URL:

https://mega.nz/#!Ylpj3LYY!yC5N06zT2Wxl3CnHbgtsA5-3Fp3rDKN5VTCu-J8M8dA

Full analysis: https://app.any.run/tasks/6b2c993d-13b5-42cf-938c-3ecf58d71fcf
Verdict: Malicious activity
Analysis date: June 16, 2018, 19:10:44
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

C156DBE1A3F718A4DC4BC9832D9096F5

SHA1:

DAF76B7A537D3A18A13838A7B902C469BC10D768

SHA256:

008D896691ADD86B5A9731D699BB2257B9FB0DAE1AA57A55B4DBE7C9DE0E73F4

SSDEEP:

3:N8X/iGEYVuSVcOdYrWZlW3kwDk:299pdvuUwDk

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • geometry dash auto speedhack.exe (PID: 3612)
      • geometry dash auto speedhack.exe (PID: 2564)
      • geometry dash auto speedhack.exe (PID: 1388)
      • geometry dash auto speedhack.exe (PID: 3036)
      • geometry dash auto speedhack.exe (PID: 3608)
      • geometry dash auto speedhack.exe (PID: 1988)
      • geometry dash auto speedhack.exe (PID: 3920)
      • geometry dash auto speedhack.exe (PID: 2760)
      • MEMZ.exe (PID: 2124)
      • MEMZ.exe (PID: 2884)
      • MEMZ.exe (PID: 3872)
      • MEMZ.exe (PID: 3252)
      • MEMZ.exe (PID: 2092)
      • MEMZ.exe (PID: 1500)
      • MEMZ.exe (PID: 572)
      • MEMZ.exe (PID: 1832)
      • MEMZ.exe (PID: 2364)
    • Low-level write access rights to disk partition

      • geometry dash auto speedhack.exe (PID: 2760)
      • MEMZ.exe (PID: 1832)
  • SUSPICIOUS

    • Application launched itself

      • software_reporter_tool.exe (PID: 3824)
      • geometry dash auto speedhack.exe (PID: 3036)
      • MEMZ.exe (PID: 3872)
    • Low-level read access rights to disk partition

      • geometry dash auto speedhack.exe (PID: 2760)
      • MEMZ.exe (PID: 1832)
    • Starts Internet Explorer

      • geometry dash auto speedhack.exe (PID: 2760)
      • MEMZ.exe (PID: 1832)
    • Executes scripts

      • cmd.exe (PID: 556)
    • Creates files in the user directory

      • cscript.exe (PID: 3252)
    • Executable content was dropped or overwritten

      • cscript.exe (PID: 3252)
    • Reads Internet Cache Settings

      • MEMZ.exe (PID: 1832)
  • INFO

    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3300)
      • iexplore.exe (PID: 3192)
      • iexplore.exe (PID: 3972)
      • iexplore.exe (PID: 3356)
      • iexplore.exe (PID: 3796)
      • iexplore.exe (PID: 1256)
      • iexplore.exe (PID: 356)
      • iexplore.exe (PID: 3864)
      • iexplore.exe (PID: 2208)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3192)
      • iexplore.exe (PID: 3972)
      • iexplore.exe (PID: 924)
      • iexplore.exe (PID: 3356)
      • iexplore.exe (PID: 3796)
      • iexplore.exe (PID: 1256)
      • iexplore.exe (PID: 996)
      • iexplore.exe (PID: 356)
      • iexplore.exe (PID: 2584)
      • iexplore.exe (PID: 3864)
      • iexplore.exe (PID: 4048)
      • iexplore.exe (PID: 2208)
    • Changes settings of System certificates

      • iexplore.exe (PID: 3300)
      • iexplore.exe (PID: 3972)
      • iexplore.exe (PID: 924)
      • iexplore.exe (PID: 4048)
    • Creates files in the user directory

      • iexplore.exe (PID: 3300)
      • iexplore.exe (PID: 3192)
      • iexplore.exe (PID: 3972)
      • iexplore.exe (PID: 924)
      • iexplore.exe (PID: 3356)
      • iexplore.exe (PID: 3796)
      • iexplore.exe (PID: 1256)
      • iexplore.exe (PID: 996)
      • iexplore.exe (PID: 356)
      • iexplore.exe (PID: 2584)
      • iexplore.exe (PID: 4048)
      • iexplore.exe (PID: 3864)
    • Dropped object may contain URL's

      • iexplore.exe (PID: 3192)
      • iexplore.exe (PID: 3300)
      • iexplore.exe (PID: 3812)
      • chrome.exe (PID: 3820)
      • iexplore.exe (PID: 924)
      • iexplore.exe (PID: 2908)
      • iexplore.exe (PID: 3972)
      • iexplore.exe (PID: 2716)
      • iexplore.exe (PID: 3356)
      • cscript.exe (PID: 3252)
      • iexplore.exe (PID: 3796)
      • iexplore.exe (PID: 860)
      • iexplore.exe (PID: 3276)
      • chrome.exe (PID: 1008)
      • chrome.exe (PID: 3304)
      • iexplore.exe (PID: 1420)
      • iexplore.exe (PID: 996)
      • iexplore.exe (PID: 356)
      • iexplore.exe (PID: 1516)
      • iexplore.exe (PID: 2584)
      • chrome.exe (PID: 2520)
      • iexplore.exe (PID: 1256)
      • iexplore.exe (PID: 4048)
      • iexplore.exe (PID: 1544)
      • iexplore.exe (PID: 2208)
      • iexplore.exe (PID: 3864)
    • Changes internet zones settings

      • iexplore.exe (PID: 3300)
      • iexplore.exe (PID: 2908)
      • iexplore.exe (PID: 3812)
      • iexplore.exe (PID: 2716)
      • iexplore.exe (PID: 860)
      • iexplore.exe (PID: 3276)
      • iexplore.exe (PID: 1420)
      • iexplore.exe (PID: 1516)
      • iexplore.exe (PID: 1544)
    • Application launched itself

      • iexplore.exe (PID: 3300)
      • chrome.exe (PID: 3820)
      • iexplore.exe (PID: 2716)
      • iexplore.exe (PID: 860)
      • chrome.exe (PID: 2520)
      • iexplore.exe (PID: 1544)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 3300)
      • iexplore.exe (PID: 3972)
      • iexplore.exe (PID: 924)
      • iexplore.exe (PID: 4048)
    • Loads the Task Scheduler COM API

      • software_reporter_tool.exe (PID: 3824)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2208)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
119
Monitored processes
71
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs software_reporter_tool.exe no specs chrome.exe no specs software_reporter_tool.exe no specs chrome.exe no specs 7zfm.exe no specs geometry dash auto speedhack.exe no specs geometry dash auto speedhack.exe geometry dash auto speedhack.exe no specs geometry dash auto speedhack.exe no specs geometry dash auto speedhack.exe no specs geometry dash auto speedhack.exe no specs geometry dash auto speedhack.exe no specs geometry dash auto speedhack.exe notepad.exe no specs iexplore.exe iexplore.exe iexplore.exe iexplore.exe notepad.exe no specs notepad.exe no specs iexplore.exe iexplore.exe cmd.exe no specs cscript.exe memz.exe no specs memz.exe no specs memz.exe memz.exe no specs memz.exe no specs memz.exe no specs memz.exe no specs memz.exe no specs memz.exe notepad.exe no specs notepad.exe no specs iexplore.exe iexplore.exe iexplore.exe iexplore.exe explorer.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs iexplore.exe iexplore.exe chrome.exe no specs iexplore.exe iexplore.exe iexplore.exe iexplore.exe cmd.exe no specs iexplore.exe iexplore.exe iexplore.exe taskmgr.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
356"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1516 CREDAT:79873C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
556cmd /c ""C:\Users\admin\Desktop\Geometry dash auto speedhack.bat" "C:\Windows\system32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
572"C:\Users\admin\AppData\Roaming\MEMZ.exe" /watchdogC:\Users\admin\AppData\Roaming\MEMZ.exeMEMZ.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\roaming\memz.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
820"C:\Windows\System32\notepad.exe" \note.txtC:\Windows\System32\notepad.exegeometry dash auto speedhack.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
860"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
geometry dash auto speedhack.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
924"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2908 CREDAT:79873C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
996"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1420 CREDAT:79873C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1008"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1688,4510938634492242320,4604477493603384802,131072 --lang=en-US --utility-allowed-dir="C:\Users\admin\AppData\Local\Temp\scoped_dir2520_4510" --service-request-channel-token=9F645F42055E9C328109A8AECA222196 --mojo-platform-channel-handle=3464 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
61.0.3163.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\61.0.3163.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1256"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3276 CREDAT:79873C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1348"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1688,4510938634492242320,4604477493603384802,131072 --service-pipe-token=3AD7A0E12D97BBE3FEFF0C57C06AAB97 --lang=en-US --disable-client-side-phishing-detection --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --blink-settings=disallowFetchForDocWrittenScriptsInMainFrame=false,disallowFetchForDocWrittenScriptsInMainFrameOnSlowConnections=true --enable-pinch --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553 --disable-accelerated-video-decode --disable-gpu-compositing --enable-gpu-async-worker-context --service-request-channel-token=3AD7A0E12D97BBE3FEFF0C57C06AAB97 --renderer-client-id=9 --mojo-platform-channel-handle=3728 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google Inc.
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
61.0.3163.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\61.0.3163.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
6 159
Read events
4 994
Write events
1 139
Delete events
26

Modification events

(PID) Process:(3300) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3300) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3300) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(3300) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(3300) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3300) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(3300) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
Operation:writeName:{00E7B403-7199-11E8-B27F-5254004AAD21}
Value:
0
(PID) Process:(3300) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Type
Value:
4
(PID) Process:(3300) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Count
Value:
5
(PID) Process:(3300) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Time
Value:
E20706000600100013000B000000A102
Executable files
1
Suspicious files
116
Text files
405
Unknown types
38

Dropped files

PID
Process
Filename
Type
3300iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
3300iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF6702E8911E1DEB4E.TMP
MD5:
SHA256:
3300iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF51D23DC692313EAB.TMP
MD5:
SHA256:
3300iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFAA52442EC12ED479.TMP
MD5:
SHA256:
3300iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{00E7B404-7199-11E8-B27F-5254004AAD21}.dat
MD5:
SHA256:
3300iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF0C0C2F0EAC333284.TMP
MD5:
SHA256:
3300iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{00E7B403-7199-11E8-B27F-5254004AAD21}.dat
MD5:
SHA256:
3192iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\WF2FXMJU\mega_nz[1].htmhtml
MD5:
SHA256:
3192iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\index.datdat
MD5:
SHA256:
3820chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000040.dbtmp
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
53
TCP/UDP connections
124
DNS requests
57
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3796
iexplore.exe
GET
172.217.16.164:80
http://google.co.ck/search?q=virus+builder+legit+free+download
US
whitelisted
3972
iexplore.exe
GET
304
2.16.186.56:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
unknown
whitelisted
3972
iexplore.exe
GET
304
2.16.186.56:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
unknown
whitelisted
3820
chrome.exe
GET
200
178.255.83.1:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBReAhtobFzTvhaRmVeJ38QUchY9AwQUu69%2BAj36pvE8hI6t7jiY7NkyMtQCEAanQ4DU6%2F7UNbWj9%2BFqvdg%3D
GB
der
727 b
whitelisted
3972
iexplore.exe
GET
301
104.111.218.180:80
http://answers.microsoft.com/en-us/protect/forum/protect_other-protect_scanning/memz-malwarevirus-trojan-completely-destroying/268bc1c2-39f4-42f8-90c2-597a673b6b45
NL
html
287 b
whitelisted
3356
iexplore.exe
GET
302
172.217.16.164:80
http://google.co.ck/search?q=how+to+send+a+virus+to+my+friend
US
html
382 b
whitelisted
924
iexplore.exe
GET
302
172.217.16.164:80
http://google.co.ck/search?q=g3t+r3kt
US
html
346 b
whitelisted
3796
iexplore.exe
GET
503
216.58.207.36:80
http://www.google.com/sorry/index?continue=http://google.co.ck/search%3Fq%3Dhow%2B2%2Bremove%2Ba%2Bvirus&q=EgTZk1kXGP7CldkFIhkA8aeDSzrwa3lIbHLNdNyWaX0XGkIjJBwEMgFy
US
html
2.50 Kb
malicious
3796
iexplore.exe
POST
503
216.58.207.36:80
http://www.google.com/sorry/index
US
html
2.50 Kb
malicious
3356
iexplore.exe
GET
503
216.58.207.36:80
http://www.google.com/sorry/index?continue=http://google.co.ck/search%3Fq%3Dhow%2Bto%2Bsend%2Ba%2Bvirus%2Bto%2Bmy%2Bfriend&q=EgTZk1kXGNDCldkFIhkA8aeDSxIC-SZAqfBRZq5gufQP5rfbUbz9MgFy
US
html
2.54 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3300
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
3820
chrome.exe
172.217.16.163:443
www.google.ru
Google Inc.
US
whitelisted
3820
chrome.exe
172.217.23.142:443
apis.google.com
Google Inc.
US
whitelisted
3820
chrome.exe
216.58.207.36:443
www.google.com
Google Inc.
US
whitelisted
3192
iexplore.exe
31.216.148.10:443
mega.nz
Datacenter Luxembourg S.A.
LU
unknown
3300
iexplore.exe
31.216.148.10:443
mega.nz
Datacenter Luxembourg S.A.
LU
unknown
3820
chrome.exe
31.216.148.11:443
eu.static.mega.co.nz
Datacenter Luxembourg S.A.
LU
unknown
3972
iexplore.exe
104.111.218.180:80
answers.microsoft.com
Akamai International B.V.
NL
whitelisted
3820
chrome.exe
216.58.210.3:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
3820
chrome.exe
216.58.208.35:443
www.gstatic.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
  • 204.79.197.229
whitelisted
mega.nz
  • 31.216.148.10
whitelisted
clientservices.googleapis.com
  • 216.58.210.3
whitelisted
www.google.ru
  • 172.217.16.163
whitelisted
ssl.gstatic.com
  • 216.58.210.3
whitelisted
www.gstatic.com
  • 216.58.208.35
  • 216.58.210.3
whitelisted
apis.google.com
  • 172.217.23.142
whitelisted
www.google.com
  • 216.58.207.36
  • 216.58.205.228
  • 216.58.214.100
malicious
ocsp.usertrust.com
  • 178.255.83.1
whitelisted
ocsp.comodoca.com
  • 178.255.83.1
whitelisted

Threats

No threats detected
No debug info