File name:

d3dcompiler_47.dll

Full analysis: https://app.any.run/tasks/ce7c719d-6163-4fb5-a6e2-7d5caecc11a0
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: January 01, 2025, 01:13:24
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (DLL) (console) x86-64, for MS Windows, 6 sections
MD5:

27736068154F24B5BA72A27528885845

SHA1:

11F2F812AD38DB8EA770AC997C6A112A25D1EF68

SHA256:

4E3B1EF0EE53F6747D28C82B1702E69EC81D2CE0B823B9DC64105D5AF194EE29

SSDEEP:

49152:wuhjwXkKcimPVqB4faGCMhGNYYpQVTxx6k/ftO4w6FXKpOD21pLeXvZCoFwI8cc6:gy904wYbZCoOI85oyIHZ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • ie4uinit.exe (PID: 7264)
    • Steals credentials from Web Browsers

      • setup.exe (PID: 7876)
  • SUSPICIOUS

    • The process executes via Task Scheduler

      • PLUGScheduler.exe (PID: 6924)
    • Reads Microsoft Outlook installation path

      • FirstLogonAnim.exe (PID: 5696)
    • Changes internet zones settings

      • ie4uinit.exe (PID: 7264)
      • EXCEL.EXE (PID: 9352)
    • Application launched itself

      • ie4uinit.exe (PID: 7264)
      • setup.exe (PID: 7940)
      • setup.exe (PID: 7876)
      • setup.exe (PID: 8064)
      • setup.exe (PID: 7808)
      • OneDriveSetup.exe (PID: 1916)
      • setup.exe (PID: 8520)
    • Write to the desktop.ini file (may be used to cloak folders)

      • ie4uinit.exe (PID: 7264)
      • fsquirt.exe (PID: 9192)
      • FileSyncConfig.exe (PID: 1228)
    • Process drops legitimate windows executable

      • rundll32.exe (PID: 6316)
    • Uses RUNDLL32.EXE to load library

      • ie4uinit.exe (PID: 7368)
    • Reads Internet Explorer settings

      • FirstLogonAnim.exe (PID: 5696)
    • Reads security settings of Internet Explorer

      • StartMenuExperienceHost.exe (PID: 7488)
      • WinStore.App.exe (PID: 8904)
    • Reads the date of Windows installation

      • StartMenuExperienceHost.exe (PID: 7488)
      • SearchApp.exe (PID: 3640)
    • Executable content was dropped or overwritten

      • OneDriveSetup.exe (PID: 9600)
    • Creates/Modifies COM task schedule object

      • EXCEL.EXE (PID: 9352)
      • OneDriveSetup.exe (PID: 9600)
    • The process creates files with name similar to system file names

      • OneDriveSetup.exe (PID: 9600)
    • The process drops C-runtime libraries

      • OneDriveSetup.exe (PID: 9600)
    • Creates a software uninstall entry

      • OneDriveSetup.exe (PID: 9600)
    • Checks Windows Trust Settings

      • WinStore.App.exe (PID: 8904)
  • INFO

    • Manual execution by a user

      • unregmp2.exe (PID: 7220)
      • FirstLogonAnim.exe (PID: 5696)
      • ie4uinit.exe (PID: 7264)
      • unregmp2.exe (PID: 7688)
      • chrmstp.exe (PID: 7720)
      • setup.exe (PID: 7876)
      • fsquirt.exe (PID: 9192)
      • OneDriveSetup.exe (PID: 1916)
      • msedge.exe (PID: 9340)
      • EXCEL.EXE (PID: 9352)
      • wab.exe (PID: 9832)
      • chrome.exe (PID: 6532)
    • Reads security settings of Internet Explorer

      • FirstLogonAnim.exe (PID: 5696)
      • ie4uinit.exe (PID: 7264)
      • ie4uinit.exe (PID: 7368)
      • WWAHost.exe (PID: 9256)
      • BackgroundTransferHost.exe (PID: 9520)
      • OneDriveSetup.exe (PID: 1916)
      • OneDriveSetup.exe (PID: 9600)
      • ApplicationFrameHost.exe (PID: 5744)
      • BackgroundTransferHost.exe (PID: 6696)
      • BackgroundTransferHost.exe (PID: 3920)
      • BackgroundTransferHost.exe (PID: 6328)
      • BackgroundTransferHost.exe (PID: 8236)
      • BackgroundTransferHost.exe (PID: 5392)
      • BackgroundTransferHost.exe (PID: 9448)
      • BackgroundTransferHost.exe (PID: 9284)
      • BackgroundTransferHost.exe (PID: 9736)
    • Checks supported languages

      • PLUGScheduler.exe (PID: 6924)
      • setup.exe (PID: 7876)
      • setup.exe (PID: 7896)
      • setup.exe (PID: 7940)
      • setup.exe (PID: 7960)
      • setup.exe (PID: 7844)
      • setup.exe (PID: 8064)
      • setup.exe (PID: 8520)
      • setup.exe (PID: 8096)
      • setup.exe (PID: 7976)
      • setup.exe (PID: 7808)
      • StartMenuExperienceHost.exe (PID: 7488)
      • TextInputHost.exe (PID: 8176)
      • SearchApp.exe (PID: 3640)
      • wab.exe (PID: 9832)
      • FileSyncConfig.exe (PID: 1228)
      • WinStore.App.exe (PID: 8904)
      • OneDrive.exe (PID: 3524)
    • Local mutex for internet shortcut management

      • ie4uinit.exe (PID: 7264)
    • Creates files in the program directory

      • PLUGScheduler.exe (PID: 6924)
      • ie4uinit.exe (PID: 7264)
      • chrmstp.exe (PID: 7780)
      • chrmstp.exe (PID: 7720)
      • setup.exe (PID: 7940)
      • setup.exe (PID: 7876)
      • setup.exe (PID: 8064)
      • setup.exe (PID: 7808)
      • setup.exe (PID: 8520)
      • chrmstp.exe (PID: 3524)
      • chrmstp.exe (PID: 9284)
    • Reads the computer name

      • PLUGScheduler.exe (PID: 6924)
      • setup.exe (PID: 7876)
      • setup.exe (PID: 7940)
      • setup.exe (PID: 7808)
      • setup.exe (PID: 8064)
      • TextInputHost.exe (PID: 8176)
      • StartMenuExperienceHost.exe (PID: 7488)
      • SearchApp.exe (PID: 3640)
      • setup.exe (PID: 8520)
      • OneDrive.exe (PID: 3524)
      • WinStore.App.exe (PID: 8904)
    • The sample compiled with english language support

      • rundll32.exe (PID: 6316)
      • OneDriveSetup.exe (PID: 9600)
      • chrome.exe (PID: 9036)
    • Application launched itself

      • chrmstp.exe (PID: 7780)
      • chrmstp.exe (PID: 7720)
      • msedge.exe (PID: 8136)
      • chrmstp.exe (PID: 9284)
      • chrome.exe (PID: 6532)
      • chrmstp.exe (PID: 3524)
    • Process checks computer location settings

      • setup.exe (PID: 7940)
      • setup.exe (PID: 7808)
      • StartMenuExperienceHost.exe (PID: 7488)
      • SearchApp.exe (PID: 3640)
      • WinStore.App.exe (PID: 8904)
    • Reads Microsoft Office registry keys

      • setup.exe (PID: 8520)
      • setup.exe (PID: 7876)
    • The process uses the downloaded file

      • FirstLogonAnim.exe (PID: 5696)
      • OneDriveSetup.exe (PID: 9600)
    • Sends debugging messages

      • StartMenuExperienceHost.exe (PID: 7488)
      • EXCEL.EXE (PID: 9352)
    • Checks proxy server information

      • SearchApp.exe (PID: 3640)
      • WWAHost.exe (PID: 9256)
      • BackgroundTransferHost.exe (PID: 9520)
      • WinStore.App.exe (PID: 8904)
      • BackgroundTransferHost.exe (PID: 3920)
      • BackgroundTransferHost.exe (PID: 6328)
    • Reads the software policy settings

      • SearchApp.exe (PID: 3640)
      • OneDriveSetup.exe (PID: 1916)
      • BackgroundTransferHost.exe (PID: 9520)
      • OneDriveSetup.exe (PID: 9600)
      • WinStore.App.exe (PID: 8904)
      • BackgroundTransferHost.exe (PID: 3920)
      • BackgroundTransferHost.exe (PID: 6328)
    • Reads Environment values

      • SearchApp.exe (PID: 3640)
      • WinStore.App.exe (PID: 8904)
    • Reads the machine GUID from the registry

      • SearchApp.exe (PID: 3640)
      • OneDrive.exe (PID: 3524)
      • WinStore.App.exe (PID: 8904)
    • The sample compiled with chinese language support

      • OneDriveSetup.exe (PID: 9600)
    • The sample compiled with portuguese language support

      • OneDriveSetup.exe (PID: 9600)
    • Reads CPU info

      • OneDrive.exe (PID: 3524)
    • Reads the time zone

      • OneDrive.exe (PID: 3524)
    • Creates files or folders in the user directory

      • BackgroundTransferHost.exe (PID: 6328)
    • Executable content was dropped or overwritten

      • chrome.exe (PID: 9036)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 1981:01:19 07:15:57+00:00
ImageFileCharacteristics: Executable, Large address aware, DLL
PEType: PE32+
LinkerVersion: 14.26
CodeSize: 3706880
InitializedDataSize: 1212416
UninitializedDataSize: -
EntryPoint: 0x28f360
OSVersion: 10
ImageVersion: 10
SubsystemVersion: 6
Subsystem: Windows command line
FileVersionNumber: 10.0.20348.1
ProductVersionNumber: 10.0.20348.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Microsoft Corporation
FileDescription: Direct3D HLSL Compiler for Redistribution
FileVersion: 10.0.20348.1 (WinBuild.160101.0800)
InternalName: d3dcompiler_47.dll
LegalCopyright: © Microsoft Corporation. All rights reserved.
OriginalFileName: d3dcompiler_47.dll
ProductName: Microsoft® Windows® Operating System
ProductVersion: 10.0.20348.1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
356
Monitored processes
131
Malicious processes
5
Suspicious processes
2

Behavior graph

Click at the process to see the details
start rundll32.exe no specs plugscheduler.exe no specs firstlogonanim.exe no specs unregmp2.exe no specs ie4uinit.exe ie4uinit.exe no specs rundll32.exe no specs rundll32.exe no specs unregmp2.exe no specs chrmstp.exe no specs chrmstp.exe no specs chrmstp.exe no specs chrmstp.exe no specs setup.exe setup.exe no specs setup.exe no specs setup.exe no specs setup.exe no specs setup.exe no specs msedge.exe User OOBE Create Elevated Object Server no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs setup.exe no specs setup.exe no specs setup.exe no specs setup.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs textinputhost.exe no specs startmenuexperiencehost.exe no specs searchapp.exe wwahost.exe no specs msedge.exe no specs User OOBE Create Elevated Object Server no specs fsquirt.exe no specs mobsync.exe no specs onedrivesetup.exe no specs msedge.exe no specs excel.exe wab.exe no specs backgroundtransferhost.exe onedrivesetup.exe msedge.exe no specs msedge.exe no specs filesyncconfig.exe no specs onedrive.exe no specs chrome.exe chrome.exe no specs msedge.exe no specs applicationframehost.exe no specs winstore.app.exe chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrmstp.exe no specs chrmstp.exe no specs chrmstp.exe no specs chrome.exe no specs chrmstp.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs msedge.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs msedge.exe no specs chrome.exe no specs backgroundtransferhost.exe backgroundtransferhost.exe no specs backgroundtransferhost.exe no specs msedge.exe no specs msedge.exe no specs chrome.exe no specs backgroundtransferhost.exe no specs backgroundtransferhost.exe backgroundtransferhost.exe no specs backgroundtransferhost.exe no specs backgroundtransferhost.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
968"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=5648 --field-trial-handle=1904,i,14675689116280963163,137325022897715426,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
Administrator
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
1228"C:\Users\Administrator\AppData\Local\Microsoft\OneDrive\19.043.0304.0013\FileSyncConfig.exe" C:\Users\Administrator\AppData\Local\Microsoft\OneDrive\19.043.0304.0013\FileSyncConfig.exeOneDriveSetup.exe
User:
Administrator
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft OneDrive Configuration Application
Exit code:
0
Version:
19.043.0304.0013
Modules
Images
c:\users\administrator\appdata\local\microsoft\onedrive\19.043.0304.0013\filesyncconfig.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
1448"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5236 --field-trial-handle=1904,i,14675689116280963163,137325022897715426,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
Administrator
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
1460"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=5196 --field-trial-handle=1904,i,14675689116280963163,137325022897715426,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
Administrator
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
1476"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5412 --field-trial-handle=1904,i,14675689116280963163,137325022897715426,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
Administrator
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
1476"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=37 --mojo-platform-channel-handle=3788 --field-trial-handle=1904,i,14675689116280963163,137325022897715426,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
Administrator
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
122.0.6261.70
1580"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=2864 --field-trial-handle=1904,i,14675689116280963163,137325022897715426,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
Administrator
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
122.0.6261.70
1916"C:\Windows\SysWOW64\OneDriveSetup.exe" /thfirstsetupC:\Windows\SysWOW64\OneDriveSetup.exeexplorer.exe
User:
Administrator
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft OneDrive (32 bit) Setup
Exit code:
0
Version:
19.043.0304.0013
Modules
Images
c:\windows\syswow64\onedrivesetup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
2336"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5796 --field-trial-handle=2220,i,4676356880953533170,13847606073806001137,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
Administrator
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
2456"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.3636 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAABEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=3000 --field-trial-handle=1904,i,14675689116280963163,137325022897715426,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
Administrator
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Total events
66 787
Read events
63 815
Write events
2 874
Delete events
98

Modification events

(PID) Process:(7220) unregmp2.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Keyboard\Native Media Players\WMP
Operation:writeName:AppName
Value:
Windows Media Player
(PID) Process:(7220) unregmp2.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Keyboard\Native Media Players\WMP
Operation:writeName:ExePath
Value:
C:\Program Files\Windows Media Player\wmplayer.exe
(PID) Process:(7264) ie4uinit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383}
Operation:writeName:IsInstalled
Value:
1
(PID) Process:(7264) ie4uinit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\InstallInfo
Operation:writeName:IconsVisible
Value:
1
(PID) Process:(7264) ie4uinit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Setup\OC Manager\Subcomponents
Operation:writeName:IEAccess
Value:
1
(PID) Process:(7264) ie4uinit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Capabilities
Operation:writeName:Hidden
Value:
0
(PID) Process:(7264) ie4uinit.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main
Operation:writeName:DisableFirstRunCustomize
Value:
1
(PID) Process:(7264) ie4uinit.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\ShellFolder
Operation:writeName:Attributes
Value:
1048576
(PID) Process:(7264) ie4uinit.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-1430448594-2639229838-973813799-439329657-1197984847-4069167804-1277922394
Operation:writeName:DisplayName
Value:
windows_ie_ac_001
(PID) Process:(7264) ie4uinit.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\BrowserEmulation
Operation:writeName:CVListTTL
Value:
0
Executable files
244
Suspicious files
1 265
Text files
742
Unknown types
35

Dropped files

PID
Process
Filename
Type
6924PLUGScheduler.exeC:\ProgramData\PLUG\Logs\RUXIMLog.045.etlbinary
MD5:673727AF7C6805E869C9F8BE1E468F4A
SHA256:6B16B7DE97F397BCEC36EB3F18C7B64CD3DB6D2974DDF319A251CE27B80D837B
6924PLUGScheduler.exeC:\ProgramData\PLUG\Logs\RUXIMLog.039.etlbinary
MD5:C8834D365FAE073DEDE1F1620454CE71
SHA256:C6DD793EEE1D5551CA507A3C5BFFECA82DD3E29C63C2C6DD218A7D4BFB37046B
6924PLUGScheduler.exeC:\ProgramData\PLUG\Logs\RUXIMLog.047.etlbinary
MD5:FA358BFEE9B4E1FFB7394D13CBBC4898
SHA256:6FF97BBF8A56286A4C71623829514CC14B7F8CBBCF09748D939F733968478A22
6924PLUGScheduler.exeC:\ProgramData\PLUG\Logs\RUXIMLog.041.etlbinary
MD5:44A0E917AD0C126931B1BCD959285A9A
SHA256:DDFBE47E7DFD6D8B7517F2F6FF9808ECF3C0A25F588A9F96D04F4E2B4A578573
6924PLUGScheduler.exeC:\ProgramData\PLUG\Logs\RUXIMLog.036.etlbinary
MD5:FED961067F664B5381B65A534B7AB728
SHA256:652F31A8284AE812D1D9D24192BC800976BF74C240591C6AC443A28C4709FB7C
6924PLUGScheduler.exeC:\ProgramData\PLUG\Logs\RUXIMLog.035.etlbinary
MD5:A7A21FBC9D00F33F186B34A50E170C13
SHA256:64CAC91E46D4FC832958232A658431CBF9D8D9F265653ACA2BEB32428D4688EC
6924PLUGScheduler.exeC:\ProgramData\PLUG\Logs\RUXIMLog.038.etlbinary
MD5:5EA68411BF8E9EAF4621BAF73F61449E
SHA256:9D4CA5A1D871F819C139A498BB910A63576C2FE6367853544F8D172D8B6EBFF7
6924PLUGScheduler.exeC:\ProgramData\PLUG\Logs\RUXIMLog.037.etlbinary
MD5:A23907B6FDD47DCABFDFD7CF2FCD7671
SHA256:0C9C33FE9E984A2E5A70EBA51F36B9929A86199E424AF2F8080E1267B87DC970
6924PLUGScheduler.exeC:\ProgramData\PLUG\Logs\RUXIMLog.043.etlbinary
MD5:2F36C598EBFF5B5CDD898C9691D6BCCB
SHA256:8900C5931ED8E0D1B68082B45CF2F4E8C1025D36825508E0804C916D781B9F50
6924PLUGScheduler.exeC:\ProgramData\PLUG\Logs\RUXIMLog.044.etlbinary
MD5:079890A8EC8D5CB6523FCEC2209780AA
SHA256:0E12D2D76DD738CE196BED522E35F75E2CC91294F78CDDCBE8CE7787AAA70049
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
91
TCP/UDP connections
185
DNS requests
149
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7692
msedge.exe
GET
200
2.23.209.3:80
http://assets.msn.com/staticsb/statics/latest/fre/version.json
unknown
whitelisted
5356
svchost.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
9192
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
5356
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl
unknown
whitelisted
3640
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D
unknown
whitelisted
9352
EXCEL.EXE
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
whitelisted
GET
200
23.32.238.107:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
3640
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
9352
EXCEL.EXE
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
192.168.100.255:137
whitelisted
5732
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
23.32.238.107:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
2.23.181.156:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5064
SearchApp.exe
2.21.110.146:443
www.bing.com
AKAMAI-AS
DE
whitelisted
1176
svchost.exe
20.190.159.64:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5064
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 20.73.194.208
whitelisted
google.com
  • 216.58.206.78
whitelisted
crl.microsoft.com
  • 23.32.238.107
  • 23.32.238.112
  • 2.16.241.12
  • 2.16.241.19
whitelisted
www.microsoft.com
  • 2.23.181.156
  • 2.23.209.3
  • 2.23.209.51
  • 2.23.209.59
  • 2.23.209.20
whitelisted
www.bing.com
  • 2.21.110.146
  • 2.21.110.139
  • 2.23.209.130
  • 2.23.209.187
  • 2.23.209.133
whitelisted
login.live.com
  • 20.190.159.64
  • 20.190.159.68
  • 20.190.159.73
  • 20.190.159.75
  • 40.126.31.69
  • 20.190.159.71
  • 20.190.159.0
  • 20.190.159.23
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 184.30.17.189
whitelisted
arc.msn.com
  • 20.103.156.88
  • 20.199.58.43
  • 20.105.99.58
  • 20.223.36.55
whitelisted
fd.api.iris.microsoft.com
  • 20.103.156.88
whitelisted

Threats

No threats detected
No debug info