URL:

https://nhentai.net

Full analysis: https://app.any.run/tasks/16388d4b-a307-437a-b669-de206bddb642
Verdict: No threats detected
Analysis date: December 14, 2019, 07:20:26
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

26D705AC0CC86F01100AB0C4FAD731DC

SHA1:

BF0E8B66CD5A25BE0FEAA3D662992BE427C805F6

SHA256:

025CD83AE01CDC332A1698EC3ACEEC7C84B83557F5388968E02831E877688E07

SSDEEP:

3:N880n:280

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Changes internet zones settings

      • iexplore.exe (PID: 2528)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2528)
    • Creates files in the user directory

      • iexplore.exe (PID: 1732)
      • iexplore.exe (PID: 2528)
    • Application launched itself

      • iexplore.exe (PID: 2528)
    • Reads internet explorer settings

      • iexplore.exe (PID: 1732)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2528)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2528)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 1732)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
1732"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2528 CREDAT:71937C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2528"C:\Program Files\Internet Explorer\iexplore.exe" "https://nhentai.net"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
407
Read events
343
Write events
63
Delete events
1

Modification events

(PID) Process:(2528) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2528) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2528) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2528) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(2528) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2528) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
4600000092000000010000000000000000000000000000000000000000000000C0E333BBEAB1D301000000000000000000000000020000001700000000000000FE800000000000007D6CB050D9C573F70B000000000000006D00330032005C004D00530049004D004700330032002E0064006C000100000004AA400014AA4000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000C0A8016400000000000000000000000000000000000000000800000000000000805D3F00983740000008000002000000000000600000002060040000B8A94000020000008802000060040000B8A9400004000000F8010000B284000088B64000B84B400043003A000000000000000000000000000000000000000000
(PID) Process:(2528) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
Operation:writeName:{3BF28BCF-1E42-11EA-AB41-5254004A04AF}
Value:
0
(PID) Process:(2528) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Type
Value:
4
(PID) Process:(2528) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Count
Value:
2
(PID) Process:(2528) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Time
Value:
E3070C0006000E00070014002A001B01
Executable files
0
Suspicious files
0
Text files
34
Unknown types
7

Dropped files

PID
Process
Filename
Type
2528iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LH043OAM\favicon[1].ico
MD5:
SHA256:
2528iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
1732iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\JHWNGGLD\nhentai_net[1].txt
MD5:
SHA256:
1732iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\index.datdat
MD5:56611BAF46F431591A73C84C7A02CEB1
SHA256:503053F23CB547F62E6530B1A246F8A7690C159176CC005E4D9DB4248CDB1B39
1732iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\admin@nhentai[1].txttext
MD5:9C9E267A6A232E578A3080C8F1265814
SHA256:921B186BE2906CFE43E33C38C0FC46AA2EBFFA65C795B84CEFB76E13544EE72A
1732iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.datdat
MD5:9D7D4444E487D2E7B4630E241CEF7C4E
SHA256:D9C81D82156E9F3BFA5B30135FCF90321CA3F8A8F910EAE6709771EBC2578BA7
1732iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\3VOJ6CPV\main_style.05d924b7da41[1].csstext
MD5:05D924B7DA413821B625A441B050677C
SHA256:FF022E1BC2CD2E27F8621B03B528CEB1217DD8338D4A63895F8A813252DBE790
1732iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MU05E2NR\73104[1].txt
MD5:
SHA256:
1732iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\JHWNGGLD\10000815[1].htmhtml
MD5:4506A9633FCBFCB7307BF7EC4D503B35
SHA256:43A6D75CCC9D3E64FE1A835757500EAFF9FCD4288F0F93ED6D769672B3B32D83
1732iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\JHWNGGLD\desktop.iniini
MD5:4A3DEB274BB5F0212C2419D3D8D08612
SHA256:2842973D15A14323E08598BE1DFB87E54BF88A76BE8C7BC94C56B079446EDF38
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
23
DNS requests
12
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2528
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1732
iexplore.exe
104.27.205.92:443
nhentai.net
Cloudflare Inc
US
unknown
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
1732
iexplore.exe
104.17.65.4:443
cdnjs.cloudflare.com
Cloudflare Inc
US
unknown
1732
iexplore.exe
172.217.23.106:443
fonts.googleapis.com
Google Inc.
US
whitelisted
1732
iexplore.exe
104.27.204.92:443
nhentai.net
Cloudflare Inc
US
unknown
1732
iexplore.exe
172.217.22.3:443
fonts.gstatic.com
Google Inc.
US
whitelisted
1732
iexplore.exe
66.254.114.38:443
ads.trafficjunky.net
Reflected Networks, Inc.
US
unknown
1732
iexplore.exe
172.217.21.238:443
www.google-analytics.com
Google Inc.
US
whitelisted
1732
iexplore.exe
216.18.168.166:443
a.adtng.com
Reflected Networks, Inc.
US
suspicious
2528
iexplore.exe
104.27.205.92:443
nhentai.net
Cloudflare Inc
US
unknown

DNS requests

Domain
IP
Reputation
nhentai.net
  • 104.27.205.92
  • 104.27.204.92
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
cdnjs.cloudflare.com
  • 104.17.65.4
  • 104.17.64.4
whitelisted
fonts.googleapis.com
  • 172.217.23.106
whitelisted
static.nhentai.net
  • 104.27.204.92
  • 104.27.205.92
malicious
fonts.gstatic.com
  • 172.217.22.3
whitelisted
ads.trafficjunky.net
  • 66.254.114.38
whitelisted
www.google-analytics.com
  • 172.217.21.238
whitelisted
a.adtng.com
  • 216.18.168.166
whitelisted
vz-cdn2.contentabc.com
  • 192.229.221.214
unknown

Threats

No threats detected
No debug info