Loading ...

Play interactive tourEdit tour

Analysis Report http://louisville.edu/coronavirus/assets/Dec12020InterimPolicyforUniversityTravel.pdf

Overview

General Information

Sample URL:http://louisville.edu/coronavirus/assets/Dec12020InterimPolicyforUniversityTravel.pdf
Analysis ID:411367
Infos:

Most interesting Screenshot:

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

Startup

  • System is w10x64
  • iexplore.exe (PID: 5916 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 4552 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5916 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
      • AcroRd32.exe (PID: 5140 cmdline: 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe' /o /eo /l /b /ac /id 4552 MD5: B969CF0C7B2C443A99034881E8C8740A)
        • AcroRd32.exe (PID: 5452 cmdline: 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe' --type=renderer /prefetch:1 /o /eo /l /b /ac /id 4552 MD5: B969CF0C7B2C443A99034881E8C8740A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
Source: global trafficHTTP traffic detected: GET /coronavirus/assets/Dec12020InterimPolicyforUniversityTravel.pdf HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateHost: louisville.eduConnection: Keep-Alive
Source: msapplication.xml0.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xaef4f5bf,0x01d746df</date><accdate>0xaef4f5bf,0x01d746df</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml0.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xaef4f5bf,0x01d746df</date><accdate>0xaef4f5bf,0x01d746df</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml5.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xaefc1cd2,0x01d746df</date><accdate>0xaefc1cd2,0x01d746df</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml5.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xaefc1cd2,0x01d746df</date><accdate>0xaefc1cd2,0x01d746df</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml7.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xaefc1cd2,0x01d746df</date><accdate>0xaefc1cd2,0x01d746df</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: msapplication.xml7.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xaefc1cd2,0x01d746df</date><accdate>0xaefc1cd2,0x01d746df</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: unknownDNS traffic detected: queries for: louisville.edu
Source: AcroRd32.exe, 00000004.00000002.1659566788.0000000008EED000.00000002.00000001.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: AcroRd32.exe, 00000004.00000002.1659566788.0000000008EED000.00000002.00000001.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertEVCodeSigningCA-SHA2.crt0
Source: AcroRd32.exe, 00000004.00000002.1659566788.0000000008EED000.00000002.00000001.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
Source: AcroRd32.exe, 00000004.00000002.1659566788.0000000008EED000.00000002.00000001.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: AcroRd32.exe, 00000004.00000002.1659566788.0000000008EED000.00000002.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: AcroRd32.exe, 00000004.00000002.1659566788.0000000008EED000.00000002.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: AcroRd32.exe, 00000004.00000002.1659566788.0000000008EED000.00000002.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/EVCodeSigningSHA2-g1.crl07
Source: AcroRd32.exe, 00000004.00000002.1659566788.0000000008EED000.00000002.00000001.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: AcroRd32.exe, 00000004.00000002.1659566788.0000000008EED000.00000002.00000001.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: AcroRd32.exe, 00000004.00000002.1659566788.0000000008EED000.00000002.00000001.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: AcroRd32.exe, 00000004.00000002.1659566788.0000000008EED000.00000002.00000001.sdmpString found in binary or memory: http://crl4.digicert.com/EVCodeSigningSHA2-g1.crl0K
Source: AcroRd32.exe, 00000004.00000002.1659566788.0000000008EED000.00000002.00000001.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: AcroRd32.exe, 00000004.00000002.1660481864.0000000009794000.00000004.00000001.sdmp, ~DF5E4421C38C2CE13F.TMP.1.drString found in binary or memory: http://louisville.edu/coronavirus/assets/Dec12020InterimPolicyforUniversityTravel.pdf
Source: {D9051C57-B2D2-11EB-90E4-ECF4BB862DED}.dat.1.drString found in binary or memory: http://louisville.edu/coronavirus/assets/Dec12020InterimPolicyforUniversityTravel.pdfRoot
Source: AcroRd32.exe, 00000004.00000002.1660481864.0000000009794000.00000004.00000001.sdmpString found in binary or memory: http://louisville.edu/coronavirus/assets/Dec12020InterimPolicyforUniversityTravel.pdfs
Source: Dec 1 2020 - Interim Policy for University Travel[1].pdf.2.drString found in binary or memory: http://louisville.edu/studyabroad/policies/travel-warning-policy)
Source: AcroRd32.exe, 00000004.00000002.1659566788.0000000008EED000.00000002.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0C
Source: AcroRd32.exe, 00000004.00000002.1659566788.0000000008EED000.00000002.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0H
Source: AcroRd32.exe, 00000004.00000002.1659566788.0000000008EED000.00000002.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0I
Source: AcroRd32.exe, 00000004.00000002.1659566788.0000000008EED000.00000002.00000001.sdmpString found in binary or memory: http://ocsp.digicert.com0O
Source: msapplication.xml.1.drString found in binary or memory: http://www.amazon.com/
Source: AcroRd32.exe, 00000004.00000002.1659566788.0000000008EED000.00000002.00000001.sdmpString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
Source: msapplication.xml1.1.drString found in binary or memory: http://www.google.com/
Source: msapplication.xml2.1.drString found in binary or memory: http://www.live.com/
Source: AcroRd32.exe, 00000004.00000002.1661021220.0000000009998000.00000004.00000001.sdmp, Dec 1 2020 - Interim Policy for University Travel[1].pdf.2.drString found in binary or memory: http://www.louisville.edu/coronavirus)
Source: msapplication.xml3.1.drString found in binary or memory: http://www.nytimes.com/
Source: AcroRd32.exe, 00000004.00000002.1653199339.0000000008030000.00000002.00000001.sdmpString found in binary or memory: http://www.osmf.org/default/1.0%http://www.osmf.org/mediatype/default
Source: AcroRd32.exe, 00000004.00000002.1653199339.0000000008030000.00000002.00000001.sdmpString found in binary or memory: http://www.osmf.org/drm/default
Source: AcroRd32.exe, 00000004.00000002.1653199339.0000000008030000.00000002.00000001.sdmpString found in binary or memory: http://www.osmf.org/elementId%http://www.osmf.org/temporal/embedded$http://www.osmf.org/temporal/dyn
Source: AcroRd32.exe, 00000004.00000002.1653199339.0000000008030000.00000002.00000001.sdmpString found in binary or memory: http://www.osmf.org/layout/anchor
Source: AcroRd32.exe, 00000004.00000002.1653199339.0000000008030000.00000002.00000001.sdmpString found in binary or memory: http://www.osmf.org/layout/padding%http://www.osmf.org/layout/attributes
Source: AcroRd32.exe, 00000004.00000002.1653199339.0000000008030000.00000002.00000001.sdmpString found in binary or memory: http://www.osmf.org/region/target#http://www.osmf.org/layout/renderer#http://www.osmf.org/layout/abs
Source: AcroRd32.exe, 00000004.00000002.1653199339.0000000008030000.00000002.00000001.sdmpString found in binary or memory: http://www.osmf.org/subclip/1.0
Source: AcroRd32.exe, 00000004.00000002.1653199339.0000000008030000.00000002.00000001.sdmpString found in binary or memory: http://www.quicktime.com.Acrobat
Source: msapplication.xml4.1.drString found in binary or memory: http://www.reddit.com/
Source: msapplication.xml5.1.drString found in binary or memory: http://www.twitter.com/
Source: msapplication.xml6.1.drString found in binary or memory: http://www.wikipedia.com/
Source: msapplication.xml7.1.drString found in binary or memory: http://www.youtube.com/
Source: Dec 1 2020 - Interim Policy for University Travel[1].pdf.2.drString found in binary or memory: https://forms.office.com/Pages/ResponsePage.aspx?id=Sm4k3TRUFU6K45Gtl5eyCSa4a5uPy2ZEov0th0MezgJUN0NK
Source: AcroRd32.exe, 00000004.00000002.1660857750.0000000009950000.00000004.00000001.sdmpString found in binary or memory: https://ims-na1.adobelogin.com
Source: AcroRd32.exe, 00000004.00000002.1660857750.0000000009950000.00000004.00000001.sdmpString found in binary or memory: https://ims-na1.adobelogin.com:
Source: AcroRd32.exe, 00000004.00000002.1659566788.0000000008EED000.00000002.00000001.sdmpString found in binary or memory: https://www.digicert.com/CPS0
Source: classification engineClassification label: clean0.win@7/17@1/1
Source: Dec 1 2020 - Interim Policy for University Travel[1].pdf.2.drInitial sample: https://forms.office.com/pages/responsepage.aspx?id=sm4k3trufu6k45gtl5eycsa4a5upy2zeov0th0mezgjun0nkt0mzufljudrpwtnnsfdvn1josfbqmcqlqcn0pwcu
Source: Dec 1 2020 - Interim Policy for University Travel[1].pdf.2.drInitial sample: https://forms.office.com/Pages/ResponsePage.aspx?id=Sm4k3TRUFU6K45Gtl5eyCSa4a5uPy2ZEov0th0MezgJUN0NKT0MzUFlJUDRPWTNNSFdVN1JOSFBQMCQlQCN0PWcu
Source: Dec 1 2020 - Interim Policy for University Travel[1].pdf.2.drInitial sample: http://www.louisville.edu/coronavirus
Source: Dec 1 2020 - Interim Policy for University Travel[1].pdf.2.drInitial sample: http://louisville.edu/studyabroad/policies/travel-warning-policy
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\HighJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DFFF3F5C6B9F825167.TMPJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5916 CREDAT:17410 /prefetch:2
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe' /o /eo /l /b /ac /id 4552
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe' --type=renderer /prefetch:1 /o /eo /l /b /ac /id 4552
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5916 CREDAT:17410 /prefetch:2Jump to behavior
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe' /o /eo /l /b /ac /id 4552Jump to behavior
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe' --type=renderer /prefetch:1 /o /eo /l /b /ac /id 4552Jump to behavior
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeFile opened: C:\Windows\SysWOW64\Msftedit.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dllJump to behavior
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeCode function: 4_2_053C5110 LdrInitializeThunk,4_2_053C5110
Source: AcroRd32.exe, 00000004.00000002.1650353958.0000000005D70000.00000002.00000001.sdmpBinary or memory string: Program Manager
Source: AcroRd32.exe, 00000004.00000002.1650353958.0000000005D70000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
Source: AcroRd32.exe, 00000004.00000002.1650353958.0000000005D70000.00000002.00000001.sdmpBinary or memory string: Progman
Source: AcroRd32.exe, 00000004.00000002.1650353958.0000000005D70000.00000002.00000001.sdmpBinary or memory string: Progmanlock

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Spearphishing Link1Windows Management InstrumentationPath InterceptionProcess Injection2Masquerading1OS Credential DumpingProcess Discovery2Remote ServicesData from Local SystemExfiltration Over Other Network MediumNon-Application Layer Protocol2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection2LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothApplication Layer Protocol2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationIngress Tool Transfer1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 411367 URL: http://louisville.edu/coron... Startdate: 11/05/2021 Architecture: WINDOWS Score: 0 7 iexplore.exe 2 86 2->7         started        process3 9 iexplore.exe 31 7->9         started        dnsIp4 16 louisville.edu 136.165.238.241, 49715, 49716, 80 LOUISVILLEUS United States 9->16 12 AcroRd32.exe 23 9->12         started        process5 process6 14 AcroRd32.exe 2 12->14         started       

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
http://louisville.edu/coronavirus/assets/Dec12020InterimPolicyforUniversityTravel.pdf0%VirustotalBrowse
http://louisville.edu/coronavirus/assets/Dec12020InterimPolicyforUniversityTravel.pdf0%Avira URL Cloudsafe

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

SourceDetectionScannerLabelLink
http://www.osmf.org/layout/anchor0%URL Reputationsafe
http://www.osmf.org/layout/anchor0%URL Reputationsafe
http://www.osmf.org/layout/anchor0%URL Reputationsafe
http://www.osmf.org/layout/anchor0%URL Reputationsafe
http://www.osmf.org/region/target#http://www.osmf.org/layout/renderer#http://www.osmf.org/layout/abs0%URL Reputationsafe
http://www.osmf.org/region/target#http://www.osmf.org/layout/renderer#http://www.osmf.org/layout/abs0%URL Reputationsafe
http://www.osmf.org/region/target#http://www.osmf.org/layout/renderer#http://www.osmf.org/layout/abs0%URL Reputationsafe
http://www.osmf.org/region/target#http://www.osmf.org/layout/renderer#http://www.osmf.org/layout/abs0%URL Reputationsafe
http://www.osmf.org/drm/default0%URL Reputationsafe
http://www.osmf.org/drm/default0%URL Reputationsafe
http://www.osmf.org/drm/default0%URL Reputationsafe
http://www.osmf.org/drm/default0%URL Reputationsafe
http://www.osmf.org/layout/padding%http://www.osmf.org/layout/attributes0%URL Reputationsafe
http://www.osmf.org/layout/padding%http://www.osmf.org/layout/attributes0%URL Reputationsafe
http://www.osmf.org/layout/padding%http://www.osmf.org/layout/attributes0%URL Reputationsafe
http://www.osmf.org/layout/padding%http://www.osmf.org/layout/attributes0%URL Reputationsafe
http://www.osmf.org/elementId%http://www.osmf.org/temporal/embedded$http://www.osmf.org/temporal/dyn0%URL Reputationsafe
http://www.osmf.org/elementId%http://www.osmf.org/temporal/embedded$http://www.osmf.org/temporal/dyn0%URL Reputationsafe
http://www.osmf.org/elementId%http://www.osmf.org/temporal/embedded$http://www.osmf.org/temporal/dyn0%URL Reputationsafe
http://www.osmf.org/elementId%http://www.osmf.org/temporal/embedded$http://www.osmf.org/temporal/dyn0%URL Reputationsafe
http://www.wikipedia.com/0%URL Reputationsafe
http://www.wikipedia.com/0%URL Reputationsafe
http://www.wikipedia.com/0%URL Reputationsafe
http://www.wikipedia.com/0%URL Reputationsafe
http://www.osmf.org/default/1.0%http://www.osmf.org/mediatype/default0%URL Reputationsafe
http://www.osmf.org/default/1.0%http://www.osmf.org/mediatype/default0%URL Reputationsafe
http://www.osmf.org/default/1.0%http://www.osmf.org/mediatype/default0%URL Reputationsafe
http://www.osmf.org/default/1.0%http://www.osmf.org/mediatype/default0%URL Reputationsafe
http://www.quicktime.com.Acrobat0%URL Reputationsafe
http://www.quicktime.com.Acrobat0%URL Reputationsafe
http://www.quicktime.com.Acrobat0%URL Reputationsafe
http://www.quicktime.com.Acrobat0%URL Reputationsafe
http://www.osmf.org/subclip/1.00%URL Reputationsafe
http://www.osmf.org/subclip/1.00%URL Reputationsafe
http://www.osmf.org/subclip/1.00%URL Reputationsafe
http://www.osmf.org/subclip/1.00%URL Reputationsafe

Domains and IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
louisville.edu
136.165.238.241
truefalse
    high

    Contacted URLs

    NameMaliciousAntivirus DetectionReputation
    http://louisville.edu/coronavirus/assets/Dec12020InterimPolicyforUniversityTravel.pdffalse
      high

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      http://www.louisville.edu/coronavirus)AcroRd32.exe, 00000004.00000002.1661021220.0000000009998000.00000004.00000001.sdmp, Dec 1 2020 - Interim Policy for University Travel[1].pdf.2.drfalse
        high
        http://www.nytimes.com/msapplication.xml3.1.drfalse
          high
          http://louisville.edu/coronavirus/assets/Dec12020InterimPolicyforUniversityTravel.pdfsAcroRd32.exe, 00000004.00000002.1660481864.0000000009794000.00000004.00000001.sdmpfalse
            high
            https://ims-na1.adobelogin.com:AcroRd32.exe, 00000004.00000002.1660857750.0000000009950000.00000004.00000001.sdmpfalse
              high
              http://www.osmf.org/layout/anchorAcroRd32.exe, 00000004.00000002.1653199339.0000000008030000.00000002.00000001.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://louisville.edu/coronavirus/assets/Dec12020InterimPolicyforUniversityTravel.pdfRoot{D9051C57-B2D2-11EB-90E4-ECF4BB862DED}.dat.1.drfalse
                high
                http://www.youtube.com/msapplication.xml7.1.drfalse
                  high
                  http://www.osmf.org/region/target#http://www.osmf.org/layout/renderer#http://www.osmf.org/layout/absAcroRd32.exe, 00000004.00000002.1653199339.0000000008030000.00000002.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  https://forms.office.com/Pages/ResponsePage.aspx?id=Sm4k3TRUFU6K45Gtl5eyCSa4a5uPy2ZEov0th0MezgJUN0NKDec 1 2020 - Interim Policy for University Travel[1].pdf.2.drfalse
                    high
                    http://louisville.edu/studyabroad/policies/travel-warning-policy)Dec 1 2020 - Interim Policy for University Travel[1].pdf.2.drfalse
                      high
                      http://www.osmf.org/drm/defaultAcroRd32.exe, 00000004.00000002.1653199339.0000000008030000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.osmf.org/layout/padding%http://www.osmf.org/layout/attributesAcroRd32.exe, 00000004.00000002.1653199339.0000000008030000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.osmf.org/elementId%http://www.osmf.org/temporal/embedded$http://www.osmf.org/temporal/dynAcroRd32.exe, 00000004.00000002.1653199339.0000000008030000.00000002.00000001.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.wikipedia.com/msapplication.xml6.1.drfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.amazon.com/msapplication.xml.1.drfalse
                        high
                        http://www.live.com/msapplication.xml2.1.drfalse
                          high
                          http://www.osmf.org/default/1.0%http://www.osmf.org/mediatype/defaultAcroRd32.exe, 00000004.00000002.1653199339.0000000008030000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.quicktime.com.AcrobatAcroRd32.exe, 00000004.00000002.1653199339.0000000008030000.00000002.00000001.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          https://ims-na1.adobelogin.comAcroRd32.exe, 00000004.00000002.1660857750.0000000009950000.00000004.00000001.sdmpfalse
                            high
                            http://www.reddit.com/msapplication.xml4.1.drfalse
                              high
                              http://www.twitter.com/msapplication.xml5.1.drfalse
                                high
                                http://www.osmf.org/subclip/1.0AcroRd32.exe, 00000004.00000002.1653199339.0000000008030000.00000002.00000001.sdmpfalse
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown

                                Contacted IPs

                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs

                                Public

                                IPDomainCountryFlagASNASN NameMalicious
                                136.165.238.241
                                louisville.eduUnited States
                                1657LOUISVILLEUSfalse

                                General Information

                                Joe Sandbox Version:32.0.0 Black Diamond
                                Analysis ID:411367
                                Start date:11.05.2021
                                Start time:20:32:53
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:0h 14m 23s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:browseurl.jbs
                                Sample URL:http://louisville.edu/coronavirus/assets/Dec12020InterimPolicyforUniversityTravel.pdf
                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                Number of analysed new started processes analysed:40
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Detection:CLEAN
                                Classification:clean0.win@7/17@1/1
                                EGA Information:
                                • Successful, ratio: 100%
                                HCA Information:
                                • Successful, ratio: 100%
                                • Number of executed functions: 11
                                • Number of non-executed functions: 0
                                Cookbook Comments:
                                • Adjust boot time
                                • Enable AMSI
                                Warnings:
                                Show All
                                • Max analysis timeout: 720s exceeded, the analysis took too long

                                Simulations

                                Behavior and APIs

                                No simulations

                                Joe Sandbox View / Context

                                IPs

                                No context

                                Domains

                                No context

                                ASN

                                No context

                                JA3 Fingerprints

                                No context

                                Dropped Files

                                No context

                                Created / dropped Files

                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{D9051C55-B2D2-11EB-90E4-ECF4BB862DED}.dat
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:Microsoft Word Document
                                Category:dropped
                                Size (bytes):36440
                                Entropy (8bit):1.8880688792959317
                                Encrypted:false
                                SSDEEP:96:r2ZZZk2cWOMtOzfO2BMOqjOqIOqrOqtOq8fOqd8X:r2ZZZk2cWrt8f/BMpjpIprptp8fpd8X
                                MD5:03C6C287F3B033DFF4B8DB78D7230C52
                                SHA1:ED93357D6D3A37BBD854E1C79A900D9F8EA878B5
                                SHA-256:2B6D7B446B599492541E869E44B789A80F430929C8C988C81E0191A85E0713FC
                                SHA-512:45EBF88173055660B005914475E8F4AE098F1758D67BD9B2172E9D2C5248C29FEB7EA52096489FF7D49A0FED116444A493C639E4E5BE190A5DF210928B2E54E6
                                Malicious:false
                                Reputation:low
                                Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{D9051C57-B2D2-11EB-90E4-ECF4BB862DED}.dat
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:Microsoft Word Document
                                Category:dropped
                                Size (bytes):24280
                                Entropy (8bit):1.6532995324916002
                                Encrypted:false
                                SSDEEP:48:Iw7GcpreGwpaSG4pQSGrapbScGQpBCGHHpcjTGUp8QGzYpm7HoGoptVsbG6Npm:rhZWQi6UBS0jZ29WkM7ojStg
                                MD5:11590ACBB4BBC2652A84BF459E3BBA1F
                                SHA1:6E46F385BFE26436FF4D392A8F198635B38FC81A
                                SHA-256:99470707D44999BE757DD61D680946EC3B82D44BB161AF5965EF1AEA47588BC9
                                SHA-512:2162DDE1F306719F80AA665FC3C4756F0074B4F1B8AB6634A1988EE82D0A3C48D8D62C88BEAF8C7A4E83EC18EAF45E41C2A9A90E9FC6816ED2E5C58285221AB8
                                Malicious:false
                                Reputation:low
                                Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{D9051C58-B2D2-11EB-90E4-ECF4BB862DED}.dat
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:Microsoft Word Document
                                Category:dropped
                                Size (bytes):16984
                                Entropy (8bit):1.565792769306293
                                Encrypted:false
                                SSDEEP:48:IwkGcprZGwpa8G4pQMGrapbSDGQpKXG7HpRoTGIpG:r4ZTQc6KBS9A2TsA
                                MD5:7A58ACDC00F9DE3D3A8AEBC52023B5F5
                                SHA1:04D541AC2542DD7445515D85C3DABD91C05FEFAA
                                SHA-256:4F251B2BFEA41B7B278138BACC56FB0F6C932F10BBFBB32BD83F4C5C9B6B384C
                                SHA-512:F7B3F46894AA14F71777709827C04B394380C9ECB683DBD86581E553B2CC706F5E8752EC3D69AEFC5B9579D675ABA510C3D81897CA6C0A71599C2C9C2D8B0991
                                Malicious:false
                                Reputation:low
                                Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-17529550060\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):656
                                Entropy (8bit):5.06320493364117
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxOEwDYBDjnWimI002EtM3MHdNMNxOEwDYBDjnWimI00ObVbkEtMb:2d6NxOzQjSZHKd6NxOzQjSZ76b
                                MD5:97182FB7867A4AD6E78E2FFF5043FB47
                                SHA1:3410EB7ACC90AEF9BFA59FAEFE360B4BC22E2846
                                SHA-256:AF3C56F70A40AFE084CF32B43479CAB54311F22AFC1682EDC2E8A9C9B5D9AF50
                                SHA-512:6D3FC406247AB0580868F377BF8AFEB27831FB458F4E208981580E6A016A49FB965E82176B7E606FBE9A80BA4901E72C20380216AC7C113169E0FA2E6F5BDB80
                                Malicious:false
                                Reputation:low
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xaefc1cd2,0x01d746df</date><accdate>0xaefc1cd2,0x01d746df</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xaefc1cd2,0x01d746df</date><accdate>0xaefc1cd2,0x01d746df</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18270793970\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):653
                                Entropy (8bit):5.103142634927204
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxe2kwNMBNfnWimI002EtM3MHdNMNxe2kwNMBNfnWimI00Obkak6EtMb:2d6NxrISZHKd6NxrISZ7Aa7b
                                MD5:B20DB0D7F299CFF27611CD94A9BB9232
                                SHA1:069692348E768E2F2F26CEDB7D2634F495446EB0
                                SHA-256:25732DACB3773AB512860946FFA522887F21208A7CEF3ADDCAF21FC8D20603D3
                                SHA-512:E0A7B739C38A290F5C48FD478C94F0CE33FCA3258F6E1D1D4DC28DECE714BE37CAB7B47156363E8BBFC456B0639C7A57A914300601189E0745F2C0879E1140C7
                                Malicious:false
                                Reputation:low
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0xaef4f5bf,0x01d746df</date><accdate>0xaef4f5bf,0x01d746df</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0xaef4f5bf,0x01d746df</date><accdate>0xaef4f5bf,0x01d746df</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Amazon.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-21706820\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):662
                                Entropy (8bit):5.080279154526209
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxvLwDYBDjnWimI002EtM3MHdNMNxvLwDYBDjnWimI00ObmZEtMb:2d6NxvUQjSZHKd6NxvUQjSZ7mb
                                MD5:AEC8609B7B29EFBE6056C8D3E94DF9CD
                                SHA1:AD3FA181DE1AC9F1CDEC3F798EB18A9945B2DC01
                                SHA-256:BF8F3B20D86E8E5DA7DF8A821E206B5FBF3129F3E0331C6B407B81DE6AE78A1A
                                SHA-512:FF25043F1B79959F0D70112CCB297BA43DA9C49453DD0F442ACE8054DE63D5F0EB1CB59675973CA652F6066CD15C4DD04EE03A4E64C187FCE88A65F548BCD848
                                Malicious:false
                                Reputation:low
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0xaefc1cd2,0x01d746df</date><accdate>0xaefc1cd2,0x01d746df</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0xaefc1cd2,0x01d746df</date><accdate>0xaefc1cd2,0x01d746df</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Wikipedia.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):647
                                Entropy (8bit):5.078530873431818
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxiwDYBDjnWimI002EtM3MHdNMNxiwDYBDjnWimI00Obd5EtMb:2d6NxtQjSZHKd6NxtQjSZ7Jjb
                                MD5:8964DE777205E3831C83A707B0CD13D5
                                SHA1:55C7A99B0EE97C251F5303F41B05B65821AC7E4E
                                SHA-256:766C9192FB02D8A86B62AC87AFE2EDEC676C614DD0E793DA686FE4A8C94CE6D7
                                SHA-512:372CEDD4D93F979F04994E6126C7EB0B3D13D3A769CD57E2B110997AFA5B259071AF395E263225B921F04BD947436630443FAB40AFAFF6556716D2229A5C04DC
                                Malicious:false
                                Reputation:low
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0xaefc1cd2,0x01d746df</date><accdate>0xaefc1cd2,0x01d746df</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0xaefc1cd2,0x01d746df</date><accdate>0xaefc1cd2,0x01d746df</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Live.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6757900\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):656
                                Entropy (8bit):5.097967420004993
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxhGwwDYBDjnWimI002EtM3MHdNMNxhGwwDYBDjnWimI00Ob8K075EtMb:2d6NxQXQjSZHKd6NxQXQjSZ7YKajb
                                MD5:2DF15EBD274982E0AB3405FC91805BC4
                                SHA1:4FB0FFA0E173D84BDA02200657E9EAEDF9B69637
                                SHA-256:E8C73CFF3AD09F338D3EE3765CB5DE75F8B3BA699AF47C68B6D1204C657665A2
                                SHA-512:13E179CD497698304F23FAE6714ACEADFA8C94B575C6A386DB3A0959E4098F4DE0AEFEAACA7DD16972FC554233A6B0F303D43A394BDB22291952D10991EB11D8
                                Malicious:false
                                Reputation:low
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xaefc1cd2,0x01d746df</date><accdate>0xaefc1cd2,0x01d746df</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xaefc1cd2,0x01d746df</date><accdate>0xaefc1cd2,0x01d746df</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8760897390\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):653
                                Entropy (8bit):5.061747821604419
                                Encrypted:false
                                SSDEEP:12:TMHdNMNx0nwDYBDjnWimI002EtM3MHdNMNx0nwDYBDjnWimI00ObxEtMb:2d6Nx04QjSZHKd6Nx04QjSZ7nb
                                MD5:06985B1225A03C1A40FC42A807E3E874
                                SHA1:30FA1CA210B71D1EFED6126BE5E4B1096A956BDD
                                SHA-256:53C31899C62D705AC12B80C82EC8BFB74A600A5AD573674F52CDB6225C636534
                                SHA-512:B2F11CB6B6AC3C78CB83C0ED813FFDC758FD71EE1A0629C26DB22481B06BA56CAC6ACA5347388B964009CAA7CD3EFB4ACE57DDB3F92B9DD490CEE072BE4F32A8
                                Malicious:false
                                Reputation:low
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0xaefc1cd2,0x01d746df</date><accdate>0xaefc1cd2,0x01d746df</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0xaefc1cd2,0x01d746df</date><accdate>0xaefc1cd2,0x01d746df</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Reddit.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):656
                                Entropy (8bit):5.103628634911867
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxxwDYBDjnWimI002EtM3MHdNMNxxwDYBDjnWimI00Ob6Kq5EtMb:2d6NxeQjSZHKd6NxeQjSZ7ob
                                MD5:78E5B3D4B6792F55109A3394DC00111B
                                SHA1:B3F77CC3EFF4570D0C1CF4462C1368AD5CA9D104
                                SHA-256:0455B866036C4420AC0BE2219E9C346B123A35A6CF7A382351207FEC35DEB65C
                                SHA-512:6187716B7BD3430F06135FBE734174B56292B618E0BCA5899A5E920D475488166B5588E61DED9F9EB5CE6EFCD4D44CA31A44B46A3A5B22D28376397F5252CC8F
                                Malicious:false
                                Reputation:low
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0xaefc1cd2,0x01d746df</date><accdate>0xaefc1cd2,0x01d746df</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0xaefc1cd2,0x01d746df</date><accdate>0xaefc1cd2,0x01d746df</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\NYTimes.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20332743330\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):659
                                Entropy (8bit):5.094317234838545
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxcwNMBNfnWimI002EtM3MHdNMNxcwNMBNfnWimI00ObVEtMb:2d6NxwSZHKd6NxwSZ7Db
                                MD5:526FC0216224127EE4BAA4956DD66C5A
                                SHA1:1F8F7EB62F4DF4B8D024C87660CE1C1DCDA575CF
                                SHA-256:50439721984984E1E0FB82674D8E858CF07D2CC0A5550A21418BC1B280BB3A31
                                SHA-512:125CBE75558D1FE64CF9B450AC9579ADF6F9F315DBC92BDD12A3CA55D326E576336063E23B44479B917848277A840CB1685C06889FBCA63D9105225BEB24EF5E
                                Malicious:false
                                Reputation:low
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xaef4f5bf,0x01d746df</date><accdate>0xaef4f5bf,0x01d746df</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xaef4f5bf,0x01d746df</date><accdate>0xaef4f5bf,0x01d746df</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin8215062560\msapplication.xml
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                                Category:dropped
                                Size (bytes):653
                                Entropy (8bit):5.064493914043756
                                Encrypted:false
                                SSDEEP:12:TMHdNMNxfnwDYBDjnWimI002EtM3MHdNMNxfnwDYBDjnWimI00Obe5EtMb:2d6NxwQjSZHKd6NxwQjSZ7ijb
                                MD5:41512AA2443DA028B6A40EBA89FE469E
                                SHA1:70839999CF7123B86DF7B7590815945254159E9D
                                SHA-256:6F266EC16A01DBC3334E042B02CCD356AB3FEC7218A6148E2EFE29CC146F7E2E
                                SHA-512:448ECFD731A8170E2788245D746BCE72B054B4AEE4A80EE2817C3BEE565E3D309D9D155FFBF5E0AB44797C1921C7A528A075AA9F6744CB3593D3026A268D8184
                                Malicious:false
                                Reputation:low
                                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0xaefc1cd2,0x01d746df</date><accdate>0xaefc1cd2,0x01d746df</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0xaefc1cd2,0x01d746df</date><accdate>0xaefc1cd2,0x01d746df</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Google.url"/></tile></msapplication></browserconfig>..
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WJ8I2OL4\Dec 1 2020 - Interim Policy for University Travel[1].pdf
                                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                File Type:PDF document, version 1.7
                                Category:dropped
                                Size (bytes):38636
                                Entropy (8bit):7.925387978690509
                                Encrypted:false
                                SSDEEP:768:y0IO9EIBB6IX0H1g39SbuJid3KmGzXEHGvzH9+NXARPTJvZdnRSkFEydtGdtV/yo:ZOIB0dhNwRZTnDq/dCpslFp
                                MD5:84B945EA01E67415B849525E3C623CDD
                                SHA1:8C2630011FFC04A701561221027451EFD67AD233
                                SHA-256:AF7CD94F971A203F204B6C869F6C4E8271B0C2530BA8B4BC26ABF0CBEEBB9DBC
                                SHA-512:67EFFE2EC39BCFCBC640271585953B21200A8D3B2141962B1BBB1A8FC6BF660B261DE0F2142D8652F2E1E0BE1892DC1B13781EE3934809592927701E294937DB
                                Malicious:false
                                Reputation:low
                                Preview: %PDF-1.7..%......1 0 obj..<</Type/Catalog/Pages 2 0 R/Lang(en-US) /StructTreeRoot 28 0 R/MarkInfo<</Marked true>>/Metadata 101 0 R/ViewerPreferences 102 0 R>>..endobj..2 0 obj..<</Type/Pages/Count 1/Kids[ 3 0 R] >>..endobj..3 0 obj..<</Type/Page/Parent 2 0 R/Resources<</Font<</F1 5 0 R/F2 9 0 R/F3 11 0 R/F4 13 0 R>>/ExtGState<</GS7 7 0 R/GS8 8 0 R>>/XObject<</Meta18 18 0 R>>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/Annots[ 19 0 R 20 0 R 21 0 R 22 0 R 23 0 R 24 0 R 25 0 R 26 0 R] /MediaBox[ 0 0 612 792] /Contents 4 0 R/Group<</Type/Group/S/Transparency/CS/DeviceRGB>>/Tabs/S/StructParents 0>>..endobj..4 0 obj..<</Filter/FlateDecode/Length 4134>>..stream..x....r.6..3..>J..&....x..5.M.icw...A.eG.[RE.........,..=c......o......z<Y'.}w..z=.|.^%.N...?O.....w..|..-..7.k..f:....../_$...ei.?#B.,)..jD.....?.$.....G..I2J......%$).:.,..*.......}..4|..F|.....>.....?..^..~9>z,X....%U.fuR.B....P.W?.HN#8z.X..wq4.^,.{...h.......s....49.|.\.g..U3[?$.!.\'o..Y..g....q.{{!y....|...... 8..I^.u..
                                C:\Users\user\AppData\Local\Temp\acrord32_sbx\A9R4wl84n_777wlx_47g.tmp
                                Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                                File Type:data
                                Category:modified
                                Size (bytes):32768
                                Entropy (8bit):7.994442390753805
                                Encrypted:true
                                SSDEEP:768:NIecnWYJ9CQYJnK+hRtEZv+XsFfYo/QhvLa9Z4:NHcnW/HxdyZvXmoYhzaw
                                MD5:89468E8FFA187D5EC442E0BD15053321
                                SHA1:744D9880DB326C75C072C9C499BEB1F5BBA45B2E
                                SHA-256:67F852951CD601C7E5AFAEE4222BB892CCE8E1084A4D80CB3DC5542CD5951991
                                SHA-512:80A610CE1B463D1C6CCE174A1F916245D574B97C2045C275F2ADC060726ABB5B644EAEA8EAE4916D2C96CF89AABAD0DFAB7DD8FD3A2CCB33DB8D67811748D65D
                                Malicious:false
                                Reputation:low
                                Preview: .}......S.P..i.......IS.6.eO...p...6....c...-.EN);.c.y!..{.'[....V....N...i..E.>...t.#m?.....9.;1....`..!...........[...x......rJ..^1-..8.'...i....+U.+9P.c,L.S.|.Z..w.l.d.(..H.4./..b\v.B....y..iI........._q9".8a0?.J.....dP...t..8..a....#.X..$...(.=...FI..z.o...f.`_\...z......9.i......VA.....4.T...g.P....~....Y,3.......g..i..h....Mi?..K.,D..P%.I-a'Z..Jw...X....K.L&...q..yW@..{.$.f?..Ba....~.....p........5}%...~....o....iNv.Z&"T....O.7..v...}...a.....(Mjn....R.0X.......3.j....#.<<......Z.......Wf+..c.|../.k?@f.v\(._=..D..Z....K!.....Q.bF.g8.5.P.g.K_...3M../...;=.P.2....s..wu...k.....5.w..X....M.'.X].`.mT...V.S .Y.....8?..7u.)..S|ox...d.....Y..~8..NI.".q.+.......qZ.. .....M2>....db..D.h.U....a ..k...&U.......`W....a../L7.....guS.B.<...W..@I.......M.pI...A......q\N..V.*..H\......g...d....r8......T}..;...>...$."B..p....U#....r.p..L.<.....$7xx.\.H.l.qp.4...o$.h....d|........". ..|....?....H.LC..j...vb..Q;..05JX=.....3...Z....".PkK....h.K.
                                C:\Users\user\AppData\Local\Temp\~DF5E4421C38C2CE13F.TMP
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):34473
                                Entropy (8bit):0.37064969110499696
                                Encrypted:false
                                SSDEEP:24:c9lLh9lLh9lIn9lIn9lRg9lRA9lTS9lTy9lSSd9lSSd9lwj99lwh9l2/9l2/9l/0:kBqoxKAuvScS+jeU+X7I7/VsfKX
                                MD5:769971887C0E80852D82B8E877ED591F
                                SHA1:E3D8D3C9B1DD1D43B147EAE99F5825B6466DF1AC
                                SHA-256:037B4F5461B2892FB601BB978FDFB7ACA309A2A72C8DC83492D6F967BF87BCE8
                                SHA-512:3470A8026DF9DDCD24EB5CAF26CF3622A5FD4AEF96DC63586EFB0C520039E5468C5A1D8F39544D1ECA0BC8FF2ED64F9D6AA003527B844AE674FF4A11950E2FC7
                                Malicious:false
                                Reputation:low
                                Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Local\Temp\~DF65406A083BBA58B1.TMP
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):25441
                                Entropy (8bit):0.27918767598683664
                                Encrypted:false
                                SSDEEP:24:c9lLh9lLh9lIn9lIn9lRx/9lRJ9lTb9lTb9lSSU9lSSU9laAa/9laA:kBqoxxJhHWSVSEab
                                MD5:AB889A32AB9ACD33E816C2422337C69A
                                SHA1:1190C6B34DED2D295827C2A88310D10A8B90B59B
                                SHA-256:4D6EC54B8D244E63B0F04FBE2B97402A3DF722560AD12F218665BA440F4CEFDA
                                SHA-512:BD250855747BB4CEC61814D0E44F810156D390E3E9F120A12935EFDF80ACA33C4777AD66257CCA4E4003FEF0741692894980B9298F01C4CDD2D8A9C7BB522FB6
                                Malicious:false
                                Reputation:low
                                Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                C:\Users\user\AppData\Local\Temp\~DFFF3F5C6B9F825167.TMP
                                Process:C:\Program Files\internet explorer\iexplore.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):13125
                                Entropy (8bit):0.5451951693227013
                                Encrypted:false
                                SSDEEP:24:c9lLh9lLh9lIn9lIn9lodF9lo39lWuNqEqM6qBqKq:kBqoI4muNqEqM6qBqh
                                MD5:A920DA73E61CDDA9390E7D2162FB6B0A
                                SHA1:402BFC37DA51392E415D3546B810903AB8518951
                                SHA-256:709FC76BC86194A6968B23FE65433D6925CD2980F2A95B51F8BF2F26E8172F04
                                SHA-512:7935E28FBD5D12E07FC5038A8244AD051DAD9FF97DE472D0E321E48625760E0B2444E1756EBF45A7C08633A7ACAB227A58117B2D16D69BD8FFF17DB9398D9D88
                                Malicious:false
                                Reputation:low
                                Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                                Static File Info

                                No static file info

                                Network Behavior

                                Network Port Distribution

                                TCP Packets

                                TimestampSource PortDest PortSource IPDest IP
                                May 11, 2021 20:33:45.599827051 CEST4971580192.168.2.3136.165.238.241
                                May 11, 2021 20:33:45.599987984 CEST4971680192.168.2.3136.165.238.241
                                May 11, 2021 20:33:45.761102915 CEST8049715136.165.238.241192.168.2.3
                                May 11, 2021 20:33:45.761137962 CEST8049716136.165.238.241192.168.2.3
                                May 11, 2021 20:33:45.761269093 CEST4971580192.168.2.3136.165.238.241
                                May 11, 2021 20:33:45.761334896 CEST4971680192.168.2.3136.165.238.241
                                May 11, 2021 20:33:45.763324976 CEST4971580192.168.2.3136.165.238.241
                                May 11, 2021 20:33:45.923095942 CEST8049715136.165.238.241192.168.2.3
                                May 11, 2021 20:33:45.937477112 CEST8049715136.165.238.241192.168.2.3
                                May 11, 2021 20:33:45.937500954 CEST8049715136.165.238.241192.168.2.3
                                May 11, 2021 20:33:45.937524080 CEST8049715136.165.238.241192.168.2.3
                                May 11, 2021 20:33:45.937547922 CEST8049715136.165.238.241192.168.2.3
                                May 11, 2021 20:33:45.937549114 CEST4971580192.168.2.3136.165.238.241
                                May 11, 2021 20:33:45.937572002 CEST8049715136.165.238.241192.168.2.3
                                May 11, 2021 20:33:45.937572956 CEST4971580192.168.2.3136.165.238.241
                                May 11, 2021 20:33:45.937593937 CEST8049715136.165.238.241192.168.2.3
                                May 11, 2021 20:33:45.937618017 CEST8049715136.165.238.241192.168.2.3
                                May 11, 2021 20:33:45.937627077 CEST4971580192.168.2.3136.165.238.241
                                May 11, 2021 20:33:45.937644958 CEST8049715136.165.238.241192.168.2.3
                                May 11, 2021 20:33:45.937648058 CEST4971580192.168.2.3136.165.238.241
                                May 11, 2021 20:33:45.937669992 CEST8049715136.165.238.241192.168.2.3
                                May 11, 2021 20:33:45.937678099 CEST4971580192.168.2.3136.165.238.241
                                May 11, 2021 20:33:45.937686920 CEST8049715136.165.238.241192.168.2.3
                                May 11, 2021 20:33:45.937697887 CEST4971580192.168.2.3136.165.238.241
                                May 11, 2021 20:33:45.937719107 CEST4971580192.168.2.3136.165.238.241
                                May 11, 2021 20:33:45.937740088 CEST4971580192.168.2.3136.165.238.241
                                May 11, 2021 20:33:46.101633072 CEST8049715136.165.238.241192.168.2.3
                                May 11, 2021 20:33:46.101658106 CEST8049715136.165.238.241192.168.2.3
                                May 11, 2021 20:33:46.101670027 CEST8049715136.165.238.241192.168.2.3
                                May 11, 2021 20:33:46.101682901 CEST8049715136.165.238.241192.168.2.3
                                May 11, 2021 20:33:46.101700068 CEST8049715136.165.238.241192.168.2.3
                                May 11, 2021 20:33:46.101717949 CEST8049715136.165.238.241192.168.2.3
                                May 11, 2021 20:33:46.101731062 CEST8049715136.165.238.241192.168.2.3
                                May 11, 2021 20:33:46.101735115 CEST4971580192.168.2.3136.165.238.241
                                May 11, 2021 20:33:46.101751089 CEST8049715136.165.238.241192.168.2.3
                                May 11, 2021 20:33:46.101768970 CEST8049715136.165.238.241192.168.2.3
                                May 11, 2021 20:33:46.101775885 CEST4971580192.168.2.3136.165.238.241
                                May 11, 2021 20:33:46.101784945 CEST8049715136.165.238.241192.168.2.3
                                May 11, 2021 20:33:46.101800919 CEST8049715136.165.238.241192.168.2.3
                                May 11, 2021 20:33:46.101815939 CEST8049715136.165.238.241192.168.2.3
                                May 11, 2021 20:33:46.101829052 CEST4971580192.168.2.3136.165.238.241
                                May 11, 2021 20:33:46.101830959 CEST8049715136.165.238.241192.168.2.3
                                May 11, 2021 20:33:46.101847887 CEST8049715136.165.238.241192.168.2.3
                                May 11, 2021 20:33:46.101846933 CEST4971580192.168.2.3136.165.238.241
                                May 11, 2021 20:33:46.101864100 CEST8049715136.165.238.241192.168.2.3
                                May 11, 2021 20:33:46.101878881 CEST4971580192.168.2.3136.165.238.241
                                May 11, 2021 20:33:46.101883888 CEST8049715136.165.238.241192.168.2.3
                                May 11, 2021 20:33:46.101901054 CEST8049715136.165.238.241192.168.2.3
                                May 11, 2021 20:33:46.101908922 CEST4971580192.168.2.3136.165.238.241
                                May 11, 2021 20:33:46.101917028 CEST8049715136.165.238.241192.168.2.3
                                May 11, 2021 20:33:46.101927996 CEST4971580192.168.2.3136.165.238.241
                                May 11, 2021 20:33:46.101933002 CEST8049715136.165.238.241192.168.2.3
                                May 11, 2021 20:33:46.101949930 CEST8049715136.165.238.241192.168.2.3
                                May 11, 2021 20:33:46.101959944 CEST4971580192.168.2.3136.165.238.241
                                May 11, 2021 20:33:46.101990938 CEST4971580192.168.2.3136.165.238.241
                                May 11, 2021 20:33:46.267220974 CEST8049715136.165.238.241192.168.2.3
                                May 11, 2021 20:34:45.921159983 CEST8049716136.165.238.241192.168.2.3
                                May 11, 2021 20:34:45.921361923 CEST4971680192.168.2.3136.165.238.241
                                May 11, 2021 20:35:34.928066015 CEST4971680192.168.2.3136.165.238.241
                                May 11, 2021 20:35:35.086971045 CEST8049716136.165.238.241192.168.2.3

                                UDP Packets

                                TimestampSource PortDest PortSource IPDest IP
                                May 11, 2021 20:33:37.224772930 CEST5062053192.168.2.38.8.8.8
                                May 11, 2021 20:33:37.276420116 CEST53506208.8.8.8192.168.2.3
                                May 11, 2021 20:33:38.312508106 CEST6493853192.168.2.38.8.8.8
                                May 11, 2021 20:33:38.361545086 CEST53649388.8.8.8192.168.2.3
                                May 11, 2021 20:33:39.088257074 CEST6015253192.168.2.38.8.8.8
                                May 11, 2021 20:33:39.146723032 CEST53601528.8.8.8192.168.2.3
                                May 11, 2021 20:33:39.295406103 CEST5754453192.168.2.38.8.8.8
                                May 11, 2021 20:33:39.347206116 CEST53575448.8.8.8192.168.2.3
                                May 11, 2021 20:33:40.042587996 CEST5598453192.168.2.38.8.8.8
                                May 11, 2021 20:33:40.094602108 CEST53559848.8.8.8192.168.2.3
                                May 11, 2021 20:33:40.922749043 CEST6418553192.168.2.38.8.8.8
                                May 11, 2021 20:33:40.971935034 CEST53641858.8.8.8192.168.2.3
                                May 11, 2021 20:33:41.872699976 CEST6511053192.168.2.38.8.8.8
                                May 11, 2021 20:33:41.921628952 CEST53651108.8.8.8192.168.2.3
                                May 11, 2021 20:33:43.636934996 CEST5836153192.168.2.38.8.8.8
                                May 11, 2021 20:33:43.697138071 CEST53583618.8.8.8192.168.2.3
                                May 11, 2021 20:33:44.117597103 CEST6349253192.168.2.38.8.8.8
                                May 11, 2021 20:33:44.185013056 CEST53634928.8.8.8192.168.2.3
                                May 11, 2021 20:33:44.860064983 CEST6083153192.168.2.38.8.8.8
                                May 11, 2021 20:33:44.912158966 CEST53608318.8.8.8192.168.2.3
                                May 11, 2021 20:33:45.525552988 CEST6010053192.168.2.38.8.8.8
                                May 11, 2021 20:33:45.583208084 CEST53601008.8.8.8192.168.2.3
                                May 11, 2021 20:33:45.914628983 CEST5319553192.168.2.38.8.8.8
                                May 11, 2021 20:33:45.967145920 CEST53531958.8.8.8192.168.2.3
                                May 11, 2021 20:33:49.106151104 CEST5014153192.168.2.38.8.8.8
                                May 11, 2021 20:33:49.154844046 CEST53501418.8.8.8192.168.2.3
                                May 11, 2021 20:33:50.512593985 CEST5302353192.168.2.38.8.8.8
                                May 11, 2021 20:33:50.561570883 CEST53530238.8.8.8192.168.2.3
                                May 11, 2021 20:33:51.792617083 CEST4956353192.168.2.38.8.8.8
                                May 11, 2021 20:33:51.841552019 CEST53495638.8.8.8192.168.2.3
                                May 11, 2021 20:33:53.001874924 CEST5135253192.168.2.38.8.8.8
                                May 11, 2021 20:33:53.050693035 CEST53513528.8.8.8192.168.2.3
                                May 11, 2021 20:33:53.838274002 CEST5934953192.168.2.38.8.8.8
                                May 11, 2021 20:33:53.887079954 CEST53593498.8.8.8192.168.2.3
                                May 11, 2021 20:33:54.747421026 CEST5708453192.168.2.38.8.8.8
                                May 11, 2021 20:33:54.798157930 CEST53570848.8.8.8192.168.2.3
                                May 11, 2021 20:33:56.145703077 CEST5882353192.168.2.38.8.8.8
                                May 11, 2021 20:33:56.197326899 CEST53588238.8.8.8192.168.2.3
                                May 11, 2021 20:33:57.330096006 CEST5756853192.168.2.38.8.8.8
                                May 11, 2021 20:33:57.389296055 CEST53575688.8.8.8192.168.2.3
                                May 11, 2021 20:34:01.721692085 CEST5054053192.168.2.38.8.8.8
                                May 11, 2021 20:34:01.770529985 CEST53505408.8.8.8192.168.2.3
                                May 11, 2021 20:34:02.684662104 CEST5436653192.168.2.38.8.8.8
                                May 11, 2021 20:34:02.736207962 CEST53543668.8.8.8192.168.2.3
                                May 11, 2021 20:34:11.943348885 CEST5303453192.168.2.38.8.8.8
                                May 11, 2021 20:34:12.002760887 CEST53530348.8.8.8192.168.2.3
                                May 11, 2021 20:34:14.132914066 CEST5776253192.168.2.38.8.8.8
                                May 11, 2021 20:34:14.181756973 CEST53577628.8.8.8192.168.2.3
                                May 11, 2021 20:34:15.024446964 CEST5543553192.168.2.38.8.8.8
                                May 11, 2021 20:34:15.081799030 CEST53554358.8.8.8192.168.2.3
                                May 11, 2021 20:34:15.151463032 CEST5776253192.168.2.38.8.8.8
                                May 11, 2021 20:34:15.200406075 CEST53577628.8.8.8192.168.2.3
                                May 11, 2021 20:34:16.026624918 CEST5543553192.168.2.38.8.8.8
                                May 11, 2021 20:34:16.075609922 CEST53554358.8.8.8192.168.2.3
                                May 11, 2021 20:34:16.198246956 CEST5776253192.168.2.38.8.8.8
                                May 11, 2021 20:34:16.247097015 CEST53577628.8.8.8192.168.2.3
                                May 11, 2021 20:34:16.665625095 CEST5071353192.168.2.38.8.8.8
                                May 11, 2021 20:34:16.723833084 CEST53507138.8.8.8192.168.2.3
                                May 11, 2021 20:34:17.073093891 CEST5543553192.168.2.38.8.8.8
                                May 11, 2021 20:34:17.123318911 CEST53554358.8.8.8192.168.2.3
                                May 11, 2021 20:34:18.290467978 CEST5776253192.168.2.38.8.8.8
                                May 11, 2021 20:34:18.341634989 CEST53577628.8.8.8192.168.2.3
                                May 11, 2021 20:34:19.119632006 CEST5543553192.168.2.38.8.8.8
                                May 11, 2021 20:34:19.169595957 CEST53554358.8.8.8192.168.2.3
                                May 11, 2021 20:34:22.307642937 CEST5776253192.168.2.38.8.8.8
                                May 11, 2021 20:34:22.360076904 CEST53577628.8.8.8192.168.2.3
                                May 11, 2021 20:34:23.119786024 CEST5543553192.168.2.38.8.8.8
                                May 11, 2021 20:34:23.168530941 CEST53554358.8.8.8192.168.2.3
                                May 11, 2021 20:34:31.948184967 CEST5613253192.168.2.38.8.8.8
                                May 11, 2021 20:34:32.005697966 CEST53561328.8.8.8192.168.2.3
                                May 11, 2021 20:34:33.713370085 CEST5898753192.168.2.38.8.8.8
                                May 11, 2021 20:34:33.770751953 CEST53589878.8.8.8192.168.2.3
                                May 11, 2021 20:34:35.081949949 CEST5657953192.168.2.38.8.8.8
                                May 11, 2021 20:34:35.141115904 CEST53565798.8.8.8192.168.2.3
                                May 11, 2021 20:34:42.987179041 CEST6063353192.168.2.38.8.8.8
                                May 11, 2021 20:34:43.055875063 CEST53606338.8.8.8192.168.2.3
                                May 11, 2021 20:34:56.054220915 CEST6129253192.168.2.38.8.8.8
                                May 11, 2021 20:34:56.115648031 CEST53612928.8.8.8192.168.2.3
                                May 11, 2021 20:35:17.587557077 CEST6361953192.168.2.38.8.8.8
                                May 11, 2021 20:35:17.654825926 CEST53636198.8.8.8192.168.2.3
                                May 11, 2021 20:35:40.870258093 CEST6493853192.168.2.38.8.8.8
                                May 11, 2021 20:35:40.927452087 CEST53649388.8.8.8192.168.2.3
                                May 11, 2021 20:36:28.720570087 CEST6194653192.168.2.38.8.8.8
                                May 11, 2021 20:36:28.777877092 CEST53619468.8.8.8192.168.2.3
                                May 11, 2021 20:36:29.810992956 CEST6491053192.168.2.38.8.8.8
                                May 11, 2021 20:36:29.867907047 CEST53649108.8.8.8192.168.2.3
                                May 11, 2021 20:36:30.487509966 CEST5212353192.168.2.38.8.8.8
                                May 11, 2021 20:36:30.547513008 CEST53521238.8.8.8192.168.2.3
                                May 11, 2021 20:36:31.159152031 CEST5613053192.168.2.38.8.8.8
                                May 11, 2021 20:36:31.218460083 CEST53561308.8.8.8192.168.2.3
                                May 11, 2021 20:36:31.794131994 CEST5633853192.168.2.38.8.8.8
                                May 11, 2021 20:36:31.853203058 CEST53563388.8.8.8192.168.2.3
                                May 11, 2021 20:36:32.456187963 CEST5942053192.168.2.38.8.8.8
                                May 11, 2021 20:36:32.506105900 CEST53594208.8.8.8192.168.2.3
                                May 11, 2021 20:36:33.430186987 CEST5878453192.168.2.38.8.8.8
                                May 11, 2021 20:36:33.480163097 CEST53587848.8.8.8192.168.2.3
                                May 11, 2021 20:36:35.655929089 CEST6397853192.168.2.38.8.8.8
                                May 11, 2021 20:36:35.715584993 CEST53639788.8.8.8192.168.2.3
                                May 11, 2021 20:36:36.761265039 CEST6293853192.168.2.38.8.8.8
                                May 11, 2021 20:36:36.811424017 CEST53629388.8.8.8192.168.2.3
                                May 11, 2021 20:36:37.670710087 CEST5570853192.168.2.38.8.8.8
                                May 11, 2021 20:36:37.719393015 CEST53557088.8.8.8192.168.2.3
                                May 11, 2021 20:38:32.863888025 CEST5680353192.168.2.38.8.8.8
                                May 11, 2021 20:38:32.921166897 CEST53568038.8.8.8192.168.2.3
                                May 11, 2021 20:38:33.610927105 CEST5714553192.168.2.38.8.8.8
                                May 11, 2021 20:38:33.677917004 CEST53571458.8.8.8192.168.2.3
                                May 11, 2021 20:38:40.202306986 CEST5535953192.168.2.38.8.8.8
                                May 11, 2021 20:38:40.269273043 CEST53553598.8.8.8192.168.2.3
                                May 11, 2021 20:38:44.442126989 CEST5830653192.168.2.38.8.8.8
                                May 11, 2021 20:38:44.518428087 CEST53583068.8.8.8192.168.2.3
                                May 11, 2021 20:38:44.876787901 CEST6412453192.168.2.38.8.8.8
                                May 11, 2021 20:38:44.934597015 CEST53641248.8.8.8192.168.2.3
                                May 11, 2021 20:41:12.290935993 CEST4936153192.168.2.38.8.8.8
                                May 11, 2021 20:41:12.350517035 CEST53493618.8.8.8192.168.2.3
                                May 11, 2021 20:41:12.906342983 CEST6315053192.168.2.38.8.8.8
                                May 11, 2021 20:41:12.981420040 CEST53631508.8.8.8192.168.2.3
                                May 11, 2021 20:41:45.937783003 CEST5327953192.168.2.38.8.8.8
                                May 11, 2021 20:41:46.013698101 CEST53532798.8.8.8192.168.2.3

                                DNS Queries

                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                May 11, 2021 20:33:45.525552988 CEST192.168.2.38.8.8.80x1eacStandard query (0)louisville.eduA (IP address)IN (0x0001)

                                DNS Answers

                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                May 11, 2021 20:33:45.583208084 CEST8.8.8.8192.168.2.30x1eacNo error (0)louisville.edu136.165.238.241A (IP address)IN (0x0001)
                                May 11, 2021 20:38:32.921166897 CEST8.8.8.8192.168.2.30x6defNo error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.trafficmanager.netCNAME (Canonical name)IN (0x0001)
                                May 11, 2021 20:41:12.350517035 CEST8.8.8.8192.168.2.30x9cc3No error (0)prda.aadg.msidentity.comwww.tm.a.prd.aadg.trafficmanager.netCNAME (Canonical name)IN (0x0001)

                                HTTP Request Dependency Graph

                                • louisville.edu

                                HTTP Packets

                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                0192.168.2.349715136.165.238.24180C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                TimestampkBytes transferredDirectionData
                                May 11, 2021 20:33:45.763324976 CEST716OUTGET /coronavirus/assets/Dec12020InterimPolicyforUniversityTravel.pdf HTTP/1.1
                                Accept: text/html, application/xhtml+xml, image/jxr, */*
                                Accept-Language: en-US
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like Gecko
                                Accept-Encoding: gzip, deflate
                                Host: louisville.edu
                                Connection: Keep-Alive
                                May 11, 2021 20:33:45.937477112 CEST938INHTTP/1.1 200 OK
                                Server: nginx/1.20.0
                                Date: Tue, 11 May 2021 18:33:45 GMT
                                Content-Type: application/pdf
                                Content-Length: 69481
                                Connection: keep-alive
                                Last-Modified: Mon, 03 May 2021 21:11:17 GMT
                                Content-Disposition: inline; filename="Dec 1 2020 - Interim Policy for University Travel.pdf"
                                X-Varnish: 32621914
                                Age: 0
                                Via: 1.1 varnish (Varnish/6.0)
                                Accept-Ranges: bytes
                                Data Raw: 25 50 44 46 2d 31 2e 37 0d 0a 25 b5 b5 b5 b5 0d 0a 31 20 30 20 6f 62 6a 0d 0a 3c 3c 2f 54 79 70 65 2f 43 61 74 61 6c 6f 67 2f 50 61 67 65 73 20 32 20 30 20 52 2f 4c 61 6e 67 28 65 6e 2d 55 53 29 20 2f 53 74 72 75 63 74 54 72 65 65 52 6f 6f 74 20 32 38 20 30 20 52 2f 4d 61 72 6b 49 6e 66 6f 3c 3c 2f 4d 61 72 6b 65 64 20 74 72 75 65 3e 3e 2f 4d 65 74 61 64 61 74 61 20 31 30 31 20 30 20 52 2f 56 69 65 77 65 72 50 72 65 66 65 72 65 6e 63 65 73 20 31 30 32 20 30 20 52 3e 3e 0d 0a 65 6e 64 6f 62 6a 0d 0a 32 20 30 20 6f 62 6a 0d 0a 3c 3c 2f 54 79 70 65 2f 50 61 67 65 73 2f 43 6f 75 6e 74 20 31 2f 4b 69 64 73 5b 20 33 20 30 20 52 5d 20 3e 3e 0d 0a 65 6e 64 6f 62 6a 0d 0a 33 20 30 20 6f 62 6a 0d 0a 3c 3c 2f 54 79 70 65 2f 50 61 67 65 2f 50 61 72 65 6e 74 20 32 20 30 20 52 2f 52 65 73 6f 75 72 63 65 73 3c 3c 2f 46 6f 6e 74 3c 3c 2f 46 31 20 35 20 30 20 52 2f 46 32 20 39 20 30 20 52 2f 46 33 20 31 31 20 30 20 52 2f 46 34 20 31 33 20 30 20 52 3e 3e 2f 45 78 74 47 53 74 61 74 65 3c 3c 2f 47 53 37 20 37 20 30 20 52 2f 47 53 38 20 38 20 30 20 52 3e 3e 2f 58 4f 62 6a 65 63 74 3c 3c 2f 4d 65 74 61 31 38 20 31 38 20 30 20 52 3e 3e 2f 50 72 6f 63 53 65 74 5b 2f 50 44 46 2f 54 65 78 74 2f 49 6d 61 67 65 42 2f 49 6d 61 67 65 43 2f 49 6d 61 67 65 49 5d 20 3e 3e 2f 41 6e 6e 6f 74 73 5b 20 31 39 20 30 20 52 20 32 30 20 30 20 52 20 32 31 20 30 20 52 20 32 32 20 30 20 52 20 32 33 20 30 20 52 20 32 34 20 30 20 52 20 32 35 20 30 20 52 20 32 36 20 30 20 52 5d 20 2f 4d 65 64 69 61 42 6f 78 5b 20 30 20 30 20 36 31 32 20 37 39 32 5d 20 2f 43 6f 6e 74 65 6e 74 73 20 34 20 30 20 52 2f 47 72 6f 75 70 3c 3c 2f 54 79 70 65 2f 47 72 6f 75 70 2f 53 2f 54 72 61 6e 73 70 61 72 65 6e 63 79 2f 43 53 2f 44 65 76 69 63 65 52 47 42 3e 3e 2f 54 61 62 73 2f 53 2f 53 74 72 75 63 74 50 61 72 65 6e 74 73 20 30 3e 3e 0d 0a 65 6e 64 6f 62 6a 0d 0a 34 20 30 20 6f 62 6a 0d 0a 3c 3c 2f 46 69 6c 74 65 72 2f 46 6c 61 74 65 44 65 63 6f 64 65 2f 4c 65 6e 67 74 68 20 34 31 33 34 3e 3e 0d 0a 73 74 72 65 61 6d 0d 0a 78 9c c5 1c db 72 db 36 f6 dd 33 fe 07 3e 4a 9d 98 26 00 de d4 ed 78 a6 b9 35 dd 4d b7 69 63 77 a7 93 f6 41 96 65 47 1b 5b 52 45 c9 a9 f7 eb 17 07 d7 03 10 90 2c 91 89 3d 63 9b a2 00 1c e0 dc 6f e4 e9 f7 ab f5 ec 7a 3c 59 27 df 7d 77 fa fd 7a 3d 9e 7c 9c 5e 25 1f 4e cf 17 cb 3f 4f cf 1f 96 d3 d3 77 e3 9b d9 7c bc 9e 2d e6 a7 ef 37 97 6b b8 f5 66 3a be 9a ae ce ce 92 e7 2f 5f 24 7f 1d 1f 65 69 06 3f 23 42 93 2c 29 f9 df 6a 44 93 d5 f4 f8 e8 3f df 24 f3 e3 a3 e7 e7 c7 47 a7 af 49 32 4a ce af 8f 8f 08 1f 93 25 24 29 8a 3a a5 2c a9 f2 2a cd ab e4 fc 8e 8f f9 e1 7d 95 dc 34 7c bd e4 46 7c aa d5 a7 1f 8e 8f 3e 0c 92 e1 9f c9 f9 3f 8f 8f 5e f1 d5 7e 39 3e 7a 2c 58 9a 10 e2 c0 25 55 91 66 75 52 b1 42 c3 15 e0 c2 50 92 57 3f bd 48 4e 23 38 7a be 58 af 17 77 71 34 bd 5e 2c d6 7b a3 89 f9 68 ca d3 8c 16 09 ab d2 82 ff 73 b7 9b c0 8a 34 39 9f 7c 18 5c cc 67 f7 d3 55 33 5b 3f 24 8b 21
                                Data Ascii: %PDF-1.7%1 0 obj<</Type/Catalog/Pages 2 0 R/Lang(en-US) /StructTreeRoot 28 0 R/MarkInfo<</Marked true>>/Metadata 101 0 R/ViewerPreferences 102 0 R>>endobj2 0 obj<</Type/Pages/Count 1/Kids[ 3 0 R] >>endobj3 0 obj<</Type/Page/Parent 2 0 R/Resources<</Font<</F1 5 0 R/F2 9 0 R/F3 11 0 R/F4 13 0 R>>/ExtGState<</GS7 7 0 R/GS8 8 0 R>>/XObject<</Meta18 18 0 R>>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI] >>/Annots[ 19 0 R 20 0 R 21 0 R 22 0 R 23 0 R 24 0 R 25 0 R 26 0 R] /MediaBox[ 0 0 612 792] /Contents 4 0 R/Group<</Type/Group/S/Transparency/CS/DeviceRGB>>/Tabs/S/StructParents 0>>endobj4 0 obj<</Filter/FlateDecode/Length 4134>>streamxr63>J&x5MicwAeG[RE,=coz<Y'}wz=|^%N?Ow|-7kf:/_$ei?#B,)jD?$GI2J%$):,*}4|F|>?^~9>z,X%UfuRBPW?HN#8zXwq4^,{hs49|\gU3[?$!
                                May 11, 2021 20:33:45.937500954 CEST939INData Raw: 1b 5c 27 6f 17 9b 59 c3 af ee 67 b7 b7 d3 03 71 97 7b 7b 21 79 91 16 91 bd 7c f8 2e cb ea ea ec 20 38 fe 99 49 5e a7 75 04 cc a1 7c d0 82 51 90 94 45 d0 7a 02 2b e6 02 af 02 8d 80 c3 e1 09 1b 4c 9f 25 ff fa 3d c9 33 3a a2 fd 6c 82 32 9a d6 31 84
                                Data Ascii: \'oYgq{{!y|. 8I^u|QEz+L%=3:l21W#e|E KMhnL8R"~*>|d)ObW4]I\$ ONz$[xLWe#G}q1<??oz7y><w)~BOO-uj9
                                May 11, 2021 20:33:45.937524080 CEST941INData Raw: e9 ac 10 3b 91 ce 69 79 5a d5 69 c9 76 a3 f8 a3 d9 d6 7a a8 9d 22 48 88 9e aa df 5b 13 38 3a b9 19 21 f8 7e 5e 26 35 1e d6 95 9d 00 8b 08 a9 da 58 05 f1 30 b6 a6 5e 29 20 63 79 ae d4 2c 2e 98 4b 1b 05 23 f6 9c 59 80 cd 69 c0 1b 53 b1 6b 5f f9 5c
                                Data Ascii: ;iyZivz"H[8:!~^&5X0^) cy,.K#YiSk_\N4.2+l2z-GgU'QBb$T+DKci9JKw18jQ"yaNYlW}8BjFB8$f46mtm4}!xa(*BW5F
                                May 11, 2021 20:33:45.937547922 CEST942INData Raw: d4 ae ea 3e 2b 19 0c 26 15 9f ca fa 08 35 e9 01 d5 11 1a 0a 35 59 41 e1 34 ed d7 2a 54 b5 08 35 8b c3 43 4d 17 5e bd 05 5e 17 e5 42 83 6c 1c 86 f2 8e b3 1b b7 98 0d 67 a3 12 c4 bd 04 1b 2f 82 b5 92 ef 40 44 80 ea fe 7a 28 4c 78 39 58 a9 61 ea de
                                Data Ascii: >+&55YA4*T5CM^^Blg/@Dz(Lx9Xaz/6puW#m"@btXFA\I7=?BzOE8sIhc{~A?6Fv~YV>gcn&ELZVH
                                May 11, 2021 20:33:45.937572002 CEST944INData Raw: 3e 3e 0d 0a 65 6e 64 6f 62 6a 0d 0a 36 20 30 20 6f 62 6a 0d 0a 3c 3c 2f 54 79 70 65 2f 46 6f 6e 74 44 65 73 63 72 69 70 74 6f 72 2f 46 6f 6e 74 4e 61 6d 65 2f 41 72 69 61 6c 2d 42 6f 6c 64 4d 54 2f 46 6c 61 67 73 20 33 32 2f 49 74 61 6c 69 63 41
                                Data Ascii: >>endobj6 0 obj<</Type/FontDescriptor/FontName/Arial-BoldMT/Flags 32/ItalicAngle 0/Ascent 905/Descent -210/CapHeight 728/AvgWidth 479/MaxWidth 2628/FontWeight 700/XHeight 250/Leading 33/StemV 47/FontBBox[ -628 -210 2000 728] >>endobj
                                May 11, 2021 20:33:45.937593937 CEST945INData Raw: 70 65 2f 43 49 44 46 6f 6e 74 54 79 70 65 32 2f 54 79 70 65 2f 46 6f 6e 74 2f 43 49 44 54 6f 47 49 44 4d 61 70 2f 49 64 65 6e 74 69 74 79 2f 44 57 20 31 30 30 30 2f 43 49 44 53 79 73 74 65 6d 49 6e 66 6f 20 31 36 20 30 20 52 2f 46 6f 6e 74 44 65
                                Data Ascii: pe/CIDFontType2/Type/Font/CIDToGIDMap/Identity/DW 1000/CIDSystemInfo 16 0 R/FontDescriptor 17 0 R/W 99 0 R>>endobj16 0 obj<</Ordering(Identity) /Registry(Adobe) /Supplement 0>>endobj17 0 obj<</Type/FontDescriptor/FontName/ArialMT/F
                                May 11, 2021 20:33:45.937618017 CEST946INData Raw: 06 13 f4 b4 b6 c4 00 e0 6b 0f 92 b3 fa 95 43 23 60 45 26 9e 53 68 14 23 00 7c e9 31 72 56 d8 09 14 3a a2 80 b5 9f 82 7c f3 e9 0e f8 76 d2 f8 11 58 44 01 a4 2c 14 9a 00 8a cf 14 1d 05 92 e2 7f 36 ab c0 a2 21 74 dd ce 23 ed 48 9a 55 4b 59 38 a1 d5
                                Data Ascii: kC#`E&Sh#|1rV:|vXD,6!t#HUKY82iL7Wxuw4[yWDiUi67:PfwmuFhjW[?zFZs!#y[R^'p@@KT5P 7V:9(lP
                                May 11, 2021 20:33:45.937644958 CEST948INData Raw: c7 3b 40 34 3c 88 86 3b 40 56 19 44 7f 05 c2 61 15 fa fb bc 7e fd f6 8c f4 86 53 69 2f d3 f7 21 d9 ae fb 63 bb 96 03 03 08 ae 4c 97 f9 be 31 b1 e4 78 04 70 44 ac 52 2e 60 d1 e8 1b 25 b1 3b f1 90 43 32 4b ea bb f7 ec 0a 33 d7 3b 52 56 43 da 80 69
                                Data Ascii: ;@4<;@VDa~Si/!cL1xpDR.`%;C2K3;RVCi)!~`D7A]WG_K0|Hpl#kA!@kE}X-CkTT1)T:mxK'TDmk[]DLU#xPD.*QdOJ6QIs
                                May 11, 2021 20:33:45.937669992 CEST949INData Raw: 54 79 70 65 2f 41 63 74 69 6f 6e 2f 53 2f 55 52 49 2f 55 52 49 28 68 74 74 70 3a 2f 2f 6c 6f 75 69 73 76 69 6c 6c 65 2e 65 64 75 2f 73 74 75 64 79 61 62 72 6f 61 64 2f 70 6f 6c 69 63 69 65 73 2f 74 72 61 76 65 6c 2d 77 61 72 6e 69 6e 67 2d 70 6f
                                Data Ascii: Type/Action/S/URI/URI(http://louisville.edu/studyabroad/policies/travel-warning-policy) >>/StructParent 3>>endobj22 0 obj<</Subtype/Link/Rect[ 310.93 426.9 415.08 452.08] /BS<</W 0>>/F 4/A<</Type/Action/S/URI/URI(http://louisville.edu/st
                                May 11, 2021 20:33:45.937686920 CEST950INData Raw: 6e 44 61 74 65 28 44 3a 32 30 32 31 30 35 30 33 32 31 30 36 33 37 2b 30 30 27 30 30 27 29 20 2f 4d 6f 64 44 61 74 65 28 44 3a 32 30 32 31 30 35 30 33 32 31 30 36 33 37 2b 30 30 27 30 30 27 29 20 3e 3e 0d 0a 65 6e 64 6f 62 6a 0d 0a 33 35 20 30 20
                                Data Ascii: nDate(D:20210503210637+00'00') /ModDate(D:20210503210637+00'00') >>endobj35 0 obj<</Type/ObjStm/N 65/First 498/Filter/FlateDecode/Length 1063>>streamxWn8}/?(+678]S)
                                May 11, 2021 20:33:46.101633072 CEST998INData Raw: 73 3b 33 c3 e1 50 4a 62 24 0d 69 4e d2 12 67 82 a4 23 ae 25 49 4f 82 29 52 8c 84 d6 a4 b0 cd 0c 29 6c 6b 4b 0a 3f e6 48 79 52 da 93 66 f8 02 89 23 ad 3a 41 86 0b 82 04 63 14 56 c8 32 46 90 60 83 12 41 d6 81 cc 90 33 9c 40 ec b9 84 08 a8 65 9c 34
                                Data Ascii: s;3PJb$iNg#%IO)R)lkK?HyRf#:AcV2F`A3@e42A>\AFi0B%:dq%`t~,ZK gl<YqNhF,#<KCG86B2$!%FqOg8gN ^t#;II`H=b/Bk


                                Code Manipulations

                                Statistics

                                CPU Usage

                                Click to jump to process

                                Memory Usage

                                Click to jump to process

                                High Level Behavior Distribution

                                Click to dive into process behavior distribution

                                Behavior

                                Click to jump to process

                                System Behavior

                                General

                                Start time:20:33:42
                                Start date:11/05/2021
                                Path:C:\Program Files\internet explorer\iexplore.exe
                                Wow64 process (32bit):false
                                Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                                Imagebase:0x7ff72ad00000
                                File size:823560 bytes
                                MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low

                                General

                                Start time:20:33:43
                                Start date:11/05/2021
                                Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                Wow64 process (32bit):true
                                Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5916 CREDAT:17410 /prefetch:2
                                Imagebase:0x330000
                                File size:822536 bytes
                                MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low

                                General

                                Start time:20:33:46
                                Start date:11/05/2021
                                Path:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                                Wow64 process (32bit):true
                                Commandline:'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe' /o /eo /l /b /ac /id 4552
                                Imagebase:0xb50000
                                File size:2571312 bytes
                                MD5 hash:B969CF0C7B2C443A99034881E8C8740A
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low

                                General

                                Start time:20:33:47
                                Start date:11/05/2021
                                Path:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                                Wow64 process (32bit):true
                                Commandline:'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe' --type=renderer /prefetch:1 /o /eo /l /b /ac /id 4552
                                Imagebase:0xb50000
                                File size:2571312 bytes
                                MD5 hash:B969CF0C7B2C443A99034881E8C8740A
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Reputation:low

                                Disassembly

                                Code Analysis

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:13.5%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:0%
                                  Total number of Nodes:1
                                  Total number of Limit Nodes:0

                                  Graph

                                  execution_graph 92 53c5003 LdrInitializeThunk

                                  Callgraph

                                  Executed Functions

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 2 53c5110-53c511c LdrInitializeThunk
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.1648209472.00000000053C5000.00000020.00000001.sdmp, Offset: 053C5000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_53c5000_AcroRd32.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 974553679e260ee94105ede55221de7ebabb8bf32f6d2476e9886545627095af
                                  • Instruction ID: e9e25a79da4b49eba1e8d7fe18c27522da9b3995b9a6b5d6e8808763a65d6502
                                  • Opcode Fuzzy Hash: 974553679e260ee94105ede55221de7ebabb8bf32f6d2476e9886545627095af
                                  • Instruction Fuzzy Hash: 699002B138504852D500A55A540DA06010957D0245FA9D011A1158595DCE758871B1B1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 53c5003-53c501c LdrInitializeThunk
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.1648209472.00000000053C5000.00000020.00000001.sdmp, Offset: 053C5000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_53c5000_AcroRd32.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: fb269d273603896e8253d897fa35f50221e2e72d8a57a74862c2f157e07bbb90
                                  • Instruction ID: 40cd280011e125d5d4e91a7c615fc32c60841392b617f2dbdcc29b7f9f6c08ff
                                  • Opcode Fuzzy Hash: fb269d273603896e8253d897fa35f50221e2e72d8a57a74862c2f157e07bbb90
                                  • Instruction Fuzzy Hash: 1FC04C9518EBD54FD30353711C7A9D22F645A9325275E81D7D480CB09BC54806AB9373
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 10 53c5790-53c579c LdrInitializeThunk
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.1648209472.00000000053C5000.00000020.00000001.sdmp, Offset: 053C5000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_53c5000_AcroRd32.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: ca610c29548365b14193f4b3733efc108bc5fba3ea4f85a3fdda65596795f4ca
                                  • Instruction ID: 24c222a81b5e1cdc8929526d861eb7b7469039e69b5b0c81c8aede3c95c81b83
                                  • Opcode Fuzzy Hash: ca610c29548365b14193f4b3733efc108bc5fba3ea4f85a3fdda65596795f4ca
                                  • Instruction Fuzzy Hash: 1F9002B138100413D540B15A541D6064109A7E1341FA9D011E0508554CDD55887662A2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 7 53c5490-53c549c LdrInitializeThunk
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.1648209472.00000000053C5000.00000020.00000001.sdmp, Offset: 053C5000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_53c5000_AcroRd32.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 27f39f725fbc4ddf4ed6edbdbaf2fb901154df17dbddf5cfe2b0171797882fc8
                                  • Instruction ID: ed9f01ea0f7c23bd89b61a385316db703e49615f704c05367ebdf9426b085d9c
                                  • Opcode Fuzzy Hash: 27f39f725fbc4ddf4ed6edbdbaf2fb901154df17dbddf5cfe2b0171797882fc8
                                  • Instruction Fuzzy Hash: 409002B138100812D500A19A4409706010957D0241FA9C412E0618558DCE95887175B1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 5 53c5310-53c531c LdrInitializeThunk
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.1648209472.00000000053C5000.00000020.00000001.sdmp, Offset: 053C5000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_53c5000_AcroRd32.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 94fe9238a1e4ce733e42958529fbd4d5e349bfa2a5c7ed018426c4686885a88d
                                  • Instruction ID: 9447b12b62010385d9d3105b563272ad9021b1b32defda6667d104bdddd03be6
                                  • Opcode Fuzzy Hash: 94fe9238a1e4ce733e42958529fbd4d5e349bfa2a5c7ed018426c4686885a88d
                                  • Instruction Fuzzy Hash: 079002F13C100852D500A15A4419B06010997E1341FA9C015E1158554DCE59CC7271A6
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 9 53c5750-53c575c LdrInitializeThunk
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.1648209472.00000000053C5000.00000020.00000001.sdmp, Offset: 053C5000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_53c5000_AcroRd32.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 29a4828123023646854a7bbbcb48b4819c91ec2835c90ceab7cf9a40c6c5dfcf
                                  • Instruction ID: afc34d6a9a137a3c542639b049d78ead32c0aee77a63480a3447406eeacafe08
                                  • Opcode Fuzzy Hash: 29a4828123023646854a7bbbcb48b4819c91ec2835c90ceab7cf9a40c6c5dfcf
                                  • Instruction Fuzzy Hash: F89002B939300412D580B15A540D60A010957D1242FE9D415A0109558CCD55887963A1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 6 53c5350-53c535c LdrInitializeThunk
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.1648209472.00000000053C5000.00000020.00000001.sdmp, Offset: 053C5000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_53c5000_AcroRd32.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 8d89eae79bf23fd2470a217f38d913a545bfe8558363e65addd2e62fded9dca4
                                  • Instruction ID: 5ea3d84543781284fe2818d238d8025bab4dbd911074f17dbebd2ae9ea90420b
                                  • Opcode Fuzzy Hash: 8d89eae79bf23fd2470a217f38d913a545bfe8558363e65addd2e62fded9dca4
                                  • Instruction Fuzzy Hash: 1C9002F138504492D511A25A4409F0A420D57E0285FE9C016A0148594CCD658972E1A1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1 53c5050-53c505c LdrInitializeThunk
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.1648209472.00000000053C5000.00000020.00000001.sdmp, Offset: 053C5000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_53c5000_AcroRd32.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 4c84151277232184f4ece1caff9d03736cb5b2ac7b5af92573ec6003a39c157d
                                  • Instruction ID: c167b7542daf6858573f5189dc2cfda649c436be1ab1a95d524171969364458c
                                  • Opcode Fuzzy Hash: 4c84151277232184f4ece1caff9d03736cb5b2ac7b5af92573ec6003a39c157d
                                  • Instruction Fuzzy Hash: 5B9002B178500812D541B15A4459706011D57D0281FE9C012A0118554DCE958B76B6E1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 3 53c51d0-53c51dc LdrInitializeThunk
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.1648209472.00000000053C5000.00000020.00000001.sdmp, Offset: 053C5000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_53c5000_AcroRd32.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: 7e47dad86479da47a279e07b6665d510168b853dcf6ee2752cb09e064007092b
                                  • Instruction ID: f712c09118f7ab06895c2f92f54f831258102bbc0871f5471167a53f10353a1b
                                  • Opcode Fuzzy Hash: 7e47dad86479da47a279e07b6665d510168b853dcf6ee2752cb09e064007092b
                                  • Instruction Fuzzy Hash: 4C9002B138100C52D500A15A4409B46010957E0341FA9C016A0218654DCE55C87175A1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 4 53c52d0-53c52dc LdrInitializeThunk
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.1648209472.00000000053C5000.00000020.00000001.sdmp, Offset: 053C5000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_53c5000_AcroRd32.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: b2a3f88fabd24f7c8c3c2fafaa86054f15987965036c94671819ae633b8cb8be
                                  • Instruction ID: 595b96017b642c6488b1f85f8e50c5a5e77438745a2681b1e6536427cda0bd29
                                  • Opcode Fuzzy Hash: b2a3f88fabd24f7c8c3c2fafaa86054f15987965036c94671819ae633b8cb8be
                                  • Instruction Fuzzy Hash: 0D9002B139114812D510A15A8409706010957D1241FA9C411A0918558DCED588B171A2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 8 53c56d0-53c56dc LdrInitializeThunk
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.1648209472.00000000053C5000.00000020.00000001.sdmp, Offset: 053C5000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_53c5000_AcroRd32.jbxd
                                  Similarity
                                  • API ID: InitializeThunk
                                  • String ID:
                                  • API String ID: 2994545307-0
                                  • Opcode ID: dfe2004c431489e9de8f4bf325dee0477a038e150051f59701c81b6116e10e0f
                                  • Instruction ID: 410af6811aa0a808a77b91965b216cec03cf9dd7cdf36a1e6e8a0aa3957d8b51
                                  • Opcode Fuzzy Hash: dfe2004c431489e9de8f4bf325dee0477a038e150051f59701c81b6116e10e0f
                                  • Instruction Fuzzy Hash: 499002B138100812D500A59A540D646010957E0341FA9D011A5118555ECEA588B171B1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Non-executed Functions