Loading ...

Analysis Report https://docsusignnet.egnyte.com/dl/XgvBJA92Ez

Overview

General Information

Joe Sandbox Version:24.0.0 Fire Opal
Analysis ID:96287
Start date:06.12.2018
Start time:22:47:54
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 4m 7s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:browseurl.jbs
Sample URL:https://docsusignnet.egnyte.com/dl/XgvBJA92Ez
Analysis system description:Windows 10 64 bit (version 1803) with Office 2016, Adobe Reader DC 19, Chrome 70, Firefox 63, Java 8.171
Number of analysed new started processes analysed:5
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies
  • EGA enabled
Analysis stop reason:Timeout
Detection:CLEAN
Classification:clean1.win@3/196@43/33
Cookbook Comments:
  • Adjust boot time
  • Browsing link: https://www.egnyte.com/corp/registration/register-lp-online-file-sharing.html?utm_source=hot-share-link-page&utm_medium=product&utm_content=overview-page&utm_campaign=file-sharing
  • Browsing link: https://docsusignnet.egnyte.com/nolink.jsp#
Warnings:
Show All
  • Exclude process from analysis (whitelisted): ielowutil.exe, conhost.exe, CompatTelRunner.exe
  • Report size getting too big, too many NtCreateFile calls found.
  • Report size getting too big, too many NtDeviceIoControlFile calls found.
  • Report size getting too big, too many NtOpenFile calls found.
  • Report size getting too big, too many NtQueryAttributesFile calls found.

Detection

StrategyScoreRangeReportingDetection
Threshold10 - 100Report FP / FNclean

Confidence

StrategyScoreRangeFurther Analysis Required?Confidence
Threshold40 - 5false
ConfidenceConfidence


Classification

Analysis Advice

Uses HTTPS for network communication, use the 'Proxy HTTPS (port 443) to read its encrypted data' cookbook for further analysis



Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and Control
Valid AccountsWindows Remote ManagementWinlogon Helper DLLPort MonitorsFile System Logical OffsetsCredential DumpingSecurity Software Discovery1Application Deployment SoftwareData from Local SystemData Encrypted1Standard Non-Application Layer Protocol3
Replication Through Removable MediaService ExecutionPort MonitorsAccessibility FeaturesBinary PaddingNetwork SniffingApplication Window DiscoveryRemote ServicesData from Removable MediaExfiltration Over Other Network MediumStandard Application Layer Protocol3

Signature Overview

Click to jump to signature section


Phishing:

barindex
Found iframesShow sources
Source: https://www-am2.egnyte.com/corp/registration/lp-join-the-thousands.html?utm_source=hot-share-link-page&utm_medium=product&utm_content=overview-page&utm_campaign=file-sharing&georedirect=trueHTTP Parser: Iframe src: https://pages.egnyte.com/index.php/form/XDFrame
Source: https://www-am2.egnyte.com/corp/registration/lp-join-the-thousands.html?utm_source=hot-share-link-page&utm_medium=product&utm_content=overview-page&utm_campaign=file-sharing&georedirect=trueHTTP Parser: Iframe src: https://bid.g.doubleclick.net/xbbe/pixel?d=KAE
META author tag missingShow sources
Source: https://www-am2.egnyte.com/corp/registration/lp-join-the-thousands.html?utm_source=hot-share-link-page&utm_medium=product&utm_content=overview-page&utm_campaign=file-sharing&georedirect=trueHTTP Parser: No <meta name="author".. found
META copyright tag missingShow sources
Source: https://www-am2.egnyte.com/corp/registration/lp-join-the-thousands.html?utm_source=hot-share-link-page&utm_medium=product&utm_content=overview-page&utm_campaign=file-sharing&georedirect=trueHTTP Parser: No <meta name="copyright".. found

Networking:

barindex
Connects to many different domainsShow sources
Source: unknownNetwork traffic detected: DNS query count 43
Downloads files from webservers via HTTPShow sources
Source: global trafficHTTP traffic detected: GET /corp/registration/lp-join-the-thousands.html?utm_source=hot-share-link-page&utm_medium=product&utm_content=overview-page&utm_campaign=file-sharing HTTP/1.1Accept: text/html, application/xhtml+xml, image/jxr, */*Accept-Language: en-USUser-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; rv:11.0) like GeckoAccept-Encoding: gzip, deflateConnection: Keep-AliveHost: www.egnyte.comCookie: __utma=55272052.502342335.1544165322.1544165322.1544165322.1; __utmb=55272052.1.10.1544165322; __utmc=55272052; __utmz=55272052.1544165322.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmt=1
Found strings which match to known social media urlsShow sources
Source: lp-join-the-thousands[2].htm.2.drString found in binary or memory: <a href="https://twitter.com/Egnyte" target="_blank" title="Follow Egnyte on Twitter" class="fa fa-twitter" aria-hidden="true"></a><span class="sr-only">Follow Egnyte on Twitter</span></li> equals www.twitter.com (Twitter)
Source: lp-join-the-thousands[2].htm.2.drString found in binary or memory: <a href="https://www.facebook.com/Egnyte/" target="_blank" title="Follow Egnyte on Facebook" class="fa fa-facebook" aria-hidden="true"></a><span class="sr-only">Follow Egnyte on Facebook</span></li> equals www.facebook.com (Facebook)
Source: lp-join-the-thousands[2].htm.2.drString found in binary or memory: <a href="https://www.linkedin.com/company/egnyte" target="_blank" title="Follow Egnyte on LinkedIn" class="fa fa-linkedin" aria-hidden="true"></a><span class="sr-only">Follow Egnyte on LinkedIn</span> equals www.linkedin.com (Linkedin)
Source: publicdomains[1].json.2.drString found in binary or memory: "53.yahoo.com", equals www.yahoo.com (Yahoo)
Source: publicdomains[1].json.2.drString found in binary or memory: "75.yahoo.com", equals www.yahoo.com (Yahoo)
Source: publicdomains[1].json.2.drString found in binary or memory: "email.yahoo.com", equals www.yahoo.com (Yahoo)
Source: publicdomains[1].json.2.drString found in binary or memory: "www.yahoo.com", equals www.yahoo.com (Yahoo)
Source: registration.messages[1].js.2.drString found in binary or memory: NON_BUSINESS_EMAIL : 'Please enter a valid business email (no gmail, yahoo, etc.)', equals www.yahoo.com (Yahoo)
Source: gtm[1].js.2.drString found in binary or memory: "vtp_html":"\n\u003Cscript type=\"text\/gtmscript\"\u003Efor(var gtmYTPlayers=[],e=document.getElementsByTagName(\"iframe\"),x=e.length;x--;)\/youtube.com\\\/embed\/.test(e[x].src)\u0026\u0026-1===e[x].src.indexOf(\"enablejsapi\\x3d\")\u0026\u0026(e[x].src+=(-1===e[x].src.indexOf(\"?\")?\"?\":\"\\x26\")+\"enablejsapi\\x3d1\");function onYouTubeIframeAPIReady(){for(var b=document.getElementsByTagName(\"iframe\"),a=b.length;a--;)\/youtube.com\\\/embed\/.test(b[a].src)\u0026\u0026(gtmYTPlayers.push(new YT.Player(b[a],{events:{onStateChange:onPlayerStateChange,onError:onPlayerError}})),YT.gtmLastAction=\"p\")}\nfunction onPlayerStateChange(b){b.data==YT.PlayerState.PLAYING\u0026\u0026setTimeout(onPlayerPercent,1E3,b.target);var a=b.target.getVideoData();a=a.video_id+\":\"+a.title;b.data==YT.PlayerState.PLAYING\u0026\u0026\"p\"==YT.gtmLastAction\u0026\u0026(dataLayer.push({event:\"youtube\",eventCategory:\"youtube\",eventAction:\"play\",eventLabel:a}),YT.gtmLastAction=\"\");b.data==YT.PlayerState.PAUSED\u0026
Source: gtm[1].js.2.drString found in binary or memory: "vtp_html":"\u003Cscript data-gtmsrc=\"\/\/platform.twitter.com\/oct.js\" type=\"text\/gtmscript\"\u003E\u003C\/script\u003E\n\u003Cscript type=\"text\/gtmscript\"\u003Etwttr.conversion.trackPid(\"l4ruo\",{tw_sale_amount:0,tw_order_quantity:0});\u003C\/script\u003E\n\u003Cnoscript\u003E\n\u003Cimg height=\"1\" width=\"1\" style=\"display:none;\" alt=\"\" src=\"https:\/\/analytics.twitter.com\/i\/adsct?txn_id=l4ruo\u0026amp;p_id=Twitter\u0026amp;tw_sale_amount=0\u0026amp;tw_order_quantity=0\"\u003E\n\u003Cimg height=\"1\" width=\"1\" style=\"display:none;\" alt=\"\" src=\"\/\/t.co\/i\/adsct?txn_id=l4ruo\u0026amp;p_id=Twitter\u0026amp;tw_sale_amount=0\u0026amp;tw_order_quantity=0\"\u003E\n\u003C\/noscript\u003E", equals www.twitter.com (Twitter)
Source: gtm[1].js.2.drString found in binary or memory: "vtp_html":"\u003Cscript data-gtmsrc=\"\/\/platform.twitter.com\/oct.js\" type=\"text\/gtmscript\"\u003E\u003C\/script\u003E\n\u003Cscript type=\"text\/gtmscript\"\u003Etwttr.conversion.trackPid(\"l66cx\",{tw_sale_amount:0,tw_order_quantity:0});\u003C\/script\u003E\n\u003Cnoscript\u003E\n\u003Cimg height=\"1\" width=\"1\" style=\"display:none;\" alt=\"\" src=\"https:\/\/analytics.twitter.com\/i\/adsct?txn_id=l66cx\u0026amp;p_id=Twitter\u0026amp;tw_sale_amount=0\u0026amp;tw_order_quantity=0\"\u003E\n\u003Cimg height=\"1\" width=\"1\" style=\"display:none;\" alt=\"\" src=\"\/\/t.co\/i\/adsct?txn_id=l66cx\u0026amp;p_id=Twitter\u0026amp;tw_sale_amount=0\u0026amp;tw_order_quantity=0\"\u003E\n\u003C\/noscript\u003E", equals www.twitter.com (Twitter)
Source: gtm[1].js.2.drString found in binary or memory: "vtp_html":"\u003Cscript type=\"text\/gtmscript\" id=\"gtm-youtube-tracking\"\u003E(function(h,f,l){function n(){\"loading\"!==h.readyState?m():\"addEventListener\"in h?p(h,\"DOMContentLoaded\",m):p(f,\"load\",m)}function m(){var b=[].slice.call(h.getElementsByTagName(\"iframe\")).concat([].slice.call(h.getElementsByTagName(\"embed\"))),a;for(a=0;a\u003Cb.length;a++){var d=q(b[a]);if(d){d=b[a];var e=f.location,c=h.createElement(\"a\");c.href=d.src;c.hostname=\"www.youtube.com\";c.protocol=e.protocol;var g=\"\/\"===c.pathname.charAt(0)?c.pathname:\"\/\"+c.pathname;-1\u003Cc.search.indexOf(\"enablejsapi\")||(c.search=\n(0\u003Cc.search.length?c.search+\"\\x26\":\"\")+\"enablejsapi\\x3d1\");if(!(-1\u003Cc.search.indexOf(\"origin\"))\u0026\u0026-1===e.hostname.indexOf(\"localhost\")){var w=e.port?\":\"+e.port:\"\";e=e.protocol+\"%2F%2F\"+e.hostname+w;c.search=c.search+\"\\x26origin\\x3d\"+e}\"application\/x-shockwave-flash\"===d.type\u0026\u0026(e=h.createElement(\"iframe\"),e.height=d.height,e.width=d.width
Source: gtm[1].js.2.drString found in binary or memory: "vtp_html":"\u003Cscript type=\"text\/gtmscript\"\u003E!function(b,e,f,g,a,c,d){b.fbq||(a=b.fbq=function(){a.callMethod?a.callMethod.apply(a,arguments):a.queue.push(arguments)},b._fbq||(b._fbq=a),a.push=a,a.loaded=!0,a.version=\"2.0\",a.queue=[],c=e.createElement(f),c.async=!0,c.src=g,d=e.getElementsByTagName(f)[0],d.parentNode.insertBefore(c,d))}(window,document,\"script\",\"https:\/\/connect.facebook.net\/en_US\/fbevents.js\");fbq(\"init\",\"594814020675331\");fbq(\"track\",\"PageView\");\u003C\/script\u003E\n\u003Cnoscript\u003E\u003Cimg height=\"1\" width=\"1\" style=\"display:none\" src=\"https:\/\/www.facebook.com\/tr?id=594814020675331\u0026amp;ev=PageView\u0026amp;noscript=1\"\u003E\u003C\/noscript\u003E", equals www.facebook.com (Facebook)
Source: gtm[1].js.2.drString found in binary or memory: "vtp_javascript":["template","(function(){for(var a=document.getElementsByTagName(\"iframe\"),b=a.length;b--;)if(\/youtube.com\\\/embed\/.test(a[b].src))return!0;return!1})();"] equals www.youtube.com (Youtube)
Source: bootstrap.min[1].css.2.drString found in binary or memory: * Copyright 2011-2016 Twitter, Inc. equals www.twitter.com (Twitter)
Source: fbevents[1].js.2.drString found in binary or memory: * As with any software that integrates with the Facebook platform, your use of equals www.facebook.com (Facebook)
Source: fbevents[1].js.2.drString found in binary or memory: * Copyright (c) 2017-present, Facebook, Inc. All rights reserved. equals www.facebook.com (Facebook)
Source: fbevents[1].js.2.drString found in binary or memory: * [http://developers.facebook.com/policy/]. This copyright notice shall be equals www.facebook.com (Facebook)
Source: fbevents[1].js.2.drString found in binary or memory: * in connection with the web services and APIs provided by Facebook. equals www.facebook.com (Facebook)
Source: fbevents[1].js.2.drString found in binary or memory: * this software is subject to the Facebook Platform Policy equals www.facebook.com (Facebook)
Source: msapplication.xml0.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xf67f96b8,0x01d48df8</date><accdate>0xf67f96b8,0x01d48df8</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml0.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.facebook.com/"/><date>0xf67f96b8,0x01d48df8</date><accdate>0xf6820591,0x01d48df8</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Facebook.url"/></tile></msapplication></browserconfig> equals www.facebook.com (Facebook)
Source: msapplication.xml5.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xf68f1630,0x01d48df8</date><accdate>0xf68f1630,0x01d48df8</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml5.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.twitter.com/"/><date>0xf68f1630,0x01d48df8</date><accdate>0xf6918a02,0x01d48df8</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Twitter.url"/></tile></msapplication></browserconfig> equals www.twitter.com (Twitter)
Source: msapplication.xml7.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xf693fdf4,0x01d48df8</date><accdate>0xf693fdf4,0x01d48df8</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: msapplication.xml7.1.drString found in binary or memory: <browserconfig><msapplication><config><site src="http://www.youtube.com/"/><date>0xf693fdf4,0x01d48df8</date><accdate>0xf6965d11,0x01d48df8</accdate></config><tile><wide310x150logo/><square310x310logo/><square70x70logo/><favorite src="C:\Users\user\Favorites\Youtube.url"/></tile></msapplication></browserconfig> equals www.youtube.com (Youtube)
Source: insight.min[1].js.2.drString found in binary or memory: PixelLogger=function(d){function a(){return a.__super__.constructor.apply(this,arguments)}__extends(a,d);a.https_path="https://px.ads.linkedin.com/insight_tag_errors.gif";a.log=function(b,c){var e,f;e=this.map_error_data(c,"&",encodeURIComponent);f=new Image(1,1);f.src=""+this.https_path+"?"+e;return f};return a}(BaseLogger); equals www.linkedin.com (Linkedin)
Source: www-widgetapi[1].js.2.drString found in binary or memory: Wa.prototype.g=function(a){if(a.origin==V(this,"host")||a.origin==V(this,"host").replace(/^http:/,"https:")){try{var b=JSON.parse(a.data)}catch(c){return}this.c=!0;this.a||0!=a.origin.indexOf("https:")||(this.a=!0);if(a=U[b.id])a.A=!0,a.A&&(y(a.s,a.B,a),a.s.length=0),a.H(b)}};function W(a,b,c){this.h=this.a=this.b=null;this.g=this[r]||(this[r]=++t);this.c=0;this.A=!1;this.s=[];this.f=null;this.l=c;this.m={};c=document;if(a=l(a)?c.getElementById(a):a)if(c="iframe"==a.tagName.toLowerCase(),b.host||(b.host=c?Ba(a.src):"https://www.youtube.com"),this.b=new Wa(b),c||(b=Ya(this,a),this.h=a,(c=a.parentNode)&&c.replaceChild(b,a),a=b),this.a=a,this.a.id||(a=b=this.a,a=a[r]||(a[r]=++t),b.id="widget"+a),R[this.a.id]=this,window.postMessage){this.f=new M;Za(this);b=V(this.b,"events"); equals www.youtube.com (Youtube)
Source: www-widgetapi[1].js.2.drString found in binary or memory: h.B=function(a){a.id=this.g;a.channel="widget";a=xa(a);var b=this.b;var c=Ba(this.a.src);b=0==c.indexOf("https:")?[c]:b.a?[c.replace("http:","https:")]:b.c?[c]:[c,c.replace("http:","https:")];if(!this.a.contentWindow)throw Error("The YouTube player is not attached to the DOM.");for(c=0;c<b.length;c++)try{this.a.contentWindow.postMessage(a,b[c])}catch(d){if(d.name&&"SyntaxError"==d.name)Ha(d,"WARNING");else throw d;}};function bb(a){return(0==a.search("cue")||0==a.search("load"))&&"loadModule"!=a} equals www.youtube.com (Youtube)
Source: iframe_api[1].js.2.drString found in binary or memory: if (!window['YT']) {var YT = {loading: 0,loaded: 0};}if (!window['YTConfig']) {var YTConfig = {'host': 'http://www.youtube.com'};}if (!YT.loading) {YT.loading = 1;(function(){var l = [];YT.ready = function(f) {if (YT.loaded) {f();} else {l.push(f);}};window.onYTReady = function() {YT.loaded = 1;for (var i = 0; i < l.length; i++) {try {l[i]();} catch (e) {}}};YT.setConfig = function(c) {for (var k in c) {if (c.hasOwnProperty(k)) {YTConfig[k] = c[k];}}};var a = document.createElement('script');a.type = 'text/javascript';a.id = 'www-widgetapi-script';a.src = 'https://s.ytimg.com/yts/jsbin/www-widgetapi-vflxGrywa/www-widgetapi.js';a.async = true;var c = document.currentScript;if (c) {var n = c.nonce || c.getAttribute('nonce');if (n) {a.setAttribute('nonce', n);}}var b = document.getElementsByTagName('script')[0];b.parentNode.insertBefore(a, b);})();} equals www.youtube.com (Youtube)
Source: insight.min[1].js.2.drString found in binary or memory: true};d.prototype.get_pixli_url=function(){return""+this.tag_settings.data.protocol+"//"+(this.tag_settings.data.test_url||"px.ads.linkedin.com")+"/collect/"};d.prototype.create_query_string=function(){var a,b;a=this.first_party_id_manager.li_fat_id;b=new ParamBuilder(this.tag_settings);a!=null&&b.add_li_fat_id(a);return QueryStringBuilder.build(b.build())};d.prototype.write_tags_to_dom=function(){var a,b;a=this.create_query_string();a=""+this.get_pixli_url()+"?"+a;b=this.context.doc.body;if(this.tag_settings.data.use_iframe!= equals www.linkedin.com (Linkedin)
Performs DNS lookupsShow sources
Source: unknownDNS traffic detected: queries for: docsusignnet.egnyte.com
Urls found in memory or binary dataShow sources
Source: roundtrip[1].js.2.drString found in binary or memory: http://d.adroll.com/consent/choices
Source: animate[1].css.2.drString found in binary or memory: http://daneden.me/animate
Source: font-awesome.min[1].css0.2.drString found in binary or memory: http://fontawesome.io
Source: font-awesome.min[1].css0.2.drString found in binary or memory: http://fontawesome.io/license
Source: bootstrap.min[1].css.2.drString found in binary or memory: http://getbootstrap.com)
Source: sessioncam.recorder[1].js.2.drString found in binary or memory: http://github.com/flowersinthesand/jquery-stringifyJSON
Source: slick.min[1].js.2.drString found in binary or memory: http://github.com/kenwheeler/slick
Source: slick.min[1].js.2.drString found in binary or memory: http://github.com/kenwheeler/slick/issues
Source: sessioncam.recorder[1].js.2.dr, jquery-1.11.1[1].js0.2.drString found in binary or memory: http://jquery.com/
Source: sessioncam.recorder[1].js.2.dr, jquery-1.11.1[1].js0.2.drString found in binary or memory: http://jquery.org/license
Source: jquery-ui-1.10.3.custom.min[1].js.2.drString found in binary or memory: http://jqueryui.com
Source: slick.min[1].js.2.drString found in binary or memory: http://kenwheeler.github.io
Source: slick.min[1].js.2.drString found in binary or memory: http://kenwheeler.github.io/slick
Source: animate[1].css.2.drString found in binary or memory: http://opensource.org/licenses/MIT
Source: sessioncam.recorder[1].js.2.drString found in binary or memory: http://plugins.jquery.com/project/dataSelector
Source: sessioncam.recorder[1].js.2.dr, jquery-1.11.1[1].js0.2.drString found in binary or memory: http://sizzlejs.com/
Source: passwordStrength[1].js0.2.drString found in binary or memory: http://stackoverflow.com/questions/3446170/escape-string-for-use-in-javascript-regex
Source: underscore-min[1].js.2.drString found in binary or memory: http://underscorejs.org
Source: enquire.min[1].js.2.drString found in binary or memory: http://wicky.nillia.ms/enquire.js
Source: msapplication.xml.1.drString found in binary or memory: http://www.amazon.com/
Source: select2.min[1].js.2.dr, sessioncam.recorder[1].js.2.drString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: lp-join-the-thousands[2].htm.2.drString found in binary or memory: http://www.bbb.org/sanjose/business-reviews/computers-disaster-recovery/egnyte-in-mountain-view-ca-2
Source: bookmarkscroll[2].js.2.drString found in binary or memory: http://www.dynamicdrive.com.
Source: bookmarkscroll[2].js.2.drString found in binary or memory: http://www.dynamicdrive.com/
Source: register-lp-online-file-sharing[1].htm.2.drString found in binary or memory: http://www.egnyte.com/corp/registration/lp-join-the-thousands.html?utm_source=hot-share-link-page&am
Source: select2.min[1].js.2.drString found in binary or memory: http://www.gnu.org/licenses/gpl-2.0.html
Source: ga[1].js.2.drString found in binary or memory: http://www.google-analytics.com
Source: msapplication.xml1.1.drString found in binary or memory: http://www.google.com/
Source: lp-join-the-thousands[2].htm.2.drString found in binary or memory: http://www.hhs.gov/ocr/privacy/index.html
Source: msapplication.xml2.1.drString found in binary or memory: http://www.live.com/
Source: msapplication.xml3.1.drString found in binary or memory: http://www.nytimes.com/
Source: enquire.min[1].js.2.drString found in binary or memory: http://www.opensource.org/licenses/mit-license.php)
Source: select2[1].css.2.drString found in binary or memory: http://www.quirksmode.org/css/box.html
Source: msapplication.xml4.1.drString found in binary or memory: http://www.reddit.com/
Source: pwd_meter[1].js.2.drString found in binary or memory: http://www.todnem.com/)
Source: msapplication.xml5.1.drString found in binary or memory: http://www.twitter.com/
Source: msapplication.xml6.1.drString found in binary or memory: http://www.wikipedia.com/
Source: iframe_api[1].js.2.drString found in binary or memory: http://www.youtube.com
Source: msapplication.xml7.1.drString found in binary or memory: http://www.youtube.com/
Source: gtm[1].js.2.drString found in binary or memory: https://adservice.google.com/ddm/regclk
Source: analytics[1].js.2.drString found in binary or memory: https://ampcid.google.com/v1/publisher:getClientId
Source: {1E0C4A92-F9EC-11E8-AAD9-C25F135D3C65}.dat.1.drString found in binary or memory: https://bid.g.doubleclick.net/xbbe/pixel?d=KAE
Source: forms2[1].css.2.drString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=33654
Source: roundtrip[1].js.2.drString found in binary or memory: https://d.adroll.com
Source: roundtrip[1].js.2.drString found in binary or memory: https://d.adroll.com/id/
Source: roundtrip[1].js.2.drString found in binary or memory: https://d.adroll.com/uat/
Source: roundtrip[1].js.2.drString found in binary or memory: https://d.adroll.com/uev/
Source: recaptcha__en[1].js.2.drString found in binary or memory: https://developers.google.com/recaptcha/docs/faq#localhost_support
Source: recaptcha__en[1].js.2.drString found in binary or memory: https://developers.google.com/recaptcha/docs/faq#my-computer-or-network-may-be-sending-automated-que
Source: munchkin[2].js.2.drString found in binary or memory: https://developers.marketo.com/MunchkinLicense.pdf
Source: {1E0C4A92-F9EC-11E8-AAD9-C25F135D3C65}.dat.1.drString found in binary or memory: https://docsusignnet.e
Source: {1E0C4A92-F9EC-11E8-AAD9-C25F135D3C65}.dat.1.drString found in binary or memory: https://docsusignnet.egnyte.com/Root
Source: imagestore.dat.2.drString found in binary or memory: https://docsusignnet.egnyte.com/images/egnyte.ico?v=1~
Source: {1E0C4A92-F9EC-11E8-AAD9-C25F135D3C65}.dat.1.dr, ~DF8012E0CFB03F1C8F.TMP.1.drString found in binary or memory: https://docsusignnet.egnyte.com/nolink.jsp
Source: {1E0C4A92-F9EC-11E8-AAD9-C25F135D3C65}.dat.1.drString found in binary or memory: https://docsusignnet.egnyte.com/nolink.jsp#
Source: ~DF8012E0CFB03F1C8F.TMP.1.drString found in binary or memory: https://docsusignnet.egnyte.com/nolink.jsp#/lp-join-the-thousands.html?utm_source=hot-share-link-pag
Source: {1E0C4A92-F9EC-11E8-AAD9-C25F135D3C65}.dat.1.drString found in binary or memory: https://docsusignnet.egnyte.com/nolink.jsp8Eg.com/corp/registration/lp-join-tnolink.jsp
Source: {1E0C4A92-F9EC-11E8-AAD9-C25F135D3C65}.dat.1.drString found in binary or memory: https://docsusignnet.egnyte.com/nolink.jsp8Eg/corp/registration/lp-join-the-tnolink.jsp
Source: {1E0C4A92-F9EC-11E8-AAD9-C25F135D3C65}.dat.1.drString found in binary or memory: https://docsusignnet.egnyte.com/nolink.jsp8EgRoot
Source: {1E0C4A92-F9EC-11E8-AAD9-C25F135D3C65}.dat.1.drString found in binary or memory: https://docsusignnet.egnyte.com/nolink.jsp8Eggnyte.com/nolink.jsp#/lp-join-tnolink.jsp
Source: {1E0C4A92-F9EC-11E8-AAD9-C25F135D3C65}.dat.1.drString found in binary or memory: https://docsusignnet.egnyte.com/nolink.jsp8Egnolink.jsp
Source: {1E0C4A92-F9EC-11E8-AAD9-C25F135D3C65}.dat.1.drString found in binary or memory: https://docsusignnet.egnyte.com/nolink.jsp8Egnyte
Source: {1E0C4A92-F9EC-11E8-AAD9-C25F135D3C65}.dat.1.drString found in binary or memory: https://docsusignnet.egnyte.com/nolink.jspRoot
Source: {1E0C4A92-F9EC-11E8-AAD9-C25F135D3C65}.dat.1.drString found in binary or memory: https://docsusignnet.egnyte.com/nolink.jspgnyte.com/nolink.jspRoot
Source: {1E0C4A92-F9EC-11E8-AAD9-C25F135D3C65}.dat.1.drString found in binary or memory: https://docsusignnet.egnyte.com/nolink.jspv
Source: lp-join-the-thousands[2].htm.2.drString found in binary or memory: https://fonts.googleapis.com/css?family=Open
Source: css[1].css.2.drString found in binary or memory: https://fonts.gstatic.com/s/opensans/v15/mem5YaGs126MiZpBA-UN7rgOUuhv.woff)
Source: css[1].css.2.drString found in binary or memory: https://fonts.gstatic.com/s/opensans/v15/mem5YaGs126MiZpBA-UN_r8OUuhv.woff)
Source: css[1].css.2.drString found in binary or memory: https://fonts.gstatic.com/s/opensans/v15/mem5YaGs126MiZpBA-UNirkOUuhv.woff)
Source: css[1].css.2.drString found in binary or memory: https://fonts.gstatic.com/s/opensans/v15/mem8YaGs126MiZpBA-UFVZ0d.woff)
Source: css[1].css.2.drString found in binary or memory: https://fonts.gstatic.com/s/opensans/v15/memnYaGs126MiZpBA-UFUKWyV9hrIqU.woff)
Source: gtm[1].js.2.drString found in binary or memory: https://github.com/krux/postscribe/blob/master/LICENSE.
Source: animate[1].css.2.drString found in binary or memory: https://github.com/nickpettit/glide
Source: bootstrap.min[1].css.2.drString found in binary or memory: https://github.com/twbs/bootstrap/blob/master/LICENSE)
Source: lp-join-the-thousands[2].htm.2.drString found in binary or memory: https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css
Source: lp-join-the-thousands[2].htm.2.drString found in binary or memory: https://maxcdn.bootstrapcdn.com/font-awesome/4.6.3/css/font-awesome.min.css
Source: lp-join-the-thousands[2].htm.2.drString found in binary or memory: https://oss.maxcdn.com/libs/html5shiv/3.7.0/html5shiv.js
Source: lp-join-the-thousands[2].htm.2.drString found in binary or memory: https://oss.maxcdn.com/libs/respond.js/1.3.0/respond.min.js
Source: lp-join-the-thousands[2].htm.2.drString found in binary or memory: https://pages.egnyte.com
Source: {1E0C4A92-F9EC-11E8-AAD9-C25F135D3C65}.dat.1.drString found in binary or memory: https://pages.egnyte.com/index.php/form/XDFrame
Source: lp-join-the-thousands[2].htm.2.drString found in binary or memory: https://pages.egnyte.com/js/forms2/js/forms2.min.js
Source: roundtrip[1].js.2.drString found in binary or memory: https://pixel.cdnwidget.com/cdn/c.min.js?data-gdis=1&data-apikey=afaa2674&id=c.js&data-adcb=adroll_c
Source: lp-join-the-thousands[2].htm.2.drString found in binary or memory: https://player.vimeo.com/video/160936214?autoplay=1
Source: lp-join-the-thousands[2].htm.2.drString found in binary or memory: https://player.vimeo.com/video/181860200?autoplay=1
Source: lp-join-the-thousands[2].htm.2.drString found in binary or memory: https://player.vimeo.com/video/202085562?autoplay=1
Source: lp-join-the-thousands[2].htm.2.drString found in binary or memory: https://privacy-policy.truste.com/privacy-seal/seal?rid=607817b6-24c3-4a95-a179-a9ac4c708cb3
Source: lp-join-the-thousands[1].htm0.2.drString found in binary or memory: https://privacy-policy.truste.com/privacy-seal/seal?rid=e96065ef-dca4-4e6e-9b05-58a08a2db21c
Source: lp-join-the-thousands[2].htm.2.drString found in binary or memory: https://privacy.truste.com/privacy-seal/validation?rid=607817b6-24c3-4a95-a179-a9ac4c708cb3
Source: lp-join-the-thousands[1].htm0.2.drString found in binary or memory: https://privacy.truste.com/privacy-seal/validation?rid=e96065ef-dca4-4e6e-9b05-58a08a2db21c
Source: insight.min[1].js.2.drString found in binary or memory: https://px.ads.linkedin.com/insight_tag_errors.gif
Source: roundtrip[1].js.2.drString found in binary or memory: https://s.adroll.com
Source: roundtrip[1].js.2.drString found in binary or memory: https://s.adroll.com/j/exp/
Source: iframe_api[1].js.2.drString found in binary or memory: https://s.ytimg.com/yts/jsbin/www-widgetapi-vflxGrywa/www-widgetapi.js
Source: ga[1].js.2.drString found in binary or memory: https://ssl.google-analytics.com
Source: ga[1].js.2.drString found in binary or memory: https://ssl.google-analytics.com/j/__utm.gif
Source: analytics[1].js.2.drString found in binary or memory: https://stats.g.doubleclick.net/j/collect
Source: ga[1].js.2.drString found in binary or memory: https://stats.g.doubleclick.net/j/collect?
Source: analytics[1].js.2.drString found in binary or memory: https://stats.g.doubleclick.net/r/collect?t=dc&aip=1&_r=3&
Source: MarketoAdwordHelper[1].js.2.drString found in binary or memory: https://support.google.com/adwords/answer/6299296
Source: recaptcha__en[1].js.2.drString found in binary or memory: https://support.google.com/recaptcha
Source: recaptcha__en[1].js.2.drString found in binary or memory: https://support.google.com/recaptcha#6262736
Source: recaptcha__en[1].js.2.drString found in binary or memory: https://support.google.com/recaptcha/#6175971
Source: recaptcha__en[1].js.2.drString found in binary or memory: https://support.google.com/recaptcha/?hl=en#6223828
Source: lp-join-the-thousands[2].htm.2.drString found in binary or memory: https://twitter.com/Egnyte
Source: 50310928[1].js.2.drString found in binary or memory: https://vimeo.com/
Source: 50310928[1].js.2.drString found in binary or memory: https://vimeo.com/api/oembed.json?url=
Source: lp-join-the-thousands[2].htm.2.drString found in binary or memory: https://vimeo.com/egnyte
Source: sessioncam.recorder[1].js.2.drString found in binary or memory: https://ws.sessioncam.com/Record
Source: {1E0C4A92-F9EC-11E8-AAD9-C25F135D3C65}.dat.1.drString found in binary or memory: https://www-am2.egnyte
Source: imagestore.dat.2.drString found in binary or memory: https://www-am2.egnyte.com/common/images/egnyte.ico~
Source: {1E0C4A92-F9EC-11E8-AAD9-C25F135D3C65}.dat.1.dr, lp-join-the-thousands[2].htm.2.drString found in binary or memory: https://www-am2.egnyte.com/corp/registration/lp-join-the-thousands.html?utm_source=hot-share-link-pa
Source: {1E0C4A92-F9EC-11E8-AAD9-C25F135D3C65}.dat.1.drString found in binary or memory: https://www.egnyte.com
Source: lp-join-the-thousands[2].htm.2.dr, lp-join-the-thousands[1].htm0.2.drString found in binary or memory: https://www.egnyte.com/corp/privacy_policy.html
Source: lp-join-the-thousands[1].htm.2.drString found in binary or memory: https://www.egnyte.com/corp/registration/lp-join-the-thousands.html?utm_source=hot-share-link-page&a
Source: {1E0C4A92-F9EC-11E8-AAD9-C25F135D3C65}.dat.1.dr, ~DF8012E0CFB03F1C8F.TMP.1.drString found in binary or memory: https://www.egnyte.com/corp/registration/lp-join-the-thousands.html?utm_source=hot-share-link-page&u
Source: {1E0C4A92-F9EC-11E8-AAD9-C25F135D3C65}.dat.1.drString found in binary or memory: https://www.egnyte.com/corp/registration/lp-join-the-tv
Source: nolink[1].htm.2.drString found in binary or memory: https://www.egnyte.com/corp/registration/register-lp-online-file-sharing.html?utm_source=hot-share-l
Source: lp-join-the-thousands[2].htm.2.dr, lp-join-the-thousands[1].htm0.2.drString found in binary or memory: https://www.egnyte.com/corp/terms_of_service.html
Source: publicPageCommons[1].js0.2.drString found in binary or memory: https://www.egnyte.com/wsgi/route_to_dc?target=/corp/registration/lp-join-the-thousands.html&utm_sou
Source: {1E0C4A92-F9EC-11E8-AAD9-C25F135D3C65}.dat.1.drString found in binary or memory: https://www.egnyte.comgnyte.com/nolink.jspv
Source: analytics[1].js.2.drString found in binary or memory: https://www.google-analytics.com/analytics
Source: analytics[1].js.2.drString found in binary or memory: https://www.google-analytics.com/gtm/js?id=
Source: analytics[1].js.2.drString found in binary or memory: https://www.google-analytics.com/u/d
Source: analytics[1].js.2.drString found in binary or memory: https://www.google.%/ads/ga-audiences
Source: ga[1].js.2.drString found in binary or memory: https://www.google.%/ads/ga-audiences?
Source: f[1].txt0.2.drString found in binary or memory: https://www.google.ch/pagead/1p-user-list/1044965931/?random
Source: ga[1].js.2.dr, analytics[1].js.2.drString found in binary or memory: https://www.google.com/analytics/web/inpage/pub/inpage.js?
Source: recaptcha__en[1].js.2.drString found in binary or memory: https://www.google.com/intl/
Source: f[1].txt0.2.drString found in binary or memory: https://www.google.com/pagead/1p-user-list/1044965931/?random
Source: recaptcha__en[1].js.2.drString found in binary or memory: https://www.google.com/recaptcha/
Source: lp-join-the-thousands[2].htm.2.drString found in binary or memory: https://www.google.com/recaptcha/api.js?onload=onGoogleReCaptchaLoadCallback&render=explicit
Source: lp-join-the-thousands[2].htm.2.drString found in binary or memory: https://www.googletagmanager.com/gtm.js?id=
Source: lp-join-the-thousands[2].htm.2.drString found in binary or memory: https://www.googletagmanager.com/ns.html?id=GTM-TJ3NMS
Source: api[1].js0.2.drString found in binary or memory: https://www.gstatic.com/recaptcha/api2/v1542004393985/recaptcha__en.js
Source: lp-join-the-thousands[2].htm.2.drString found in binary or memory: https://www.linkedin.com/company/egnyte
Source: www-widgetapi[1].js.2.drString found in binary or memory: https://www.youtube.com
Uses HTTPSShow sources
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49865
Source: unknownNetwork traffic detected: HTTP traffic on port 49890 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49862
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49861
Source: unknownNetwork traffic detected: HTTP traffic on port 49878 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49912 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49795 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49826 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49859
Source: unknownNetwork traffic detected: HTTP traffic on port 49906 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49849 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49881 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49857
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49856
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49855
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49854
Source: unknownNetwork traffic detected: HTTP traffic on port 49889 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49853
Source: unknownNetwork traffic detected: HTTP traffic on port 49866 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49850
Source: unknownNetwork traffic detected: HTTP traffic on port 49820 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49872 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49893 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49855 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49915 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49909 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49823 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49806 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49798 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49849
Source: unknownNetwork traffic detected: HTTP traffic on port 49861 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49848
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49847
Source: unknownNetwork traffic detected: HTTP traffic on port 49886 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49869 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49924 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49819 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49918 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49873 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49892 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49828 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49850 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49831 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49904 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49847 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49921 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49833
Source: unknownNetwork traffic detected: HTTP traffic on port 49887 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49832
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49798
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49831
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49797
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49830
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49796
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49795
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
Source: unknownNetwork traffic detected: HTTP traffic on port 49822 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49791
Source: unknownNetwork traffic detected: HTTP traffic on port 49870 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49856 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49910 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49853 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49913 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49796 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49825 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49808 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49829
Source: unknownNetwork traffic detected: HTTP traffic on port 49811 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49828
Source: unknownNetwork traffic detected: HTTP traffic on port 49884 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49827
Source: unknownNetwork traffic detected: HTTP traffic on port 49907 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49826
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49825
Source: unknownNetwork traffic detected: HTTP traffic on port 49867 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49824
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49823
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49822
Source: unknownNetwork traffic detected: HTTP traffic on port 49865 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49821
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49820
Source: unknownNetwork traffic detected: HTTP traffic on port 49922 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49859 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49916 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49871 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49894 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49833 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49819
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49818
Source: unknownNetwork traffic detected: HTTP traffic on port 49810 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49791 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49868 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49885 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49811
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49810
Source: unknownNetwork traffic detected: HTTP traffic on port 49862 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49894
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49893
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49892
Source: unknownNetwork traffic detected: HTTP traffic on port 49919 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49891
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49890
Source: unknownNetwork traffic detected: HTTP traffic on port 49879 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49827 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49911 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49809
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49808
Source: unknownNetwork traffic detected: HTTP traffic on port 49830 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49806
Source: unknownNetwork traffic detected: HTTP traffic on port 49848 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49805
Source: unknownNetwork traffic detected: HTTP traffic on port 49882 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
Source: unknownNetwork traffic detected: HTTP traffic on port 49905 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49803
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49924
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49923
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49889
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49922
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49888
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49921
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49887
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49920
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49886
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49885
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49884
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49883
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49882
Source: unknownNetwork traffic detected: HTTP traffic on port 49821 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49881
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49880
Source: unknownNetwork traffic detected: HTTP traffic on port 49857 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49877 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49854 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49914 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49797 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49908 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49824 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49919
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49918
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49917
Source: unknownNetwork traffic detected: HTTP traffic on port 49809 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49883 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49916
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49915
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49914
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49913
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49879
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49912
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49878
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49911
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49877
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49910
Source: unknownNetwork traffic detected: HTTP traffic on port 49891 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49874
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49873
Source: unknownNetwork traffic detected: HTTP traffic on port 49923 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49872
Source: unknownNetwork traffic detected: HTTP traffic on port 49818 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49871
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49870
Source: unknownNetwork traffic detected: HTTP traffic on port 49917 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49874 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49829 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49880 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49832 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49909
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49908
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49907
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49906
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49905
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49904
Source: unknownNetwork traffic detected: HTTP traffic on port 49920 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49903
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49869
Source: unknownNetwork traffic detected: HTTP traffic on port 49903 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49868
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49867
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49866
Source: unknownNetwork traffic detected: HTTP traffic on port 49888 -> 443

System Summary:

barindex
Classification labelShow sources
Source: classification engineClassification label: clean1.win@3/196@43/33
Creates files inside the user directoryShow sources
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\HighJump to behavior
Creates temporary filesShow sources
Source: C:\Program Files\internet explorer\iexplore.exeFile created: C:\Users\user\AppData\Local\Temp\~DF55FCED23A71876B5.TMPJump to behavior
Reads ini filesShow sources
Source: C:\Program Files\internet explorer\iexplore.exeFile read: C:\Users\desktop.iniJump to behavior
Spawns processesShow sources
Source: unknownProcess created: C:\Program Files\internet explorer\iexplore.exe 'C:\Program Files\Internet Explorer\iexplore.exe' -Embedding
Source: unknownProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2788 CREDAT:17410 /prefetch:2
Source: C:\Program Files\internet explorer\iexplore.exeProcess created: C:\Program Files (x86)\Internet Explorer\iexplore.exe 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:2788 CREDAT:17410 /prefetch:2Jump to behavior
Found graphical window changes (likely an installer)Show sources
Source: Window RecorderWindow detected: More than 3 window changes detected
Uses new MSVCR DllsShow sources
Source: C:\Program Files (x86)\Internet Explorer\iexplore.exeFile opened: C:\Program Files (x86)\Java\jre1.8.0_171\bin\msvcr100.dllJump to behavior

Malware Analysis System Evasion:

barindex
May try to detect the virtual machine to hinder analysis (VM artifact strings found in memory)Show sources
Source: registration.helper[1].js.2.drBinary or memory string: //To be removed in future after the revamp of VMWare registration flow.
Source: registration.core[1].js.2.drBinary or memory string: VMWARE: 'vmware',
Source: registration.helper[1].js.2.drBinary or memory string: return ((typeof isVM != 'undefined' && isVM === 'true') || ($("#hidFromVMWAREminisite").length > 0 && $.trim($("#hidFromVMWAREminisite").val()) === 'true'));
Source: registration.helper[1].js.2.drBinary or memory string: promotionCode = 'vmware-go';

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
behaviorgraph top1 process2 2 Behavior Graph ID: 96287 URL: https://docsusignnet.egnyte.com/dl/XgvBJA92Ez Startdate: 06/12/2018 Architecture: WINDOWS Score: 1 5 iexplore.exe 10 84 2->5         started        process3 7 iexplore.exe 3 256 5->7         started        dnsIp4 10 spdc-global.pbp.gysm.yahoodns.net 188.125.66.33, 443, 49873, 49874 YAHOO-IRDGB United Kingdom 7->10 12 s.gycs.b.yahoodns.net 87.248.116.11, 443, 49855, 49856 YAHOO-AMANL United Kingdom 7->12 14 69 other IPs or domains 7->14

Simulations

Behavior and APIs

No simulations

Antivirus Detection

Initial Sample

SourceDetectionScannerLabelLink
https://docsusignnet.egnyte.com/dl/XgvBJA92Ez0%virustotalBrowse

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

SourceDetectionScannerLabelLink
sj07b.mktossl.com0%virustotalBrowse

URLs

SourceDetectionScannerLabelLink
http://www.todnem.com/)0%virustotalBrowse
http://www.todnem.com/)0%Avira URL Cloudsafe
https://docsusignnet.e0%Avira URL Cloudsafe
https://www.egnyte.comgnyte.com/nolink.jspv0%Avira URL Cloudsafe
https://www-am2.egnyte0%Avira URL Cloudsafe

Yara Overview

Initial Sample

No yara matches

PCAP (Network Traffic)

No yara matches

Dropped Files

No yara matches

Memory Dumps

No yara matches

Unpacked PEs

No yara matches

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

Dropped Files

No context

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.