Loading ...

Play interactive tourEdit tour

Analysis Report http://r20.rs6.net/tn.jsp?f=001UR9DU5DWULSSQKRSbHmS5tW1BYzJdf5a5nCBJP8j6WTiQVP7-HJVYmCgrw0XB_uf_QV56Haa_M0mobYIQXKQSaOe6Xu-1xTkGHmKJGzfmmZ2amUpZf-ss1HRg0GxKivYopLHGEV8UEW0_6cIw3aFuQi_2vwTONr1CLcH72kMluSyn6F3FeMZ-MnNHeyuCyEwaUdYWjqc4gJLjgQuRM_rdz9h3O3GIfxNvpPnSjOOSeM=&c=5vPu-3Qs9yW2IEWn1dtOMdgOR2JdmjhB8RamT_IPEu6k3Sz7qp1rDA==&ch=t9Qhnt_2hiJ7oXunOWnQpfuylRuTM4kuFHw1DTZGabFSxZ_AG1kZXw==

Overview

General Information

Sample URL:http://r20.rs6.net/tn.jsp?f=001UR9DU5DWULSSQKRSbHmS5tW1BYzJdf5a5nCBJP8j6WTiQVP7-HJVYmCgrw0XB_uf_QV56Haa_M0mobYIQXKQSaOe6Xu-1xTkGHmKJGzfmmZ2amUpZf-ss1HRg0GxKivYopLHGEV8UEW0_6cIw3aFuQi_2vwTONr1CLcH72kMluSyn6F3FeMZ-MnNHeyuCyEwaUdYWjqc4gJLjgQuRM_rdz9h3O3GIfxNvpPnSjOOSeM=&c=5vPu-3Qs9yW2IEWn1dtOMdgOR2JdmjhB8RamT_IPEu6k3Sz7qp1rDA==&ch=t9Qhnt_2hiJ7oXunOWnQpfuylRuTM4kuFHw1DTZGabFSxZ_AG1kZXw==
Analysis ID:385476
Infos:

Most interesting Screenshot:

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Startup

  • System is w10x64
  • iexplore.exe (PID: 5620 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 5904 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5620 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
      • AcroRd32.exe (PID: 3100 cmdline: 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe' /o /eo /l /b /ac /id 5904 MD5: B969CF0C7B2C443A99034881E8C8740A)
        • AcroRd32.exe (PID: 5680 cmdline: 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe' --type=renderer /prefetch:1 /o /eo /l /b /ac /id 5904 MD5: B969CF0C7B2C443A99034881E8C8740A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
Source: global trafficHTTP traffic detected: GET /tn.jsp?f=001UR9DU5DWULSSQKRSbHmS5tW1BYzJdf5a5nCBJP8j6WTiQVP7-HJVYmCgrw0XB_uf_QV56Haa_M0mobYIQXKQSaOe6Xu-1xTkGHmKJGzfmmZ2amUpZf-ss1HRg0GxKivYopLHGEV8UEW0_6cIw3aFuQi_2vwTONr1CLcH72kMluSyn6F3FeMZ-MnNHeyuCyEwaUdYWjqc4gJLjgQuRM_rdz9h3O3GIfxNvpPnSjOOSeM=&c=5vPu-3Qs9yW2IEWn1dtOMdgOR2JdmjhB8RamT_IPEu6k3Sz7qp1rDA==&ch=t9Qhnt_2hiJ7oXunOWnQpfuylRuTM4kuFHw1DTZGabFSxZ_AG1kZXw== HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: r20.rs6.netConnection: Keep-Alive
Source: msapplication.xml0.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xecdb2ec1,0x01d72fe9</date><accdate>0xecdb2ec1,0x01d72fe9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml0.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xecdb2ec1,0x01d72fe9</date><accdate>0xecdb2ec1,0x01d72fe9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml5.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xecdff36b,0x01d72fe9</date><accdate>0xecdff36b,0x01d72fe9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml5.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xecdff36b,0x01d72fe9</date><accdate>0xecdff36b,0x01d72fe9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml7.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xece255ab,0x01d72fe9</date><accdate>0xece255ab,0x01d72fe9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: msapplication.xml7.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xece255ab,0x01d72fe9</date><accdate>0xece255ab,0x01d72fe9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: unknownDNS traffic detected: queries for: clientconfig.passport.net
Source: AcroRd32.exe, 00000005.00000002.1677471128.00000000082ED000.00000002.00000001.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: AcroRd32.exe, 00000005.00000002.1677471128.00000000082ED000.00000002.00000001.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
Source: AcroRd32.exe, 00000005.00000002.1677471128.00000000082ED000.00000002.00000001.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
Source: AcroRd32.exe, 00000005.00000002.1677471128.00000000082ED000.00000002.00000001.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: AcroRd32.exe, 00000005.00000002.1677471128.00000000082ED000.00000002.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: AcroRd32.exe, 00000005.00000002.1677471128.00000000082ED000.00000002.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: AcroRd32.exe, 00000005.00000002.1677471128.00000000082ED000.00000002.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
Source: AcroRd32.exe, 00000005.00000002.1677471128.00000000082ED000.00000002.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: AcroRd32.exe, 00000005.00000002.1677471128.00000000082ED000.00000002.00000001.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: AcroRd32.exe, 00000005.00000002.1677471128.00000000082ED000.00000002.00000001.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: AcroRd32.exe, 00000005.00000002.1677471128.00000000082ED000.00000002.00000001.sdmpString found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0K
Source: AcroRd32.exe, 00000005.00000002.1677471128.00000000082ED000.00000002.00000001.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: AcroRd32.exe, 00000005.00000002.1677471128.00000000082ED000.00000002.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0C
Source: AcroRd32.exe, 00000005.00000002.1677471128.00000000082ED000.00000002.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0H
Source: AcroRd32.exe, 00000005.00000002.1677471128.00000000082ED000.00000002.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0I
Source: AcroRd32.exe, 00000005.00000002.1677471128.00000000082ED000.00000002.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0O
Source: msapplication.xml.1.drString found in binary or memory: http://www.amazon.com/
Source: AcroRd32.exe, 00000005.00000002.1677471128.00000000082ED000.00000002.00000001.sdmpString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
Source: msapplication.xml1.1.drString found in binary or memory: http://www.google.com/
Source: msapplication.xml2.1.drString found in binary or memory: http://www.live.com/
Source: msapplication.xml3.1.drString found in binary or memory: http://www.nytimes.com/
Source: AcroRd32.exe, 00000005.00000002.1672938210.0000000007430000.00000002.00000001.sdmpString found in binary or memory: http://www.osmf.org/default/1.0%http://www.osmf.org/mediatype/default
Source: AcroRd32.exe, 00000005.00000002.1672938210.0000000007430000.00000002.00000001.sdmpString found in binary or memory: http://www.osmf.org/drm/default
Source: AcroRd32.exe, 00000005.00000002.1672938210.0000000007430000.00000002.00000001.sdmpString found in binary or memory: http://www.osmf.org/elementId%http://www.osmf.org/temporal/embedded$http://www.osmf.org/temporal/dyn
Source: AcroRd32.exe, 00000005.00000002.1672938210.0000000007430000.00000002.00000001.sdmpString found in binary or memory: http://www.osmf.org/layout/anchor
Source: AcroRd32.exe, 00000005.00000002.1672938210.0000000007430000.00000002.00000001.sdmpString found in binary or memory: http://www.osmf.org/layout/padding%http://www.osmf.org/layout/attributes
Source: AcroRd32.exe, 00000005.00000002.1672938210.0000000007430000.00000002.00000001.sdmpString found in binary or memory: http://www.osmf.org/region/target#http://www.osmf.org/layout/renderer#http://www.osmf.org/layout/abs
Source: AcroRd32.exe, 00000005.00000002.1672938210.0000000007430000.00000002.00000001.sdmpString found in binary or memory: http://www.osmf.org/subclip/1.0
Source: AcroRd32.exe, 00000005.00000002.1672938210.0000000007430000.00000002.00000001.sdmpString found in binary or memory: http://www.quicktime.com.Acrobat
Source: msapplication.xml4.1.drString found in binary or memory: http://www.reddit.com/
Source: msapplication.xml5.1.drString found in binary or memory: http://www.twitter.com/
Source: msapplication.xml6.1.drString found in binary or memory: http://www.wikipedia.com/
Source: msapplication.xml7.1.drString found in binary or memory: http://www.youtube.com/
Source: ~DF0BE9630EA18F6468.TMP.1.drString found in binary or memory: https://files.constantcontact.com/54e1b5c9701/a2191b8c-25d2-4fe8-aff0-8b4735afdc69.pdf
Source: {168DA7A3-9BDD-11EB-90E5-ECF4BB570DC9}.dat.1.drString found in binary or memory: https://files.constantcontact.com/54e1b5c9701/a2191b8c-25d2-4fe8-aff0-8b4735afdc69.pdfRoot
Source: AcroRd32.exe, 00000005.00000002.1678278264.0000000008B45000.00000004.00000001.sdmpString found in binary or memory: https://ims-na1.adobelogin.com
Source: AcroRd32.exe, 00000005.00000002.1677471128.00000000082ED000.00000002.00000001.sdmpString found in binary or memory: https://www.digicert.com/CPS0
Source: classification engineClassification label: clean0.win@7/16@3/1
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{168DA7A1-9BDD-11EB-90E5-ECF4BB570DC9}.datJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DF0DA265B4E0FD1AC2.TMPJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5620 CREDAT:17410 /prefetch:2
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe' /o /eo /l /b /ac /id 5904
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe' --type=renderer /prefetch:1 /o /eo /l /b /ac /id 5904
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5620 CREDAT:17410 /prefetch:2Jump to behavior
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe' /o /eo /l /b /ac /id 5904Jump to behavior
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe' --type=renderer /prefetch:1 /o /eo /l /b /ac /id 5904Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeCode function: 5_2_045B7050 LdrInitializeThunk,5_2_045B7050
Source: AcroRd32.exe, 00000005.00000002.1670559694.0000000005160000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
Source: AcroRd32.exe, 00000005.00000002.1670559694.0000000005160000.00000002.00000001.sdmpBinary or memory string: Progman
Source: AcroRd32.exe, 00000005.00000002.1670559694.0000000005160000.00000002.00000001.sdmpBinary or memory string: SProgram Managerl
Source: AcroRd32.exe, 00000005.00000002.1670559694.0000000005160000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd,
Source: AcroRd32.exe, 00000005.00000002.1670559694.0000000005160000.00000002.00000001.sdmpBinary or memory string: Progmanlock

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection2Masquerading1OS Credential DumpingProcess Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection2LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 385476 URL: http://r20.rs6.net/tn.jsp?f... Startdate: 12/04/2021 Architecture: WINDOWS Score: 0 17 prda.aadg.msidentity.com 2->17 19 clientconfig.passport.net 2->19 8 iexplore.exe 1 76 2->8         started        process3 process4 10 iexplore.exe 30 8->10         started        dnsIp5 21 rs6.net 208.75.122.11, 49702, 49703, 80 ASN-CCUS United States 10->21 23 r20.rs6.net 10->23 25 files.constantcontact.com 10->25 13 AcroRd32.exe 22 10->13         started        process6 process7 15 AcroRd32.exe 2 13->15         started       

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
http://r20.rs6.net/tn.jsp?f=001UR9DU5DWULSSQKRSbHmS5tW1BYzJdf5a5nCBJP8j6WTiQVP7-HJVYmCgrw0XB_uf_QV56Haa_M0mobYIQXKQSaOe6Xu-1xTkGHmKJGzfmmZ2amUpZf-ss1HRg0GxKivYopLHGEV8UEW0_6cIw3aFuQi_2vwTONr1CLcH72kMluSyn6F3FeMZ-MnNHeyuCyEwaUdYWjqc4gJLjgQuRM_rdz9h3O3GIfxNvpPnSjOOSeM=&c=5vPu-3Qs9yW2IEWn1dtOMdgOR2JdmjhB8RamT_IPEu6k3Sz7qp1rDA==&ch=t9Qhnt_2hiJ7oXunOWnQpfuylRuTM4kuFHw1DTZGabFSxZ_AG1kZXw==0%Avira URL Cloudsafe

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

SourceDetectionScannerLabelLink
http://www.osmf.org/layout/anchor0%URL Reputationsafe
http://www.osmf.org/layout/anchor0%URL Reputationsafe
http://www.osmf.org/layout/anchor0%URL Reputationsafe
http://www.osmf.org/region/target#http://www.osmf.org/layout/renderer#http://www.osmf.org/layout/abs0%URL Reputationsafe
http://www.osmf.org/region/target#http://www.osmf.org/layout/renderer#http://www.osmf.org/layout/abs0%URL Reputationsafe
http://www.osmf.org/region/target#http://www.osmf.org/layout/renderer#http://www.osmf.org/layout/abs0%URL Reputationsafe
http://www.osmf.org/drm/default0%URL Reputationsafe
http://www.osmf.org/drm/default0%URL Reputationsafe
http://www.osmf.org/drm/default0%URL Reputationsafe
http://www.osmf.org/layout/padding%http://www.osmf.org/layout/attributes0%URL Reputationsafe
http://www.osmf.org/layout/padding%http://www.osmf.org/layout/attributes0%URL Reputationsafe
http://www.osmf.org/layout/padding%http://www.osmf.org/layout/attributes0%URL Reputationsafe
http://www.osmf.org/elementId%http://www.osmf.org/temporal/embedded$http://www.osmf.org/temporal/dyn0%URL Reputationsafe
http://www.osmf.org/elementId%http://www.osmf.org/temporal/embedded$http://www.osmf.org/temporal/dyn0%URL Reputationsafe
http://www.osmf.org/elementId%http://www.osmf.org/temporal/embedded$http://www.osmf.org/temporal/dyn0%URL Reputationsafe
http://www.wikipedia.com/0%URL Reputationsafe
http://www.wikipedia.com/0%URL Reputationsafe
http://www.wikipedia.com/0%URL Reputationsafe
http://www.osmf.org/default/1.0%http://www.osmf.org/mediatype/default0%URL Reputationsafe
http://www.osmf.org/default/1.0%http://www.osmf.org/mediatype/default0%URL Reputationsafe
http://www.osmf.org/default/1.0%http://www.osmf.org/mediatype/default0%URL Reputationsafe
http://www.quicktime.com.Acrobat0%URL Reputationsafe
http://www.quicktime.com.Acrobat0%URL Reputationsafe
http://www.quicktime.com.Acrobat0%URL Reputationsafe
http://www.osmf.org/subclip/1.00%URL Reputationsafe
http://www.osmf.org/subclip/1.00%URL Reputationsafe
http://www.osmf.org/subclip/1.00%URL Reputationsafe

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
rs6.net
208.75.122.11
truefalse
    high
    clientconfig.passport.net
    unknown
    unknownfalse
      unknown
      r20.rs6.net
      unknown
      unknownfalse
        high
        files.constantcontact.com
        unknown
        unknownfalse
          high

          Contacted URLs

          NameMaliciousAntivirus DetectionReputation
          http://r20.rs6.net/tn.jsp?f=001UR9DU5DWULSSQKRSbHmS5tW1BYzJdf5a5nCBJP8j6WTiQVP7-HJVYmCgrw0XB_uf_QV56Haa_M0mobYIQXKQSaOe6Xu-1xTkGHmKJGzfmmZ2amUpZf-ss1HRg0GxKivYopLHGEV8UEW0_6cIw3aFuQi_2vwTONr1CLcH72kMluSyn6F3FeMZ-MnNHeyuCyEwaUdYWjqc4gJLjgQuRM_rdz9h3O3GIfxNvpPnSjOOSeM=&c=5vPu-3Qs9yW2IEWn1dtOMdgOR2JdmjhB8RamT_IPEu6k3Sz7qp1rDA==&ch=t9Qhnt_2hiJ7oXunOWnQpfuylRuTM4kuFHw1DTZGabFSxZ_AG1kZXw==false
            high

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            https://files.constantcontact.com/54e1b5c9701/a2191b8c-25d2-4fe8-aff0-8b4735afdc69.pdfRoot{168DA7A3-9BDD-11EB-90E5-ECF4BB570DC9}.dat.1.drfalse
              high
              https://files.constantcontact.com/54e1b5c9701/a2191b8c-25d2-4fe8-aff0-8b4735afdc69.pdf~DF0BE9630EA18F6468.TMP.1.drfalse
                high
                http://www.nytimes.com/msapplication.xml3.1.drfalse
                  high
                  http://www.osmf.org/layout/anchorAcroRd32.exe, 00000005.00000002.1672938210.0000000007430000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.youtube.com/msapplication.xml7.1.drfalse
                    high
                    http://www.osmf.org/region/target#http://www.osmf.org/layout/renderer#http://www.osmf.org/layout/absAcroRd32.exe, 00000005.00000002.1672938210.0000000007430000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.osmf.org/drm/defaultAcroRd32.exe, 00000005.00000002.1672938210.0000000007430000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.osmf.org/layout/padding%http://www.osmf.org/layout/attributesAcroRd32.exe, 00000005.00000002.1672938210.0000000007430000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.osmf.org/elementId%http://www.osmf.org/temporal/embedded$http://www.osmf.org/temporal/dynAcroRd32.exe, 00000005.00000002.1672938210.0000000007430000.00000002.00000001.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.wikipedia.com/msapplication.xml6.1.drfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://www.amazon.com/msapplication.xml.1.drfalse
                      high
                      http://www.live.com/msapplication.xml2.1.drfalse
                        high
                        http://www.osmf.org/default/1.0%http://www.osmf.org/mediatype/defaultAcroRd32.exe, 00000005.00000002.1672938210.0000000007430000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        http://www.quicktime.com.AcrobatAcroRd32.exe, 00000005.00000002.1672938210.0000000007430000.00000002.00000001.sdmpfalse
                        • URL Reputation: safe
                        • URL Reputation: safe
                        • URL Reputation: safe
                        unknown
                        https://ims-na1.adobelogin.comAcroRd32.exe, 00000005.00000002.1678278264.0000000008B45000.00000004.00000001.sdmpfalse
                          high
                          http://www.reddit.com/msapplication.xml4.1.drfalse
                            high
                            http://www.twitter.com/msapplication.xml5.1.drfalse
                              high
                              http://www.osmf.org/subclip/1.0AcroRd32.exe, 00000005.00000002.1672938210.0000000007430000.00000002.00000001.sdmpfalse
                              • URL Reputation: safe
                              • URL Reputation: safe
                              • URL Reputation: safe
                              unknown

                              Contacted IPs

                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs

                              Public

                              IPDomainCountryFlagASNASN NameMalicious
                              208.75.122.11
                              rs6.netUnited States
                              40444ASN-CCUSfalse

                              General Information

                              Joe Sandbox Version:31.0.0 Emerald
                              Analysis ID:385476
                              Start date:12.04.2021
                              Start time:15:18:17
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 14m 10s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:browseurl.jbs
                              Sample URL:http://r20.rs6.net/tn.jsp?f=001UR9DU5DWULSSQKRSbHmS5tW1BYzJdf5a5nCBJP8j6WTiQVP7-HJVYmCgrw0XB_uf_QV56Haa_M0mobYIQXKQSaOe6Xu-1xTkGHmKJGzfmmZ2amUpZf-ss1HRg0GxKivYopLHGEV8UEW0_6cIw3aFuQi_2vwTONr1CLcH72kMluSyn6F3FeMZ-MnNHeyuCyEwaUdYWjqc4gJLjgQuRM_rdz9h3O3GIfxNvpPnSjOOSeM=&c=5vPu-3Qs9yW2IEWn1dtOMdgOR2JdmjhB8RamT_IPEu6k3Sz7qp1rDA==&ch=t9Qhnt_2hiJ7oXunOWnQpfuylRuTM4kuFHw1DTZGabFSxZ_AG1kZXw==
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:40
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:CLEAN
                              Classification:clean0.win@7/16@3/1
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 100%
                              • Number of executed functions: 11
                              • Number of non-executed functions: 0
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              Warnings:
                              Show All
                              • Max analysis timeout: 720s exceeded, the analysis took too long
                              • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, RuntimeBroker.exe, backgroundTaskHost.exe, audiodg.exe, BackgroundTransferHost.exe, ielowutil.exe, WMIADAP.exe, MusNotifyIcon.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                              • Excluded IPs from analysis (whitelisted): 131.253.33.200, 13.107.22.200, 93.184.220.29, 88.221.62.148, 92.123.150.225, 20.82.210.154, 92.122.145.220, 104.43.139.144, 104.126.36.242, 104.126.36.139, 13.64.90.137, 184.30.24.56, 13.88.21.125, 40.88.32.150, 152.199.19.161, 20.50.102.62, 104.43.193.48, 205.185.216.42, 205.185.216.10, 92.122.213.247, 92.122.213.194, 20.54.26.129, 52.155.217.156, 20.190.159.131, 40.126.31.5, 40.126.31.9, 20.190.159.135, 20.190.159.133, 40.126.31.140, 40.126.31.3, 40.126.31.2, 51.11.168.232, 40.127.240.158, 20.49.150.241, 20.82.209.183
                              • Excluded domains from analysis (whitelisted): cs9.wac.phicdn.net, arc.msn.com.nsatc.net, fs-wildcard.microsoft.com.edgekey.net, www.tm.a.prd.aadg.trafficmanager.net, e11290.dspg.akamaiedge.net, e13551.dscg.akamaiedge.net, skypedataprdcoleus15.cloudapp.net, ocsp.digicert.com, login.live.com, www-bing-com.dual-a-0001.a-msedge.net, audownload.windowsupdate.nsatc.net, au.download.windowsupdate.com.hwcdn.net, watson.telemetry.microsoft.com, au-bg-shim.trafficmanager.net, www.bing.com, fs.microsoft.com, e73586.dscf.akamaiedge.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, ris-prod.trafficmanager.net, displaycatalog.md.mp.microsoft.com.akadns.net, skypedataprdcolcus16.cloudapp.net, skypedataprdcolcus15.cloudapp.net, settingsfd-geo.trafficmanager.net, dual-a-0001.dc-msedge.net, ris.api.iris.microsoft.com, store-images.s-microsoft.com, blobcollector.events.data.trafficmanager.net, cs9.wpc.v0cdn.net, www.tm.lg.prod.aadmsa.trafficmanager.net, store-images.s-microsoft.com-c.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, consumerrp-displaycatalog-aks2eap-europe.md.mp.microsoft.com.akadns.net, iecvlist.microsoft.com, db5eap.displaycatalog.md.mp.microsoft.com.akadns.net, msagfx.live.com-6.edgekey.net, e12564.dspb.akamaiedge.net, authgfx.msa.akadns6.net, go.microsoft.com, arc.trafficmanager.net, wildcard-prod.constantcontact.com.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, consumerrp-displaycatalog-aks2eap.md.mp.microsoft.com.akadns.net, displaycatalog-europeeap.md.mp.microsoft.com.akadns.net, skypedataprdcolwus17.cloudapp.net, ie9comview.vo.msecnd.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, settings-win.data.microsoft.com, cds.d2s7q6s2.hwcdn.net, login.msa.msidentity.com, a-0001.a-afdentry.net.trafficmanager.net, go.microsoft.com.edgekey.net, skypedataprdcolwus15.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net

                              Simulations

                              Behavior and APIs

                              No simulations

                              Joe Sandbox View / Context

                              IPs

                              No context

                              Domains

                              No context

                              ASN

                              No context

                              JA3 Fingerprints

                              No context

                              Dropped Files

                              No context

                              Created / dropped Files

                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{168DA7A1-9BDD-11EB-90E5-ECF4BB570DC9}.dat
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:Microsoft Word Document
                              Category:dropped
                              Size (bytes):33368
                              Entropy (8bit):1.8708124467696718
                              Encrypted:false
                              SSDEEP:96:rKZlZM2UW9tlbf13gKMwYqw+QcYqwLtA3P63:rKZlZM2UW9t5f1VMOyq4tAy3
                              MD5:16F02D910645F8E230FB24B28C88B711
                              SHA1:BA30D4CA23B6A24A4460ECD06499C6B31F97C7E8
                              SHA-256:E664293A538FD07176EE4DB354A4FFE6337FA787FB27FDEB7A2BBCDB74BA85E9
                              SHA-512:1437152554FA4AE8C832EDBF73034B0E04BD368A9777334D53A0B1F4C593724B513C9947AE36ECA0693DDC9E6332ACB66665DEDA9881879F9FB36FB5BAEDEA5D
                              Malicious:false
                              Reputation:low
                              Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{168DA7A3-9BDD-11EB-90E5-ECF4BB570DC9}.dat
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:Microsoft Word Document
                              Category:dropped
                              Size (bytes):24284
                              Entropy (8bit):1.6541948934546493
                              Encrypted:false
                              SSDEEP:48:IwnGcpryGwpa2G4pQnGrapbSEGQpBuGHHpckTGUp8RGzYpm+cGop+mIRPZ3oGuwg:rNZ6QG67BScj92cWfMrMmeZg
                              MD5:89DE463AE9743F7BF96EDA292B7BEE9D
                              SHA1:3D72B09F14869320F0EA241D0374B359AA33F0EC
                              SHA-256:28AC3F6C6446DEA2A58A6D02A38FE53AA2B999AA717AFBFB1F9C29F68A16B399
                              SHA-512:0CCD482A9012F0EA3F56F0EC5630142FD6F7378FBAD994DB9B7AC0051840C7258E69F1ED3439C34B36F77F69C7A9C0BA561F79D9F61D09FBFA8AF9B119879B06
                              Malicious:false
                              Reputation:low
                              Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{168DA7A4-9BDD-11EB-90E5-ECF4BB570DC9}.dat
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:Microsoft Word Document
                              Category:dropped
                              Size (bytes):16984
                              Entropy (8bit):1.5646024253807025
                              Encrypted:false
                              SSDEEP:48:IwuGcprDGwpauG4pQuGrapbSQGQpKJG7HpReTGIpG:ryZdQO6gBSYAoTaA
                              MD5:CD29891A5996CEBA2CC31B73C71EE18C
                              SHA1:E0539BD23B73CD6F5CFBBDFD84C6A73B3BD22751
                              SHA-256:F9540FBA48D6AA37E443FAEB1980A3315438D720C9AE8ECA559092E15477151E
                              SHA-512:B3C266FBB0296D54D6CA9D7C55C0D66E0C66A7273574996A355709A40E39172898017A21B8E60481D10C73E1BCE1690A851DC4D42A769B0BAC734862641E9066
                              Malicious:false
                              Reputation:low
                              Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-17529550060\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):657
                              Entropy (8bit):5.068109153784606
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxOEVnWimI002EtM3MHdNMNxOEVnWimI00ONVbkEtMb:2d6NxOcSZHKd6NxOcSZ7Qb
                              MD5:25C645E3AD6A9AD4AFEC68ABB20E5EFD
                              SHA1:7CB048800151597F1D5EF84AA7A3442F22214AA9
                              SHA-256:D8CED8F382AB5849352B5BE30A8F1BDBE6F4667CE540E00BC54F7B351CA3BA1D
                              SHA-512:556AA39E14AF5EE13D374F181AEA0BCF08DB3D4777887A44AFD4799D73D21356BD4538B1B7A76A6A0E30EEAD3B3145271F09A6F451459525B4876B0E03C2F970
                              Malicious:false
                              Reputation:low
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xecdff36b,0x01d72fe9</date><accdate>0xecdff36b,0x01d72fe9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xecdff36b,0x01d72fe9</date><accdate>0xecdff36b,0x01d72fe9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18270793970\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):654
                              Entropy (8bit):5.086800203213303
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxe2kJicnWimI002EtM3MHdNMNxe2kJicnWimI00ONkak6EtMb:2d6Nxr4SZHKd6Nxr4SZ72a7b
                              MD5:09F96910DE1B342B88D861D9BF133AFF
                              SHA1:32A4E09A837096A5A039971A83CFEB9975397D57
                              SHA-256:368D2A752FCA1AB5C12563663CA8BF63934F66E0A0F3AF1357D0CEB300F4A185
                              SHA-512:EFA22078D2A8BD231316339F3F32D155E06615546553566A5EBF120BA8E61F42FB3258D3E6CC1549AE4ADC72E90666AD95C98B28DE89F28340B3CE1AA2E67E19
                              Malicious:false
                              Reputation:low
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0xecd407a9,0x01d72fe9</date><accdate>0xecd407a9,0x01d72fe9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0xecd407a9,0x01d72fe9</date><accdate>0xecd407a9,0x01d72fe9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Amazon.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-21706820\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):663
                              Entropy (8bit):5.078758498126462
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxvLbnWimI002EtM3MHdNMNxvLbnWimI00ONmZEtMb:2d6NxvnSZHKd6NxvnSZ7Ub
                              MD5:BD3C3AEFC8305082525F992C2F95C9F5
                              SHA1:474D35C0529E04F315A02C6DC752D76801996E2A
                              SHA-256:8E97786E87032B5AC8F70229E7E98990DF737E3C3044470C8B2B12C2334F1D7D
                              SHA-512:22F41F6D24BCBEEB096C1C1041ADE82E2474151D85366FFF476ABEAB0410ABC8CB620C735433CD2C39E166C1047999A90E293016BFC6F4CDDC82C5B8B7899ACB
                              Malicious:false
                              Reputation:low
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0xece255ab,0x01d72fe9</date><accdate>0xece255ab,0x01d72fe9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0xece255ab,0x01d72fe9</date><accdate>0xece255ab,0x01d72fe9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Wikipedia.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):648
                              Entropy (8bit):5.060381646561089
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxiYJOsJO/nWimI002EtM3MHdNMNxiYJOsJO/nWimI00ONd5EtMb:2d6NxrJOsJO/SZHKd6NxrJOsJO/SZ7n/
                              MD5:C8750D56F64FBFB7428053859BBEB97F
                              SHA1:EEE5564A00E06791F7404BA9DB1E62A514F3261F
                              SHA-256:ADF78E35A808FF5ED670FAC00CFF5D81E2EEFF4214975268A5029BDEC910A5C5
                              SHA-512:4E70FF1F169B98D8ACC3122DF4102F4DFD63400270AF0F2886491DC57299B7312CA2950E636AC210E59451B9C18F6BCBED845786E01A0BB6C86D73C56FE4C722
                              Malicious:false
                              Reputation:low
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0xecdd910b,0x01d72fe9</date><accdate>0xecdd910b,0x01d72fe9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0xecdd910b,0x01d72fe9</date><accdate>0xecdd910b,0x01d72fe9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Live.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6757900\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):657
                              Entropy (8bit):5.089818035900865
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxhGwbnWimI002EtM3MHdNMNxhGwbnWimI00ON8K075EtMb:2d6NxQuSZHKd6NxQuSZ7uKajb
                              MD5:A938C4165D344478C3B0E654B0B5BD05
                              SHA1:6EAC06E31B1254CC4697C365A14A429936D1FE8D
                              SHA-256:8CA9824AD8AF4CA8F844B530437CC5D4830BA47BF5937B4A27F3E7B9A9662EF0
                              SHA-512:84A1987779FE19E9FC3BF5F9E94E0A07FB1D490C30E039477E3CB093A79833681CFED4BC846F3C5E648AF3B25C54D2C9F91FB17C38F1D8E4EFED2A7591AF498C
                              Malicious:false
                              Reputation:low
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xece255ab,0x01d72fe9</date><accdate>0xece255ab,0x01d72fe9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xece255ab,0x01d72fe9</date><accdate>0xece255ab,0x01d72fe9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8760897390\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):654
                              Entropy (8bit):5.069190638690861
                              Encrypted:false
                              SSDEEP:12:TMHdNMNx0nVnWimI002EtM3MHdNMNx0nVnWimI00ONxEtMb:2d6Nx0VSZHKd6Nx0VSZ7Vb
                              MD5:C89C9455EE6F67C0046C07AAFBA37EA0
                              SHA1:30705122D640E2F6FB508DA99ABB72D6BFC73A00
                              SHA-256:D0497D6FD42689EB52675A755F7A08F7BDCC616279986465A8C8C176C9942E3A
                              SHA-512:EF465D881F78B984317A801E6314846F408F41899AD079BBB1197C1A6E42E77FD24AA96CD28E59D180AEBBC3EE1D830DCD47D7E913D957C887780A33762751FD
                              Malicious:false
                              Reputation:low
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0xecdff36b,0x01d72fe9</date><accdate>0xecdff36b,0x01d72fe9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0xecdff36b,0x01d72fe9</date><accdate>0xecdff36b,0x01d72fe9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Reddit.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):657
                              Entropy (8bit):5.09617646976543
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxxYJOsJO/nWimI002EtM3MHdNMNxxYJOEnWimI00ON6Kq5EtMb:2d6NxSJOsJO/SZHKd6NxSJOESZ7ub
                              MD5:441D5EB912E5B6E908516B5E3D922AA3
                              SHA1:702AF7094DE2D8392CABC0E63172E4EA09BF083F
                              SHA-256:940F5FDECD31CCC6DD477D0D71117543CC9F22900CC7D9DCAD98AC9128432841
                              SHA-512:4CCC108D2E63B6F01175339FA4C1F0760AA0294BA8F2563B8CD7217F0EFF4E45B3541C252A0CDA66891C3A55425F9728F3E59F14145B54DFB1B9B3C931E508F8
                              Malicious:false
                              Reputation:low
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0xecdd910b,0x01d72fe9</date><accdate>0xecdd910b,0x01d72fe9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0xecdd910b,0x01d72fe9</date><accdate>0xecdff36b,0x01d72fe9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\NYTimes.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20332743330\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):660
                              Entropy (8bit):5.05279294778761
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxcJ6cnWimI002EtM3MHdNMNxcJ6cnWimI00ONVEtMb:2d6Nxs6cSZHKd6Nxs6cSZ71b
                              MD5:9B207810D05F7D05EE644D556B777E3E
                              SHA1:F2DD167CB7421494128F5CCE2C0D6453D9E4FE98
                              SHA-256:127E2CE59C8F02E12767D97928289A56A8F72CFAEAFB250D0E5C71A2BCD9DE38
                              SHA-512:F8DD7CBD8877CD3D5844A7B7A733F711E3F0104A2F686819FDE927FC4FA2469E4D179865E63F2DBB5B19AC473DBEFC13C0AB3290BBE43F51A61B6CF844A9D475
                              Malicious:false
                              Reputation:low
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xecdb2ec1,0x01d72fe9</date><accdate>0xecdb2ec1,0x01d72fe9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xecdb2ec1,0x01d72fe9</date><accdate>0xecdb2ec1,0x01d72fe9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin8215062560\msapplication.xml
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                              Category:dropped
                              Size (bytes):654
                              Entropy (8bit):5.046106913945248
                              Encrypted:false
                              SSDEEP:12:TMHdNMNxfnYJOsJO/nWimI002EtM3MHdNMNxfnYJOsJO/nWimI00ONe5EtMb:2d6NxQJOsJO/SZHKd6NxQJOsJO/SZ7E/
                              MD5:7DBD3334977F25D96970181192621C6E
                              SHA1:37EE05EE585D82A1412A52396B1E807184F6F568
                              SHA-256:BA71CA56B9512AF0849F43DD2CB912E0147D4499D3383F7B2BE7B1E9B126F116
                              SHA-512:A2CFCCF8FD4A4F73B47A69910888D59E690CD746508AE87F5A1E73DE5EA3FA5A3371F368C46C309E9B9CBA9D2206435073D1528920ACE4404045F6498FC2AF53
                              Malicious:false
                              Reputation:low
                              Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0xecdd910b,0x01d72fe9</date><accdate>0xecdd910b,0x01d72fe9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0xecdd910b,0x01d72fe9</date><accdate>0xecdd910b,0x01d72fe9</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Google.url"/></tile></msapplication></browserconfig>..
                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\FOREIGN NATIONAL MAY 19[1].PDF
                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              File Type:PDF document, version 1.4
                              Category:dropped
                              Size (bytes):380221
                              Entropy (8bit):7.870253128299
                              Encrypted:false
                              SSDEEP:6144:LH99lF27Z3muoJm47QrCCCxpIY8rOqagivFXRmNBvC0qgptotTfPA2/KnkTCez:BvFXQrCCCxiKgiYNBVzYLPAsT1
                              MD5:7CEE0CC3667DC762E921DC006870B895
                              SHA1:37867E09FE1523D1D93FDBC22CCCF6EDD239F3C4
                              SHA-256:3EFA37CB85D44EE6AFB881863BA35EAC6C83BABD65B2BDD179DAB6B3BF710611
                              SHA-512:F5468455B50B977E5D706D90A5F8BCC5B389A883F19ED1EBD7F4ECE61C936E2200969C29CF868218379CD137873E80500883DB5FC7A0DCD7286CC1D8A02E2262
                              Malicious:false
                              Reputation:low
                              Preview: %PDF-1.4.%.....1 0 obj.<<./Type /Catalog./Pages 2 0 R.>>.endobj.3 0 obj.<<./Creator (Canva)./Producer (Canva)./CreationDate (D:20200512072550+00'00')./ModDate (D:20200512072549+00'00')./Keywords (DADfsHXOwPo,BADIiQWyoa4)./Author (excwrk5)./Title (Commercial flyer).>>.endobj.2 0 obj.<<./Type /Pages./Count 1./Kids [4 0 R].>>.endobj.4 0 obj.<<./Type /Page./Resources <<./ProcSets [/PDF /Text /ImageB /ImageC /ImageI]./ExtGState <<./G3 5 0 R.>>./XObject <<./X5 6 0 R./X9 7 0 R.>>./Font <<./F4 8 0 R./F6 9 0 R./F7 10 0 R./F8 11 0 R.>>.>>./MediaBox [0.0 7.9199977 360.0 511.91998]./Contents 12 0 R./StructParents 0./Parent 2 0 R./BleedBox [0.0 7.9199977 360.0 511.91998]./TrimBox [0.0 7.9199977 360.0 511.91998].>>.endobj.5 0 obj.<<./ca 1./BM /Normal.>>.endobj.6 0 obj.<<./Length 298844./Type /XObject./Subtype /Image./Width 1023./Height 680./ColorSpace /DeviceRGB./BitsPerComponent 8./Filter /DCTDecode./ColorTransform 0.>>.stream........JFIF.............C...............................................
                              C:\Users\user\AppData\Local\Temp\~DF0BE9630EA18F6468.TMP
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):34477
                              Entropy (8bit):0.37129571299060793
                              Encrypted:false
                              SSDEEP:24:c9lLh9lLh9lIn9lIn9lRg9lRA9lTS9lTy9lSSd9lSSd9lw8F9lwli9l2K9l2q9lu:kBqoxKAuvScS+vRT6+I+ImIRPZ3W
                              MD5:283F1781A03758B6D92462223056DA78
                              SHA1:1A2CF458ADB591E99AD7743FF33613AD8163D073
                              SHA-256:01E780B7710B61256EF17C9E53D4BFB0BBDD59D9774683B05507332E55D50348
                              SHA-512:0F8C93AC377CB011F274039C5084002A020D717DDF5D08CB03628C83AC766C45CB4A366C0FE1CED324DB47222F6B875F989B78C98458A4703768E9A96CC50DAF
                              Malicious:false
                              Reputation:low
                              Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Temp\~DF0DA265B4E0FD1AC2.TMP
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):13077
                              Entropy (8bit):0.5132048052970682
                              Encrypted:false
                              SSDEEP:24:c9lLh9lLh9lIn9lIn9loD9loD9lWkOQOY:kBqoIkakR1
                              MD5:B2EA602620B46AC16A3C3D179FF1BD28
                              SHA1:3B78CA602D2B8FA1BA0B5D970D92282461A1DC98
                              SHA-256:565B3E5AF95DB8225230C22BDF7F1AB3BB1D3F6684CCD53E2CD8EF1FBFE55CB3
                              SHA-512:64FF482E761B1F9919F9E5E5E269A7811457273B5D16398110113FCC43862BFCEEDCCF8A1CEE9F0EE4EC750D7805976FE224AEC09DFCA34FA156DB61AAA569A1
                              Malicious:false
                              Reputation:low
                              Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Temp\~DF94FD20260357933D.TMP
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):25441
                              Entropy (8bit):0.32289858027910606
                              Encrypted:false
                              SSDEEP:24:c9lLh9lLh9lIn9lIn9lRx/9lRJ9lTb9lTb9lSSU9lSSU9laAa/9laAWSC:kBqoxxJhHWSVSEabWSC
                              MD5:9FEC8EC4CADDDD7B70105CB782B5B2B0
                              SHA1:4B900E6940FEA009F41A0AE2D96383B30514A874
                              SHA-256:3FD713D792171A7D94CE16DB87C092B4383B99D9422383C3157F120347D26F24
                              SHA-512:B702C607049AD451F931FC7C6DF0E753F19E7E810A126879B44A4853248710466301E1ED2A7293623D50C2BDAD3A33E384C0EB5F95CA59BBC23373A1027D5F73
                              Malicious:false
                              Reputation:low
                              Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                              Static File Info

                              No static file info

                              Network Behavior

                              Network Port Distribution

                              TCP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              Apr 12, 2021 15:19:06.788369894 CEST4970280192.168.2.5208.75.122.11
                              Apr 12, 2021 15:19:06.788968086 CEST4970380192.168.2.5208.75.122.11
                              Apr 12, 2021 15:19:06.917009115 CEST8049703208.75.122.11192.168.2.5
                              Apr 12, 2021 15:19:06.917041063 CEST8049702208.75.122.11192.168.2.5
                              Apr 12, 2021 15:19:06.917164087 CEST4970380192.168.2.5208.75.122.11
                              Apr 12, 2021 15:19:06.917529106 CEST4970280192.168.2.5208.75.122.11
                              Apr 12, 2021 15:19:06.917999983 CEST4970380192.168.2.5208.75.122.11
                              Apr 12, 2021 15:19:07.052350044 CEST8049703208.75.122.11192.168.2.5
                              Apr 12, 2021 15:19:07.060214996 CEST8049703208.75.122.11192.168.2.5
                              Apr 12, 2021 15:19:07.060235023 CEST8049703208.75.122.11192.168.2.5
                              Apr 12, 2021 15:19:07.060321093 CEST4970380192.168.2.5208.75.122.11
                              Apr 12, 2021 15:19:07.075143099 CEST4970380192.168.2.5208.75.122.11
                              Apr 12, 2021 15:19:07.202436924 CEST8049703208.75.122.11192.168.2.5
                              Apr 12, 2021 15:20:56.217231989 CEST4970280192.168.2.5208.75.122.11
                              Apr 12, 2021 15:20:56.344779015 CEST8049702208.75.122.11192.168.2.5
                              Apr 12, 2021 15:20:56.344806910 CEST8049702208.75.122.11192.168.2.5
                              Apr 12, 2021 15:20:56.345072031 CEST4970280192.168.2.5208.75.122.11

                              UDP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              Apr 12, 2021 15:18:57.195163965 CEST5270453192.168.2.58.8.8.8
                              Apr 12, 2021 15:18:57.252574921 CEST53527048.8.8.8192.168.2.5
                              Apr 12, 2021 15:18:57.385423899 CEST5221253192.168.2.58.8.8.8
                              Apr 12, 2021 15:18:57.434305906 CEST53522128.8.8.8192.168.2.5
                              Apr 12, 2021 15:18:57.701565981 CEST5430253192.168.2.58.8.8.8
                              Apr 12, 2021 15:18:57.764841080 CEST53543028.8.8.8192.168.2.5
                              Apr 12, 2021 15:18:57.991409063 CEST5378453192.168.2.58.8.8.8
                              Apr 12, 2021 15:18:58.049997091 CEST53537848.8.8.8192.168.2.5
                              Apr 12, 2021 15:18:58.338965893 CEST6530753192.168.2.58.8.8.8
                              Apr 12, 2021 15:18:58.372776985 CEST6434453192.168.2.58.8.8.8
                              Apr 12, 2021 15:18:58.404958963 CEST53653078.8.8.8192.168.2.5
                              Apr 12, 2021 15:18:58.421545982 CEST53643448.8.8.8192.168.2.5
                              Apr 12, 2021 15:19:00.719647884 CEST6206053192.168.2.58.8.8.8
                              Apr 12, 2021 15:19:00.780303001 CEST53620608.8.8.8192.168.2.5
                              Apr 12, 2021 15:19:05.471481085 CEST6180553192.168.2.58.8.8.8
                              Apr 12, 2021 15:19:05.533642054 CEST53618058.8.8.8192.168.2.5
                              Apr 12, 2021 15:19:06.712677002 CEST5479553192.168.2.58.8.8.8
                              Apr 12, 2021 15:19:06.774744034 CEST53547958.8.8.8192.168.2.5
                              Apr 12, 2021 15:19:06.802594900 CEST4955753192.168.2.58.8.8.8
                              Apr 12, 2021 15:19:06.851794004 CEST53495578.8.8.8192.168.2.5
                              Apr 12, 2021 15:19:07.080960035 CEST6173353192.168.2.58.8.8.8
                              Apr 12, 2021 15:19:07.142441034 CEST53617338.8.8.8192.168.2.5
                              Apr 12, 2021 15:19:09.328388929 CEST6544753192.168.2.58.8.8.8
                              Apr 12, 2021 15:19:09.390604973 CEST53654478.8.8.8192.168.2.5
                              Apr 12, 2021 15:19:26.886754990 CEST5244153192.168.2.58.8.8.8
                              Apr 12, 2021 15:19:26.949954987 CEST53524418.8.8.8192.168.2.5
                              Apr 12, 2021 15:19:31.844438076 CEST6217653192.168.2.58.8.8.8
                              Apr 12, 2021 15:19:31.897313118 CEST53621768.8.8.8192.168.2.5
                              Apr 12, 2021 15:19:33.030312061 CEST5959653192.168.2.58.8.8.8
                              Apr 12, 2021 15:19:33.079998970 CEST53595968.8.8.8192.168.2.5
                              Apr 12, 2021 15:19:34.096780062 CEST6529653192.168.2.58.8.8.8
                              Apr 12, 2021 15:19:34.149822950 CEST53652968.8.8.8192.168.2.5
                              Apr 12, 2021 15:19:35.488280058 CEST6318353192.168.2.58.8.8.8
                              Apr 12, 2021 15:19:35.538528919 CEST53631838.8.8.8192.168.2.5
                              Apr 12, 2021 15:19:36.260453939 CEST6015153192.168.2.58.8.8.8
                              Apr 12, 2021 15:19:36.309067965 CEST53601518.8.8.8192.168.2.5
                              Apr 12, 2021 15:19:36.503468990 CEST6318353192.168.2.58.8.8.8
                              Apr 12, 2021 15:19:36.552143097 CEST53631838.8.8.8192.168.2.5
                              Apr 12, 2021 15:19:37.257545948 CEST6015153192.168.2.58.8.8.8
                              Apr 12, 2021 15:19:37.315336943 CEST53601518.8.8.8192.168.2.5
                              Apr 12, 2021 15:19:37.503601074 CEST6318353192.168.2.58.8.8.8
                              Apr 12, 2021 15:19:37.563009977 CEST53631838.8.8.8192.168.2.5
                              Apr 12, 2021 15:19:38.269494057 CEST6015153192.168.2.58.8.8.8
                              Apr 12, 2021 15:19:38.318314075 CEST53601518.8.8.8192.168.2.5
                              Apr 12, 2021 15:19:39.519500971 CEST6318353192.168.2.58.8.8.8
                              Apr 12, 2021 15:19:39.568207979 CEST53631838.8.8.8192.168.2.5
                              Apr 12, 2021 15:19:40.269707918 CEST6015153192.168.2.58.8.8.8
                              Apr 12, 2021 15:19:40.326908112 CEST53601518.8.8.8192.168.2.5
                              Apr 12, 2021 15:19:43.597547054 CEST6318353192.168.2.58.8.8.8
                              Apr 12, 2021 15:19:43.646311998 CEST53631838.8.8.8192.168.2.5
                              Apr 12, 2021 15:19:44.285749912 CEST6015153192.168.2.58.8.8.8
                              Apr 12, 2021 15:19:44.343308926 CEST53601518.8.8.8192.168.2.5
                              Apr 12, 2021 15:19:44.868835926 CEST5696953192.168.2.58.8.8.8
                              Apr 12, 2021 15:19:44.920469999 CEST53569698.8.8.8192.168.2.5
                              Apr 12, 2021 15:19:47.156686068 CEST5516153192.168.2.58.8.8.8
                              Apr 12, 2021 15:19:47.205323935 CEST53551618.8.8.8192.168.2.5
                              Apr 12, 2021 15:19:48.541523933 CEST5475753192.168.2.58.8.8.8
                              Apr 12, 2021 15:19:48.593079090 CEST53547578.8.8.8192.168.2.5
                              Apr 12, 2021 15:19:49.743335009 CEST4999253192.168.2.58.8.8.8
                              Apr 12, 2021 15:19:49.800481081 CEST53499928.8.8.8192.168.2.5
                              Apr 12, 2021 15:19:51.022154093 CEST6007553192.168.2.58.8.8.8
                              Apr 12, 2021 15:19:51.073843002 CEST53600758.8.8.8192.168.2.5
                              Apr 12, 2021 15:19:53.560250998 CEST5501653192.168.2.58.8.8.8
                              Apr 12, 2021 15:19:53.608885050 CEST53550168.8.8.8192.168.2.5
                              Apr 12, 2021 15:19:54.259708881 CEST6434553192.168.2.58.8.8.8
                              Apr 12, 2021 15:19:54.308511972 CEST53643458.8.8.8192.168.2.5
                              Apr 12, 2021 15:19:55.596672058 CEST5712853192.168.2.58.8.8.8
                              Apr 12, 2021 15:19:55.645845890 CEST53571288.8.8.8192.168.2.5
                              Apr 12, 2021 15:20:17.141606092 CEST5479153192.168.2.58.8.8.8
                              Apr 12, 2021 15:20:17.199884892 CEST53547918.8.8.8192.168.2.5
                              Apr 12, 2021 15:21:00.270756960 CEST5046353192.168.2.58.8.8.8
                              Apr 12, 2021 15:21:00.322156906 CEST53504638.8.8.8192.168.2.5
                              Apr 12, 2021 15:21:29.189321995 CEST5039453192.168.2.58.8.8.8
                              Apr 12, 2021 15:21:29.261440039 CEST53503948.8.8.8192.168.2.5
                              Apr 12, 2021 15:21:48.415178061 CEST5853053192.168.2.58.8.8.8
                              Apr 12, 2021 15:21:48.477737904 CEST53585308.8.8.8192.168.2.5
                              Apr 12, 2021 15:21:49.512181044 CEST5381353192.168.2.58.8.8.8
                              Apr 12, 2021 15:21:49.587318897 CEST53538138.8.8.8192.168.2.5
                              Apr 12, 2021 15:21:50.861028910 CEST6373253192.168.2.58.8.8.8
                              Apr 12, 2021 15:21:50.933968067 CEST53637328.8.8.8192.168.2.5
                              Apr 12, 2021 15:21:51.626597881 CEST5734453192.168.2.58.8.8.8
                              Apr 12, 2021 15:21:51.686646938 CEST53573448.8.8.8192.168.2.5
                              Apr 12, 2021 15:21:52.233217955 CEST5445053192.168.2.58.8.8.8
                              Apr 12, 2021 15:21:52.293164015 CEST53544508.8.8.8192.168.2.5
                              Apr 12, 2021 15:21:52.934613943 CEST5926153192.168.2.58.8.8.8
                              Apr 12, 2021 15:21:53.011869907 CEST53592618.8.8.8192.168.2.5
                              Apr 12, 2021 15:21:54.046004057 CEST5715153192.168.2.58.8.8.8
                              Apr 12, 2021 15:21:54.096122026 CEST53571518.8.8.8192.168.2.5
                              Apr 12, 2021 15:21:55.766287088 CEST5941353192.168.2.58.8.8.8
                              Apr 12, 2021 15:21:55.823585987 CEST53594138.8.8.8192.168.2.5
                              Apr 12, 2021 15:21:57.158423901 CEST6051653192.168.2.58.8.8.8
                              Apr 12, 2021 15:21:57.207694054 CEST53605168.8.8.8192.168.2.5
                              Apr 12, 2021 15:21:57.872054100 CEST5164953192.168.2.58.8.8.8
                              Apr 12, 2021 15:21:57.929920912 CEST53516498.8.8.8192.168.2.5
                              Apr 12, 2021 15:23:54.075620890 CEST6508653192.168.2.58.8.8.8
                              Apr 12, 2021 15:23:54.136023998 CEST53650868.8.8.8192.168.2.5
                              Apr 12, 2021 15:23:55.310157061 CEST5643253192.168.2.58.8.8.8
                              Apr 12, 2021 15:23:55.380156040 CEST53564328.8.8.8192.168.2.5
                              Apr 12, 2021 15:24:03.221530914 CEST5292953192.168.2.58.8.8.8
                              Apr 12, 2021 15:24:03.290947914 CEST53529298.8.8.8192.168.2.5
                              Apr 12, 2021 15:24:07.987732887 CEST6431753192.168.2.58.8.8.8
                              Apr 12, 2021 15:24:08.055860043 CEST53643178.8.8.8192.168.2.5
                              Apr 12, 2021 15:24:08.412378073 CEST6100453192.168.2.58.8.8.8
                              Apr 12, 2021 15:24:08.469455957 CEST53610048.8.8.8192.168.2.5
                              Apr 12, 2021 15:26:37.848639965 CEST5689553192.168.2.58.8.8.8
                              Apr 12, 2021 15:26:37.897789001 CEST53568958.8.8.8192.168.2.5
                              Apr 12, 2021 15:27:12.401345968 CEST6237253192.168.2.58.8.8.8
                              Apr 12, 2021 15:27:12.466770887 CEST53623728.8.8.8192.168.2.5

                              DNS Queries

                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                              Apr 12, 2021 15:18:57.991409063 CEST192.168.2.58.8.8.80xa5d4Standard query (0)clientconfig.passport.netA (IP address)IN (0x0001)
                              Apr 12, 2021 15:19:06.712677002 CEST192.168.2.58.8.8.80x5090Standard query (0)r20.rs6.netA (IP address)IN (0x0001)
                              Apr 12, 2021 15:19:07.080960035 CEST192.168.2.58.8.8.80x6febStandard query (0)files.constantcontact.comA (IP address)IN (0x0001)

                              DNS Answers

                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                              Apr 12, 2021 15:18:58.049997091 CEST8.8.8.8192.168.2.50xa5d4No error (0)clientconfig.passport.netauthgfx.msa.akadns6.netCNAME (Canonical name)IN (0x0001)
                              Apr 12, 2021 15:19:06.774744034 CEST8.8.8.8192.168.2.50x5090No error (0)r20.rs6.netrs6.netCNAME (Canonical name)IN (0x0001)
                              Apr 12, 2021 15:19:06.774744034 CEST8.8.8.8192.168.2.50x5090No error (0)rs6.net208.75.122.11A (IP address)IN (0x0001)
                              Apr 12, 2021 15:19:07.142441034 CEST8.8.8.8192.168.2.50x6febNo error (0)files.constantcontact.comwildcard-prod.constantcontact.com.edgekey.netCNAME (Canonical name)IN (0x0001)
                              Apr 12, 2021 15:23:54.136023998 CEST8.8.8.8192.168.2.50x9830No error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.trafficmanager.netCNAME (Canonical name)IN (0x0001)

                              HTTP Request Dependency Graph

                              • r20.rs6.net

                              HTTP Packets

                              Session IDSource IPSource PortDestination IPDestination PortProcess
                              0192.168.2.549703208.75.122.1180C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              TimestampkBytes transferredDirectionData
                              Apr 12, 2021 15:19:06.917999983 CEST1316OUTGET /tn.jsp?f=001UR9DU5DWULSSQKRSbHmS5tW1BYzJdf5a5nCBJP8j6WTiQVP7-HJVYmCgrw0XB_uf_QV56Haa_M0mobYIQXKQSaOe6Xu-1xTkGHmKJGzfmmZ2amUpZf-ss1HRg0GxKivYopLHGEV8UEW0_6cIw3aFuQi_2vwTONr1CLcH72kMluSyn6F3FeMZ-MnNHeyuCyEwaUdYWjqc4gJLjgQuRM_rdz9h3O3GIfxNvpPnSjOOSeM=&c=5vPu-3Qs9yW2IEWn1dtOMdgOR2JdmjhB8RamT_IPEu6k3Sz7qp1rDA==&ch=t9Qhnt_2hiJ7oXunOWnQpfuylRuTM4kuFHw1DTZGabFSxZ_AG1kZXw== HTTP/1.1
                              Accept: text/html, application/xhtml+xml, image/jxr, */*
                              Accept-Language: en-US
                              User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
                              Accept-Encoding: gzip, deflate
                              Host: r20.rs6.net
                              Connection: Keep-Alive
                              Apr 12, 2021 15:19:07.060214996 CEST1349INHTTP/1.1 302 Found
                              Date: Mon, 12 Apr 2021 13:19:06 GMT
                              Server: Apache
                              P3P: CP="CAO DSP TAIa OUR NOR UNI"
                              Location: https://files.constantcontact.com/54e1b5c9701/a2191b8c-25d2-4fe8-aff0-8b4735afdc69.pdf
                              Content-Length: 0
                              Cache-Control: private, no-cache, no-store, max-age=0, must-revalidate, no-cache="Set-Cookie"
                              Pragma: no-cache
                              Connection: close
                              Content-Type: text/html;charset=ISO-8859-1


                              Code Manipulations

                              Statistics

                              CPU Usage

                              Click to jump to process

                              Memory Usage

                              Click to jump to process

                              High Level Behavior Distribution

                              Click to dive into process behavior distribution

                              Behavior

                              Click to jump to process

                              System Behavior

                              General

                              Start time:15:19:03
                              Start date:12/04/2021
                              Path:C:\Program Files\internet explorer\iexplore.exe
                              Wow64 process (32bit):false
                              Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                              Imagebase:0x7ff73e7b0000
                              File size:823560 bytes
                              MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low

                              General

                              Start time:15:19:04
                              Start date:12/04/2021
                              Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5620 CREDAT:17410 /prefetch:2
                              Imagebase:0xbf0000
                              File size:822536 bytes
                              MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low

                              General

                              Start time:15:19:07
                              Start date:12/04/2021
                              Path:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe' /o /eo /l /b /ac /id 5904
                              Imagebase:0x320000
                              File size:2571312 bytes
                              MD5 hash:B969CF0C7B2C443A99034881E8C8740A
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low

                              General

                              Start time:15:19:08
                              Start date:12/04/2021
                              Path:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe' --type=renderer /prefetch:1 /o /eo /l /b /ac /id 5904
                              Imagebase:0x320000
                              File size:2571312 bytes
                              MD5 hash:B969CF0C7B2C443A99034881E8C8740A
                              Has elevated privileges:false
                              Has administrator privileges:false
                              Programmed in:C, C++ or other language
                              Reputation:low

                              Disassembly

                              Code Analysis

                              Reset < >

                                Execution Graph

                                Execution Coverage:13.5%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:0%
                                Total number of Nodes:1
                                Total number of Limit Nodes:0

                                Graph

                                execution_graph 92 45b7003 LdrInitializeThunk

                                Callgraph

                                Executed Functions

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1 45b7050-45b705c LdrInitializeThunk
                                APIs
                                Memory Dump Source
                                • Source File: 00000005.00000002.1667861681.00000000045B7000.00000020.00000001.sdmp, Offset: 045B7000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_45b7000_AcroRd32.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 60c4eea08dc9b3396f52fb7f072ebabd791c5fea85ecd0ae8db6a70723588e68
                                • Instruction ID: 1f088c47e12878d265940b5571550c608e3360751325ba3d02bd9d61573c5fa8
                                • Opcode Fuzzy Hash: 60c4eea08dc9b3396f52fb7f072ebabd791c5fea85ecd0ae8db6a70723588e68
                                • Instruction Fuzzy Hash: 3D9002B165500452E14175694454706011957D0282FE5C012A0154554DCA958B76B7E1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 0 45b7003-45b701c LdrInitializeThunk
                                APIs
                                Memory Dump Source
                                • Source File: 00000005.00000002.1667861681.00000000045B7000.00000020.00000001.sdmp, Offset: 045B7000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_45b7000_AcroRd32.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: dfc722cb8b73492a71cde811708dde1a206dda084d8ac81eb8dc24f3412aca8c
                                • Instruction ID: 1205bf21da60aa35b69651f0eeda61687aa0b24fdc85b01a11a16fe6dc1b1e19
                                • Opcode Fuzzy Hash: dfc722cb8b73492a71cde811708dde1a206dda084d8ac81eb8dc24f3412aca8c
                                • Instruction Fuzzy Hash: 86C04C9509EBD14FD30353701C759D22F605A9325275E81D7D4848B09BC54806AB9373
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 8 45b76d0-45b76dc LdrInitializeThunk
                                APIs
                                Memory Dump Source
                                • Source File: 00000005.00000002.1667861681.00000000045B7000.00000020.00000001.sdmp, Offset: 045B7000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_45b7000_AcroRd32.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 2a8e80ff786fc952b457d42417e8306c2fdb97097e599296c35c92d9a2a4115a
                                • Instruction ID: 3c5ee0896adc3ba9cc629711913a33be071d1619d23670552358693bb78ef190
                                • Opcode Fuzzy Hash: 2a8e80ff786fc952b457d42417e8306c2fdb97097e599296c35c92d9a2a4115a
                                • Instruction Fuzzy Hash: 889002B125100452E10069A95408646010557E0342FA5D011A5154555ECAA588B172B1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 4 45b72d0-45b72dc LdrInitializeThunk
                                APIs
                                Memory Dump Source
                                • Source File: 00000005.00000002.1667861681.00000000045B7000.00000020.00000001.sdmp, Offset: 045B7000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_45b7000_AcroRd32.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: c2ed597fe0944b5d67d3fd9f5e7fdda6251694389c1ad3645975f6e77e24f5b5
                                • Instruction ID: a5651a7379f0af776839050508a23cc693f0c3cac7c16a5a23078c553d222495
                                • Opcode Fuzzy Hash: c2ed597fe0944b5d67d3fd9f5e7fdda6251694389c1ad3645975f6e77e24f5b5
                                • Instruction Fuzzy Hash: 949002B136114452E11065698404706010557D1242FA5C411A0954558DCAD588B172A2
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 3 45b71d0-45b71dc LdrInitializeThunk
                                APIs
                                Memory Dump Source
                                • Source File: 00000005.00000002.1667861681.00000000045B7000.00000020.00000001.sdmp, Offset: 045B7000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_45b7000_AcroRd32.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: e3a77c6ac00c9e187e25df3ba38124539010e40d92bac3335d620d7a4c1422eb
                                • Instruction ID: 8f6d6603a92dcdd9e8435c2f67672cfd5333d817e8420a848a1abcc9a12af4b7
                                • Opcode Fuzzy Hash: e3a77c6ac00c9e187e25df3ba38124539010e40d92bac3335d620d7a4c1422eb
                                • Instruction Fuzzy Hash: DF9002B125100892E10065694404B46010557E0342FA5C016A0254654DCA55C87176A1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 9 45b7750-45b775c LdrInitializeThunk
                                APIs
                                Memory Dump Source
                                • Source File: 00000005.00000002.1667861681.00000000045B7000.00000020.00000001.sdmp, Offset: 045B7000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_45b7000_AcroRd32.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 01339d89859445b5dcfe8a74bc0fd4f0ebaf1e59a309d18d7b26184674c51d52
                                • Instruction ID: 56a74e7ee1e757f028ed8b7ccb80493c86332e389ad7f786d1a91bd785c836df
                                • Opcode Fuzzy Hash: 01339d89859445b5dcfe8a74bc0fd4f0ebaf1e59a309d18d7b26184674c51d52
                                • Instruction Fuzzy Hash: DA9002B926300052E1807569540860A010557D1243FE5D415A0145558CCD55887963A1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 6 45b7350-45b735c LdrInitializeThunk
                                APIs
                                Memory Dump Source
                                • Source File: 00000005.00000002.1667861681.00000000045B7000.00000020.00000001.sdmp, Offset: 045B7000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_45b7000_AcroRd32.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 4ca5657fecf71ec533c091e76a84b64cf5cd5823b424e2a675ab05ee896e04e7
                                • Instruction ID: a3cb76758bf85279f6e09bf04aec96412f94050d0379032fe22de5c42c9d0144
                                • Opcode Fuzzy Hash: 4ca5657fecf71ec533c091e76a84b64cf5cd5823b424e2a675ab05ee896e04e7
                                • Instruction Fuzzy Hash: D89002F1255040D2E11166694404F0A420957E0286FE5C016A0184594CC9658972E2A1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 5 45b7310-45b731c LdrInitializeThunk
                                APIs
                                Memory Dump Source
                                • Source File: 00000005.00000002.1667861681.00000000045B7000.00000020.00000001.sdmp, Offset: 045B7000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_45b7000_AcroRd32.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 93d55c506c8ea46e4e961099afc070b00c86208e6514f807ff4510efbc6c306c
                                • Instruction ID: 35b328700a35bffed059b0bc9c5db0d516edd8256cf454e8407034f0143453b0
                                • Opcode Fuzzy Hash: 93d55c506c8ea46e4e961099afc070b00c86208e6514f807ff4510efbc6c306c
                                • Instruction Fuzzy Hash: 2C9002F139100492E10065694414B06010597E1342FA5C015E1194554DCA59CC7272A6
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 2 45b7110-45b711c LdrInitializeThunk
                                APIs
                                Memory Dump Source
                                • Source File: 00000005.00000002.1667861681.00000000045B7000.00000020.00000001.sdmp, Offset: 045B7000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_45b7000_AcroRd32.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 2c3c4861bcc2abf3c618c035478f110f928102aa16c50d1df385042a92c515ed
                                • Instruction ID: 0d59ff3f939beb192e9835ddfe4cf25e4f30eb6c00148d19004f612f24dc5623
                                • Opcode Fuzzy Hash: 2c3c4861bcc2abf3c618c035478f110f928102aa16c50d1df385042a92c515ed
                                • Instruction Fuzzy Hash: 919002B125504492E10069695408A06010557D0246FA5D011A1194595DCA758871B2B1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 7 45b7490-45b749c LdrInitializeThunk
                                APIs
                                Memory Dump Source
                                • Source File: 00000005.00000002.1667861681.00000000045B7000.00000020.00000001.sdmp, Offset: 045B7000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_45b7000_AcroRd32.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: f644434e7269a43c68c33cd4216a2883c9673e2288d63bccd5d0993a1e817e5c
                                • Instruction ID: 6b21b83d22079670bc6c61082edbff717d2dc574e0c5646c1ff11f91602ceec8
                                • Opcode Fuzzy Hash: f644434e7269a43c68c33cd4216a2883c9673e2288d63bccd5d0993a1e817e5c
                                • Instruction Fuzzy Hash: 2B9002B125100452E10065A94404706010557D0242FA5C412E0654558DCA95887176B1
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 10 45b7790-45b779c LdrInitializeThunk
                                APIs
                                Memory Dump Source
                                • Source File: 00000005.00000002.1667861681.00000000045B7000.00000020.00000001.sdmp, Offset: 045B7000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_5_2_45b7000_AcroRd32.jbxd
                                Similarity
                                • API ID: InitializeThunk
                                • String ID:
                                • API String ID: 2994545307-0
                                • Opcode ID: 830751f9295ba8d8e3f2846285c0597b33f778ba4aa3655328f092153696a56c
                                • Instruction ID: a5a4795d5e336d8df0b0ae678f2bb8f2fd2bd21ef4f962b97079a63480925be2
                                • Opcode Fuzzy Hash: 830751f9295ba8d8e3f2846285c0597b33f778ba4aa3655328f092153696a56c
                                • Instruction Fuzzy Hash: 999002B135100053E140756954186064105A7E1342FA5D011E0544554CDD55887663A2
                                Uniqueness

                                Uniqueness Score: -1.00%

                                Non-executed Functions