Loading ...

Play interactive tourEdit tour

Windows Analysis Report 0333 - CCFL Seniors Funded Facilities Risk Assessments 20210801.mhtml

Overview

General Information

Sample Name:0333 - CCFL Seniors Funded Facilities Risk Assessments 20210801.mhtml
Analysis ID:458967
MD5:129696ab429a996fba603f5946f20389
SHA1:8bb06a0a27d7ac48a92576b27abb02eaf1acd21c
SHA256:ff890973cd32878dff5325414d4a6d36e483c828fbda3eaf6f0fa469fbb2d987
Infos:

Most interesting Screenshot:

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

No high impact signatures.

Classification

Process Tree

  • System is w10x64
  • iexplore.exe (PID: 6944 cmdline: 'C:\Program Files\Internet Explorer\iexplore.exe' C:\Users\user\Desktop\0333 - CCFL Seniors Funded Facilities Risk Assessments 20210801.mhtml MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596)
    • iexplore.exe (PID: 7012 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6944 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll
Source: msapplication.xml0.0.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x14a50c70,0x01d788ad</date><accdate>0x14a50c70,0x01d788ad</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml0.0.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x14a50c70,0x01d788ad</date><accdate>0x14a50c70,0x01d788ad</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml5.0.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x14c40b34,0x01d788ad</date><accdate>0x14c40b34,0x01d788ad</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml5.0.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x14c40b34,0x01d788ad</date><accdate>0x14c40b34,0x01d788ad</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml7.0.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x14cb31e9,0x01d788ad</date><accdate>0x14cb31e9,0x01d788ad</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: msapplication.xml7.0.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x14cb31e9,0x01d788ad</date><accdate>0x14cb31e9,0x01d788ad</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: msapplication.xml.0.drString found in binary or memory: http://www.amazon.com/
Source: msapplication.xml1.0.drString found in binary or memory: http://www.google.com/
Source: wbk9C9B.tmp.2.drString found in binary or memory: http://www.healthspace.com/Clients/Common/ReportDefinitions.nsf/RefNum/0333
Source: msapplication.xml2.0.drString found in binary or memory: http://www.live.com/
Source: msapplication.xml3.0.drString found in binary or memory: http://www.nytimes.com/
Source: msapplication.xml4.0.drString found in binary or memory: http://www.reddit.com/
Source: msapplication.xml5.0.drString found in binary or memory: http://www.twitter.com/
Source: msapplication.xml6.0.drString found in binary or memory: http://www.wikipedia.com/
Source: msapplication.xml7.0.drString found in binary or memory: http://www.youtube.com/
Source: wbk9C9B.tmp.2.drString found in binary or memory: https://ravens.healthspace.ca/ReportServer?%2FVIHA%2FCCFL%2F0333%20-%20CCFL%20Seniors%20Funded%20Fac
Source: classification engineClassification label: clean0.winMHTML@3/14@0/1
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{3F393D3B-F4A0-11EB-90EB-ECF4BBEA1588}.datJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DF7AB7A8B365382B36.TMPJump to behavior
Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' C:\Users\user\Desktop\0333 - CCFL Seniors Funded Facilities Risk Assessments 20210801.mhtml
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6944 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6944 CREDAT:17410 /prefetch:2
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_211\bin\msvcr100.dll

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection1Masquerading1OS Credential DumpingFile and Directory Discovery1Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsProcess Injection1LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 458967 Sample: 0333 - CCFL Seniors Funded ... Startdate: 03/08/2021 Architecture: WINDOWS Score: 0 5 iexplore.exe 1 79 2->5         started        dnsIp3 10 192.168.2.1 unknown unknown 5->10 8 iexplore.exe 26 5->8         started        process4

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

No Antivirus matches

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

SourceDetectionScannerLabelLink
https://ravens.healthspace.ca/ReportServer?%2FVIHA%2FCCFL%2F0333%20-%20CCFL%20Seniors%20Funded%20Fac0%Avira URL Cloudsafe
http://www.wikipedia.com/0%URL Reputationsafe
http://www.healthspace.com/Clients/Common/ReportDefinitions.nsf/RefNum/03330%Avira URL Cloudsafe

Domains and IPs

Contacted Domains

No contacted domains info

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
https://ravens.healthspace.ca/ReportServer?%2FVIHA%2FCCFL%2F0333%20-%20CCFL%20Seniors%20Funded%20Facwbk9C9B.tmp.2.drfalse
  • Avira URL Cloud: safe
unknown
http://www.wikipedia.com/msapplication.xml6.0.drfalse
  • URL Reputation: safe
unknown
http://www.amazon.com/msapplication.xml.0.drfalse
    high
    http://www.healthspace.com/Clients/Common/ReportDefinitions.nsf/RefNum/0333wbk9C9B.tmp.2.drfalse
    • Avira URL Cloud: safe
    unknown
    http://www.nytimes.com/msapplication.xml3.0.drfalse
      high
      http://www.live.com/msapplication.xml2.0.drfalse
        high
        http://www.reddit.com/msapplication.xml4.0.drfalse
          high
          http://www.twitter.com/msapplication.xml5.0.drfalse
            high
            http://www.youtube.com/msapplication.xml7.0.drfalse
              high
              http://www.google.com/msapplication.xml1.0.drfalse
                high

                Contacted IPs

                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs

                Public

                IPDomainCountryFlagASNASN NameMalicious

                Private

                IP
                192.168.2.1

                General Information

                Joe Sandbox Version:33.0.0 White Diamond
                Analysis ID:458967
                Start date:03.08.2021
                Start time:23:16:59
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 4m 14s
                Hypervisor based Inspection enabled:false
                Report type:light
                Sample file name:0333 - CCFL Seniors Funded Facilities Risk Assessments 20210801.mhtml
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:16
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:CLEAN
                Classification:clean0.winMHTML@3/14@0/1
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Found application associated with file extension: .mhtml
                Warnings:
                Show All
                • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                • Excluded IPs from analysis (whitelisted): 104.42.151.234, 40.88.32.150, 23.203.80.193, 13.88.21.125, 204.79.197.222, 20.82.210.154, 152.199.19.161, 20.54.110.249, 40.112.88.60, 20.50.102.62, 80.67.82.235, 80.67.82.211
                • Excluded domains from analysis (whitelisted): fp.msedge.net, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a1449.dscg2.akamai.net, arc.msn.com, e11290.dspg.akamaiedge.net, a-0019.a-msedge.net, iecvlist.microsoft.com, skypedataprdcoleus15.cloudapp.net, go.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, a-0019.standard.a-msedge.net, 1.perf.msedge.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, ie9comview.vo.msecnd.net, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, ris.api.iris.microsoft.com, blobcollector.events.data.trafficmanager.net, go.microsoft.com.edgekey.net, skypedataprdcolwus16.cloudapp.net, skypedataprdcolwus15.cloudapp.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, cs9.wpc.v0cdn.net
                • Not all processes where analyzed, report is missing behavior information
                • VT rate limit hit for: /opt/package/joesandbox/database/analysis/458967/sample/0333 - CCFL Seniors Funded Facilities Risk Assessments 20210801.mhtml

                Simulations

                Behavior and APIs

                No simulations

                Joe Sandbox View / Context

                IPs

                No context

                Domains

                No context

                ASN

                No context

                JA3 Fingerprints

                No context

                Dropped Files

                No context

                Created / dropped Files

                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{3F393D3B-F4A0-11EB-90EB-ECF4BBEA1588}.dat
                Process:C:\Program Files\internet explorer\iexplore.exe
                File Type:Microsoft Word Document
                Category:dropped
                Size (bytes):24152
                Entropy (8bit):1.753517549125157
                Encrypted:false
                SSDEEP:96:rDZQZkV2kP6WkP9FktkP9xfkP9rCCtkP9ryk7L/zWkP9+fyZH/:rDZQZq2pWQktgfTCt07L/zWUH/
                MD5:EA8AAF53A3E9254BCD799DAB1650C704
                SHA1:44A0C24BDE509E525B5C632308A45DAAA02B472D
                SHA-256:B9BA6329ED0B3C4E96D6EFE19C1C05997A79095FC60A3D0AC041A0D0624C995A
                SHA-512:0547C9710937368142EF1ABDC49F6F0AEDF99B7D617CF190ACBF89DB406F66C2316D31FEBACABA87A3032CE4B2159E3A9B089112B059D013EA160626ED5DD840
                Malicious:false
                Reputation:low
                Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{3F393D3D-F4A0-11EB-90EB-ECF4BBEA1588}.dat
                Process:C:\Program Files\internet explorer\iexplore.exe
                File Type:Microsoft Word Document
                Category:dropped
                Size (bytes):28954
                Entropy (8bit):2.2316766846831606
                Encrypted:false
                SSDEEP:192:r9ZWQmtW8ocoB7bO2HMOQZIpGvc/fmImB:rTjWvl8fO2sOEIpcf
                MD5:E9622E82DA52E25233FD9AF76E802F9F
                SHA1:E31132B11EFBD875C2EE5CDE77133B95A6B4A215
                SHA-256:397C085AEE05E5E47F8F27DDE4A6086C8CF88F2D702685D885E9CDD739E892B3
                SHA-512:B839BD05126998B1D6C2FB33344B30A00C0258ABA794039ACD0A40E85A562C4B3E80AA525F2FA74D4833E765D61830551D49B36FCA17BEB639D6217548D19EF4
                Malicious:false
                Reputation:low
                Preview: ................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................R.o.o.t. .E.n.t.r.y.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-17529550060\msapplication.xml
                Process:C:\Program Files\internet explorer\iexplore.exe
                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                Category:dropped
                Size (bytes):656
                Entropy (8bit):5.072624047947721
                Encrypted:false
                SSDEEP:12:TMHdNMNxOEL23vq23vuNnWimI002EtM3MHdNMNxOEL23vq23vuNnWimI00OYGVb2:2d6NxOI23C23ISZHKd6NxOI23C23ISZ2
                MD5:DF44614A9A6CD79F6C1D30A27E1E3F94
                SHA1:972CEB904C2DA335280B131DC61A6FB7A84BD013
                SHA-256:7B95E527ED2532A40DF880A24508AB0716DAB4D60BEF0AF439DA879AA085B247
                SHA-512:52159597746925BBF1260A506A231A117FEDB4EBE9EB5A018FE808C6AC85D32606617C32E7240C5E3EAF893AB09BB404B8F99521E31FA3500AD2E93682ED3C52
                Malicious:false
                Reputation:low
                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x14c40b34,0x01d788ad</date><accdate>0x14c40b34,0x01d788ad</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0x14c40b34,0x01d788ad</date><accdate>0x14c40b34,0x01d788ad</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig>..
                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18270793970\msapplication.xml
                Process:C:\Program Files\internet explorer\iexplore.exe
                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                Category:dropped
                Size (bytes):653
                Entropy (8bit):5.150647426570353
                Encrypted:false
                SSDEEP:12:TMHdNMNxe2k55kv05kvuNnWimI002EtM3MHdNMNxe2k55kv05kvuNnWimI00OYGv:2d6Nxr2i8iISZHKd6Nxr2i8iISZ7Yzan
                MD5:F27FB87A42B5F21C85B668886CCBFD7F
                SHA1:2D446CD11C34971E7E47625ECEFD17BA6F8C05E7
                SHA-256:35ED7766D95E924EA7F6BCCAEB59086CDA8D7B2B19B1AD36FFA0ABE4269357C8
                SHA-512:72F6D2DF529A59AE740F8120F54D70688C2337E1573ADF3009BD9565562E7ABD4A9A901F66CA4823266DAC4AD66F483A2F01F29BBBBD1EF575CB667C39978892
                Malicious:false
                Reputation:low
                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0x14945f42,0x01d788ad</date><accdate>0x14945f42,0x01d788ad</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.amazon.com/"/><date>0x14945f42,0x01d788ad</date><accdate>0x14945f42,0x01d788ad</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Amazon.url"/></tile></msapplication></browserconfig>..
                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-21706820\msapplication.xml
                Process:C:\Program Files\internet explorer\iexplore.exe
                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                Category:dropped
                Size (bytes):662
                Entropy (8bit):5.090901506310693
                Encrypted:false
                SSDEEP:12:TMHdNMNxvLL23vq23vuNnWimI002EtM3MHdNMNxvLL23vq23vuNnWimI00OYGmZt:2d6Nxv323C23ISZHKd6Nxv323C23ISZy
                MD5:03FC59F90ACEA334D57D9E6CAD9B3717
                SHA1:257D7CAEFDD63115195BF7D02F3C34B55503F479
                SHA-256:F4A16A58597331CA1BF1AEFCBD70A88E173D797D50E206A49A3A4AE54156E499
                SHA-512:B49AD042B64183E6B5E2F6845E46B68AEB4355A4815CE9D92B9AAD5B2D7DD2189498344BEAA56FE980A67138DD289E5A9D19719170380CE0E85DA0DEA6B80998
                Malicious:false
                Reputation:low
                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0x14c40b34,0x01d788ad</date><accdate>0x14c40b34,0x01d788ad</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.wikipedia.com/"/><date>0x14c40b34,0x01d788ad</date><accdate>0x14c40b34,0x01d788ad</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Wikipedia.url"/></tile></msapplication></browserconfig>..
                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml
                Process:C:\Program Files\internet explorer\iexplore.exe
                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                Category:dropped
                Size (bytes):647
                Entropy (8bit):5.053433908395234
                Encrypted:false
                SSDEEP:12:TMHdNMNxievxvuNnWimI002EtM3MHdNMNxievxvuNnWimI00OYGd5EtMb:2d6NxtZISZHKd6NxtZISZ7YEjb
                MD5:AAEC48334C8FC91452D09C0927CA4916
                SHA1:BC4B964FE5BC3D44187FA70AC0A8BCE7D0430093
                SHA-256:235B4B279625AF62C6A176786EB2B3A8F8C0B5F1A6329A5BE258FDAE5873428A
                SHA-512:1E9F26F845C15C356E6003C625C82D9CBB82E351D77A43CC096DA61577397FB3FDE6C0CC13944F3C60CB1603429F96ED92B986BC97CA4280E32FA8A649076F98
                Malicious:false
                Reputation:low
                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0x14ac33ac,0x01d788ad</date><accdate>0x14ac33ac,0x01d788ad</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.live.com/"/><date>0x14ac33ac,0x01d788ad</date><accdate>0x14ac33ac,0x01d788ad</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Live.url"/></tile></msapplication></browserconfig>..
                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6757900\msapplication.xml
                Process:C:\Program Files\internet explorer\iexplore.exe
                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                Category:dropped
                Size (bytes):656
                Entropy (8bit):5.106861393380306
                Encrypted:false
                SSDEEP:12:TMHdNMNxhGwhvivuNnWimI002EtM3MHdNMNxhGwhvivuNnWimI00OYG8K075EtMb:2d6NxQsaISZHKd6NxQsaISZ7YrKajb
                MD5:50E65D990429DE83B78EA6C5A3538606
                SHA1:941E64B86A09A1A4D71D642F214CEE4489DB5116
                SHA-256:4831377DEBB2248704751B25363369F224476A1F4CE15FB410C039C5F3E176AA
                SHA-512:A68868E716B8A7BFC9CC857215851A50ADDB1F930768E96C09F1721FD9D7791D305C4AEE78CD0CE25524273F67C0D6EC711540B510E5D8940DB0AA80EA35E344
                Malicious:false
                Reputation:low
                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x14cb31e9,0x01d788ad</date><accdate>0x14cb31e9,0x01d788ad</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0x14cb31e9,0x01d788ad</date><accdate>0x14cb31e9,0x01d788ad</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig>..
                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8760897390\msapplication.xml
                Process:C:\Program Files\internet explorer\iexplore.exe
                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                Category:dropped
                Size (bytes):653
                Entropy (8bit):5.0515852499020015
                Encrypted:false
                SSDEEP:12:TMHdNMNx0nevxvuNnWimI002EtM3MHdNMNx0nevq23vuNnWimI00OYGxEtMb:2d6Nx0eZISZHKd6Nx0eC23ISZ7Ygb
                MD5:C993D204B5758736A33250EA39536578
                SHA1:352A75A7F90B80411507127ACA9A37D767F18BF3
                SHA-256:A1F987AAEC89763DCCBA939619EF49C93A17D621E1B63A13024474E574A83EB2
                SHA-512:F346B5A8236C75A5ED31DAE5441427C990EF9108C255A43D4621C698A21EFEC7A5C30FA64B8C7CE1D9E6DC18C1BE14A31C1B74F0DE929D228B2C19D07A9F4A0A
                Malicious:false
                Reputation:low
                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0x14ac33ac,0x01d788ad</date><accdate>0x14ac33ac,0x01d788ad</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.reddit.com/"/><date>0x14ac33ac,0x01d788ad</date><accdate>0x14c40b34,0x01d788ad</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Reddit.url"/></tile></msapplication></browserconfig>..
                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml
                Process:C:\Program Files\internet explorer\iexplore.exe
                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                Category:dropped
                Size (bytes):656
                Entropy (8bit):5.078374875494457
                Encrypted:false
                SSDEEP:12:TMHdNMNxxevxvuNnWimI002EtM3MHdNMNxxevxvuNnWimI00OYG6Kq5EtMb:2d6NxUZISZHKd6NxUZISZ7Yhb
                MD5:A484BFC5AD35517E6C3C6938A4BC1207
                SHA1:57D2EA297A7D263B8ED96CB22A4EA3F02DD1B383
                SHA-256:58C4CAF3752A96F207047278C8BA654950A8DD7D1D143C4488460DD0B8F7F06E
                SHA-512:3FA7FEBFD136447BAFC44B126BDBECC36AEAAC57CBAD9A6DAEE9BE3B0B90B7CF1C77BD0C4F4445810FA81BDFA6EDEAF791504A739112FAA19D11587CC9758032
                Malicious:false
                Reputation:low
                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0x14ac33ac,0x01d788ad</date><accdate>0x14ac33ac,0x01d788ad</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.nytimes.com/"/><date>0x14ac33ac,0x01d788ad</date><accdate>0x14ac33ac,0x01d788ad</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\NYTimes.url"/></tile></msapplication></browserconfig>..
                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20332743330\msapplication.xml
                Process:C:\Program Files\internet explorer\iexplore.exe
                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                Category:dropped
                Size (bytes):659
                Entropy (8bit):5.068156126395315
                Encrypted:false
                SSDEEP:12:TMHdNMNxcgvXvuNnWimI002EtM3MHdNMNxcgvXvuNnWimI00OYGVEtMb:2d6NxJ/ISZHKd6NxJ/ISZ7Ykb
                MD5:71DAC2DB16EBAFD7556001FAF262A706
                SHA1:F825D2CFEA40A67CE05963A4FB3D2A345CAD0ECF
                SHA-256:71B495D2B10A92AE0A5EF59A8D6AC7CBD987B4DF1D4EA4AECF023B55B73F25DA
                SHA-512:4282EC7A6ACA1DFBF458C43CE215E028D2C21CE49DDA25370CC1FFC4161DD01C8F911A784012B0F7042870532F3737D6575EB5C2746FA822941E6FCB1FB3CAA9
                Malicious:false
                Reputation:low
                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x14a50c70,0x01d788ad</date><accdate>0x14a50c70,0x01d788ad</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0x14a50c70,0x01d788ad</date><accdate>0x14a50c70,0x01d788ad</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig>..
                C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin8215062560\msapplication.xml
                Process:C:\Program Files\internet explorer\iexplore.exe
                File Type:XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators
                Category:dropped
                Size (bytes):653
                Entropy (8bit):5.049848553005894
                Encrypted:false
                SSDEEP:12:TMHdNMNxfngvXvuNnWimI002EtM3MHdNMNxfngvXvuNnWimI00OYGe5EtMb:2d6NxI/ISZHKd6NxI/ISZ7YLjb
                MD5:122D3F92D33534BFF054B6DAC0164BBD
                SHA1:7E1AA5FF25F409CF206AE3E852DBB119DA46EC48
                SHA-256:ED692214CFEB258038208B4267B17AF6491C2391E5BEC74CC6F86060C4D04ECC
                SHA-512:C445751B171300CF2C6CF8BE92EC19D6F7DC8CC898648306D1A9BA2760400F6618364F7B0E555A73DBC29BB00EF34A300A5E73A0E45C47355DFBA8EA685800B5
                Malicious:false
                Reputation:low
                Preview: <?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0x14a50c70,0x01d788ad</date><accdate>0x14a50c70,0x01d788ad</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig>..<?xml version="1.0" encoding="utf-8"?>..<browserconfig><msapplication><config><site src="http://www.google.com/"/><date>0x14a50c70,0x01d788ad</date><accdate>0x14a50c70,0x01d788ad</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Google.url"/></tile></msapplication></browserconfig>..
                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\2WF3MMUU\wbk9C9B.tmp
                Process:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                File Type:HTML document, UTF-8 Unicode text, with very long lines, with CRLF, LF line terminators
                Category:dropped
                Size (bytes):34439
                Entropy (8bit):5.69367155071897
                Encrypted:false
                SSDEEP:384:giBIupO8JyaJlwlSEs+2+1H7W/A2GJcyicpanQ+nl:gQYH7W/A2GJkcpanQ+nl
                MD5:7FC1AFC6BB13B58A1AAD7E446788248E
                SHA1:C5B14BE408CA0C26E547C8E455B542D98407EBD8
                SHA-256:D6E17DED91970B0284E54A8D922D8B633C5648834658D42645F7BEB6274295A0
                SHA-512:9E15C6966683840A05C6D0A508778EB47264FB32C287AF29C2E4996EF3B562A10F150671DC7A8D152D5107CE1B29626BC543599CA5AB135B63E08F39FFF2B070
                Malicious:false
                Reputation:low
                Preview: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"><html>..<head><title>0333 - CCFL Seniors Funded Facilities Risk Assessments</title>..<META http-equiv="Content-Type" content="text/html; charset=utf-8"/><META http-equiv="Content-Style-Type" content="text/css"/><META http-equiv="Content-Script-Type" content="text/javascript"/><META HTTP-EQUIV="Location" CONTENT="https://ravens.healthspace.ca/ReportServer?%2FVIHA%2FCCFL%2F0333%20-%20CCFL%20Seniors%20Funded%20Facilities%20Risk%20Assessments"/><META HTTP-EQUIV="Uri" CONTENT="https://ravens.healthspace.ca/ReportServer?%2FVIHA%2FCCFL%2F0333%20-%20CCFL%20Seniors%20Funded%20Facilities%20Risk%20Assessments"/><META HTTP-EQUIV="Last-Modified" CONTENT="08/03/2021 17:21:17"><META NAME="StartDate" CONTENT="4/1/2021 12:00:00 AM"><META NAME="EndDate" CONTENT="1/1/2200 12:00:00 AM"><META NAME="SourceDatabase" CONTENT=""><META NAME="Generator" CONTENT="Microsoft Report 8.0 "/><META NAME="Originator" CONTENT="Microsoft Report 8.0 "/><style t
                C:\Users\user\AppData\Local\Temp\~DF34CD3393F0C35364.TMP
                Process:C:\Program Files\internet explorer\iexplore.exe
                File Type:data
                Category:dropped
                Size (bytes):38539
                Entropy (8bit):0.9561710410084375
                Encrypted:false
                SSDEEP:96:kBqoxK7pwFjFLY+OOOdObO7IV/o75/oV1iO5fm:kBqoxK7pKhLY+OOOdObO7I8c/fm
                MD5:F81C189E1CF5D59F960AECA02072A1A0
                SHA1:131D5F0BD554BAA7804C861D991691FFB2F5DDED
                SHA-256:55C711D39BC3E02AA21E2BF26045F245423041432D780C8976FD5DDA135C1242
                SHA-512:9CAFEF9989881F72EE8B3B1543212B4661978C215F5C87742BBA750DD96FE4EB270B7B8796BE4602BE1F59F324265026019D670C193C06952CB32CED8FE742A2
                Malicious:false
                Reputation:low
                Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                C:\Users\user\AppData\Local\Temp\~DF7AB7A8B365382B36.TMP
                Process:C:\Program Files\internet explorer\iexplore.exe
                File Type:data
                Category:dropped
                Size (bytes):12965
                Entropy (8bit):0.4129652521876017
                Encrypted:false
                SSDEEP:24:c9lLh9lLh9lIn9lIn9lok39lok39lWkP9F+ry9+V:kBqoIk4kmkP9F+ry9+V
                MD5:FEC9DC8CA6C2DA6C4E3CB15957EC5B69
                SHA1:C7B87850A3BC9613109162B014D1A47BEEFDBCC9
                SHA-256:6E1367087FCFDBBFE10C2ADC1F377F74711A96211EA3B930B4B828F28090D92B
                SHA-512:E7C48D01B367D1C306B0E388547AE671D37715A63E0F959C3A744223DCB098DF3C3AC3EB834BC5B1A48FE9EA8F4025B459DE3843CDC05BDECF171842AFD5A4DD
                Malicious:false
                Preview: .............................*%..H..M..{y..+.0...(................... ...............................................*%..H..M..{y..+.0...(................... ..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

                Static File Info

                General

                File type:MIME entity, ASCII text, with CRLF line terminators
                Entropy (8bit):5.850048759606687
                TrID:
                  File name:0333 - CCFL Seniors Funded Facilities Risk Assessments 20210801.mhtml
                  File size:47641
                  MD5:129696ab429a996fba603f5946f20389
                  SHA1:8bb06a0a27d7ac48a92576b27abb02eaf1acd21c
                  SHA256:ff890973cd32878dff5325414d4a6d36e483c828fbda3eaf6f0fa469fbb2d987
                  SHA512:cafbb699cd7c1e5f3e8600ae42d731c1b2ee6dfd4fa85b975cd6ae670482331e50b3120c0dc9339497afa1d3d6718bf8b4e25c4734869b85a7d7fe221ab22985
                  SSDEEP:768:zI5uJgbvHGuj4BdhvFzZJhiFi2DRimrdaMIzQOXOYProBc6m+PPQ72xF/Bc5Ix6H:z9mOuj4BfvFNJhiFi2DRiSoMIzQOXOYF
                  File Content Preview:MIME-Version: 1.0..Content-Type: multipart/related;...boundary="----=_NextPart_01C35DB7.4B204430"..X-MSSQLRS-ProducerVersion: V12.0.6164.21....This is a multi-part message in MIME format.....------=_NextPart_01C35DB7.4B204430..Content-Disposition: inline;

                  File Icon

                  Icon Hash:e4e0c8c3ccccccf5

                  Network Behavior

                  Network Port Distribution

                  UDP Packets

                  TimestampSource PortDest PortSource IPDest IP
                  Aug 3, 2021 23:17:40.603475094 CEST5585453192.168.2.48.8.8.8
                  Aug 3, 2021 23:17:40.638756037 CEST53558548.8.8.8192.168.2.4
                  Aug 3, 2021 23:17:42.128210068 CEST6454953192.168.2.48.8.8.8
                  Aug 3, 2021 23:17:42.165383101 CEST53645498.8.8.8192.168.2.4
                  Aug 3, 2021 23:17:43.130601883 CEST6315353192.168.2.48.8.8.8
                  Aug 3, 2021 23:17:43.160814047 CEST53631538.8.8.8192.168.2.4
                  Aug 3, 2021 23:17:43.955030918 CEST5299153192.168.2.48.8.8.8
                  Aug 3, 2021 23:17:43.981496096 CEST53529918.8.8.8192.168.2.4
                  Aug 3, 2021 23:17:45.000622988 CEST5370053192.168.2.48.8.8.8
                  Aug 3, 2021 23:17:45.026740074 CEST53537008.8.8.8192.168.2.4
                  Aug 3, 2021 23:17:45.761113882 CEST5172653192.168.2.48.8.8.8
                  Aug 3, 2021 23:17:45.786199093 CEST53517268.8.8.8192.168.2.4
                  Aug 3, 2021 23:17:46.393933058 CEST5679453192.168.2.48.8.8.8
                  Aug 3, 2021 23:17:46.429388046 CEST53567948.8.8.8192.168.2.4
                  Aug 3, 2021 23:17:47.272595882 CEST5653453192.168.2.48.8.8.8
                  Aug 3, 2021 23:17:47.306711912 CEST53565348.8.8.8192.168.2.4
                  Aug 3, 2021 23:17:47.425610065 CEST5662753192.168.2.48.8.8.8
                  Aug 3, 2021 23:17:47.458163023 CEST53566278.8.8.8192.168.2.4
                  Aug 3, 2021 23:17:48.992388010 CEST5662153192.168.2.48.8.8.8
                  Aug 3, 2021 23:17:49.024883032 CEST53566218.8.8.8192.168.2.4
                  Aug 3, 2021 23:17:50.246335983 CEST6311653192.168.2.48.8.8.8
                  Aug 3, 2021 23:17:50.281713963 CEST53631168.8.8.8192.168.2.4
                  Aug 3, 2021 23:17:51.283576012 CEST6407853192.168.2.48.8.8.8
                  Aug 3, 2021 23:17:51.318937063 CEST53640788.8.8.8192.168.2.4
                  Aug 3, 2021 23:17:52.271672964 CEST6480153192.168.2.48.8.8.8
                  Aug 3, 2021 23:17:52.304491043 CEST53648018.8.8.8192.168.2.4
                  Aug 3, 2021 23:17:53.309432030 CEST6172153192.168.2.48.8.8.8
                  Aug 3, 2021 23:17:53.337141037 CEST53617218.8.8.8192.168.2.4
                  Aug 3, 2021 23:17:53.943913937 CEST5125553192.168.2.48.8.8.8
                  Aug 3, 2021 23:17:53.969093084 CEST53512558.8.8.8192.168.2.4
                  Aug 3, 2021 23:17:54.578797102 CEST6152253192.168.2.48.8.8.8
                  Aug 3, 2021 23:17:54.607729912 CEST53615228.8.8.8192.168.2.4
                  Aug 3, 2021 23:17:55.205802917 CEST5233753192.168.2.48.8.8.8
                  Aug 3, 2021 23:17:55.233627081 CEST53523378.8.8.8192.168.2.4
                  Aug 3, 2021 23:17:55.851756096 CEST5504653192.168.2.48.8.8.8
                  Aug 3, 2021 23:17:55.877979040 CEST53550468.8.8.8192.168.2.4
                  Aug 3, 2021 23:18:05.240936041 CEST5315753192.168.2.48.8.8.8
                  Aug 3, 2021 23:18:05.270133972 CEST53531578.8.8.8192.168.2.4
                  Aug 3, 2021 23:18:08.227647066 CEST4961253192.168.2.48.8.8.8
                  Aug 3, 2021 23:18:08.262995005 CEST53496128.8.8.8192.168.2.4
                  Aug 3, 2021 23:18:17.341274023 CEST4928553192.168.2.48.8.8.8
                  Aug 3, 2021 23:18:17.367053032 CEST53492858.8.8.8192.168.2.4
                  Aug 3, 2021 23:18:18.003416061 CEST5060153192.168.2.48.8.8.8
                  Aug 3, 2021 23:18:18.035815001 CEST53506018.8.8.8192.168.2.4
                  Aug 3, 2021 23:18:18.352765083 CEST4928553192.168.2.48.8.8.8
                  Aug 3, 2021 23:18:18.380382061 CEST53492858.8.8.8192.168.2.4
                  Aug 3, 2021 23:18:19.008255005 CEST5060153192.168.2.48.8.8.8
                  Aug 3, 2021 23:18:19.034560919 CEST53506018.8.8.8192.168.2.4
                  Aug 3, 2021 23:18:19.390186071 CEST4928553192.168.2.48.8.8.8
                  Aug 3, 2021 23:18:19.424820900 CEST53492858.8.8.8192.168.2.4
                  Aug 3, 2021 23:18:20.023504019 CEST5060153192.168.2.48.8.8.8
                  Aug 3, 2021 23:18:20.048027992 CEST53506018.8.8.8192.168.2.4
                  Aug 3, 2021 23:18:21.398682117 CEST4928553192.168.2.48.8.8.8
                  Aug 3, 2021 23:18:21.426642895 CEST53492858.8.8.8192.168.2.4
                  Aug 3, 2021 23:18:22.023812056 CEST5060153192.168.2.48.8.8.8
                  Aug 3, 2021 23:18:22.050652981 CEST53506018.8.8.8192.168.2.4
                  Aug 3, 2021 23:18:25.494786024 CEST4928553192.168.2.48.8.8.8
                  Aug 3, 2021 23:18:25.528342009 CEST53492858.8.8.8192.168.2.4
                  Aug 3, 2021 23:18:26.082607985 CEST5060153192.168.2.48.8.8.8
                  Aug 3, 2021 23:18:26.108752012 CEST53506018.8.8.8192.168.2.4
                  Aug 3, 2021 23:18:27.761676073 CEST6087553192.168.2.48.8.8.8
                  Aug 3, 2021 23:18:27.828830004 CEST53608758.8.8.8192.168.2.4
                  Aug 3, 2021 23:18:28.629173040 CEST5644853192.168.2.48.8.8.8
                  Aug 3, 2021 23:18:28.684003115 CEST53564488.8.8.8192.168.2.4
                  Aug 3, 2021 23:18:29.185785055 CEST5917253192.168.2.48.8.8.8
                  Aug 3, 2021 23:18:29.221349001 CEST53591728.8.8.8192.168.2.4
                  Aug 3, 2021 23:18:29.583183050 CEST6242053192.168.2.48.8.8.8
                  Aug 3, 2021 23:18:29.615458965 CEST53624208.8.8.8192.168.2.4
                  Aug 3, 2021 23:18:30.048237085 CEST6057953192.168.2.48.8.8.8
                  Aug 3, 2021 23:18:30.082396030 CEST53605798.8.8.8192.168.2.4
                  Aug 3, 2021 23:18:30.386779070 CEST5018353192.168.2.48.8.8.8
                  Aug 3, 2021 23:18:30.438640118 CEST53501838.8.8.8192.168.2.4
                  Aug 3, 2021 23:18:30.908571959 CEST6153153192.168.2.48.8.8.8
                  Aug 3, 2021 23:18:30.943892002 CEST53615318.8.8.8192.168.2.4
                  Aug 3, 2021 23:18:31.408210993 CEST4922853192.168.2.48.8.8.8
                  Aug 3, 2021 23:18:31.440696001 CEST53492288.8.8.8192.168.2.4
                  Aug 3, 2021 23:18:32.078246117 CEST5979453192.168.2.48.8.8.8
                  Aug 3, 2021 23:18:32.110929966 CEST53597948.8.8.8192.168.2.4
                  Aug 3, 2021 23:18:33.012077093 CEST5591653192.168.2.48.8.8.8
                  Aug 3, 2021 23:18:33.047689915 CEST53559168.8.8.8192.168.2.4
                  Aug 3, 2021 23:18:33.511861086 CEST5275253192.168.2.48.8.8.8
                  Aug 3, 2021 23:18:33.544663906 CEST53527528.8.8.8192.168.2.4
                  Aug 3, 2021 23:18:42.577074051 CEST6054253192.168.2.48.8.8.8
                  Aug 3, 2021 23:18:42.618083954 CEST53605428.8.8.8192.168.2.4
                  Aug 3, 2021 23:18:42.814157963 CEST6068953192.168.2.48.8.8.8
                  Aug 3, 2021 23:18:42.849208117 CEST53606898.8.8.8192.168.2.4
                  Aug 3, 2021 23:18:44.757206917 CEST6420653192.168.2.48.8.8.8
                  Aug 3, 2021 23:18:44.794114113 CEST53642068.8.8.8192.168.2.4
                  Aug 3, 2021 23:19:18.837274075 CEST5090453192.168.2.48.8.8.8
                  Aug 3, 2021 23:19:18.880028009 CEST53509048.8.8.8192.168.2.4
                  Aug 3, 2021 23:19:20.722563982 CEST5752553192.168.2.48.8.8.8
                  Aug 3, 2021 23:19:20.761243105 CEST53575258.8.8.8192.168.2.4

                  DNS Answers

                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                  Aug 3, 2021 23:18:05.270133972 CEST8.8.8.8192.168.2.40x52b2No error (0)a-0019.a.dns.azurefd.neta-0019.standard.a-msedge.netCNAME (Canonical name)IN (0x0001)

                  Code Manipulations

                  Statistics

                  Behavior

                  Click to jump to process

                  System Behavior

                  General

                  Start time:23:17:46
                  Start date:03/08/2021
                  Path:C:\Program Files\internet explorer\iexplore.exe
                  Wow64 process (32bit):false
                  Commandline:'C:\Program Files\Internet Explorer\iexplore.exe' C:\Users\user\Desktop\0333 - CCFL Seniors Funded Facilities Risk Assessments 20210801.mhtml
                  Imagebase:0x7ff63a040000
                  File size:823560 bytes
                  MD5 hash:6465CB92B25A7BC1DF8E01D8AC5E7596
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  General

                  Start time:23:17:47
                  Start date:03/08/2021
                  Path:C:\Program Files (x86)\Internet Explorer\iexplore.exe
                  Wow64 process (32bit):true
                  Commandline:'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:6944 CREDAT:17410 /prefetch:2
                  Imagebase:0xf20000
                  File size:822536 bytes
                  MD5 hash:071277CC2E3DF41EEEA8013E2AB58D5A
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Disassembly

                  Reset < >