General Info

URL

http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf

Full analysis
https://app.any.run/tasks/22fd0c9c-1e1f-4626-9982-d9edc7155565
Verdict
Malicious activity
Analysis date
7/17/2019, 17:02:18
OS:
Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distored by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.

Software environment set and analysis options

Launch configuration

Task duration
60 seconds
Additional time used
none
Fakenet option
off
Heavy Evaision option
off
MITM proxy
off
Route via Tor
off
Network geolocation
off
Privacy
Public submission
Autoconfirmation of UAC
on

Software preset

  • Internet Explorer 8.0.7601.17514
  • Adobe Acrobat Reader DC MUI (15.023.20070)
  • Adobe Flash Player 26 ActiveX (26.0.0.131)
  • Adobe Flash Player 26 NPAPI (26.0.0.131)
  • Adobe Flash Player 26 PPAPI (26.0.0.131)
  • Adobe Refresh Manager (1.8.0)
  • CCleaner (5.35)
  • FileZilla Client 3.36.0 (3.36.0)
  • Google Chrome (75.0.3770.100)
  • Google Update Helper (1.3.34.7)
  • Java 8 Update 92 (8.0.920.14)
  • Java Auto Updater (2.8.92.14)
  • Microsoft .NET Framework 4.7.2 (4.7.03062)
  • Microsoft Office Access MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Access Setup Metadata MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Excel MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office OneNote MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Outlook MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office PowerPoint MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Professional 2010 (14.0.6029.1000)
  • Microsoft Office Proof (English) 2010 (14.0.6029.1000)
  • Microsoft Office Proof (French) 2010 (14.0.6029.1000)
  • Microsoft Office Proof (Spanish) 2010 (14.0.6029.1000)
  • Microsoft Office Proofing (English) 2010 (14.0.6029.1000)
  • Microsoft Office Publisher MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Shared MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Shared Setup Metadata MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Single Image 2010 (14.0.6029.1000)
  • Microsoft Office Word MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (9.0.30729.6161)
  • Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219 (10.0.40219)
  • Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.30501 (12.0.30501.0)
  • Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005 (12.0.21005)
  • Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005 (12.0.21005)
  • Microsoft Visual C++ 2015-2019 Redistributable (x86) - 14.21.27702 (14.21.27702.2)
  • Microsoft Visual C++ 2019 X86 Additional Runtime - 14.21.27702 (14.21.27702)
  • Microsoft Visual C++ 2019 X86 Minimum Runtime - 14.21.27702 (14.21.27702)
  • Mozilla Firefox 67.0.4 (x86 en-US) (67.0.4)
  • Notepad++ (32-bit x86) (7.5.1)
  • Opera 12.15 (12.15.1748)
  • Skype version 8.29 (8.29)
  • Update for Microsoft .NET Framework 4.7.2 (KB4087364) (1)
  • VLC media player (2.2.6)
  • WinRAR 5.60 (32-bit) (5.60.0)

Hotfixes

  • Client LanguagePack Package
  • Client Refresh LanguagePack Package
  • CodecPack Basic Package
  • Foundation Package
  • IE Troubleshooters Package
  • InternetExplorer Optional Package
  • KB2534111
  • KB2999226
  • KB4019990
  • KB976902
  • LocalPack AU Package
  • LocalPack CA Package
  • LocalPack GB Package
  • LocalPack US Package
  • LocalPack ZA Package
  • ProfessionalEdition
  • UltimateEdition

Behavior activities

MALICIOUS SUSPICIOUS INFO

No malicious indicators.

No suspicious indicators.

Creates files in the user directory
  • iexplore.exe (PID: 3068)
Application launched itself
  • iexplore.exe (PID: 2844)
  • RdrCEF.exe (PID: 3208)
Changes internet zones settings
  • iexplore.exe (PID: 2844)
Reads Internet Cache Settings
  • iexplore.exe (PID: 3068)

Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Screenshots

Processes

Total processes
43
Monitored processes
11
Malicious processes
0
Suspicious processes
0

Behavior graph

+
start iexplore.exe iexplore.exe acrord32.exe no specs acrord32.exe acrord32.exe no specs rdrcef.exe no specs rdrcef.exe no specs rdrcef.exe no specs rdrcef.exe no specs adobearm.exe no specs reader_sl.exe no specs
Specs description
Program did not start
Integrity level elevation
Task сontains an error or was rebooted
Process has crashed
Task contains several apps running
Executable file was dropped
Debug information is available
Process was injected
Network attacks were detected
Application downloaded the executable file
Actions similar to stealing personal data
Behavior similar to exploiting the vulnerability
Inspected object has sucpicious PE structure
File is detected by antivirus software
CPU overrun
RAM overrun
Process starts the services
Process was added to the startup
Behavior similar to spam
Low-level access to the HDD
Probably Tor was used
System was rebooted
Connects to the network
Known threat

Process information

Click at the process to see the details.

PID
2844
CMD
"C:\Program Files\Internet Explorer\iexplore.exe" -nohome
Path
C:\Program Files\Internet Explorer\iexplore.exe
Indicators
Parent process
––
User
admin
Integrity Level
MEDIUM
Version:
Company
Microsoft Corporation
Description
Internet Explorer
Version
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Image
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\shell32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\psapi.dll
c:\windows\system32\oleacc.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\profapi.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\comdlg32.dll
c:\windows\system32\cryptbase.dll
c:\program files\internet explorer\sqmapi.dll
c:\windows\system32\rpcrtremote.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\rasman.dll
c:\windows\system32\rtutils.dll
c:\windows\system32\sensapi.dll
c:\windows\system32\nlaapi.dll
c:\windows\system32\rasadhlp.dll
c:\windows\system32\ieui.dll
c:\windows\system32\msimg32.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\clbcatq.dll
c:\program files\internet explorer\ieproxy.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\url.dll
c:\windows\system32\version.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\propsys.dll
c:\windows\system32\xmllite.dll
c:\windows\system32\explorerframe.dll
c:\windows\system32\duser.dll
c:\windows\system32\dui70.dll
c:\windows\system32\msfeeds.dll
c:\windows\system32\sxs.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\system32\normaliz.dll
c:\windows\system32\wship6.dll
c:\windows\system32\fwpuclnt.dll
c:\windows\system32\mlang.dll
c:\windows\system32\mssprxy.dll

PID
3068
CMD
"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2844 CREDAT:71937
Path
C:\Program Files\Internet Explorer\iexplore.exe
Indicators
Parent process
iexplore.exe
User
admin
Integrity Level
LOW
Version:
Company
Microsoft Corporation
Description
Internet Explorer
Version
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Image
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\shell32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\psapi.dll
c:\windows\system32\oleacc.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\comdlg32.dll
c:\program files\internet explorer\ieshims.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\rpcrtremote.dll
c:\program files\internet explorer\sqmapi.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\propsys.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\profapi.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\rsaenh.dll
c:\program files\internet explorer\ieproxy.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\mlang.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\apphelp.dll
c:\program files\java\jre1.8.0_92\bin\ssv.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\version.dll
c:\progra~1\micros~1\office14\urlredir.dll
c:\windows\system32\secur32.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\progra~1\micros~1\office14\msohev.dll
c:\program files\java\jre1.8.0_92\bin\jp2ssv.dll
c:\program files\java\jre1.8.0_92\bin\msvcr100.dll
c:\program files\java\jre1.8.0_92\bin\deploy.dll
c:\windows\system32\imagehlp.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\sxs.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\rasman.dll
c:\windows\system32\rtutils.dll
c:\windows\system32\sensapi.dll
c:\windows\system32\nlaapi.dll
c:\windows\system32\rasadhlp.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\system32\normaliz.dll
c:\windows\system32\wship6.dll
c:\windows\system32\fwpuclnt.dll
c:\windows\system32\wpc.dll
c:\windows\system32\userenv.dll
c:\windows\system32\wevtapi.dll
c:\windows\system32\samcli.dll
c:\windows\system32\samlib.dll
c:\windows\system32\netutils.dll
c:\program files\common files\adobe\acrobat\activex\acropdf.dll
c:\program files\common files\adobe\acrobat\activex\acropdfimpl.dll
c:\windows\system32\mpr.dll
c:\windows\system32\msvcp120.dll
c:\windows\system32\msvcr120.dll
c:\program files\adobe\acrobat reader dc\reader\acrord32.exe

PID
3408
CMD
"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" /o /eo /l /b /id 3068
Path
C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
Indicators
No indicators
Parent process
iexplore.exe
User
admin
Integrity Level
LOW
Exit code
0
Version:
Company
Adobe Systems Incorporated
Description
Adobe Acrobat Reader DC
Version
15.23.20070.215641
Modules
Image
c:\program files\adobe\acrobat reader dc\reader\acrord32.exe
c:\systemroot\system32\ntdll.dll

PID
3724
CMD
"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" /o /eo /l /b /id 3068
Path
C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
Indicators
Parent process
iexplore.exe
User
admin
Integrity Level
MEDIUM
Version:
Company
Adobe Systems Incorporated
Description
Adobe Acrobat Reader DC
Version
15.23.20070.215641
Modules
Image
c:\program files\adobe\acrobat reader dc\reader\acrord32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\shell32.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\kbdus.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\profapi.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\psapi.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\explorerframe.dll
c:\windows\system32\duser.dll
c:\windows\system32\dui70.dll
c:\windows\system32\propsys.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\sspicli.dll
c:\program files\adobe\acrobat reader dc\reader\acrocef\rdrcef.exe
c:\windows\system32\wininet.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\system32\userenv.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\schannel.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\rasman.dll
c:\windows\system32\rtutils.dll
c:\windows\system32\sensapi.dll
c:\windows\system32\nlaapi.dll
c:\windows\system32\rasadhlp.dll
c:\windows\system32\wship6.dll
c:\windows\system32\fwpuclnt.dll
c:\windows\system32\credssp.dll
c:\windows\system32\secur32.dll
c:\windows\system32\ncrypt.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\gpapi.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\sfc.dll
c:\windows\system32\sfc_os.dll
c:\windows\system32\devrtl.dll
c:\program files\common files\adobe\arm\1.0\adobearm.exe
c:\windows\system32\mpr.dll

PID
3476
CMD
"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" --type=renderer /o /eo /l /b /id 3068
Path
C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
Indicators
No indicators
Parent process
AcroRd32.exe
User
admin
Integrity Level
LOW
Version:
Company
Adobe Systems Incorporated
Description
Adobe Acrobat Reader DC
Version
15.23.20070.215641
Modules
Image
c:\program files\adobe\acrobat reader dc\reader\acrord32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\shell32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\ole32.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\ntmarta.dll
c:\program files\adobe\acrobat reader dc\reader\acrord32.dll
c:\program files\adobe\acrobat reader dc\reader\agm.dll
c:\windows\system32\msvcp120.dll
c:\windows\system32\msvcr120.dll
c:\windows\system32\version.dll
c:\program files\adobe\acrobat reader dc\reader\bib.dll
c:\program files\adobe\acrobat reader dc\reader\cooltype.dll
c:\program files\adobe\acrobat reader dc\reader\ace.dll
c:\windows\system32\psapi.dll
c:\windows\system32\profapi.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\rasman.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\rtutils.dll
c:\program files\adobe\acrobat reader dc\reader\cryptocme.dll
c:\program files\adobe\acrobat reader dc\reader\ccme_base.dll
c:\program files\adobe\acrobat reader dc\reader\ccme_base_non_fips.dll
c:\program files\adobe\acrobat reader dc\reader\ccme_asym.dll
c:\program files\adobe\acrobat reader dc\reader\ccme_ecc.dll
c:\program files\adobe\acrobat reader dc\reader\ccme_ecdrbg.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\program files\adobe\acrobat reader dc\reader\axe8sharedexpat.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\propsys.dll
c:\windows\system32\msftedit.dll
c:\windows\system32\msls31.dll
c:\program files\adobe\acrobat reader dc\reader\sqlite.dll
c:\program files\adobe\acrobat reader dc\reader\plug_ins\ia32.api
c:\windows\system32\wininet.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\mscms.dll
c:\windows\system32\userenv.dll
c:\program files\adobe\acrobat reader dc\reader\plug_ins\updater.api

PID
3208
CMD
"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16448250
Path
C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
Indicators
No indicators
Parent process
AcroRd32.exe
User
admin
Integrity Level
MEDIUM
Version:
Company
Adobe Systems Incorporated
Description
Adobe RdrCEF
Version
15.23.20053.211670
Modules
Image
c:\program files\adobe\acrobat reader dc\reader\acrocef\rdrcef.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\winmm.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\program files\adobe\acrobat reader dc\reader\acrocef\libcef.dll
c:\windows\system32\psapi.dll
c:\windows\system32\winspool.drv
c:\windows\system32\comdlg32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\oleacc.dll
c:\windows\system32\version.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\kbdus.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\nlaapi.dll
c:\windows\system32\audioses.dll
c:\windows\system32\mmdevapi.dll
c:\windows\system32\propsys.dll
c:\windows\system32\dhcpcsvc6.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\apphelp.dll

PID
2616
CMD
"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-3d-apis --disable-databases --disable-direct-npapi-requests --disable-file-system --disable-notifications --disable-shared-workers --disable-direct-write --lang=en-US --lang=en-US --log-severity=disable --product-version="ReaderServices/15.23.20053 Chrome/45.0.2454.85" --device-scale-factor=1 --enable-delegated-renderer --num-raster-threads=2 --gpu-rasterization-msaa-sample-count=8 --content-image-texture-target=3553 --video-image-texture-target=3553 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --channel="3208.0.672857324\898492145" --allow-no-sandbox-job /prefetch:673131151
Path
C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
Indicators
No indicators
Parent process
RdrCEF.exe
User
admin
Integrity Level
LOW
Exit code
0
Version:
Company
Adobe Systems Incorporated
Description
Adobe RdrCEF
Version
15.23.20053.211670
Modules
Image
c:\program files\adobe\acrobat reader dc\reader\acrocef\rdrcef.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\winmm.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\program files\adobe\acrobat reader dc\reader\acrocef\libcef.dll
c:\windows\system32\psapi.dll
c:\windows\system32\winspool.drv
c:\windows\system32\comdlg32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\oleacc.dll
c:\windows\system32\version.dll
c:\windows\system32\cryptbase.dll

PID
2944
CMD
"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-3d-apis --disable-databases --disable-direct-npapi-requests --disable-file-system --disable-notifications --disable-shared-workers --disable-direct-write --lang=en-US --lang=en-US --log-severity=disable --product-version="ReaderServices/15.23.20053 Chrome/45.0.2454.85" --device-scale-factor=1 --enable-delegated-renderer --num-raster-threads=2 --gpu-rasterization-msaa-sample-count=8 --content-image-texture-target=3553 --video-image-texture-target=3553 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --channel="3208.1.1535973508\774382319" --allow-no-sandbox-job /prefetch:673131151
Path
C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
Indicators
No indicators
Parent process
RdrCEF.exe
User
admin
Integrity Level
LOW
Version:
Company
Adobe Systems Incorporated
Description
Adobe RdrCEF
Version
15.23.20053.211670
Modules
Image
c:\program files\adobe\acrobat reader dc\reader\acrocef\rdrcef.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\winmm.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\program files\adobe\acrobat reader dc\reader\acrocef\libcef.dll
c:\windows\system32\psapi.dll
c:\windows\system32\winspool.drv
c:\windows\system32\comdlg32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\oleacc.dll
c:\windows\system32\version.dll
c:\windows\system32\cryptbase.dll

PID
3488
CMD
"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-3d-apis --disable-databases --disable-direct-npapi-requests --disable-file-system --disable-notifications --disable-shared-workers --disable-direct-write --lang=en-US --lang=en-US --log-severity=disable --product-version="ReaderServices/15.23.20053 Chrome/45.0.2454.85" --device-scale-factor=1 --enable-delegated-renderer --num-raster-threads=2 --gpu-rasterization-msaa-sample-count=8 --content-image-texture-target=3553 --video-image-texture-target=3553 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --channel="3208.2.143042095\168939005" --allow-no-sandbox-job /prefetch:673131151
Path
C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
Indicators
No indicators
Parent process
RdrCEF.exe
User
admin
Integrity Level
LOW
Version:
Company
Adobe Systems Incorporated
Description
Adobe RdrCEF
Version
15.23.20053.211670
Modules
Image
c:\program files\adobe\acrobat reader dc\reader\acrocef\rdrcef.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\winmm.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\program files\adobe\acrobat reader dc\reader\acrocef\libcef.dll
c:\windows\system32\psapi.dll
c:\windows\system32\winspool.drv
c:\windows\system32\comdlg32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\oleacc.dll
c:\windows\system32\version.dll
c:\windows\system32\cryptbase.dll

PID
2328
CMD
"C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" /PRODUCT:Reader /VERSION:15.0 /MODE:3
Path
C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe
Indicators
No indicators
Parent process
AcroRd32.exe
User
admin
Integrity Level
MEDIUM
Version:
Company
Adobe Systems Incorporated
Description
Adobe Reader and Acrobat Manager
Version
1.824.27.2646
Modules
Image
c:\program files\common files\adobe\arm\1.0\adobearm.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\ole32.dll
c:\windows\system32\psapi.dll
c:\windows\system32\version.dll
c:\windows\system32\wininet.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\sensapi.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\comdlg32.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\shell32.dll
c:\windows\system32\winspool.drv
c:\windows\system32\wintrust.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\propsys.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\apphelp.dll
c:\program files\adobe\acrobat reader dc\reader\reader_sl.exe
c:\windows\system32\normaliz.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\rpcrtremote.dll
c:\windows\system32\qmgrprxy.dll

PID
3840
CMD
"C:\Program Files\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe"
Path
C:\Program Files\Adobe\Acrobat Reader DC\Reader\Reader_sl.exe
Indicators
No indicators
Parent process
AdobeARM.exe
User
admin
Integrity Level
MEDIUM
Version:
Company
Adobe Systems Incorporated
Description
Adobe Acrobat SpeedLauncher
Version
15.23.20053.211670
Modules
Image
c:\program files\adobe\acrobat reader dc\reader\reader_sl.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcp120.dll
c:\windows\system32\msvcr120.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll

Registry activity

Total events
550
Read events
465
Write events
83
Delete events
2

Modification events

PID
Process
Operation
Key
Name
Value
2844
iexplore.exe
delete key
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012019032320190324
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
CompatibilityFlags
0
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
SecuritySafe
1
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
ProxyEnable
0
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
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
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
{E7878149-A8A3-11E9-B506-5254004A04AF}
0
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Type
4
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Count
1
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Time
E3070700030011000F0002002200F401
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{789FE86F-6FC4-46A1-9849-EDE0DB0C95CA}\iexplore
Type
4
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{789FE86F-6FC4-46A1-9849-EDE0DB0C95CA}\iexplore
Count
1
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{789FE86F-6FC4-46A1-9849-EDE0DB0C95CA}\iexplore
Time
E3070700030011000F0002002200F401
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
FullScreen
no
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Window_Placement
2C0000000200000003000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF20000000200000004003000078020000
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Favorites\Links
Order
08000000020000000C01000001000000020000007E0000000000000070003200EC000000464B245120005355474745537E312E55524C0000540008000400EFBE454B974D464B24512A000000F94300000000020000000000000000000000000000005300750067006700650073007400650064002000530069007400650073002E00750072006C0000001C00000000000000820000000100000074003200E2000000464B24512000574542534C497E312E55524C0000580008000400EFBE454B864A464B24512A000000743E0000000003000000000000000000000000000000570065006200200053006C006900630065002000470061006C006C006500720079002E00750072006C0000001C00000000000000
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\iexplore
Type
3
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\iexplore
Count
1
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\iexplore
Time
E3070700030011000F0002002200A002
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\iexplore
LoadTime
15
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B4F3A835-0E21-4959-BA22-42B3008E02FF}\iexplore
Type
3
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B4F3A835-0E21-4959-BA22-42B3008E02FF}\iexplore
Count
1
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B4F3A835-0E21-4959-BA22-42B3008E02FF}\iexplore
Time
E3070700030011000F0002002200BF02
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B4F3A835-0E21-4959-BA22-42B3008E02FF}\iexplore
LoadTime
218
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore
Type
3
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore
Count
1
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore
Time
E3070700030011000F00020022008A03
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore
LoadTime
48
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012019071720190718
CachePath
%USERPROFILE%\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019071720190718
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012019071720190718
CachePrefix
:2019071720190718:
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012019071720190718
CacheLimit
8192
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012019071720190718
CacheOptions
11
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012019071720190718
CacheRepair
0
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\WindowsSearch
UpgradeTime
F671FBAAB03CD501
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
Path
C:\Users\admin\Favorites\Links\Suggested Sites.url
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
Handler
{B0FA7D7C-7195-4F03-B03E-9DC1C9EBC394}
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
FeedUrl
https://ieonline.microsoft.com/#ieslice
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
DisplayName
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
ErrorState
0
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
DisplayMask
0
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
Path
C:\Users\admin\Favorites\Links\Web Slice Gallery.url
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
Handler
{B0FA7D7C-7195-4F03-B03E-9DC1C9EBC394}
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
FeedUrl
http://go.microsoft.com/fwlink/?LinkId=121315
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
DisplayName
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
ErrorState
0
2844
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
DisplayMask
0
3068
iexplore.exe
delete key
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\LowCache\Extensible Cache\MSHist012018082820180829
3068
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\LowCache\Extensible Cache\MSHist012019071720190718
CachePath
%USERPROFILE%\AppData\Local\Microsoft\Windows\History\Low\History.IE5\MSHist012019071720190718
3068
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\LowCache\Extensible Cache\MSHist012019071720190718
CachePrefix
:2019071720190718:
3068
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\LowCache\Extensible Cache\MSHist012019071720190718
CacheLimit
8192
3068
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\LowCache\Extensible Cache\MSHist012019071720190718
CacheOptions
11
3068
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\LowCache\Extensible Cache\MSHist012019071720190718
CacheRepair
0
3724
AcroRd32.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
ProxyEnable
0
3724
AcroRd32.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
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
3724
AcroRd32.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\70\52C64B7E
LanguageList
en-US
3724
AcroRd32.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
3724
AcroRd32.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1
3476
AcroRd32.exe
write
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\ExitSection
bLastExitNormal
0
3476
AcroRd32.exe
write
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\AVGeneral
bExpandRHPInViewer
1
3476
AcroRd32.exe
write
HKEY_CURRENT_USER\Software\Adobe\Acrobat Reader\DC\SDI
bMaximizeNextDocument
0
2328
AdobeARM.exe
write
HKEY_CURRENT_USER\Software\Adobe\Adobe ARM\1.0\ARM
iSpeedLauncherLogonTime
BE37F6099831D501
2328
AdobeARM.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
2328
AdobeARM.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1

Files activity

Executable files
0
Suspicious files
2
Text files
9
Unknown types
16

Dropped files

PID
Process
Filename
Type
3476
AcroRd32.exe
C:\Users\admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
sqlite
MD5: 6194822702f617c52feb668d1182c59e
SHA256: 809a0a88213a53f1594c548bdb27612217a89c70dc1d9c6c42b460b048d8db84
3068
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\4YSO3GRA\archer_parts_catalog[1].pdf
pdf
MD5: 34061c8f9518248761959c43aae09c69
SHA256: 560b151c882226652dd3504362285a8a3b74c6ce523e5c750e394820aa361a75
3476
AcroRd32.exe
C:\Users\admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages-journal
––
MD5:  ––
SHA256:  ––
3476
AcroRd32.exe
C:\Users\admin\AppData\Local\Temp\acrord32_sbx\A9R1va637n_15xd1xy_2ok.tmp
––
MD5:  ––
SHA256:  ––
3476
AcroRd32.exe
C:\Users\admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
sqlite
MD5: 35f5d466a35322a634e712cab6b8654e
SHA256: b49e53352dec2d222a85b2807808e8dff39088253521cce07e261822082e942d
3476
AcroRd32.exe
C:\Users\admin\AppData\Local\Temp\acrord32_sbx\A9R1kn4mv8_15xd1xx_2ok.tmp
––
MD5:  ––
SHA256:  ––
3476
AcroRd32.exe
C:\Users\admin\AppData\Local\Temp\acrord32_sbx\A9Rvnrf13_15xd1xv_2ok.tmp
––
MD5:  ––
SHA256:  ––
3476
AcroRd32.exe
C:\Users\admin\AppData\Local\Temp\acrord32_sbx\A9R1q3y5be_15xd1xw_2ok.tmp
––
MD5:  ––
SHA256:  ––
3476
AcroRd32.exe
C:\Users\admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
sqlite
MD5: 13544e4827f2d4950cfc41eef6ccef9d
SHA256: a1e2a2bc5d463c82ce3aa351077faa228d0d7d6643462ee227b976d158c20003
3476
AcroRd32.exe
C:\Users\admin\AppData\Local\Adobe\Acrobat\DC\UserCache.bin
binary
MD5: f2ccdcb794f73276ba1f9f38d838a464
SHA256: 8d2723e0f1761a838ea2ca2d9786f2a4cdd44f98c595e969a38687841aa380c7
3476
AcroRd32.exe
C:\Users\admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
sqlite
MD5: b93b145fe0eb9ccadf3b49905c4a0ae2
SHA256: 8928b58dc44f172b2bea427a12bc8aa05e44873e6425a6fe6f302964c5a59822
3476
AcroRd32.exe
C:\Users\admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
sqlite
MD5: 37a0303191a90de5742ddb378fb281bc
SHA256: e42fdb7cb9817206fab71f933a2a5eafcb3668eccc20d9883badafdcfb083403
3476
AcroRd32.exe
C:\Users\admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
sqlite
MD5: 26a8885ce9b1e03aac7d6ae6e1343801
SHA256: 37dd44e1ab880b4baefc5abf97b1e24444fe8a3d880a245199ae16e7a520c5a8
3476
AcroRd32.exe
C:\Users\admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
sqlite
MD5: 0b8bdbb076b08e5036ed7e9d59564860
SHA256: 60e1fe70c2c455f22d9be3e19cab4ff36c4d12d92b5058ee5ce71a8c8373e3eb
3476
AcroRd32.exe
C:\Users\admin\AppData\LocalLow\Adobe\Acrobat\DC\ReaderMessages
sqlite
MD5: 71289f8f8d3000638a846f994c51e52b
SHA256: a67239b25ef289bb16b95feb12a1d0a77fef6772cd26901970bce3116d81fcb9
2328
AdobeARM.exe
C:\Users\admin\AppData\Local\Temp\ArmUI.ini
text
MD5: 864c22fb9a1c0670edf01c6ed3e4fbe4
SHA256: b4d4dcd9594d372d7c0c975d80ef5802c88502895ed4b8a26ca62e225f2f18b0
2844
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019071720190718\index.dat
dat
MD5: 196498fa8e99c7d566684c93f6ef2983
SHA256: bdfd0d08b8c7ff067adb4a3109151567fa2cfcc26c1b5b70293d0e920e1b2a05
3068
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\MSHist012019071720190718\index.dat
dat
MD5: 436a1f03718397b444c554750aba0838
SHA256: 9976e045870d0490870932209b991715af8e5ea6bcc6e1754383c6c45005214d
3068
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\index.dat
dat
MD5: 80acaf572be229a9a1bb7bfd4f276b5a
SHA256: 3de240f0efd538cc2547e3f48af61cf7b1995781d1b2c65d6e212b9892dbe6da
2844
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\favicon[1].png
image
MD5: 9fb559a691078558e77d6848202f6541
SHA256: 6d8a01dc7647bc218d003b58fe04049e24a9359900b7e0cebae76edf85b8b914
2844
iexplore.exe
C:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
––
MD5:  ––
SHA256:  ––
2844
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\JGRR2OYX\favicon[1].ico
––
MD5:  ––
SHA256:  ––
3068
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.dat
dat
MD5: 34fc7c1d224800e3639f24b70d930a6c
SHA256: 3aef272d69f73e221f5a2a04a6ef0229f1dbfe5ac12a9123b0e9673edaf0be2e
3068
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\RHDJ66C7\desktop.ini
ini
MD5: 4a3deb274bb5f0212c2419d3d8d08612
SHA256: 2842973d15a14323e08598be1dfb87e54bf88a76be8c7bc94c56b079446edf38
3068
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\NIVAA544\desktop.ini
ini
MD5: 4a3deb274bb5f0212c2419d3d8d08612
SHA256: 2842973d15a14323e08598be1dfb87e54bf88a76be8c7bc94c56b079446edf38
3068
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\X0X8AGE5\desktop.ini
ini
MD5: 4a3deb274bb5f0212c2419d3d8d08612
SHA256: 2842973d15a14323e08598be1dfb87e54bf88a76be8c7bc94c56b079446edf38
2844
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini
ini
MD5: 4a3deb274bb5f0212c2419d3d8d08612
SHA256: 2842973d15a14323e08598be1dfb87e54bf88a76be8c7bc94c56b079446edf38
3068
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\4YSO3GRA\desktop.ini
ini
MD5: 4a3deb274bb5f0212c2419d3d8d08612
SHA256: 2842973d15a14323e08598be1dfb87e54bf88a76be8c7bc94c56b079446edf38
3068
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\desktop.ini
ini
MD5: 4a3deb274bb5f0212c2419d3d8d08612
SHA256: 2842973d15a14323e08598be1dfb87e54bf88a76be8c7bc94c56b079446edf38
3068
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\desktop.ini
ini
MD5: 4a3deb274bb5f0212c2419d3d8d08612
SHA256: 2842973d15a14323e08598be1dfb87e54bf88a76be8c7bc94c56b079446edf38

Find more information of the staic content and download it at the full report

Network activity

HTTP(S) requests
250
TCP/UDP connections
9
DNS requests
5
Threats
245

HTTP requests

PID Process Method HTTP Code IP URL CN Type Size Reputation
2844 iexplore.exe GET 200 204.79.197.200:80 http://www.bing.com/favicon.ico US
image
whitelisted
3068 iexplore.exe GET –– 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
––
––
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
vc
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
ini
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3724 AcroRd32.exe GET 304 2.16.186.32:80 http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/282_15_23_20070.zip unknown
––
––
whitelisted
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3724 AcroRd32.exe GET 304 2.16.186.32:80 http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/284_15_23_20070.zip unknown
––
––
whitelisted
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3724 AcroRd32.exe GET 304 2.16.186.32:80 http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/283_15_23_20070.zip unknown
––
––
whitelisted
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
dws
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3724 AcroRd32.exe GET 304 2.16.186.32:80 http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/message.zip unknown
––
––
whitelisted
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
mp3
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET –– 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
––
––
suspicious
3068 iexplore.exe GET 206 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
binary
suspicious
3068 iexplore.exe GET –– 67.251.117.230:80 http://vrr.dyndns.biz/docs/OLE/Piper/archer_parts_catalog.pdf US
––
––
suspicious

Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID Process IP ASN CN Reputation
2844 iexplore.exe 204.79.197.200:80 Microsoft Corporation US whitelisted
3068 iexplore.exe 67.251.117.230:80 Time Warner Cable Internet LLC US suspicious
–– –– 2.18.233.74:443 Akamai International B.V. –– whitelisted
3724 AcroRd32.exe 2.16.186.32:80 Akamai International B.V. –– whitelisted
–– –– 2.16.186.32:80 Akamai International B.V. –– whitelisted

DNS requests

Domain IP Reputation
www.bing.com 204.79.197.200
13.107.21.200
whitelisted
vrr.dyndns.biz 67.251.117.230
suspicious
armmf.adobe.com 2.18.233.74
whitelisted
acroipm2.adobe.com 2.16.186.32
2.16.186.33
whitelisted

Threats

PID Process Class Message
–– –– Misc activity ET INFO DYNAMIC_DNS Query to *.dyndns. Domain
–– –– Misc activity AV INFO DYNAMIC_DNS Query to *.dyndns. Domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain
3068 iexplore.exe Potentially Bad Traffic ET INFO DYNAMIC_DNS HTTP Request to a *.dyndns.* domain

Debug output strings

No debug info.