI002EtM3MHdNMNxxMInnWimI00Ob6Kq5EtMb:2d6NxPSZHKd6NxPSZ7ob
                                  MD5:90EB3D0006520EAD5FB3F39FB2877E6B
                                  SHA1:F91DC840BF4452C8F90D737C40AC8691BB673574
                                  SHA-256:1B30570777BD4341D3FA16D13D6DDF46EC7FC2A051B1E09F50BF915FF1122CB1
                                  SHA-512:0C33F7AE0CE5D2157684AF3239629A95984607B1FD04DD13C9EFE7D40F4D7EAEFD4E3DB4326B5AAD5C88338A4605EF012B222C157801EF5300FE08E435C09A4F
                                  Malicious:false
                                  Reputation:low
                                  Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0xf20f985b,0x01d70bfe</date><accdate>0xf20f985b,0x01d70bfe</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0xf20f985b,0x01d70bfe</date><accdate>0xf20f985b,0x01d70bfe</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\NYTimes.url"/></tile></msapplication></browserconfig>..
                                  C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20332743330\msapplication.xml
                                  Process:C:\Program Files\internet explorer\iexplore.exe
                                  File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):659
                                  Entropy (8bit):5.074682489716457
                                  Encrypted:false
                                  SSDEEP:12:TMHdNMNxcMrEnWimI002EtM3MHdNMNxcMrEnWimI00ObVEtMb:2d6NxmSZHKd6NxmSZ7Db
                                  MD5:300E6A318AF11B6B444384EA3D5157B2
                                  SHA1:1D249238782DED480132A6A5525E00DA28D01C6E
                                  SHA-256:1C59D42C62A25EDFE9EC082ED7820B76E880573778BB3040035BA5CD721C0616
                                  SHA-512:99CE9113385477BA436B1E80ADACE6DA12EC0EB70E5B0F8291E0C42903977A237AFF7D1305C4762B52E8C5A9C51B3E9B32BE601BF71F17E38CAF54C6FE03F893
                                  Malicious:false
                                  Reputation:low
                                  Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xf20d35f7,0x01d70bfe</date><accdate>0xf20d35f7,0x01d70bfe</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xf20d35f7,0x01d70bfe</date><accdate>0xf20d35f7,0x01d70bfe</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig>..
                                  C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin8215062560\msapplication.xml
                                  Process:C:\Program Files\internet explorer\iexplore.exe
                                  File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                  Category:dropped
                                  Size (bytes):653
                                  Entropy (8bit):5.060852335114437
                                  Encrypted:false
                                  SSDEEP:12:TMHdNMNxfnMrEnWimI002EtM3MHdNMNxfnMrEnWimI00Obe5EtMb:2d6NxfSZHKd6NxfSZ7ijb
                                  MD5:9D80D0482D2242BAA48C384FE3C0E128
                                  SHA1:E2153EBEFBCF2E87DDD3941B227F28B6D7B0A7A6
                                  SHA-256:8A16BC031A764D25564D4BD6DCD6CA16B321893581E8A229C416C077E4B1EAE2
                                  SHA-512:25A9C4578FDD0C05767EFD68A80875F68C3D7CF4EDE3B8301E7CEF050F03CDA4F703D6613D963DD2449EECC21866461FF9C8AFEC2BE7A18936B5BA2BDF03AB5B
                                  Malicious:false
                                  Reputation:low
                                  Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0xf20d35f7,0x01d70bfe</date><accdate>0xf20d35f7,0x01d70bfe</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0xf20d35f7,0x01d70bfe</date><accdate>0xf20d35f7,0x01d70bfe</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Google.url"/></tile></msapplication></browserconfig>..
                                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\KFOlCnqEu92Fr1MmEU9fBBc9[1].ttf
                                  Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                  File Type:TrueType Font data, 18 tables, 1st "GDEF", 8 names, Microsoft, language 0x409, Copyright 2011 Google Inc. All Rights Reserved.Roboto MediumRegularVersion 2.137; 2017Roboto-Me
                                  Category:downloaded
                                  Size (bytes):35588
                                  Entropy (8bit):6.410135551455154
                                  Encrypted:false
                                  SSDEEP:768:6yVJgIpAqZsXgDNHOBBPXNOKdhT1N+06XAxGrzmoqpxk0SnuUR:enq805OBBdhT1NP6XAxGryoqp2
                                  MD5:4D88404F733741EAACFDA2E318840A98
                                  SHA1:49E0F3D32666AC36205F84AC7457030CA0A9D95F
                                  SHA-256:B464107219AF95400AF44C949574D9617DE760E100712D4DEC8F51A76C50DDA1
                                  SHA-512:2E5D3280D5F7E70CA3EA29E7C01F47FEB57FE93FC55FD0EA63641E99E5D699BB4B1F1F686DA25C91BA4F64833F9946070F7546558CBD68249B0D853949FF85C5
                                  Malicious:false
                                  Reputation:low
                                  IE Cache URL:https://fonts.gstatic.com/s/roboto/v18/KFOlCnqEu92Fr1MmEU9fBBc9.ttf
                                  Preview: ........... GDEF......{....dGPOS......|<....GSUB7b.....8....OS/2t.#...r....`cmap......st...Lcvt 1..K..y....\fpgm..$...v.....gasp......{.....glyf.'.....,..j.hdmx......r|....head...r..n....6hhea......q....$hmtx..MO..n@....loca\v@z..l(....maxp......l.... name..:...z,....post.m.d..{.... prep...)..x|...S...d...(.............o......9........................EX../... >Y..EX../....>Y......9......9......9......9........9......9......01!!.!.......!.5.!.(.<..6......................}.w...x.^.^..^...............<......9.........EX../... >Y..EX../....>Y.....+X!...Y..../01.#.!.462...."&.~......J.JH.H......9KK97JJ....e...@.......%...EX../...">Y..../..../......./01..#.3..#.3..#...-#...w.}....}.....`...............EX../... >Y..EX../... >Y..EX../....>Y..EX../....>Y......9../.....+X!...Y............../.....+X!...Y...............................01.#.#.#5!.#5!.3.3.3.3.#.3.#.#.3.#...L.L...:...N.N.N.N..:..L.v.:....f....9....`...`....f.8.9...d.-.&...,...*-...9...EX../... >Y..EX../... >Y..EX.#/.
                                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\KFOlCnqEu92Fr1MmYUtfBBc9[1].ttf
                                  Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                  File Type:TrueType Font data, 18 tables, 1st "GDEF", 8 names, Microsoft, language 0x409, Copyright 2011 Google Inc. All Rights Reserved.Roboto BlackRegularVersion 2.137; 2017Roboto-Bla
                                  Category:downloaded
                                  Size (bytes):35208
                                  Entropy (8bit):6.392518822467014
                                  Encrypted:false
                                  SSDEEP:768:53Dmu13ucOmpIN22bN8o6Ze0XlGV+uM49pSeCu7XniviDffw6mo/quUR:lD13DjSNz0XlG0uL9YeCu7Xn4iTo9o/4
                                  MD5:4D99B85FA964307056C1410F78F51439
                                  SHA1:F8E30A1A61011F1EE42435D7E18BA7E21D4EE894
                                  SHA-256:01027695832F4A3850663C9E798EB03EADFD1462D0B76E7C5AC6465D2D77DBD0
                                  SHA-512:13D93544B16453FE9AC9FC025C3D4320C1C83A2ECA4CD01132CE5C68B12E150BC7D96341F10CBAA2777526CF72B2CA0CD64458B3DF1875A184BBB907C5E3D731
                                  Malicious:false
                                  Reputation:low
                                  IE Cache URL:https://fonts.gstatic.com/s/roboto/v18/KFOlCnqEu92Fr1MmYUtfBBc9.ttf
                                  Preview: ........... GDEF......z\...dGPOS......z.....GSUB7b..........OS/2ve#...p....`cmap......r....Lcvt ...=..xX...Zfpgm..#...ud....gasp......zP....glyf.......,..i~hdmx......q ....head...R..l....6hhea.]....p....$hmtx..<...l.....locaK./...j.....maxp......j.... name..9...x....|post.m.d..z0... prep...C..w ...8...d...(.............P...EX../....>Y..EX../....>Y......9......9......9......9........9......9......01!!.!.......!.5.!.(.<..6......................}.w...x.^.^..^....g...........<......9.........EX../....>Y..EX../....>Y.....+X!...Y..../01.!.!.462..."&....+.g..k.kk.k......J__.__.......^.......&......9........./......9../........01..#.3..#.3.+..._+...v.S.8..S.8.......z.......... !..9.........EX../....>Y..EX../....>Y..EX../....>Y..EX../....>Y......9../.....+X!...Y............../.....+X!...Y...............................01.#.#.#53.#53.3.3.3.3.!.3.!.#.3.#.d.C.C..,..E.D.E.E...,...C.@.,....f.........`...`.....f.Q......S.&.Q...-.r.+./..9...EX../....>Y..EX.!/..!.>Y..!...9........!..9......
                                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\KFOmCnqEu92Fr1Mu4mxP[1].ttf
                                  Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                  File Type:TrueType Font data, 18 tables, 1st "GDEF", 8 names, Microsoft, language 0x409, Copyright 2011 Google Inc. All Rights Reserved.RobotoRegularVersion 2.137; 2017Roboto-Regularht
                                  Category:downloaded
                                  Size (bytes):35408
                                  Entropy (8bit):6.412277939913633
                                  Encrypted:false
                                  SSDEEP:768:PX4i+tezjtQYgu30G0xL9nQbuEL7LQo9SBxQbptqKmomjJlvh:PJ2z3G0xpUusLEBKptqNomjV
                                  MD5:372D0CC3288FE8E97DF49742BAEFCE90
                                  SHA1:754D9EAA4A009C42E8D6D40C632A1DAD6D44EC21
                                  SHA-256:466989FD178CA6ED13641893B7003E5D6EC36E42C2A816DEE71F87B775EA097F
                                  SHA-512:8447BC59795B16877974CD77C52729F6FF08A1E741F68FF445C087ECC09C8C4822B83E8907D156A00BE81CB2C0259081926E758C12B3AEA023AC574E4A6C9885
                                  Malicious:false
                                  Reputation:low
                                  IE Cache URL:https://fonts.gstatic.com/s/roboto/v18/KFOmCnqEu92Fr1Mu4mxP.ttf
                                  Preview: ........... GDEF......{`...dGPOS...h..{.....GSUB7b..........OS/2tq#...q....`cmap......s....Lcvt +.....yl...Tfpgmw.`...vd....gasp......{T....glyf.......,..j.hdmx......r ....head.j.z..m....6hhea......q....$hmtx..Vl..m.....loca?.#...k.....maxp......k.... name.U9...y....tpost.m.d..{4... prep.f....x ...I...d...(.............q......9........................EX../....>Y..EX../....>Y......9......9......9......9..........9......9.......01!!.!.......!.5.!.(.<..6......................}.w...x.^.^..^.......{.......0...EX../....>Y..EX../....>Y.....+X!...Y......901.#.3.462..."&.[....7l88l7......-==Z;;........#.........../......9../........01..#.3..#.3...o.....o...x...........w...............EX../....>Y..EX../....>Y..EX../....>Y..EX../....>Y......9|../......+X!...Y............../.....+X!...Y...............................01.!.#.#5!.!5!.3.!.3.3.#.3.#.#.!.!....P.P...E....R.R..R.R..E..P....E.....f....b....`...`.....f.#.b....n.0.....+.i...EX../....>Y..EX."/..".>Y.."...9..................+X!.
                                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\logo_48[1].png
                                  Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                  File Type:PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
                                  Category:downloaded
                                  Size (bytes):2228
                                  Entropy (8bit):7.82817506159911
                                  Encrypted:false
                                  SSDEEP:48:4/6MuQu6DYYEcBDlBVzqawiHI1Oupgl8m7NCnagQJFknwD:4SabhtXqMHyCl8m7N0ag6D
                                  MD5:EF9941290C50CD3866E2BA6B793F010D
                                  SHA1:4736508C795667DCEA21F8D864233031223B7832
                                  SHA-256:1B9EFB22C938500971AAC2B2130A475FA23684DD69E43103894968DF83145B8A
                                  SHA-512:A0C69C70117C5713CAF8B12F3B6E8BBB9CDAF72768E5DB9DB5831A3C37541B87613C6B020DD2F9B8760064A8C7337F175E7234BFE776EEE5E3588DC5662419D9
                                  Malicious:false
                                  Reputation:low
                                  IE Cache URL:https://www.gstatic.com/recaptcha/api2/logo_48.png
                                  Preview: .PNG........IHDR...0...0.....W.......gAMA......a.... cHRM..z&..............u0...`..:....p..Q<....bKGD.......C......pHYs.................IDATh...P....=..8.....Nx. ..PlP8..;.C.1iL#6...*.Z..!......3.po .o.L.i.I..1fl..4..ujL&6$...............w...........,Z..z. ~.....\.._.C.eK...g..%..P..L7...96..q....L.....k6...*..,xz.._......B."#...L(n..f..Yb...*.8.;....K)N...H).%.F"Ic.LB.........jG.uD..B....Tm....T..).A.}D.f..3.V.....O.....t_..].x.{o......*....x?!W...j..@..G=Ed.XF.........J..E?../]..?p..W..H..d5% WA+.....)2r..+..'qk8.../HS.[...u..z.P.*....-.A.}.......I .P.....S....|...)..KS4....I.....W...@....S.s..s..$`.X9.....E.x.=.u.*iJ...........k......'...!.a....*+.....(...S..\h....@............I.$..%.2....l......a.|.....U....y.....t..8....TF.o.p.+.@<.g........-.M.....:.@..(.......@......>..=.ofm.WM{...e..,..D.r.......w....T.L.os..T@Rv..;.....9....56<.x...........2.k.1....dd.V.....m..y5../4|...G.p.V.......6...}.....B........5...&..v..yTd.6...../m.K...(.
                                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\recaptcha__en[1].js
                                  Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                  File Type:ASCII text, with very long lines
                                  Category:downloaded
                                  Size (bytes):339250
                                  Entropy (8bit):5.72235648390319
                                  Encrypted:false
                                  SSDEEP:6144:2LgyvcysILY+3SqzE30QvvbuzLRp/epQx2g9tIxGdPLy:2LQ6HWEAbyRopQx9IC+
                                  MD5:32C49DC5F9FA12F530A84CD51D5E274A
                                  SHA1:89C75509FB3E3807679E55B57A4C0569A4B8EDD8
                                  SHA-256:46C97699759B3239F2306F7D09DF96131FB1044315B07CFDD62B66C2E4C0125B
                                  SHA-512:7388DB3DF5DDC98C633E0037020672366D5DD0F078206EE9A2412A90C9EBC9806CB43131A0C947A71E97FAD1F3EF6460FD1AC28991797E1EA2665B5765001680
                                  Malicious:false
                                  Reputation:low
                                  IE Cache URL:https://www.gstatic.com/recaptcha/releases/jxFQ7RQ9s9HTGKeWcoa6UQdD/recaptcha__en.js
                                  Preview: (function(){/*.. Copyright The Closure Library Authors.. SPDX-License-Identifier: Apache-2.0.*/.var F=function(){return[function(B,G,Z,I,W,l,d,N){if(!(B+(N=[2,11,13],N)[0]&N[2]))a:{for(I=(Z=L[32](N[1],!1,G(),g[N[0]].bind(null,32)),0);I<Z.length;I++)if(Z[I].src&&M[16](N[0]).test(Z[I].src)){d=I;break a}d=-1}return(B^644)%((B<<1&((B-6)%5||Z.Y||(Z.Y=new IA,Z.Z=0,Z.S&&L[3](3,null,1,"&","=",function(S,x){Z.add(decodeURIComponent(S.replace(/\+/g,G)),x)},Z.S)),15))==N[0]&&(G.Y=I,d={value:Z}),9)||(k.call(this),this.C=l8[Z]||l8[1],this.o=l,this.S=I,this.W=G,this.Y=W),d},function(B,G,Z,I,W,l){return(B|.((B-9)%2||(l=dR(Z.W,function(d){return"function"===typeof d[G]})),8))&7||(I==G?Z.I.call(Z.S,W):Z.Z&&Z.Z.call(Z.S,W)),l},function(B,G,Z,I,W,l,d,N,S){if(!((B^(N=[19,3,10],349))%N[0])){if(I==Z)throw Error("Unable to set parent component");if(l=Z&&I.I&&I.uZ)W=I.I,d=I.uZ,l=W.K&&d?w[47](N[1],d,W.K)||G:null;if(l&&I.I!=Z)throw Error("Unable to set parent component");(I.I=Z,k.O).Hm.call(I,Z)}if(!((B>>2)%11)
                                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\0W10PBUV\webworker[1].js
                                  Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                  File Type:ASCII text, with no line terminators
                                  Category:downloaded
                                  Size (bytes):102
                                  Entropy (8bit):4.866417162271585
                                  Encrypted:false
                                  SSDEEP:3:JSbMqSL1cdXWKQKEIElWc800XwECWaee:PLKdXNQKslW903jL
                                  MD5:C4DE09C4DA7F5AC82A7022B16D6CA1E1
                                  SHA1:7B219909A24256D5BC57F6F25DFDDDB0DEDFEE43
                                  SHA-256:AB1E16C1B3F793E0AEC723C7A7ADD9E179781105D1646CED630AF7007CA52720
                                  SHA-512:3A22CB6A31BFBA24143351F018436FF7978C444A36392447D566C9251A37DE76ECF1262FE4EE2BB97EDD788481626A2AFB72FEFFCEE853FE2840A31C3A68F525
                                  Malicious:false
                                  Reputation:low
                                  IE Cache URL:https://www.google.com/recaptcha/api2/webworker.js?hl=en&v=jxFQ7RQ9s9HTGKeWcoa6UQdD
                                  Preview: importScripts('https://www.gstatic.com/recaptcha/releases/jxFQ7RQ9s9HTGKeWcoa6UQdD/recaptcha__en.js');
                                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\api[1].js
                                  Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                  File Type:ASCII text, with very long lines, with no line terminators
                                  Category:downloaded
                                  Size (bytes):850
                                  Entropy (8bit):5.527084929213002
                                  Encrypted:false
                                  SSDEEP:24:2jkm94/zKPccAv+KVCetQ1IeqsLqo40RWUnYN:VKEctKoe61IoLrwUnG
                                  MD5:F265186D221473A895D2373E5666BC80
                                  SHA1:1B167F3E67EA18FD54FA21AFB265156B4AEAF7E6
                                  SHA-256:7BE93782718B63BDF0478467DBAE39879064F603EB44D42A90A6C6FEE1EE81A3
                                  SHA-512:F677A3F22F324555AAAF6249EA0569F68F35BCB1B567956BF517026646E4B88275EBCCDFBFDB32B06FA067767AD0B966379C53BE4D19071408A99EAC867F1987
                                  Malicious:false
                                  Reputation:low
                                  IE Cache URL:https://www.google.com/recaptcha/api.js
                                  Preview: /* PLEASE DO NOT COPY AND PASTE THIS CODE. */(function(){var w=window,C='___grecaptcha_cfg',cfg=w[C]=w[C]||{},N='grecaptcha';var gr=w[N]=w[N]||{};gr.ready=gr.ready||function(f){(cfg['fns']=cfg['fns']||[]).push(f);};w['__recaptcha_api']='https://www.google.com/recaptcha/api2/';(cfg['render']=cfg['render']||[]).push('onload');w['__google_recaptcha_client']=true;var d=document,po=d.createElement('script');po.type='text/javascript';po.async=true;po.src='https://www.gstatic.com/recaptcha/releases/jxFQ7RQ9s9HTGKeWcoa6UQdD/recaptcha__en.js';po.crossOrigin='anonymous';po.integrity='sha384-M9863pj8VTkCmdbfuuaGvQUaNXo72mc4KbfOtDfVBjv+zjrQy0vx5uzX9BsGSepE';var e=d.querySelector('script[nonce]'),n=e&&(e['nonce']||e.getAttribute('nonce'));if(n){po.setAttribute('nonce',n);}var s=d.getElementsByTagName('script')[0];s.parentNode.insertBefore(po, s);})();
                                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\bootstrap.min[1].css
                                  Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                  File Type:ASCII text, with very long lines
                                  Category:downloaded
                                  Size (bytes):155758
                                  Entropy (8bit):5.06621719317054
                                  Encrypted:false
                                  SSDEEP:1536:b/xImT+IcCQYYDnDEBi83NcuSEk/ekX/uKiq3SYiLENM6HN26F:b/Riz7G3q3SYiLENM6HN26F
                                  MD5:A15C2AC3234AA8F6064EF9C1F7383C37
                                  SHA1:6E10354828454898FDA80F55F3DECB347FD9ED21
                                  SHA-256:60B19E5DA6A9234FF9220668A5EC1125C157A268513256188EE80F2D2C8D8D36
                                  SHA-512:B435CF71A9AE66C59677A3AC285C87EA702A87F32367FE5893CF13E68F9A31FCA0A8D14F6A7D692F23C5027751CE63961CA4FE8D20F35A926FF24AE3EB1D4B30
                                  Malicious:false
                                  Reputation:low
                                  IE Cache URL:https://stackpath.bootstrapcdn.com/bootstrap/4.3.1/css/bootstrap.min.css
                                  Preview: /*!. * Bootstrap v4.3.1 (https://getbootstrap.com/). * Copyright 2011-2019 The Bootstrap Authors. * Copyright 2011-2019 Twitter, Inc.. * Licensed under MIT (https://github.com/twbs/bootstrap/blob/master/LICENSE). */:root{--blue:#007bff;--indigo:#6610f2;--purple:#6f42c1;--pink:#e83e8c;--red:#dc3545;--orange:#fd7e14;--yellow:#ffc107;--green:#28a745;--teal:#20c997;--cyan:#17a2b8;--white:#fff;--gray:#6c757d;--gray-dark:#343a40;--primary:#007bff;--secondary:#6c757d;--success:#28a745;--info:#17a2b8;--warning:#ffc107;--danger:#dc3545;--light:#f8f9fa;--dark:#343a40;--breakpoint-xs:0;--breakpoint-sm:576px;--breakpoint-md:768px;--breakpoint-lg:992px;--breakpoint-xl:1200px;--font-family-sans-serif:-apple-system,BlinkMacSystemFont,"Segoe UI",Roboto,"Helvetica Neue",Arial,"Noto Sans",sans-serif,"Apple Color Emoji","Segoe UI Emoji","Segoe UI Symbol","Noto Color Emoji";--font-family-monospace:SFMono-Regular,Menlo,Monaco,Consolas,"Liberation Mono","Courier New",monospace}*,::after,::before{box-sizing:
                                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\MEEXW4H4\main[1].htm
                                  Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                  File Type:HTML document, ASCII text, with very long lines
                                  Category:dropped
                                  Size (bytes):4089
                                  Entropy (8bit):6.087642737690734
                                  Encrypted:false
                                  SSDEEP:96:pXOwrxD4Hz25ACm8AaPrm2uDolnMauObL2ZekEVaCrlSg:dTDC2C6ZzYDoMjOn2ZeBMCrj
                                  MD5:35215D0F2AD79BCAF364698DF19471BE
                                  SHA1:163534CE4E89EB0C0989A8885C535ECC60E6B2B5
                                  SHA-256:8F3882B7A14723C994322F4379F9C5530594929EC8A98362FABBACD342A03482
                                  SHA-512:3FE2BE3D251A74023D7D973E5AB8DE8D5897D00E3AF3EB489B27C7C35EEC7E6E656A07E761C97517BC1A92ABA0F1396A4F4950D6E65B6CFD1F68ED80551BCE51
                                  Malicious:false
                                  Reputation:low
                                  Preview: .<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">.<html xmlns="http://www.w3.org/1999/xhtml">.<head>.<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />.<title>Redirecting...</title>.<script src="https://www.google.com/recaptcha/api.js" async defer></script>.<link href="https://stackpath.bootstrapcdn.com/bootstrap/4.3.1/css/bootstrap.min.css" rel="stylesheet" integrity="sha384-ggOyR0iXCbMQv3Xipma34MD+dH/1fQ784/j6cY/iJTQUOhcWr7x9JvoRxT2MZw1T" crossorigin="anonymous">.<script> .</script>.</head>.<body>. <div class="container h-100 d-flex justify-content-center">. <div class="my-auto">. <form action="main.php#NAv4Iy1laxwi4kMQauBLUpOkZx4vQg9kjGMEa8Jnl8Mw19TxiRmwN4i05chLQesu9JKxKcGSqyoaqottxxgjugi848Ys5YNycifhuhIQgyly4emnUliJGgg8MbfBeqgmlHYr13NP5RL4blaHkwYHRQhq6UlTJgNWABYrWc7S1nrue6dGWWTJqRjSEyJDObJlMGyUrYZz9GdO7nGJj08TQjB3KCRakQ4Zp9r3mBDJ6TxsrT0cg0mq7zn9kgKMfmt5DGR4VwZ0hVjtKu0uueMOijKvXtVP
                                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\bframe[1].htm
                                  Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                  File Type:HTML document, ASCII text
                                  Category:dropped
                                  Size (bytes):1553
                                  Entropy (8bit):5.587275124185853
                                  Encrypted:false
                                  SSDEEP:24:D0ksPkGAy/iOYsFYxMJ0/iOYXFYx1S/iOYrFYxAQNPGtPjgvPCt9U0NSAL3B1zwm:Dc1A1OLKIXOgKNOMK5N+RwqZV1T
                                  MD5:FA7EE097ECBE3171B44C06E4C395D44C
                                  SHA1:31AC1C16150A843020992A3FF00D1E947A85FDD7
                                  SHA-256:54FBA8F33AB3E3EBAB58387AEFD96EB73EF40B9455105EF3E540394C8E87C6ED
                                  SHA-512:A239C6EE65B341467362CB6DED7F76AF1EE928E930A831E2159DD6400888960B7CC399643C32F23D59435DB7838D79E38141FF0A855735F5E4620E5B3D003A0F
                                  Malicious:false
                                  Reputation:low
                                  Preview: <!DOCTYPE HTML><html dir="ltr" lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.<meta http-equiv="X-UA-Compatible" content="IE=edge">..<title>reCAPTCHA</title>.<style type="text/css">.@font-face {. font-family: 'Roboto';. font-style: normal;. font-weight: 400;. src: url(//fonts.gstatic.com/s/roboto/v18/KFOmCnqEu92Fr1Mu4mxP.ttf) format('truetype');.}.@font-face {. font-family: 'Roboto';. font-style: normal;. font-weight: 500;. src: url(//fonts.gstatic.com/s/roboto/v18/KFOlCnqEu92Fr1MmEU9fBBc9.ttf) format('truetype');.}.@font-face {. font-family: 'Roboto';. font-style: normal;. font-weight: 900;. src: url(//fonts.gstatic.com/s/roboto/v18/KFOlCnqEu92Fr1MmYUtfBBc9.ttf) format('truetype');.}..</style>.<link rel="stylesheet" type="text/css" href="https://www.gstatic.com/recaptcha/releases/jxFQ7RQ9s9HTGKeWcoa6UQdD/styles__ltr.css" nonce="HV+NCuDuO9fYGff9AqAq/A">.<script nonce="HV+NCuDuO9fYGff9AqAq/A" type="text/javascript">window['__recaptcha_api
                                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\favicon[1].htm
                                  Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                  File Type:HTML document, ASCII text
                                  Category:dropped
                                  Size (bytes):135
                                  Entropy (8bit):4.730167916533376
                                  Encrypted:false
                                  SSDEEP:3:qVv/FTL//rG3oOkADY3LQHEOt8jOkADLWEHsVM7L//+ac4NGb:qF/pO3+mY7QHtSmfHsVI6X4Qb
                                  MD5:83B862BEAD2D480026254FB2A6EB9969
                                  SHA1:26BAD9E6C1579172B0E3B6BC1C18918164FF6478
                                  SHA-256:FB258CB538CA92D61C8CD4EB08CC23DA70C278B8766EAA731CE11E9B2F1DA4D4
                                  SHA-512:E4AB645251A514EE41457923B7EC8EEE4A8B0A2B77DC046DA5463B2C6020E4E8497268830C3F75387DD6AD02E75C8C71952FA25437D9F53CF20EB433F7B68A33
                                  Malicious:false
                                  Reputation:low
                                  Preview: <html>. <body>. <script>window.location.href="/index.php?" + window.location.href.split("?")[1];</script>. </body>.</html>
                                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PSUEOSZZ\otnuxQi5Wy3Eq9ZSf6m85_p8wZJ2BK7uby0VQVvK-UA[1].js
                                  Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                  File Type:ASCII text, with very long lines, with no line terminators
                                  Category:downloaded
                                  Size (bytes):21037
                                  Entropy (8bit):5.578581267912917
                                  Encrypted:false
                                  SSDEEP:384:K3MOZGdqZx3F1oAes+SyMvrTc03QMEZguFhhqYj8OEM5lWmR65hLzjzDzEzOYP:KcjsZx3F1oAB+SVrTc03nErxxzlUb0h
                                  MD5:7AD08192F8856DD00BB2A2F2186E231B
                                  SHA1:257BCF4051EAA0DF2BEA75DA9BDC89A2504E9BA6
                                  SHA-256:A2D9EEC508B95B2DC4ABD6527FA9BCE7FA7CC1927604AEEE6F2D15415BCAF940
                                  SHA-512:50358F70890EF9BF5EEC3D6D3856809FA5513A91C2810F188BD613131513ADA93576AEBBC3FDB9D860C2F53710639E526E8CB20123FA726C047B6665E8505A6B
                                  Malicious:false
                                  Reputation:low
                                  IE Cache URL:https://www.google.com/js/bg/otnuxQi5Wy3Eq9ZSf6m85_p8wZJ2BK7uby0VQVvK-UA.js
                                  Preview: /* Anti-spam. Want to say hello? Contact (base64) Ym90Z3VhcmQtY29udGFjdEBnb29nbGUuY29t */ (function(){var n=function(y,g){if(y=(g=null,v).trustedTypes,!y||!y.createPolicy)return g;try{g=y.createPolicy("bg",{createHTML:T,createScript:T,createScriptURL:T})}catch(k){v.console&&v.console.error(k.message)}return g},T=function(y){return y},v=this||self;(0,eval)(function(y,g){return(g=n())&&1===y.eval(g.createScript("1"))?function(k){return g.createScript(k)}:function(k){return""+k}}(v)(Array(7824*Math.random()|0).join("\n")+'(function(){var W,yL=function(y){return y},gY=function(y,g){function v(){}((y.W=(v.prototype=g.prototype,g.prototype),y).prototype=new v,y.prototype).constructor=y,y.DU=function(T,n,k){for(var P=Array(arguments.length-2),M=2;M<arguments.length;M++)P[M-2]=arguments[M];return g.prototype[n].apply(T,P)}},u=function(y,g){return"object"==(g=typeof y,g)&&null!=y||"function"==g},vq=function(y,g){if(y=(g=null,J).trustedTypes,!y||!y.createPolicy)return g;try{g=y.createPolicy("bg"
                                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\anchor[1].htm
                                  Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                  File Type:HTML document, ASCII text, with very long lines
                                  Category:dropped
                                  Size (bytes):14156
                                  Entropy (8bit):5.943885980673333
                                  Encrypted:false
                                  SSDEEP:384:3/SzMxCJHG9K6pXQw4fIPazUhykZL0TFc8ZO:3/SzMOm9JGwIIPaz+TeXA
                                  MD5:36F04426D4072B391A2C7053773B528F
                                  SHA1:29BC205710F70E83C1F1EFBFE107F7121F39A2A7
                                  SHA-256:7E5251B0E50C39156112C0FCB42854DCFE1601A3DD27B7B6F82259266AC279C0
                                  SHA-512:41DD0D1B79891E088C6898E9648D5A44D030671730E13CA85A9E5AC9D6BD8CE3E2EDF81B66C3932327F010CC44C35166BDD0C4BA2C371A4697192D088749A3B5
                                  Malicious:false
                                  Reputation:low
                                  Preview: <!DOCTYPE HTML><html dir="ltr" lang="en"><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8">.<meta http-equiv="X-UA-Compatible" content="IE=edge">.<style type="text/css">.@font-face {. font-family: 'Roboto';. font-style: normal;. font-weight: 400;. src: url(//fonts.gstatic.com/s/roboto/v18/KFOmCnqEu92Fr1Mu4mxP.ttf) format('truetype');.}.@font-face {. font-family: 'Roboto';. font-style: normal;. font-weight: 500;. src: url(//fonts.gstatic.com/s/roboto/v18/KFOlCnqEu92Fr1MmEU9fBBc9.ttf) format('truetype');.}.@font-face {. font-family: 'Roboto';. font-style: normal;. font-weight: 900;. src: url(//fonts.gstatic.com/s/roboto/v18/KFOlCnqEu92Fr1MmYUtfBBc9.ttf) format('truetype');.}..</style>.<link rel="stylesheet" type="text/css" href="https://www.gstatic.com/recaptcha/releases/jxFQ7RQ9s9HTGKeWcoa6UQdD/styles__ltr.css" nonce="9gbDVDppr9kRQMbpHlFJVQ">.<script nonce="9gbDVDppr9kRQMbpHlFJVQ" type="text/javascript">window['__recaptcha_api'] = 'https://www.google.c
                                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\styles__ltr[1].css
                                  Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                  File Type:ASCII text, with very long lines, with no line terminators
                                  Category:downloaded
                                  Size (bytes):51178
                                  Entropy (8bit):5.968129596292632
                                  Encrypted:false
                                  SSDEEP:768:+LUmmAWTe2uXYp8Mi+yKSrKebyBwxDl+xedtY5PoiDH1fkQJVEwY:4UcW6v+2rKwxDliP7dnY
                                  MD5:E548DC0AEF0A21A2DF5B964EF93118AA
                                  SHA1:983091AEC1E7BFEB79F768E4B997C43B55EDE14A
                                  SHA-256:6B08EA3A348838BC942AD470A757575975BD09459B63C1872C6E1129A6CA1939
                                  SHA-512:17A4EC0CB167C2C7653ABEF6384C68BE2BCEEE6FB657D3A27132B3508F28087AEEB8072409DB95F6D4BE7BFE1F54A51D6EB073AE5D902DA90ADA5ECDE72F29FC
                                  Malicious:false
                                  Reputation:low
                                  IE Cache URL:https://www.gstatic.com/recaptcha/releases/jxFQ7RQ9s9HTGKeWcoa6UQdD/styles__ltr.css
                                  Preview: .goog-inline-block{position:relative;display:-moz-inline-box;display:inline-block}* html .goog-inline-block{display:inline}*:first-child+html .goog-inline-block{display:inline}.recaptcha-checkbox{border:none;font-size:1px;height:28px;margin:4px;width:28px;overflow:visible;outline:0;vertical-align:text-bottom}.recaptcha-checkbox-border{-webkit-border-radius:2px;-moz-border-radius:2px;border-radius:2px;background-color:#fff;border:2px solid #c1c1c1;font-size:1px;height:24px;position:absolute;width:24px;z-index:1}.recaptcha-checkbox-borderAnimation{background-image:url(data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAFQAAANICAYAAABZl8i8AAAABmJLR0QA/wD/AP+gvaeTAAAACXBIWXMAAABIAAAASABGyWs+AAAACXZwQWcAAABUAAADSAC4K4y8AAA4oElEQVR42u2dCZRV1ZX3q5iE4IQIiKQQCKBt0JLEIUZwCCk7pBNFiRMajZrIl9aOLZ8sY4CWdkDbT2McooaAEmNixFhpaYE2dCiLScWiQHCgoGQoGQuhGArKKl7V+c5/n33fO/V4w733nVuheXuv9V/rrnvP2Xud3zvTPee+ewsKxMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExMTExP4OdtlT6ztAbRWvvLy8A3QkwxzH6tBGMMexI
                                  C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\unsubscribe[1].htm
                                  Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                  File Type:HTML document, ASCII text
                                  Category:downloaded
                                  Size (bytes):135
                                  Entropy (8bit):4.730167916533376
                                  Encrypted:false
                                  SSDEEP:3:qVv/FTL//rG3oOkADY3LQHEOt8jOkADLWEHsVM7L//+ac4NGb:qF/pO3+mY7QHtSmfHsVI6X4Qb
                                  MD5:83B862BEAD2D480026254FB2A6EB9969
                                  SHA1:26BAD9E6C1579172B0E3B6BC1C18918164FF6478
                                  SHA-256:FB258CB538CA92D61C8CD4EB08CC23DA70C278B8766EAA731CE11E9B2F1DA4D4
                                  SHA-512:E4AB645251A514EE41457923B7EC8EEE4A8B0A2B77DC046DA5463B2C6020E4E8497268830C3F75387DD6AD02E75C8C71952FA25437D9F53CF20EB433F7B68A33
                                  Malicious:false
                                  Reputation:low
                                  IE Cache URL:https://l-at.club/ca/fr/unsubscribe?cmp=ZGxhbmVAaW5ub3ZpYS5jb20=&t=43412431243232383631323824465224323032312D30322D3033&c=323232353734
                                  Preview: <html>. <body>. <script>window.location.href="/index.php?" + window.location.href.split("?")[1];</script>. </body>.</html>
                                  C:\Users\user\AppData\Local\Temp\~DF9CBFC16E69B9A4A0.TMP
                                  Process:C:\Program Files\internet explorer\iexplore.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):44850
                                  Entropy (8bit):1.0864309511968677
                                  Encrypted:false
                                  SSDEEP:192:kBqoxKAuqR+ouk1eB9ty5L5p5gZcXwyyAl+/Z9LXJUT3cauHmH8H:kBqoxKAuqR+ouk1eB9tcwyJk/XMs74O
                                  MD5:B1D82C7B0890113312BF40989CF5D06B
                                  SHA1:74C8C749E13F85642141B17E8BEF36381C88D1C4
                                  SHA-256:F310F84F07C2D865AEB1822F3592CFD4088E64D1CF67EB8BC790957619159058
                                  SHA-512:E3490F30399CF179C8583AAA6A1E0DAD314CF900F8E4783AEE97907CE7226091DE608F122C068F767F44231CEE059208737643A71330DF723F9F6098A33276B3
                                  Malicious:false
                                  Reputation:low
                                  Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  C:\Users\user\AppData\Local\Temp\~DFA03943B27C5375FC.TMP
                                  Process:C:\Program Files\internet explorer\iexplore.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):25441
                                  Entropy (8bit):0.30121824914630435
                                  Encrypted:false
                                  SSDEEP:24:c9lLh9lLh9lIn9lIn9lRx/9lRJ9lTb9lTb9lSSU9lSSU9laAa/9laA/A9:kBqoxxJhHWSVSEabA
                                  MD5:2C07563A6F321F94215D79B4D68E5ED3
                                  SHA1:8F03C0F44F7A24CA1E562D33CBCF6EE43ED69D3A
                                  SHA-256:CC1D7673A7FBB6883A332A3AED5B72C76E391AB81B935546EE3AC53E2F91E447
                                  SHA-512:D8A4442EDE9D152469DC33ECA33E89BF632DE2A484D6363EDB6C56A909161EDB7C34613958D299C7C6C1CB0ACF040F040BC5BEDD43BF443D494C55B083E3341D
                                  Malicious:false
                                  Reputation:low
                                  Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  C:\Users\user\AppData\Local\Temp\~DFB3C93A62F3F868D4.TMP
                                  Process:C:\Program Files\internet explorer\iexplore.exe
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):13029
                                  Entropy (8bit):0.4805165277939706
                                  Encrypted:false
                                  SSDEEP:24:c9lLh9lLh9lIn9lIn9lopF9lor9lWuL7DY0Y8Qgbv:kBqoIMSC/Y0Y0
                                  MD5:E4BFE0BB8CEEC9E95FB2AADA7B686BC2
                                  SHA1:4AED58A78DEC879A69381F6F7BC745746EED4983
                                  SHA-256:F75AFB4DCFC01F3506AB7064CA92ED5A6B5B388BAA12931D81471645BE63895E
                                  SHA-512:D706B2A4AF293F6D52AD8FE1228DB92ACE32E1A638EFBEEF7F443C839AD428DFE0ACF7A9D2DC9FEB53F80AC0EA5FC87F17FC35D1E33BC6CECB5E5FA0585E8255
                                  Malicious:false
                                  Reputation:low
                                  Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                                  Static File Info

                                  No static file info

                                  Network Behavior

                                  Network Port Distribution

                                  TCP Packets

                                  TimestampSource PortDest PortSource IPDest IP
                                  Feb 25, 2021 21:18:51.197635889 CET49718443192.168.2.3192.236.154.154
                                  Feb 25, 2021 21:18:51.197648048 CET49719443192.168.2.3192.236.154.154
                                  Feb 25, 2021 21:18:51.248326063 CET44349718192.236.154.154192.168.2.3
                                  Feb 25, 2021 21:18:51.248372078 CET44349719192.236.154.154192.168.2.3
                                  Feb 25, 2021 21:18:51.248529911 CET49718443192.168.2.3192.236.154.154
                                  Feb 25, 2021 21:18:51.248539925 CET49719443192.168.2.3192.236.154.154
                                  Feb 25, 2021 21:18:51.260044098 CET49718443192.168.2.3192.236.154.154
                                  Feb 25, 2021 21:18:51.260932922 CET49719443192.168.2.3192.236.154.154
                                  Feb 25, 2021 21:18:51.321985006 CET44349718192.236.154.154192.168.2.3
                                  Feb 25, 2021 21:18:51.322030067 CET44349719192.236.154.154192.168.2.3
                                  Feb 25, 2021 21:18:51.328528881 CET44349718192.236.154.154192.168.2.3
                                  Feb 25, 2021 21:18:51.328581095 CET44349718192.236.154.154192.168.2.3
                                  Feb 25, 2021 21:18:51.328613997 CET44349718192.236.154.154192.168.2.3
                                  Feb 25, 2021 21:18:51.328711033 CET49718443192.168.2.3192.236.154.154
                                  Feb 25, 2021 21:18:51.328756094 CET49718443192.168.2.3192.236.154.154
                                  Feb 25, 2021 21:18:51.344449043 CET44349719192.236.154.154192.168.2.3
                                  Feb 25, 2021 21:18:51.344494104 CET44349719192.236.154.154192.168.2.3
                                  Feb 25, 2021 21:18:51.344526052 CET44349719192.236.154.154192.168.2.3
                                  Feb 25, 2021 21:18:51.344599009 CET49719443192.168.2.3192.236.154.154
                                  Feb 25, 2021 21:18:51.344638109 CET49719443192.168.2.3192.236.154.154
                                  Feb 25, 2021 21:18:51.370867968 CET49719443192.168.2.3192.236.154.154
                                  Feb 25, 2021 21:18:51.370981932 CET49718443192.168.2.3192.236.154.154
                                  Feb 25, 2021 21:18:51.376056910 CET49719443192.168.2.3192.236.154.154
                                  Feb 25, 2021 21:18:51.423556089 CET44349719192.236.154.154192.168.2.3
                                  Feb 25, 2021 21:18:51.423696041 CET49719443192.168.2.3192.236.154.154
                                  Feb 25, 2021 21:18:51.423821926 CET44349718192.236.154.154192.168.2.3
                                  Feb 25, 2021 21:18:51.423978090 CET49718443192.168.2.3192.236.154.154
                                  Feb 25, 2021 21:18:51.430417061 CET44349719192.236.154.154192.168.2.3
                                  Feb 25, 2021 21:18:51.430612087 CET49719443192.168.2.3192.236.154.154
                                  Feb 25, 2021 21:18:51.582695007 CET49719443192.168.2.3192.236.154.154
                                  Feb 25, 2021 21:18:51.637224913 CET44349719192.236.154.154192.168.2.3
                                  Feb 25, 2021 21:18:51.637343884 CET49719443192.168.2.3192.236.154.154
                                  Feb 25, 2021 21:18:51.640032053 CET49719443192.168.2.3192.236.154.154
                                  Feb 25, 2021 21:18:51.695202112 CET44349719192.236.154.154192.168.2.3
                                  Feb 25, 2021 21:18:51.695259094 CET44349719192.236.154.154192.168.2.3
                                  Feb 25, 2021 21:18:51.695293903 CET44349719192.236.154.154192.168.2.3
                                  Feb 25, 2021 21:18:51.695336103 CET49719443192.168.2.3192.236.154.154
                                  Feb 25, 2021 21:18:51.695380926 CET49719443192.168.2.3192.236.154.154
                                  Feb 25, 2021 21:18:52.655885935 CET49719443192.168.2.3192.236.154.154
                                  Feb 25, 2021 21:18:52.708906889 CET44349719192.236.154.154192.168.2.3
                                  Feb 25, 2021 21:18:52.709014893 CET49719443192.168.2.3192.236.154.154

                                  UDP Packets

                                  TimestampSource PortDest PortSource IPDest IP
                                  Feb 25, 2021 21:18:42.780675888 CET5754453192.168.2.38.8.8.8
                                  Feb 25, 2021 21:18:42.831891060 CET53575448.8.8.8192.168.2.3
                                  Feb 25, 2021 21:18:43.943140030 CET5598453192.168.2.38.8.8.8
                                  Feb 25, 2021 21:18:43.992203951 CET53559848.8.8.8192.168.2.3
                                  Feb 25, 2021 21:18:44.919038057 CET6418553192.168.2.38.8.8.8
                                  Feb 25, 2021 21:18:44.967863083 CET53641858.8.8.8192.168.2.3
                                  Feb 25, 2021 21:18:45.850887060 CET6511053192.168.2.38.8.8.8
                                  Feb 25, 2021 21:18:45.902421951 CET53651108.8.8.8192.168.2.3
                                  Feb 25, 2021 21:18:47.025300980 CET5836153192.168.2.38.8.8.8
                                  Feb 25, 2021 21:18:47.074486017 CET53583618.8.8.8192.168.2.3
                                  Feb 25, 2021 21:18:48.138004065 CET6349253192.168.2.38.8.8.8
                                  Feb 25, 2021 21:18:48.186829090 CET53634928.8.8.8192.168.2.3
                                  Feb 25, 2021 21:18:49.077421904 CET6083153192.168.2.38.8.8.8
                                  Feb 25, 2021 21:18:49.129399061 CET53608318.8.8.8192.168.2.3
                                  Feb 25, 2021 21:18:49.864103079 CET6010053192.168.2.38.8.8.8
                                  Feb 25, 2021 21:18:49.924407005 CET53601008.8.8.8192.168.2.3
                                  Feb 25, 2021 21:18:50.884143114 CET5319553192.168.2.38.8.8.8
                                  Feb 25, 2021 21:18:50.904232025 CET5014153192.168.2.38.8.8.8
                                  Feb 25, 2021 21:18:50.949261904 CET53531958.8.8.8192.168.2.3
                                  Feb 25, 2021 21:18:50.957993984 CET53501418.8.8.8192.168.2.3
                                  Feb 25, 2021 21:18:51.130202055 CET5302353192.168.2.38.8.8.8
                                  Feb 25, 2021 21:18:51.192715883 CET53530238.8.8.8192.168.2.3
                                  Feb 25, 2021 21:18:51.719697952 CET4956353192.168.2.38.8.8.8
                                  Feb 25, 2021 21:18:51.724158049 CET5135253192.168.2.38.8.8.8
                                  Feb 25, 2021 21:18:51.769048929 CET53495638.8.8.8192.168.2.3
                                  Feb 25, 2021 21:18:51.775460958 CET53513528.8.8.8192.168.2.3
                                  Feb 25, 2021 21:18:51.872085094 CET5934953192.168.2.38.8.8.8
                                  Feb 25, 2021 21:18:51.923804045 CET53593498.8.8.8192.168.2.3
                                  Feb 25, 2021 21:18:51.993240118 CET5708453192.168.2.38.8.8.8
                                  Feb 25, 2021 21:18:52.042740107 CET53570848.8.8.8192.168.2.3
                                  Feb 25, 2021 21:18:53.210355997 CET5882353192.168.2.38.8.8.8
                                  Feb 25, 2021 21:18:53.259242058 CET53588238.8.8.8192.168.2.3
                                  Feb 25, 2021 21:18:54.429372072 CET5756853192.168.2.38.8.8.8
                                  Feb 25, 2021 21:18:54.478153944 CET53575688.8.8.8192.168.2.3
                                  Feb 25, 2021 21:18:55.481342077 CET5054053192.168.2.38.8.8.8
                                  Feb 25, 2021 21:18:55.530181885 CET53505408.8.8.8192.168.2.3
                                  Feb 25, 2021 21:18:56.679723024 CET5436653192.168.2.38.8.8.8
                                  Feb 25, 2021 21:18:56.734256983 CET53543668.8.8.8192.168.2.3
                                  Feb 25, 2021 21:18:57.861592054 CET5303453192.168.2.38.8.8.8
                                  Feb 25, 2021 21:18:57.910624027 CET53530348.8.8.8192.168.2.3
                                  Feb 25, 2021 21:18:59.283912897 CET5776253192.168.2.38.8.8.8
                                  Feb 25, 2021 21:18:59.332649946 CET53577628.8.8.8192.168.2.3
                                  Feb 25, 2021 21:19:00.502311945 CET5543553192.168.2.38.8.8.8
                                  Feb 25, 2021 21:19:00.552831888 CET53554358.8.8.8192.168.2.3
                                  Feb 25, 2021 21:19:01.766094923 CET5071353192.168.2.38.8.8.8
                                  Feb 25, 2021 21:19:01.820257902 CET53507138.8.8.8192.168.2.3
                                  Feb 25, 2021 21:19:02.552810907 CET5613253192.168.2.38.8.8.8
                                  Feb 25, 2021 21:19:02.607099056 CET53561328.8.8.8192.168.2.3
                                  Feb 25, 2021 21:19:05.933279991 CET5898753192.168.2.38.8.8.8
                                  Feb 25, 2021 21:19:05.993515968 CET53589878.8.8.8192.168.2.3
                                  Feb 25, 2021 21:19:07.489144087 CET5657953192.168.2.38.8.8.8
                                  Feb 25, 2021 21:19:07.552206039 CET53565798.8.8.8192.168.2.3
                                  Feb 25, 2021 21:19:16.384915113 CET6063353192.168.2.38.8.8.8
                                  Feb 25, 2021 21:19:16.433798075 CET53606338.8.8.8192.168.2.3
                                  Feb 25, 2021 21:19:19.835637093 CET6129253192.168.2.38.8.8.8
                                  Feb 25, 2021 21:19:19.884536028 CET53612928.8.8.8192.168.2.3
                                  Feb 25, 2021 21:19:20.536619902 CET6361953192.168.2.38.8.8.8
                                  Feb 25, 2021 21:19:20.593885899 CET53636198.8.8.8192.168.2.3
                                  Feb 25, 2021 21:19:20.848990917 CET6129253192.168.2.38.8.8.8
                                  Feb 25, 2021 21:19:20.901530027 CET53612928.8.8.8192.168.2.3
                                  Feb 25, 2021 21:19:21.551724911 CET6361953192.168.2.38.8.8.8
                                  Feb 25, 2021 21:19:21.600613117 CET53636198.8.8.8192.168.2.3
                                  Feb 25, 2021 21:19:21.863859892 CET6129253192.168.2.38.8.8.8
                                  Feb 25, 2021 21:19:21.912740946 CET53612928.8.8.8192.168.2.3
                                  Feb 25, 2021 21:19:22.007987022 CET6493853192.168.2.38.8.8.8
                                  Feb 25, 2021 21:19:22.066828966 CET53649388.8.8.8192.168.2.3
                                  Feb 25, 2021 21:19:23.737647057 CET6361953192.168.2.38.8.8.8
                                  Feb 25, 2021 21:19:23.795243979 CET53636198.8.8.8192.168.2.3
                                  Feb 25, 2021 21:19:23.910247087 CET6129253192.168.2.38.8.8.8
                                  Feb 25, 2021 21:19:23.959355116 CET53612928.8.8.8192.168.2.3
                                  Feb 25, 2021 21:19:25.746714115 CET6361953192.168.2.38.8.8.8
                                  Feb 25, 2021 21:19:25.795717001 CET53636198.8.8.8192.168.2.3
                                  Feb 25, 2021 21:19:27.911076069 CET6129253192.168.2.38.8.8.8
                                  Feb 25, 2021 21:19:27.961875916 CET53612928.8.8.8192.168.2.3
                                  Feb 25, 2021 21:19:29.754904032 CET6361953192.168.2.38.8.8.8
                                  Feb 25, 2021 21:19:29.803755045 CET53636198.8.8.8192.168.2.3

                                  DNS Queries

                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                  Feb 25, 2021 21:18:50.884143114 CET192.168.2.38.8.8.80x289dStandard query (0)www.emailing.nespresso.comA (IP address)IN (0x0001)
                                  Feb 25, 2021 21:18:51.130202055 CET192.168.2.38.8.8.80x3921Standard query (0)l-at.clubA (IP address)IN (0x0001)
                                  Feb 25, 2021 21:18:51.724158049 CET192.168.2.38.8.8.80x42c7Standard query (0)stackpath.bootstrapcdn.comA (IP address)IN (0x0001)
                                  Feb 25, 2021 21:19:07.489144087 CET192.168.2.38.8.8.80x9389Standard query (0)favicon.icoA (IP address)IN (0x0001)

                                  DNS Answers

                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                  Feb 25, 2021 21:18:50.949261904 CET8.8.8.8192.168.2.30x289dNo error (0)www.emailing.nespresso.comksd-generic.nespresso.com.edgesuite.netCNAME (Canonical name)IN (0x0001)
                                  Feb 25, 2021 21:18:51.192715883 CET8.8.8.8192.168.2.30x3921No error (0)l-at.club192.236.154.154A (IP address)IN (0x0001)
                                  Feb 25, 2021 21:18:51.775460958 CET8.8.8.8192.168.2.30x42c7No error (0)stackpath.bootstrapcdn.comcds.j3z9t3p6.hwcdn.netCNAME (Canonical name)IN (0x0001)
                                  Feb 25, 2021 21:19:07.552206039 CET8.8.8.8192.168.2.30x9389Name error (3)favicon.icononenoneA (IP address)IN (0x0001)

                                  HTTPS Packets

                                  TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                  Feb 25, 2021 21:18:51.328613997 CET192.236.154.154443192.168.2.349718CN=l-at.club CN=R3, O=Let's Encrypt, C=USCN=R3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Thu Feb 25 18:05:13 CET 2021 Wed Oct 07 21:21:40 CEST 2020Wed May 26 19:05:13 CEST 2021 Wed Sep 29 21:21:40 CEST 2021771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-16-23-24-65281,29-23-24,09e10692f1b7f78228b2d4e424db3a98c
                                  CN=R3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Oct 07 21:21:40 CEST 2020Wed Sep 29 21:21:40 CEST 2021
                                  Feb 25, 2021 21:18:51.344526052 CET192.236.154.154443192.168.2.349719CN=l-at.club CN=R3, O=Let's Encrypt, C=USCN=R3, O=Let's Encrypt, C=US CN=DST Root CA X3, O=Digital Signature Trust Co.Thu Feb 25 18:05:13 CET 2021 Wed Oct 07 21:21:40 CEST 2020Wed May 26 19:05:13 CEST 2021 Wed Sep 29 21:21:40 CEST 2021771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-16-23-24-65281,29-23-24,09e10692f1b7f78228b2d4e424db3a98c
                                  CN=R3, O=Let's Encrypt, C=USCN=DST Root CA X3, O=Digital Signature Trust Co.Wed Oct 07 21:21:40 CEST 2020Wed Sep 29 21:21:40 CEST 2021

                                  Code Manipulations

                                  Statistics

                                  CPU Usage

                                  Click to jump to process

                                  Memory Usage

                                  Click to jump to process

                                  Behavior

                                  Click to jump to process

                                  System Behavior

                                  General

                                  Start time:21:18:49
                                  Start date:25/02/2021
                                  Path:C:\Program Files\internet explorer\iexplore.exe
                                  Wow64 process (32bit):false
                                  Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                                  Imagebase:0x7ff7498d0000
                                  File size:823560 bytes
                                  MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low

                                  General

                                  Start time:21:18:50
                                  Start date:25/02/2021
                                  Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                  Wow64 process (32bit):true
                                  Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:3352 CREDAT:17410 /prefetch:2
                                  Imagebase:0xb70000
                                  File size:822536 bytes
                                  MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:low

                                  Disassembly

                                  Reset < >