<<

ID: 219320 Cookbook: browseurl.jbs Time: 00:06:44 Date: 01/04/2020 Version: 28.0.0 Lapis Lazuli Table of Contents

Table of Contents 2 Analysis Report http://ib.adnxs.com 4 Overview 4 General Information 4 Detection 5 Confidence 5 Classification Spiderchart 6 Analysis Advice 6 Mitre Att&ck Matrix 7 Signature Overview 7 Networking: 7 System Summary: 7 Malware Analysis System Evasion: 8 Malware Configuration 8 Behavior Graph 8 Simulations 8 Behavior and APIs 8 Antivirus, Machine Learning and Genetic Malware Detection 8 Initial Sample 8 Dropped Files 9 Unpacked PE Files 9 Domains 9 URLs 9 Yara Overview 10 Initial Sample 10 PCAP (Network Traffic) 10 Dropped Files 10 Memory Dumps 10 Unpacked PEs 10 Sigma Overview 10 Joe Sandbox View / Context 10 IPs 10 Domains 10 ASN 10 JA3 Fingerprints 10 Dropped Files 11 Screenshots 11 Thumbnails 11 Startup 12 Created / dropped Files 12 Domains and IPs 41 Contacted Domains 41 Contacted URLs 41 URLs from Memory and Binaries 42 Contacted IPs 44 Public 44 Static File Info 45 No static file info 45 Network Behavior 45 Network Port Distribution 45 TCP Packets 45 UDP Packets 47 DNS Queries 49 DNS Answers 49 HTTP Request Dependency Graph 53 HTTP Packets 53 HTTPS Packets 54 Copyright Joe Security LLC 2020 Page 2 of 64 Code Manipulations 63 Statistics 63 Behavior 63 System Behavior 63 Analysis Process: iexplore.exe PID: 4776 Parent PID: 696 63 General 63 File Activities 63 Registry Activities 64 Analysis Process: iexplore.exe PID: 2872 Parent PID: 4776 64 General 64 File Activities 64 Registry Activities 64 Disassembly 64

Copyright Joe Security LLC 2020 Page 3 of 64 Analysis Report http://ib.adnxs.com

Overview

General Information

Joe Sandbox Version: 28.0.0 Lapis Lazuli Analysis ID: 219320 Start date: 01.04.2020 Start time: 00:06:44 Joe Sandbox Product: CloudBasic Overall analysis duration: 0h 6m 35s Hypervisor based Inspection enabled: false Report type: light Cookbook file name: browseurl.jbs Sample URL: ib.adnxs.com Analysis system description: Windows 10 64 bit (version 1803) with Office 2016, Adobe Reader DC 19, Chrome 70, 63, Java 8.171, Flash 30.0.0.113 Number of analysed new started processes analysed: 8 Number of new started drivers analysed: 0 Number of existing processes analysed: 0 Number of existing drivers analysed: 0 Number of injected processes analysed: 1 Technologies: EGA enabled Analysis stop reason: Timeout Detection: CLEAN Classification: clean0.win@3/169@26/18 Cookbook Comments: Adjust boot time Enable AMSI Browsing link: https://www.app nexus.com/en/error#main-content Browsing link: https://www.appnexus.com/ Browsing link: https://www.appnexus.com/careers Browsing link: https://www.app nexus.com/careers/life-at-appnexus Browsing link: https://www.app nexus.com/careers/teams Browsing link: https://www.app nexus.com/careers/getting-hired Browsing link: https://www.app nexus.com/careers/students Browsing link: https://xandr.att.jobs/search-jobs Browsing link: https://console.appnexus.com/login Browsing link: https://openadstream- eu1.247realmedia.com/oas/ Browsing link: https://openads tream17.247realmedia.com/oas/

Copyright Joe Security LLC 2020 Page 4 of 64 Warnings: Show All Exclude process from analysis (whitelisted): taskhostw.exe, dllhost.exe, consent.exe, ielowutil.exe, WMIADAP.exe, svchost.exe TCP Packets have been reduced to 100 Created / dropped Files have been reduced to 100 Excluded IPs from analysis (whitelisted): 23.66.21.99, 216.58.208.46, 172.217.18.10, 151.101.2.110, 151.101.66.110, 151.101.130.110, 151.101.194.110, 104.22.78.135, 104.22.79.135, 2.20.218.118, 204.79.197.200, 13.107.21.200, 2.18.68.82, 92.122.215.65, 92.122.215.54, 23.10.249.67, 23.10.249.90, 2.20.142.2, 216.58.208.40, 152.199.19.161, 8.253.207.121, 8.253.207.120, 8.248.131.254, 67.27.157.254, 8.241.121.254, 205.185.216.10, 205.185.216.42, 67.27.158.126, 8.241.121.126, 67.27.159.254, 8.241.122.126, 67.27.158.254, 67.27.157.126, 8.253.95.120, 8.241.122.254 Excluded domains from analysis (whitelisted): e11697.x.akamaiedge.net, www.xandr.jobs.edgekey.net, www.googleadservices.com, e11697.dscx.akamaiedge.net, fs- wildcard.microsoft.com.edgekey.net, fs- wildcard.microsoft.com.edgekey.net.globalredir.aka dns.net, adservice.google.com, tbcdn.talentbrew.com-v1.edgekey.net, e11290.dspg.akamaiedge.net, iecvlist.microsoft.com, go.microsoft.com, prod- www.zr-att.com.akadns.net, e25441.f.akamaiedge.net, www.googletagmanager.com, e24999.f.akamaiedge.net, audownload.windowsupdate.nsatc.net, au.download.windowsupdate.com.hwcdn.net, bat.bing.com, auto.au.download.windowsupdate.com.c.footprint.n et, www.xandr.com.cdn.cloudflare.net, prod.fs.microsoft.com.akadns.net, xandr.att.jobs.edgekey.net, e37551.b.akamaiedge.net, www.google- analytics.com, fonts.googleapis.com, fs.microsoft.com, www-google- analytics.l.google.com, dual-a-0001.a-msedge.net, ie9comview.vo.msecnd.net, www- googletagmanager.l.google.com, f4.shared.global.fastly.net, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, cds.d2s7q6s2.hwcdn.net, bat-bing-com.a-0001.a- msedge.net, www.att.com.edgekey.net, i.xandr.com.cdn.cloudflare.net, go.microsoft.com.edgekey.net, smetrics.att.com.edgekey.net, cs9.wpc.v0cdn.net Report size exceeded maximum capacity and may have missing behavior information. Report size getting too big, too many NtCreateFile calls found. Report size getting too big, too many NtDeviceIoControlFile calls found.

Detection

Strategy Score Range Reporting Whitelisted Detection

Threshold 0 0 - 100 false

Confidence

Strategy Score Range Further Analysis Required? Confidence

Copyright Joe Security LLC 2020 Page 5 of 64 Strategy Score Range Further Analysis Required? Confidence

Threshold 4 0 - 5 false

Classification Spiderchart

Ransomware

Miner Spreading

mmaallliiiccciiioouusss

malicious

Evader Phishing

sssuusssppiiiccciiioouusss

suspicious

cccllleeaann

clean

Exploiter Banker

Spyware Trojan / Bot

Adware

Analysis Advice

Uses HTTPS for network communication, use the 'Proxy HTTPS (port 443) to read its encrypted data' cookbook for further analysis

Copyright Joe Security LLC 2020 Page 6 of 64 Mitre Att&ck Matrix

Remote Initial Privilege Defense Credential Lateral Command Network Service Access Execution Persistence Escalation Evasion Access Discovery Movement Collection Exfiltration and Control Effects Effects Valid Graphical User Winlogon Process Masquerading 1 Credential Security Remote File Data from Data Standard Eavesdrop on Remotely Accounts Interface 2 Helper DLL Injection 1 Dumping Software Copy 1 Local Compressed Cryptographic Insecure Track Device Discovery 1 System Protocol 2 Network Without Communication Authorization Replication Service Port Accessibility Process Network File and Remote Data from Exfiltration Standard Exploit SS7 to Remotely Through Execution Monitors Features Injection 1 Sniffing Directory Services Removable Over Other Non- Redirect Phone Wipe Data Removable Discovery 1 Media Network Application Calls/SMS Without Media Medium Layer Authorization Protocol 2 External Windows Accessibility Path Rootkit Input Query Windows Data from Automated Standard Exploit SS7 to Obtain Remote Management Features Interception Capture Registry Remote Network Exfiltration Application Track Device Device Services Instrumentation Management Shared Layer Location Cloud Drive Protocol 3 Backups Drive-by Scheduled System DLL Search Obfuscated Files Credentials System Logon Input Data Remote File SIM Card Compromise Task Firmware Order or Information in Files Network Scripts Capture Encrypted Copy 1 Swap Hijacking Configuration Discovery

Signature Overview

• Networking • System Summary • Malware Analysis System Evasion

Click to jump to signature section

Networking:

Downloads files from webservers via HTTP

Found strings which match to known social media urls

Performs DNS lookups

Urls found in memory or binary data

Uses HTTPS

System Summary:

Binary contains paths to development resources

Classification

Creates files inside the user directory

Creates temporary files

Reads ini files

Spawns processes

Found GUI installer (many successful clicks)

Copyright Joe Security LLC 2020 Page 7 of 64 Found graphical changes (likely an installer)

Uses new MSVCR Dlls

Malware Analysis System Evasion:

May try to detect the virtual machine to hinder analysis (VM artifact strings found in memory)

Malware Configuration

No configs have been found

Behavior Graph

Hide Legend Behavior Graph Legend:

ID: 219320 Process

URL: http://ib.adnxs.com Signature Startdate: 01/04/2020 Created File Architecture: WINDOWS DNS/IP Info Score: 0 Is Dropped

Is Windows Process

Number of created Registry Values

www.appnexus.com live-appnexus.pantheonsite.io fe2.edge.pantheon.io started Number of created Files

Visual Basic

Delphi

Java iexplore.exe .Net C# or VB.NET

C, C++ or other language 4 88 Is malicious

Internet started

iexplore.exe

6 193

ab13.mktoedge.com cookie-cdn.cookiepro.com

104.16.95.80, 443, 49753, 49754 104.20.184.45, 443, 49766, 49767 44 other IPs or domains unknown unknown United States United States

Simulations

Behavior and APIs

No simulations

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

Copyright Joe Security LLC 2020 Page 8 of 64 No Antivirus matches

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

Source Detection Scanner Label Link bam.nr-data.net 0% Virustotal Browse cookie-cdn.cookiepro.com 0% Virustotal Browse ab13.mktoedge.com 0% Virustotal Browse i.xandr.com 0% Virustotal Browse www.xandr.com 0% Virustotal Browse

URLs

Source Detection Scanner Label Link https://www.xandr.com/favicon-32x32.png 0% Avira URL Cloud safe https://www.xandr.com/news/amc-networks-disney-and-warnermedia-join-xandr-in-powering-the- 0% Avira URL Cloud safe future-of- https://www.xandr.com/wp/wp-includes/js/jquery/jquery.js?ver=1.12.4-wp 0% Avira URL Cloud safe https://www.xandr.com/platform/monetize/ 0% Avira URL Cloud safe https://www.xandr.com/about/ 0% Avira URL Cloud safe https://www.xandr.com/casestudies/relevance/ 0% Avira URL Cloud safe https://www.xandr.com/casestudies/ 0% Avira URL Cloud safe https://www.xandr.com/inqChat.html?IFRAME 0% Avira URL Cloud safe https://www.xandr.com/app/themes/xandr-theme/public/js/xandr.min.js?ver=1583723005 0% Avira URL Cloud safe https://www.xandr.com/platform/ 0% Avira URL Cloud safe https://www.xandr.com/about/our-story/ 0% Avira URL Cloud safe https://www.xandr.com/app/themes/xandr-theme/public/img/att-logo.svg 0% Avira URL Cloud safe https://www.xandr.com/media/addressable/ 0% Avira URL Cloud safe https://www.xandr.jobs 0% Virustotal Browse https://www.xandr.jobs 0% Avira URL Cloud safe https://sb.scorecardresearch.com/p?c1=2&c2=14617392&cv=2.0&cj=1 0% Avira URL Cloud safe https://www.xandr.com//en/error#main-content 0% Avira URL Cloud safe https://www.xandr.jobs/search-jobszSearch 0% Avira URL Cloud safe https://cookie-cdn.cookiepro.com/scripttemplates/otSDKStub.js 0% Avira URL Cloud safe https://i.xandr.com/2018/09/HPData2.png?auto=compress&fit=crop&fm=png&h=346&ixlib=ph 0% Avira URL Cloud safe https://community-marketplace.com/ 0% Avira URL Cloud safe https://i.xandr.com/2018/09/MediaDigital2T.png?auto=compress&fit=crop&fm=png&h=346&i 0% Avira URL Cloud safe https://mths.be/punycode 0% Virustotal Browse https://mths.be/punycode 0% URL Reputation safe https://dl.xandr.com/2019/12/Advertising-T-and-C_2019.11.25.pdf 0% Avira URL Cloud safe https://www.xandr.com/wp/wp-includes/css/dist/block-library/style.min.css?ver=5.2.2 0% Avira URL Cloud safe https://i.xandr.com/2018/09/HPMedia1Addressable.png? 0% Avira URL Cloud safe auto=compress&fit=crop&fm=png&h=346& https://www.xandr.com/contact-us/ 0% Avira URL Cloud safe https://www.xandr.com/media/television/ 0% Avira URL Cloud safe kenwheeler.github.io 0% Virustotal Browse kenwheeler.github.io 0% URL Reputation safe https://i.xandr.com/2018/09/HP2.png?auto=compress&fit=crop&fm=png&h=355&ixlib=php-1. 0% Avira URL Cloud safe https://www.xandr.com/privacy/cookie-policy/ 0% Avira URL Cloud safe https://www.xandr.com/news/ 0% Avira URL Cloud safe https://www.xandr.com/site.webmanifest 0% Avira URL Cloud safe https://i.xandr.com/2018/09/HPPlatform2.png?auto=compress&fit=crop&fm=png&h=346&ixli 0% Avira URL Cloud safe https://www.xandr.jobs//en/error#main-contentP 0% Avira URL Cloud safe https://i.xandr.com/2018/09/385001538e516effbb0ed5e5794fdd432a522c98.png? 0% Avira URL Cloud safe auto=compress&fit=crop& https://i.xandr.com/2019/01/photo-1537651442520-4fc506474507.jpg? 0% Avira URL Cloud safe auto=compress&fit=crop&fm=p https://www.xandr.com/social-responsibility/ 0% Avira URL Cloud safe https://i.xandr.com/2018/09/DataLivingLabs1R.png?auto=compress&fit=crop&fm=png&h=346& 0% Avira URL Cloud safe Copyright Joe Security LLC 2020 Page 9 of 64 Source Detection Scanner Label Link https://www.xandr.com/data/#audience-insights 0% Avira URL Cloud safe https://www.google.%/ads/ga-audiences 0% URL Reputation safe https://clientfiles.tmpwebeng.com/tmp/tb-assets/ajd/jquery-scrolltofixed-min.js 0% Virustotal Browse https://clientfiles.tmpwebeng.com/tmp/tb-assets/ajd/jquery-scrolltofixed-min.js 0% Avira URL Cloud safe https://www.xandr.com/media/digital/ 0% Avira URL Cloud safe https://www.xandr.com/privacy/ 0% Avira URL Cloud safe https://i.xandr.com/2018/09/7c02a2c907ec8b492714b46788c51ff126fa852f.png? 0% Avira URL Cloud safe auto=compress&fit=crop& https://www.xandr.com/media/ 0% Avira URL Cloud safe https://www.xandr.com//en/error#main-contentUser 0% Avira URL Cloud safe https://www.xandr.com/apple-touch-icon.png 0% Avira URL Cloud safe https://www.xandr.com/legal/ 0% Avira URL Cloud safe https://i.xandr.com/2018/09/HP1.png?auto=compress&fit=crop&fm=png&h=355&ixlib=php-1. 0% Avira URL Cloud safe

Yara Overview

Initial Sample

No yara matches

PCAP (Network Traffic)

No yara matches

Dropped Files

No yara matches

Memory Dumps

No yara matches

Unpacked PEs

No yara matches

Sigma Overview

No Sigma rule has matched

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

JA3 Fingerprints

Copyright Joe Security LLC 2020 Page 10 of 64 No context

Dropped Files

No context

Screenshots

Thumbnails This section contains all screenshots as thumbnails, including those not shown in the slideshow.

No bigger version

Copyright Joe Security LLC 2020 Page 11 of 64 Startup

System is w10x64 iexplore.exe (PID: 4776 cmdline: 'C:\Program Files\\iexplore.exe' -Embedding MD5: 6465CB92B25A7BC1DF8E01D8AC5E7596) iexplore.exe (PID: 2872 cmdline: 'C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE' SCODEF:4776 CREDAT:17410 /prefetch:2 MD5: 071277CC2E3DF41EEEA8013E2AB58D5A) cleanup

Created / dropped Files

C:\Users\user\AppData\Local\Microsoft\Internet Explorer\DOMStore\9K719AIK\www.xandr[1].xml Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: ASCII text, with no line terminators Size (bytes): 135 Entropy (8bit): 5.043048145848393 Encrypted: false MD5: 2FB37CAAE484422FF8056A885BE215F3 SHA1: 312AD7D64D67246CEC5A36F55334F1AA64D7E3C2 SHA-256: 7FFEC7C197CB764D17421714B70CEBF6B99AC8EC2EC0447E239832085FC3F263 SHA-512: CA1751760FEC74A67B269F8428E8D356FEEFD7A6FB3821657CF1195A15987D519962E1AC91DEDE1BD6AA3F3EDE5790DD58F4CCC5F0C0E35E170F16005065014 C Malicious: false Reputation: low

Copyright Joe Security LLC 2020 Page 12 of 64 C:\Users\user\AppData\Local\Microsoft\Internet Explorer\DOMStore\9K719AIK\www.xandr[1].xml Preview:

C:\Users\user\AppData\Local\Microsoft\Internet Explorer\DOMStore\D1YBPPLZ\www.appnexus[1].xml Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: ASCII text, with no line terminators Size (bytes): 26 Entropy (8bit): 2.469670487371862 Encrypted: false MD5: 132294CA22370B52822C17DCB5BE3AF6 SHA1: DD26B82638AD38AD471F7621A9EB79FED448A71C SHA-256: 451ABBE0AEFC000F49967DABF8D42344D146429F03C8C8D4AE5E33FF9963CF77 SHA-512: 6D5808CAD199A785C82763C68F0AE1F4938C304B46B70529EA26B3D300EF9430AD496C688D95D01588576B3A577001D62245D98137FD5CD825AD62E17D36F15C Malicious: false Reputation: low Preview:

C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{67AC28D5-73E7-11EA-AADD-C25F135D3C65}.dat Process: C:\Program Files\internet explorer\iexplore.exe File Type: Microsoft Word Document Size (bytes): 39000 Entropy (8bit): 1.9205761444238818 Encrypted: false MD5: A97B944AF95652920A62CACED6806209 SHA1: AE1056CB48FA9350F575379A95E1704EB32C808A SHA-256: 38976DDAC46ABDE41E222F488E369E3CD6AA86EB135807ACCAA21AEB97835336 SHA-512: 3DE5CD65095E5007D55AFBD508B01BAA2A7100A1EB11584F41E6C6179739D60ACD45848CC682C4F4D4FEEA62BD1DB86F20A79335A8F25C757E2CB8F80EE2690 B Malicious: false Reputation: low Preview: ...... R.o.o.t. .E.n.t.r. y......

C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{67AC28D7-73E7-11EA-AADD-C25F135D3C65}.dat Process: C:\Program Files\internet explorer\iexplore.exe File Type: Microsoft Word Document Size (bytes): 206890 Entropy (8bit): 2.5689466686892657 Encrypted: false MD5: EE2759EFAED8313087520756D35BB201 SHA1: 5E5707F95D53D5BC0BA8C495271B8F4011A76B52 SHA-256: 25A46CE687A610DA4D5DBA0E5D36B5A722655C43E3AF21C9BDC4D080390E2353 SHA-512: 06403C9D8AC65FE61C7EA9D432718208DEAD2D9BB9F08C246A4CFFF5FEB45301EC7DAC7DBB4F7036D3CABF44E3A33FE5D6390AD29DB8D0DC71403425150C59 BB Malicious: false Reputation: low Preview: ...... R.o.o.t. .E.n.t.r. y......

C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{67AC28D8-73E7-11EA-AADD-C25F135D3C65}.dat Process: C:\Program Files\internet explorer\iexplore.exe File Type: Microsoft Word Document Size (bytes): 19032 Entropy (8bit): 1.583481651917834 Encrypted: false MD5: 81E2E6ED15A8BCAF4680409F00EEAB73 SHA1: 1E7C11666D4C8CF36859108764039EF13711E260 SHA-256: 8EEA80E57CD8E0A82F6DB7C15F3CC35BC7A807E7847C53F529547B385FAD228E SHA-512: F855615B1A3C84581893F74C591842C2AD16E184983BA4E86E20F86AB11201A63E4D1F9265BAA8DF1BFA75CEFDB37F25EA06FAA3365841B2D6AB09B389BFF550 Malicious: false Reputation: low

Copyright Joe Security LLC 2020 Page 13 of 64 C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{67AC28D8-73E7-11EA-AADD-C25F135D3C65}.dat Preview: ...... R.o.o.t. .E.n.t.r. y......

C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-17529550060\msapplication.xml Process: C:\Program Files\internet explorer\iexplore.exe File Type: XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators Size (bytes): 656 Entropy (8bit): 5.09075386376495 Encrypted: false MD5: F693B635B6C831FFD87B0920D577756D SHA1: 4300A6DCF3827EA8292F84F8E8CD153E1F2F8DEA SHA-256: ADA69DCBB6BBAF0838995CD82970A68FE1B4BADBF2327FC58DB396FDE371BA2F SHA-512: F0E7F8A31D9DD4411EFDC0FAC030F950DC84D67A3E72AE040EAF15B9DC4836770447B59ECF8743B1E933193F4B3291F683ADE2EC65982702D318A940264B9B89 Malicious: false Reputation: low Preview: ..0x3fe9c78e,0x01d607f40x 3fe9c78e,0x01d607f4....0x3fe9c78e,0x01d607f40 x3fed945a,0x01d607f4 ..

C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-18270793970\msapplication.xml Process: C:\Program Files\internet explorer\iexplore.exe File Type: XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators Size (bytes): 653 Entropy (8bit): 5.078426185536632 Encrypted: false MD5: ED667C8E603E371F0AC11FD82EA2DE5A SHA1: 18EE56B0EC8E7679506E1C3A73A5B355EA06B094 SHA-256: 8DC296C2B52069C27C0532F43D08B193832F4222BBF1C1FC580AC24055F621E5 SHA-512: EC1B3C4EA3E2509C6485AC6B19770A86D51684D63067C17B2BCC33FD7844D16CCD8792542F78F433BE4C13F0D10E75D70C987050F6A50CC4B389ACCB84011CE D Malicious: false Reputation: low Preview: ..0x3f8ecea0,0x01d607f40x3f8ecea0,0x01d607f4....0x3f8ecea0,0x01d607f40x3faae1e6,0x01d607f4..

C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-21706820\msapplication.xml Process: C:\Program Files\internet explorer\iexplore.exe File Type: XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators Size (bytes): 662 Entropy (8bit): 5.113745073085453 Encrypted: false MD5: 1D40EEAB9B16A87123908F039E48D6D1 SHA1: 09D14F86D2EAC8D0F8BE9B2594A6EBF062AF17EC SHA-256: 05FF761EE45BECE41301C322604F0DB817447E047A7196DF87AF4740E31E407E SHA-512: DE4DC064C90C560C3EFEAF4BC016F631CE44CC626C0A74CD12CC5E1147A01B04B613BAC58AB5FB1EC3BE1282B6BDAA7E4EDABE7E4F52CA2C9AFAF4738AC 125D0 Malicious: false Reputation: low Preview: ..0x3ffa287a,0x01d607f4 0x3ffa287a,0x01d607f4....0x3ffa287a,0x01d607f40x3ffd9e3f,0x01d607f4..

C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml Process: C:\Program Files\internet explorer\iexplore.exe File Type: XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators Size (bytes): 647 Entropy (8bit): 5.097543056907056

Copyright Joe Security LLC 2020 Page 14 of 64 C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-4759708130\msapplication.xml Encrypted: false MD5: 77D2B758E830E50AAF961E5040BDE463 SHA1: 9AA022E8C16466428BA5F277BC6481D8FEEB375D SHA-256: 2216D5589AFEFCB38E8D148BC008C2B0BB77837318A20DAB5F1A72CEEC2A2B95 SHA-512: 4D9E87BFFF765BBBA74A396B9DF5C2C34C2B11144B7E04293D84A7200056D31545A1A7280CC470A609E379DAA1A3A44809E9E2E2C0CD91DE30395935B0CCB69 8 Malicious: false Reputation: low Preview: ..0x3fcaf2f1,0x01d607f40x3fc af2f1,0x01d607f4....0x3fcaf2f1,0x01d607f40x3fd34405,0x01d6 07f4..

C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-6757900\msapplication.xml Process: C:\Program Files\internet explorer\iexplore.exe File Type: XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators Size (bytes): 656 Entropy (8bit): 5.099459813677776 Encrypted: false MD5: A1925312112660D45EC6F94FC3DEE864 SHA1: 8ABF7C52C35955B8B8FC7862315051CAAEB199F5 SHA-256: 3C11F1954E0F5841891BE16FF05DB7AF17417E8CA122BD616AE4F7FA49F699A5 SHA-512: 910729006F8611DEDB96673CF2B0F4BC8880B398109F2ED5524A9280D2CE211059F29A98A770BEB37B16A99A5F7CDF1466A1F2AD69DFBBF26964D6BC9D5B988B Malicious: false Reputation: low Preview: ..0x4000f0c2,0x01d607f4< accdate>0x4000f0c2,0x01d607f4....0x4000f0c2,0x01d607f40 x400b80b6,0x01d607f4 ..

C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-8760897390\msapplication.xml Process: C:\Program Files\internet explorer\iexplore.exe File Type: XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators Size (bytes): 653 Entropy (8bit): 5.0966175409856715 Encrypted: false MD5: C8A69F9C6BA92DFA0C32C483392D110F SHA1: 475F8FAEF900AFE5F408214A7D38D9E5E59F58F1 SHA-256: 5358D0AC1736FE833D36E60B8F7C4AE2DDDD203C7D4A642883B5094A46C20CA6 SHA-512: A2B6235F5FD54442FC9007D6499AC8611BB1C505638ACE857E6D8C11F38468479A121405539CC90AC445447755FA018D81A622068F4C7F8F544F20F6E92D639E Malicious: false Reputation: low Preview: ..0x3fe15b71,0x01d607f40x3fe15b71,0x01d607f4....0x3fe15b71,0x01d607f40x3 fe37196,0x01d607f4..

C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml Process: C:\Program Files\internet explorer\iexplore.exe File Type: XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators Size (bytes): 656 Entropy (8bit): 5.120096362765559 Encrypted: false MD5: BD5BEB9EB3CF2F21BBF9A4E2185DBA4C SHA1: 41E4BFC903C1D2B54FECFA79F5D6F5ECEC4D6D1A SHA-256: A5DD099EB0A0859A9656F93FA818AE9CFEC90D91ED93797857DB5452E9CCCC1E SHA-512: 6B0DD0212E6C65162DE791621920B445CBA081EC3011AFC9CB72055BE2863498EC25FD057C845BFE3DECFAA2FE3C95DD131B28F07CA7AA1C96845E7D43CC954 A Malicious: false Reputation: low

Copyright Joe Security LLC 2020 Page 15 of 64 C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20259167780\msapplication.xml Preview: ..0x3fda21f3,0x01d607f4< accdate>0x3fda21f3,0x01d607f4....0x3fda21f3,0x01d607f40 x3fdbf0cf,0x01d607f4..

C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin20332743330\msapplication.xml Process: C:\Program Files\internet explorer\iexplore.exe File Type: XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators Size (bytes): 659 Entropy (8bit): 5.104205780690275 Encrypted: false MD5: B3D8F73375CD1FEECAAA746CA51E482A SHA1: E8C3658A7F10429089D3426F5D085B409AEEFEB8 SHA-256: 2005FE668F61EEAF7D079F1FDA8DD8B7EBD224DCEFE1B7628C6E1FAF262CAC53 SHA-512: 870EAE5F073F3D0E7DAA78329481FBDBF3B607D0586172EEE7BF122B5014B36F992928714A2214CA042B85C96299B72B1FFA266B08ADBBF0E403AE2AE29F251C Malicious: false Reputation: low Preview: ..0x3fb34dc0,0x01d607f4 0x3fb34dc0,0x01d607f4....0x3fb34dc0,0x01d607f40x3fc2baf9,0x01d607f4 ..

C:\Users\user\AppData\Local\Microsoft\Internet Explorer\Tiles\pin8215062560\msapplication.xml Process: C:\Program Files\internet explorer\iexplore.exe File Type: XML 1.0 document, ASCII text, with very long lines, with CRLF line terminators Size (bytes): 653 Entropy (8bit): 5.079018850091175 Encrypted: false MD5: 3D8468512ED1D12A32646ADE47C608A6 SHA1: 69102FE3D4E2BB815137686A312B88E3DE4ACC21 SHA-256: 82F51A4F4BD41367845C128373CAE743587C9F83A31392CD4E68CBF5A93E7EE5 SHA-512: 0ECAB3E0B19B6535B483FF8B7381591295BEA0691623D80EBB60A5C8BD6BCF7A42CBBB152D68E7CBA49FF1247F529EEF4C9F561B66B6289D1BB3AFAFB52625 D8 Malicious: false Reputation: low Preview: ..0x3fc7ebf1,0x01d607f40x3fc7ebf1,0x01d607f4....0x3fc7ebf1,0x01d607f40x3 fc923a0,0x01d607f4 ..

C:\Users\user\AppData\Local\Microsoft\Internet Explorer\imagestore\6aw4uvh\imagestore.dat Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: data Size (bytes): 3718 Entropy (8bit): 7.150138746292673 Encrypted: false MD5: 239A9CE0916A9248DF12EFF9AE4F6D8D SHA1: 182B78EBCFC888C5E5F2B3AFF5D47EBFFED5FE00 SHA-256: 1770F8757E7AAB405A61AD7596B4CE4585AF9B88577CC93263BD6B12087CC620 SHA-512: 64F46B8C24AD2C97FCEC889136F9409925497502F22A32EC749AEBE4113B2830C41E3A758CAB36A8AE2E1948AD96CCC81661FD4256FCE9879A935447E8CC6D7C Malicious: false Reputation: low Preview: '.h.t.t.p.s.:././.w.w.w...x.a.n.d.r...c.o.m./.f.a.v.i.c.o.n.-.3.2.x.3.2...p.n.g...... PNG...... IHDR...... D...... gAMA...... a.... cHRM..z&...... u0...`..:....p..Q<....PLTE....22....PG...... kZ.//...... NE.WN.rc...... VG.pa..~.22.22.22.22...... 33.22.12.QG.PG...... 33.22.12.UJ.PG.PG...... 22.. .PG.PG.PG...... 44.22.01.RH.PG.PG...... 22.22 ..o.PG.PG.PG...... 88.22.-/.QG.PG.PG...... 22.22.22.^Q.PG.PG...... KN.22.!&.PG.PG...... 33.22.11.UJ.PG.PG...... 22.PG.PG.PG...... 55.22.01.RH.PG ...... 22.PG.PG.PG...... QU..#.PG.PG.PG.PG...... NE.NE.NE.WN.XO.XO.XN.XN.rc.rc.rc...... pa.pa.pa.pa.pa..~.pa.pa.pa.MD.....~....n_.pa.pa.pa..~.pa.pa.pa.F>..... ~.k\.pa.pa.....~....pa.pa.pa.3-..~..~.bS.pa.pa.OF.....~....o`.pa.....~..~.9*.pa.pa.LD.....~....n_.pa.pa.....~....pa.pa.G?.....~.l].pa.OF.....~.o`.pa..~..~..~..~.22.PG....pa..~...... '....tRNS ...... bpo.....).Q..@.?..r...X...p.%n...&.%#..%..wq....9...)...8..;

C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KSU5XQMC\0b48931e-9214-4700-96ed-45d0b5ef5ed0[1].js Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: ASCII text, with very long lines, with no line terminators Size (bytes): 4179 Entropy (8bit): 5.870685294961547 Copyright Joe Security LLC 2020 Page 16 of 64 C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KSU5XQMC\0b48931e-9214-4700-96ed-45d0b5ef5ed0[1].js Encrypted: false MD5: 8C824337869A19246A4C198FEEE2D06C SHA1: 4D05BA6658381B435A9FDBE73B15366B97D90D4C SHA-256: 9D8E8CA1BC3774D36533140DC6B9443E828DFAEADB90909568D7F0271A1F573B SHA-512: 0FB3E22EC9F2320B8A1948A5C1977821597DA7C41D5A42A0EAA3B683DF5A60B656491E068F6A5E9F788E4AE0EB815E9BA4349A9AA99CBABADA15F2CA424480 B9 Malicious: false Reputation: low Preview: {"CookieSPAEnabled":false,"UseV2":true,"MobileSDK":false,"SkipGeolocation":false,"ScriptType":"PRODUCTION","Version":"5.12.0","OptanonDataJSON":"0b48931e- 9214-4700-96ed-45d0b5ef5ed0","GeolocationUrl":"https://geolocation.onetrust.com/cookieconsentpub/v1/geo/location","RuleSet":[{"Id":"f7c44079-d82a-4b1e-ac0c- fe4e8f1d04d3","Name":"EU","Countries":["no","de","fi","be","pt","bg","dk","lt","lu","hr","lv","fr","hu","se","si","sk","gb","ie","ee","mt","is","gr","it","es","at","cy","cz","pl","ro","li"," nl"],"States":{},"LanguageSwitcherPlaceholder":{"default":"en"},"BannerPushesDown":false,"Default":false,"Global":false},{"Id":"2a254722-a3c0-45b6-b79e-971a9ada 43b5","Name":"Global","Countries":[],"States":{},"LanguageSwitcherPlaceholder":{"default":"en"},"BannerPushesDown":false,"Default":true,"Global":true}],"Consent Integration":{"ConsentApi":"https://privacyportal.cookiepro.com/request/v1/consentreceipts","RequestInformation":"eyJhbGciOiJSUzUxMiJ9.eyJvdEp3dFZlcnNpb24iOjEsI nByb2Nlc3NJZCI6IjE3N

C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KSU5XQMC\377865_4_0[1].woff

Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: Web Open Font Format, TrueType, length 38458, version 0.0 Size (bytes): 38458 Entropy (8bit): 7.991134015959363 Encrypted: true MD5: 24B99AE3332EE471E5A2FEA4090976AA SHA1: AAB05EABA19735DD02C54646B4F1254026F7A05A SHA-256: BC7C148BEFD88BDA92EF9332722F9BAB321A550C61EF248AB44C2A67F32939B7 SHA-512: 170ED3C7BBC9ABEDEEF330A8F5D51220C8A0589D3A393D1CACFC86AFBB01DE646CBF2416821FF0CE2E5A0850B64E520F902B13CCFF847E4B8E1F6C23EDE81 925 Malicious: false Reputation: low Preview: wOFF...... :...... 6...... Z...... OS/2...... O...`i.cmap...... I...T...cvt ...... 4...j..&.fpgm...... <....vd~xgasp...... glyf...4..z.....P+.$head...d...3...6..e.hhea...4...!...$....hmtx...X...... 0..UTloca...... S.maxp...D...... name...... !....post...... x..8.prep...T...... F.."...... R...... ".3...... x.c`d``.ba.....6_..._.E..o...F...o..y%...... i....x.c`f.g...... 5.|.6.8`g@....~...... _.[.p...c....d.....y@J...... |.x...]+.a...... [s".,[..y..%Q4G.....jM&E...C%J.....y..8.+8.g.|.QJc...... U.U.._].".DdS.....:.U.....b.G.JQ..t.F8.F...!. .i.0.y,".u|.....6.....6.!5iH.. ..rB...... }.h5.F...f.I.QJ.N.rN9....z.a.1...... !\.N<(eY{....)k...8...... %Z.3?.-.p..|.9...>.S.p..9.|.IN.>.r.W...j...6...q.k.:-..-Q....z.g.`..I...^|k.}....?....I.....x.c`d``~.o.....~..Y.0.E...... =.....x.. [HTQ.....hijS..cZj.$..5Jf.(6E7... .B."Q.BI..(...... C...... C.CP.....EAE...=g.N..|..s.}.3.E...... 5....J.&.e.J...... f'J,wP .P.a$.>.1.bs

C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KSU5XQMC\377865_5_0[1].woff

Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: Web Open Font Format, TrueType, length 39425, version 0.0 Size (bytes): 39425 Entropy (8bit): 7.99104415762201 Encrypted: true MD5: BF58F82269CADCD9C55B44F7582FA7C4 SHA1: DE109DE4CAE63F36D504C774C2F5118652B9E56B SHA-256: 2F9B95AAB85A13C728D4348BFC7BA72D3D19F308C2F3609F6B91F6F5FCD89F5F SHA-512: 4EB8099E6053B4774F86FD8D7A8C79FEA7A94177794013CA3AA959AC499E26D6EF3A4876A2A722026FD13B998DBBCFD2793F9BE6A5ABA08E73C7703D7FA04B5 7 Malicious: false Reputation: low Preview: wOFF...... J...... ]...... OS/2...... N...`i.cmap...... I...T...cvt ...... 4...j..&:fpgm...... <....vd~xgasp...... glyf...<..~b...... head...d...3...6.~e.hhea...4...!...$....hmtx...X...... 0.r_.loca...... E.maxp...D...... name...... @..post...... x..8.prep...... F.."...... T...... $.5...... x.c`d``.bG.....m.2p3...0\.:...... e1.r ....$...7...x.c`f.f...... |....3 .P.p?.....L./.-b8...1N..a2H..-.< ...... 6.r..x...]+.a...... [s".,[..y..%Q4G.....jM&E...C%J.....y..8.+8.g.|.QJc...... U.U.._].".DdS.....:.U.....b.G.JQ..t.F8.F...!. .i.0.y,".u|.....6.....6.!5iH... .rB...... }.h5.F...f.I.QJ.N.rN9....z.a.1...... !\.N<(eY{....)k...8...... %Z.3?.-.p..|.9...>.S.p..9.|.IN.>.r.W...j...6...q.k.:-..-Q....z.g.`..I...^|k.}....?....I.....x.c`d``~.o...... ,f.. ..3...... x..KlTU.. ...I.#Dm&v.G.).JS[[..Xj.<.Z.m5...... [email protected][email protected]....{..H.&...... w...Fy...[..}x.....I-..Z..W.?.^}...).Z.

C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KSU5XQMC\GalanoGrotesque-Medium[1].woff2

Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: Web Open Font Format (Version 2), TrueType, length 32432, version 1.0 Size (bytes): 32432 Entropy (8bit): 7.993070080958123 Encrypted: true MD5: 7B3770F7954A3610A72B64D5C7BF8317 SHA1: 690ACEE431B9A84FB9EC6997A16EFF8F7651B3EC SHA-256: F529E6E5C449CC611E84D79050BA3DD4D6C77CFE3537178867AED7384490388B SHA-512: 53115B445DA82215B5D9BC001BEB3899FE234450D71469D16FD00F7086B304CC8F3B6B193CF28B9DB1C54509A39AF0BB9631F1335983C45190F38DB49DA69B60 Malicious: false Reputation: low

Copyright Joe Security LLC 2020 Page 17 of 64 C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KSU5XQMC\GalanoGrotesque-Medium[1].woff2

Preview: wOF2...... ~...... q...|...... }P...`...... D..Z....`..T.j...... |..C.6.$..0...... !..x...[.Jq...... ;....V..|F.Vy.J.W2.Y..v.>q..S....f.1..X..ZZ.~[M...".9D...3]...B.b.r4.....gl..&3.'.!f9..uW^..;..+...... o 0c|.uRd.....;).....8KF.h..8)x_.c....8...3.Zh...F.5.z?...... )...6....A.. v..WX"Qi.\0pP..p.fZfz.K.C}\.....\.K..X..c..BSC....y:...... R(.R.)..Jp...}...Uw.,...TC..]39e....h.y.g.c.G.HEh..*[email protected] Eo..V...J..0..1r...6.1X.#[.....x.6.`$.r.w.Uy.x`..{...... ,..I.#X.../.zU.(_.}.Ig.z...Cr....i..l....?...`.E....,}.t-.v.R.w..6...h.1...... f.....{..^...RN.....h..r.6g,}.b.m...f..i*&.V....W...g...H. .(.v.. O...D5..R. Nt{A.D...,...zR..L...V;.n.z...../...... q..i...... $...... =\... .r.>.9..*.5..kt..Q....4.|L.p{....Kx.t..y.T...... I.0=.O....:....1....3.1.#.x.fS.b....)..L.(.*[email protected].`n...N...... LR.:8.. .l.....E...,.....eE...... {0.xT....j]...D..H{...QS....6.p.s..?4..7Zh.....I...$..i.I....7.....P.xB.=.hy..I"A.. O..O)....N[[.=.S8.q.r...w...... (......

C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KSU5XQMC\NewErrorPageTemplate[1] Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: UTF-8 Unicode (with BOM) text, with CRLF line terminators Size (bytes): 1612 Entropy (8bit): 4.869554560514657 Encrypted: false MD5: DFEABDE84792228093A5A270352395B6 SHA1: E41258C9576721025926326F76063C2305586F76 SHA-256: 77B138AB5D0A90FF04648C26ADDD5E414CC178165E3B54A4CB3739DA0F58E075 SHA-512: E256F603E67335151BB709294749794E2E3085F4063C623461A0B3DECBCCA8E620807B707EC9BCBE36DCD7D639C55753DA0495BE85B4AE5FB6BFC52AB4B284F D Malicious: false Reputation: low Preview: .body..{.. background-repeat: repeat-x;.. background-color: white;.. font-family: "Segoe UI", "verdana", "arial";.. margin: 0em;.. color: #1f1f1f;..}.....mainContent..{.. margin-top:80px;.. width: 700px;.. margin-left: 120px;.. margin-right: 120px;..}.....title..{.. color: #54b0f7;.. font-size: 36px;.. font-weight: 300;.. line-height: 40px;.. margin-bottom: 24px;.. font-family: "Segoe UI", "verdana";.. position: relative;..}.....errorExplanation..{.. color: #000000;.. font-size: 12pt;.. font-family: "Segoe UI", "verdana", "arial";.. text-decoration: none;..}.....taskSection..{.. margin-top: 20px;.. margin-bottom: 28px;.. position: relative; ..}.....tasks..{.. color: #00 0000;.. font-family: "Segoe UI", "verdana";.. font-weight:200;.. font-size: 12pt;..}....li..{.. margin-top: 8px;..}.....diagnoseButton..{.. outline: none;.. font-size: 9pt; ..}.....launchInternetOptionsButton..{.. outline: none;

C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KSU5XQMC\TiemposTextWeb-Medium[1].woff

Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: Web Open Font Format, TrueType, length 79133, version 1.0 Size (bytes): 79133 Entropy (8bit): 7.994069573253663 Encrypted: true MD5: BC263B46E0C16A0C6F370836A65308C7 SHA1: 7F14650C5ACA37D32E754058B240B9AAB53728C1 SHA-256: 4B6AAD44F0F2157894D9CAAC0F5CF176474EC86976AF0A198B27374E0B094212 SHA-512: 00F404BC91F9D4C1EE4CAE7BE01E47D2F27EE23D2349D3FF7FA9DA790E5E38B0465E5F48206D354BA9AC940DDEE409FD48BEF8AF565A2A021015EF9C8C2DA7 A8 Malicious: false Reputation: low Preview: wOFF...... 5...... d...... !4...... 3...... GPOS.....3.....9d..GSUB...... *.B..LTSH...x...... OS/2...$...S...`~(SpVDMX...p...... u1|.cmap..!4...... #.cvt ..&....f...f.c..fpgm..$...... a.A ..gasp...... !glyf..,`...u..W.(*..hdmx...... @..-0`u..head...... 6...6...3hhea...... !...$...bhmtx...x...... -.i.loca..'....J...JT...maxp...... name...... H..post...p...... prep..%...... a...... G._.<...... |%...... x.c`d``...... j....#...P..0-..o..*...... b...Z...... U....x.c`f.g...... t.~.E.``...z...(...... 7...... 9.o....ArL.L.....3..#.^.x..{h.U...3.s6. L.....9ujsf.&....F")...... be..R0.LFZ.fdE.....?.E...... {....^56..=..<.<..=...Y.S..|..E.|...... +....of.S.|.J...... F..4...4..i._..wY.....Z.h._.2_..S..+M.o..6j...... j...t.{]...... q..O.8...|...jU..u.ob...... =K...... 5._...b.QUphw...... *q...i...}T%.rC1.K...X.G...<...Sv8.?..'.Uk....v.T.N....b.f.$T.B.yB..V..YS.J..5.e.

C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KSU5XQMC\activityi;src=6100125;type=ecomm0;cat=ecomm01-;ord=1;num=86202 22563629;gtm=2od340;auiddc=1748885882.1585724854;u19=https___www.xandr.com_;u20=Default;u30=7491296195977435583303939005[1].htm Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: HTML document, ASCII text, with very long lines, with no line terminators Size (bytes): 543 Entropy (8bit): 5.537854269432067 Encrypted: false MD5: 2BAC12CF3A52D8F92CD49DE22DA16915 SHA1: 2DD7BBE966A4B1A4EE9C032D9591873FCC7689DA SHA-256: EEE60E65469F925457D0BECA163F8BCA91D8BE735AF26FF63AAA0AD62A4F7B78 SHA-512: C30B21F4174715DCB6552FEBAF339A1E06414F62AD212AD369E29F017FF86697481EEE66E6BE54B8C2C88CADC39CA7BA781ADA77AB09C376965423BD331FC1B 9 Malicious: false Reputation: low Preview:

C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KSU5XQMC\att-logo[1].svg Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: SVG Scalable Vector Graphics image

Copyright Joe Security LLC 2020 Page 18 of 64 C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KSU5XQMC\att-logo[1].svg Size (bytes): 3996 Entropy (8bit): 4.118135963345771 Encrypted: false MD5: A76313E2E3ACEB6BAA6799AFDF2EEB66 SHA1: EC59EEC2592FA60D7B47C0B01969E8D072204B71 SHA-256: D1180661C2BB6917CDB2909F6D4F3C3FE1071D59CF73958996813553DDAA26E8 SHA-512: 28B003E9CBFC0247CEBD75197FCD8DEC45FDF2CCDB10640928D2E0C8E9418D67F74C9C1432515FA3DFC9267241EC1DDFB1B526DFDF01DC899AFC3A5FFBA0A 7C7 Malicious: false Reputation: low Preview:

C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KSU5XQMC\bing[1].js Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: ASCII text, with very long lines Size (bytes): 23315 Entropy (8bit): 5.279594817870933 Encrypted: false MD5: E37C82D9A5495B1F22D5E68274C5739D SHA1: 66FB8DC92A2E532D3761626AEE429FCAB13346A2 SHA-256: 64697DD950D251E2E82CA5A125F9DE74AEDB2588B8D8D5E2C81AD6F3F0E0C83C SHA-512: C8906E3294D76AEFC91859FF7A2984CCCC75D87D9B3A4C99F97EA4BF8A677DE319D2327B253CAFB6EAA93BCA7E1699554FA790E4B198C4E042BE2F00DA28F1 B8 Malicious: false Reputation: low Preview: //Bing.function UET(o){this.stringExists=function(n){return n&&0

C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KSU5XQMC\css_VSrfXFHCWgzq5hLrSSCUIz_6zx_2Z_UlNZn5q6qm7lE[1].css Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: troff or preprocessor input, ASCII text, with very long lines Size (bytes): 6963 Entropy (8bit): 5.032777392069196 Encrypted: false MD5: FFC2502AF593C61DD5C4BDFDCEA2CE26 SHA1: 8D6E9C6A45B0AF256B4AA30E20E3C8B7677FA1D7 SHA-256: 552ADF5C51C25A0CEAE612EB492094233FFACF1FF667F5253599F9ABAAA6EE51

Copyright Joe Security LLC 2020 Page 19 of 64 C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KSU5XQMC\css_VSrfXFHCWgzq5hLrSSCUIz_6zx_2Z_UlNZn5q6qm7lE[1].css SHA-512: C54D6FF0E815375EBF71BAC74FA44E65270917B6508A09B9EC342058FB070E1BF75CE59038BDBD94E12117FEAF36FBFFC390D55394C5FAADA4FA650B2FFED41 6 Malicious: false Reputation: low Preview: .-progress{display:inline-block;padding:1px 5px 2px 5px;}[dir="rtl"] .ajax-progress{float:right;}.ajax-progress-throbber .throbber{background:transparent url(/core/th emes/stable/images/core/throbber-active.gif) no-repeat 0 center;display:inline;padding:1px 5px 2px;}.ajax-progress-throbber .message{display:inline;padding:1px 5px 2px;}tr .ajax-progress-throbber .throbber{margin:0 2px;}.ajax-progress-bar{width:16em;}.ajax-progress-fullscreen{left:49%;position:fixed;top:48.5%;z-index:1000;backgr ound-color:#232323;background-image:url(/core/themes/stable/images/core/loading-small.gif);background-position:center center;background-repeat:no-repeat;border- radius:7px;height:24px;opacity:0.9;padding:4px;width:24px;}[dir="rtl"] .ajax-progress-fullscreen{left:auto;right:49%;}..text-align-left{text-align:left;}.text-align-right{text-alig n:right;}.text-align-center{text-align:center;}.text-align-justify{text-align:justify;}.align-left{float:left;}.align-right{float:right;}.align-center{display:b

C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KSU5XQMC\css_auSBswZNn6tC5F5B-BOtID46hgJuvXSFUhuc6ZhXMlw[1].css Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: UTF-8 Unicode text, with very long lines Size (bytes): 889051 Entropy (8bit): 5.686748654553388 Encrypted: false MD5: 1035A8B4ED8587823A6506DF60C88345 SHA1: C7AA110C9488484ADB67DD6E4600F3ACE0447636 SHA-256: 6AE481B3064D9FAB42E45E41F813AD203E3A86026EBD7485521B9CE99857325C SHA-512: A3661DEF620A9DCA2CD36B331BA756E33B8F5222AA193E2646A2C74AA5D9F9BBB136313D1A38D588177C3E72A8325C4D7F9D184A773E2F590F8FBA28EA87A45 3 Malicious: false Reputation: low Preview: @import url(https://fonts.googleapis.com/css?family=Roboto|Roboto+Mono|Roboto+Slab);@media print,screen and (min-width:40em){.reveal,.reveal.large,.reveal.small ,.reveal.tiny{right:auto;left:auto;margin:0 auto}}.slick-loading .slick-list{background:#fff url(/themes/custom/appnexus/dist/css/./ajax-loader.gif) center center no-repe at}@font-face{font-family:"slick";src:url(/themes/custom/appnexus/dist/css/./fonts/slick.eot);src:url(/themes/custom/appnexus/dist/css/./fonts/slick.eot#iefix) format("em bedded-opentype"),url(/themes/custom/appnexus/dist/css/./fonts/slick.woff) format("woff"),url(/themes/custom/appnexus/dist/css/./fonts/slick.ttf) format("truetype"),url(/ themes/custom/appnexus/dist/css/./fonts/slick.svg#slick) format("svg");font-weight:400;font-style:normal}.slick-next,.slick-prev{position:absolute;display:block;height:20 px;width:20px;line-height:0;font-size:0;:pointer;background:0 0;color:transparent;top:50%;transform:translate(0,-50%);padding:0;border:none;outline:none}.

C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KSU5XQMC\dnserror[1] Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: HTML document, UTF-8 Unicode (with BOM) text, with CRLF line terminators Size (bytes): 2997 Entropy (8bit): 4.4885437940628465 Encrypted: false MD5: 2DC61EB461DA1436F5D22BCE51425660 SHA1: E1B79BCAB0F073868079D807FAEC669596DC46C1 SHA-256: ACDEB4966289B6CE46ECC879531F85E9C6F94B718AAB521D38E2E00F7F7F7993 SHA-512: A88BECB4FBDDC5AFC55E4DC0135AF714A3EEC4A63810AE5A989F2CECB824A686165D3CEDB8CBD8F35C7E5B9F4136C29DEA32736AABB451FE8088B978B493 AC6D Malicious: false Reputation: low Preview: ..... .. .. .. Can’t reach this page.. .. .. .... ..

..
Can’t reach this page
..
..
    ..
  • Make sure the web address is correct
  • ..
  • Search for this site on Bing
  • ..

    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KSU5XQMC\edmDataDefinition[1].js Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: UTF-8 Unicode text, with very long lines, with CRLF line terminators Size (bytes): 110641 Entropy (8bit): 5.344666647974307 Encrypted: false MD5: A8851F5564F9F2C46DEBC0263E1C18DE SHA1: 8ADB3B8518E0004BFFC1C538E3F0C49C703B44DC SHA-256: B715798FD70600E3E84F2725BC473B2C4E56D7748DB32C85AC1B3CF1FB22F805 SHA-512: 02ED49CEA7540B3333E6AB473E87C3156F9E15075ECACF8489732BF878B5C7ED4F2B45B8D23AC9FF270AC3D93B968BD700284EF7E7EFFB9530045818F6191EC E Malicious: false Reputation: low

    Copyright Joe Security LLC 2020 Page 20 of 64 C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KSU5XQMC\edmDataDefinition[1].js Preview: /* edmDataDefinition build# - 1094 prod */..function master_ddo(ddo){// ECAP-19637..this.transport=ddo,this.intersectid=null,this.version=function(){if(null!==this.transp ort)return this.transport.version()},this.createPayload=function(eventAction,eventCode){if(null!==this.transport)return this.transport.createPayload(eventAction,eventCode )},this.createPayloadWithTransaction=function(eventAction,eventCode,transaction){null!==this.transport&&this.transport.createPayloadWithTransaction(eventAction, eventCode,transaction)},this.clearPageLevelCache=function(){null!==this.transport&&this.transport.clearPageLevelCache()},this.cachePageLevelItem=function(item){ null!==this.transport&&this.transport.cachePageLevelItem(item)},this.track=function(payload){null!==this.transport&&this.transport.track(payload)},this.trackPreview=funct ion(payload){if(null!==this.transport)return this.transport.trackPreview(payload)},this.registerForNotification=function(anf,listen){if(null!==this.transport)return this.

    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KSU5XQMC\hero-banner-video-v2[1].dat Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: data Size (bytes): 4456448 Entropy (8bit): 7.388450865836596 Encrypted: false MD5: 27DF55F2FC8BC257BE6189C1E2FA48A8 SHA1: 02E74339010CF4B8107CB294D698AB56F1028758 SHA-256: 7A063B97601556436CDD8ABC1C4BE44556449A8E10FC979846067E35B14CE1E5 SHA-512: BA781635514DE64B8C7C600D1ECD083273B99A75E0D92DC3D9C65C3EA3354F79E1FFA3F7B2F5E7D611DF233F64D69965A53718DF8099D2D2E332556EE6DA28B0 Malicious: false Reputation: low Preview: .....Mq8...*...K..4..e.F.;.`z...{.nf8.H.y.#.KBS..\t..!..s.v...j4L..(.)UP..Z.2.,R.....V8.J..<.9.-2a7...1=.5q....D.Xz$..@R'4X.#...q4...''&.[S...... l..5..j...g.+.L|'.....Kaq..A.&...... ].... Z^a.-..Aen{.....!.h...}..P.>:..-.(o...... w.S.*)...t...8.-d6.[.)..D;Hc.'g.O....N...Y>...}`....6W.0h+...W...QR...... S...... k]o...y.L...T...... Sg.a.-(.%.....W.F../}.U}.k...... E4d.9.^x3...... !..Dm...}+h...... '...C.z. ...B.u. ..bs...6..%QBp3...... #.C....R..YG..Xv6.d..h.j<....\`...b.).A.N..:7 <..3F.d...+...S.z...5q.HM....[:#..".9...... 6.....y.Nb....'.....s...T'.e.J...(..../....K..R2xP.. ..wbV.g.)-...YYg.xo....Xr.N...... ]....G....C.{....X.*..a.R."Y..Y.3n.|[email protected].:.b...s.H....#..KP.x6o...e..u....1.."..e~..\.....cd#H..i|.?.;:.6..=...... fV.p.w..p....OiGR.c. ...O"....W.....?C.^v.,..r..P8.OK..0:7..<...... 6.'..H_M...... 7^Q.n...Y...J...;.a....:Hf{R^M...uo....,....U.].#(...w...... y...... <..B...

    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KSU5XQMC\img-rc-look-inside-retail-2018[1].jpg Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: [TIFF image data, big-endian, direntries=0], baseline, precision 8, 786x378, frames 3 Size (bytes): 80737 Entropy (8bit): 7.943236203760043 Encrypted: false MD5: BE9D25D8CC8C7C9BB20B0B192AEC76A9 SHA1: B4430D59071E1D79CF9FC6AE3BE1BC3DF1058678 SHA-256: C0F162CCAD22F127EB6A40E86A8E71844C7229BA883333783CEFAF05EF74DE5C SHA-512: BF7FF91B994C371BB1E88B0C0AA30FAB9EE7D6EEC4AECFE7D93C60F61D63FF358BCFA2135E8841AF2180F535BBFBE18E709D8E7C1191D8744767C6B963C9FD C6 Malicious: false Reputation: low Preview: ...... JFIF.....`.`...... Exif..MM.*...... Ducky...... d...... http://ns.adobe.com/xap/1.0/.......... ...................C...

    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KSU5XQMC\img-related-content-brain-video-adco[1].png Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: PNG image data, 698 x 339, 8-bit/color RGBA, non-interlaced Size (bytes): 340090 Entropy (8bit): 7.982260245757526 Encrypted: false MD5: B6228E13AC7157B2EA94D97BCFE47A80 SHA1: 949F28C7CF1B4C7B74994D9D2D4EE466E096C8B8 SHA-256: F623B80C223E2D35DCDC0B6888EB3D816CEEABBF275C0446C53C1C3732ABE5AA SHA-512: DE47F46180D797BAC2AFCF13A5D4AC71BB0CB71ADAD5FEFFE6FD683C50EFD27595E8E8836C61FC59067AD470861609D5FE79222B1195154F423B7EE1829D0D8 9 Malicious: false Reputation: low Preview: .PNG...... IHDR...... S...... ^...... sRGB...... gAMA...... a.....pHYs...... +...... IDATx^...eK..y..c....{..V.P... 4..Z...(AF...... fz...AOz/3>.M2.E...$.D#.@@c .....;...x...... ".9.f..ub...... g._?...... fO..v6.n..?..W.Y....w...t.\...... %.D.f..v...*...s....7{.:...... W..h....M..4s...lj.|.~.O.....G...z.W+..OGG=.....;.!...... N.o...?....q....n?.T..L:>9.g"..+.I..QZ.....{.Q.Y..r...... h..pmR%..b.\.S..JQ..&.D..7F.{Fuv,%N.1I.L...v^y...g..6Zh..;A.Id.f....r9.....%....0.{P6.?8.",.EoHMu.n.}..k..S....|...... {../.b.).f....J...."P".....t[wy.c.l. .e.....g('...Db.+G..R.K..L.....9.. ./I..a..=.0...SW...... iio.f.:.....c.N3.}..-qB.....(....c.?.%...t.1~.|.6.;lJ`.1..G..Od./..~K.....0Z!..oF.]9.#.K.....qQ.:.2McI.[..

    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KSU5XQMC\img-related-content-brian-lesser-dials[1].jpg Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: [TIFF image data, big-endian, direntries=0], baseline, precision 8, 698x399, frames 3 Copyright Joe Security LLC 2020 Page 21 of 64 C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KSU5XQMC\img-related-content-brian-lesser-dials[1].jpg Size (bytes): 131315 Entropy (8bit): 7.935017302433943 Encrypted: false MD5: 90039583F43A1B7276A4FCC69C67CA64 SHA1: 86521C074738166B24B473E5F52D351068F9DAF0 SHA-256: AC14E7C8533A4397ACB4EA9BC8A10F84E1D09D63541F741275560E5B77F551BA SHA-512: 98A412FC0AA77302BAF543B8ECE2B087A1B42ED7784CE9931C918D340C1B73FC8EE94F567252481BF7600EBE3B5639D7C1720BFA717BB4A2919171B4F6439C48 Malicious: false Reputation: low Preview: ...... JFIF.....`.`...... Exif..MM.*...... Ducky...... P.....C...... C...... "...... }...... !1A..Qa."q.2....#B...R..$3br...... %&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz...... w...... !1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz...... ?..... (...(...(...... Q^s.~..t...n~"x&..wh..Mn.Z7S.R...F..Z...... a.F.\.e...... RU...8...LE(+.I/S..a..?gN.[.l.(...... Z'..E...Q...c...0...... X..ha...~.u.#...... [>.....E...... ?.lx_..-....c...... \..(.x.Y...0 ...... X.~....Mo...]B71...m..a...G.+Jx.5...7..lU.I:.Q.v...W..ho...... U...... 5...... Iv2......

    C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\KSU5XQMC\jquery.fancybox-min[1].js Process: C:\Program Files (x86)\Internet Explorer\iexplore.exe File Type: HTML document, UTF-8 Unicode text, with very long lines, with no line terminators Size (bytes): 45146 Entropy (8bit): 5.288635339321958 Encrypted: false MD5: E0C149811487DA3BA3DF8A4682138E89 SHA1: 4A0BCBCF91A7A96E5444EE1422CC05EF76521D17 SHA-256: 7429023D5896A5A7330174E15E7C139BB39D286EF55E1311EC8E9889082F57FF SHA-512: 5E1A09F168C8A4FDB04EB1B269147FE269DEAC2B188FED2D7D0DC3386EE1F2F9D73172077DEE60A00AE1B090E704E399CC4E51AB8AA85AD49A9AB27F48FBF AF9 Malicious: false Reputation: low Preview: (function(m,g,a,l){if(!a){return l}var f={speed:330,loop:true,opacity:"auto",margin:[44,0],gutter:30,:true,buttons:true,slideShow:true,fullScreen:true,thumbs:true, closeBtn:true,smallBtn:"auto",image:{preload:"auto",protect:false},ajax:{settings:{data:{fancybox:true}}},iframe:{tpl:'',preload:true,scrolling:"no",css:{}},baseClass:"",slideClass:"",baseTpl:'