File name:

d3dcompiler_47.dll

Full analysis: https://app.any.run/tasks/ce7c719d-6163-4fb5-a6e2-7d5caecc11a0
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: January 01, 2025, 01:13:24
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (DLL) (console) x86-64, for MS Windows, 6 sections
MD5:

27736068154F24B5BA72A27528885845

SHA1:

11F2F812AD38DB8EA770AC997C6A112A25D1EF68

SHA256:

4E3B1EF0EE53F6747D28C82B1702E69EC81D2CE0B823B9DC64105D5AF194EE29

SSDEEP:

49152:wuhjwXkKcimPVqB4faGCMhGNYYpQVTxx6k/ftO4w6FXKpOD21pLeXvZCoFwI8cc6:gy904wYbZCoOI85oyIHZ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • ie4uinit.exe (PID: 7264)
    • Steals credentials from Web Browsers

      • setup.exe (PID: 7876)
  • SUSPICIOUS

    • The process executes via Task Scheduler

      • PLUGScheduler.exe (PID: 6924)
    • Process drops legitimate windows executable

      • rundll32.exe (PID: 6316)
    • Reads Microsoft Outlook installation path

      • FirstLogonAnim.exe (PID: 5696)
    • Application launched itself

      • ie4uinit.exe (PID: 7264)
      • setup.exe (PID: 7940)
      • setup.exe (PID: 7876)
      • setup.exe (PID: 8064)
      • setup.exe (PID: 8520)
      • setup.exe (PID: 7808)
      • OneDriveSetup.exe (PID: 1916)
    • Write to the desktop.ini file (may be used to cloak folders)

      • ie4uinit.exe (PID: 7264)
      • fsquirt.exe (PID: 9192)
      • FileSyncConfig.exe (PID: 1228)
    • Changes internet zones settings

      • ie4uinit.exe (PID: 7264)
      • EXCEL.EXE (PID: 9352)
    • Uses RUNDLL32.EXE to load library

      • ie4uinit.exe (PID: 7368)
    • Reads Internet Explorer settings

      • FirstLogonAnim.exe (PID: 5696)
    • Reads the date of Windows installation

      • StartMenuExperienceHost.exe (PID: 7488)
      • SearchApp.exe (PID: 3640)
    • Reads security settings of Internet Explorer

      • StartMenuExperienceHost.exe (PID: 7488)
      • WinStore.App.exe (PID: 8904)
    • Creates/Modifies COM task schedule object

      • EXCEL.EXE (PID: 9352)
      • OneDriveSetup.exe (PID: 9600)
    • Executable content was dropped or overwritten

      • OneDriveSetup.exe (PID: 9600)
    • The process creates files with name similar to system file names

      • OneDriveSetup.exe (PID: 9600)
    • The process drops C-runtime libraries

      • OneDriveSetup.exe (PID: 9600)
    • Creates a software uninstall entry

      • OneDriveSetup.exe (PID: 9600)
    • Checks Windows Trust Settings

      • WinStore.App.exe (PID: 8904)
  • INFO

    • The sample compiled with english language support

      • rundll32.exe (PID: 6316)
      • OneDriveSetup.exe (PID: 9600)
      • chrome.exe (PID: 9036)
    • Manual execution by a user

      • FirstLogonAnim.exe (PID: 5696)
      • unregmp2.exe (PID: 7220)
      • ie4uinit.exe (PID: 7264)
      • chrmstp.exe (PID: 7720)
      • unregmp2.exe (PID: 7688)
      • setup.exe (PID: 7876)
      • fsquirt.exe (PID: 9192)
      • EXCEL.EXE (PID: 9352)
      • msedge.exe (PID: 9340)
      • OneDriveSetup.exe (PID: 1916)
      • wab.exe (PID: 9832)
      • chrome.exe (PID: 6532)
    • Checks supported languages

      • PLUGScheduler.exe (PID: 6924)
      • setup.exe (PID: 7876)
      • setup.exe (PID: 7896)
      • setup.exe (PID: 7940)
      • setup.exe (PID: 7960)
      • setup.exe (PID: 8096)
      • setup.exe (PID: 8064)
      • setup.exe (PID: 7844)
      • setup.exe (PID: 8520)
      • setup.exe (PID: 7976)
      • setup.exe (PID: 7808)
      • TextInputHost.exe (PID: 8176)
      • StartMenuExperienceHost.exe (PID: 7488)
      • SearchApp.exe (PID: 3640)
      • wab.exe (PID: 9832)
      • OneDrive.exe (PID: 3524)
      • FileSyncConfig.exe (PID: 1228)
      • WinStore.App.exe (PID: 8904)
    • Reads security settings of Internet Explorer

      • FirstLogonAnim.exe (PID: 5696)
      • ie4uinit.exe (PID: 7264)
      • ie4uinit.exe (PID: 7368)
      • WWAHost.exe (PID: 9256)
      • BackgroundTransferHost.exe (PID: 9520)
      • OneDriveSetup.exe (PID: 1916)
      • OneDriveSetup.exe (PID: 9600)
      • BackgroundTransferHost.exe (PID: 3920)
      • BackgroundTransferHost.exe (PID: 8236)
      • BackgroundTransferHost.exe (PID: 6696)
      • ApplicationFrameHost.exe (PID: 5744)
      • BackgroundTransferHost.exe (PID: 5392)
      • BackgroundTransferHost.exe (PID: 6328)
      • BackgroundTransferHost.exe (PID: 9448)
      • BackgroundTransferHost.exe (PID: 9736)
      • BackgroundTransferHost.exe (PID: 9284)
    • Creates files in the program directory

      • ie4uinit.exe (PID: 7264)
      • PLUGScheduler.exe (PID: 6924)
      • chrmstp.exe (PID: 7720)
      • chrmstp.exe (PID: 7780)
      • setup.exe (PID: 7940)
      • setup.exe (PID: 7876)
      • setup.exe (PID: 8064)
      • setup.exe (PID: 7808)
      • setup.exe (PID: 8520)
      • chrmstp.exe (PID: 3524)
      • chrmstp.exe (PID: 9284)
    • Local mutex for internet shortcut management

      • ie4uinit.exe (PID: 7264)
    • Reads the computer name

      • PLUGScheduler.exe (PID: 6924)
      • setup.exe (PID: 7876)
      • setup.exe (PID: 7940)
      • setup.exe (PID: 8064)
      • setup.exe (PID: 8520)
      • setup.exe (PID: 7808)
      • TextInputHost.exe (PID: 8176)
      • StartMenuExperienceHost.exe (PID: 7488)
      • SearchApp.exe (PID: 3640)
      • OneDrive.exe (PID: 3524)
      • WinStore.App.exe (PID: 8904)
    • Application launched itself

      • chrmstp.exe (PID: 7780)
      • chrmstp.exe (PID: 7720)
      • msedge.exe (PID: 8136)
      • chrmstp.exe (PID: 9284)
      • chrmstp.exe (PID: 3524)
      • chrome.exe (PID: 6532)
    • Reads Microsoft Office registry keys

      • setup.exe (PID: 7876)
      • setup.exe (PID: 8520)
    • Process checks computer location settings

      • setup.exe (PID: 7940)
      • setup.exe (PID: 7808)
      • SearchApp.exe (PID: 3640)
      • StartMenuExperienceHost.exe (PID: 7488)
      • WinStore.App.exe (PID: 8904)
    • The process uses the downloaded file

      • FirstLogonAnim.exe (PID: 5696)
      • OneDriveSetup.exe (PID: 9600)
    • Sends debugging messages

      • StartMenuExperienceHost.exe (PID: 7488)
      • EXCEL.EXE (PID: 9352)
    • Checks proxy server information

      • SearchApp.exe (PID: 3640)
      • WWAHost.exe (PID: 9256)
      • BackgroundTransferHost.exe (PID: 9520)
      • BackgroundTransferHost.exe (PID: 3920)
      • WinStore.App.exe (PID: 8904)
      • BackgroundTransferHost.exe (PID: 6328)
    • Reads the software policy settings

      • SearchApp.exe (PID: 3640)
      • OneDriveSetup.exe (PID: 1916)
      • OneDriveSetup.exe (PID: 9600)
      • BackgroundTransferHost.exe (PID: 9520)
      • BackgroundTransferHost.exe (PID: 3920)
      • WinStore.App.exe (PID: 8904)
      • BackgroundTransferHost.exe (PID: 6328)
    • Reads Environment values

      • SearchApp.exe (PID: 3640)
      • WinStore.App.exe (PID: 8904)
    • Reads the machine GUID from the registry

      • SearchApp.exe (PID: 3640)
      • OneDrive.exe (PID: 3524)
      • WinStore.App.exe (PID: 8904)
    • The sample compiled with chinese language support

      • OneDriveSetup.exe (PID: 9600)
    • The sample compiled with portuguese language support

      • OneDriveSetup.exe (PID: 9600)
    • Reads the time zone

      • OneDrive.exe (PID: 3524)
    • Reads CPU info

      • OneDrive.exe (PID: 3524)
    • Creates files or folders in the user directory

      • BackgroundTransferHost.exe (PID: 6328)
    • Executable content was dropped or overwritten

      • chrome.exe (PID: 9036)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 1981:01:19 07:15:57+00:00
ImageFileCharacteristics: Executable, Large address aware, DLL
PEType: PE32+
LinkerVersion: 14.26
CodeSize: 3706880
InitializedDataSize: 1212416
UninitializedDataSize: -
EntryPoint: 0x28f360
OSVersion: 10
ImageVersion: 10
SubsystemVersion: 6
Subsystem: Windows command line
FileVersionNumber: 10.0.20348.1
ProductVersionNumber: 10.0.20348.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Microsoft Corporation
FileDescription: Direct3D HLSL Compiler for Redistribution
FileVersion: 10.0.20348.1 (WinBuild.160101.0800)
InternalName: d3dcompiler_47.dll
LegalCopyright: © Microsoft Corporation. All rights reserved.
OriginalFileName: d3dcompiler_47.dll
ProductName: Microsoft® Windows® Operating System
ProductVersion: 10.0.20348.1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
356
Monitored processes
131
Malicious processes
5
Suspicious processes
2

Behavior graph

Click at the process to see the details
start rundll32.exe no specs plugscheduler.exe no specs firstlogonanim.exe no specs unregmp2.exe no specs ie4uinit.exe ie4uinit.exe no specs rundll32.exe no specs rundll32.exe no specs unregmp2.exe no specs chrmstp.exe no specs chrmstp.exe no specs chrmstp.exe no specs chrmstp.exe no specs setup.exe setup.exe no specs setup.exe no specs setup.exe no specs setup.exe no specs setup.exe no specs msedge.exe User OOBE Create Elevated Object Server no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs setup.exe no specs setup.exe no specs setup.exe no specs setup.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs textinputhost.exe no specs startmenuexperiencehost.exe no specs searchapp.exe wwahost.exe no specs msedge.exe no specs User OOBE Create Elevated Object Server no specs fsquirt.exe no specs mobsync.exe no specs onedrivesetup.exe no specs msedge.exe no specs excel.exe wab.exe no specs backgroundtransferhost.exe onedrivesetup.exe msedge.exe no specs msedge.exe no specs filesyncconfig.exe no specs onedrive.exe no specs chrome.exe chrome.exe no specs msedge.exe no specs applicationframehost.exe no specs winstore.app.exe chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrmstp.exe no specs chrmstp.exe no specs chrmstp.exe no specs chrome.exe no specs chrmstp.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs msedge.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs msedge.exe no specs chrome.exe no specs backgroundtransferhost.exe backgroundtransferhost.exe no specs backgroundtransferhost.exe no specs msedge.exe no specs msedge.exe no specs chrome.exe no specs backgroundtransferhost.exe no specs backgroundtransferhost.exe backgroundtransferhost.exe no specs backgroundtransferhost.exe no specs backgroundtransferhost.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
968"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=5648 --field-trial-handle=1904,i,14675689116280963163,137325022897715426,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
Administrator
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
1228"C:\Users\Administrator\AppData\Local\Microsoft\OneDrive\19.043.0304.0013\FileSyncConfig.exe" C:\Users\Administrator\AppData\Local\Microsoft\OneDrive\19.043.0304.0013\FileSyncConfig.exeOneDriveSetup.exe
User:
Administrator
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft OneDrive Configuration Application
Exit code:
0
Version:
19.043.0304.0013
Modules
Images
c:\users\administrator\appdata\local\microsoft\onedrive\19.043.0304.0013\filesyncconfig.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
1448"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5236 --field-trial-handle=1904,i,14675689116280963163,137325022897715426,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
Administrator
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
1460"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=5196 --field-trial-handle=1904,i,14675689116280963163,137325022897715426,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
Administrator
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
1476"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5412 --field-trial-handle=1904,i,14675689116280963163,137325022897715426,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
Administrator
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
1476"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=37 --mojo-platform-channel-handle=3788 --field-trial-handle=1904,i,14675689116280963163,137325022897715426,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
Administrator
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
122.0.6261.70
1580"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=2864 --field-trial-handle=1904,i,14675689116280963163,137325022897715426,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
Administrator
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
122.0.6261.70
1916"C:\Windows\SysWOW64\OneDriveSetup.exe" /thfirstsetupC:\Windows\SysWOW64\OneDriveSetup.exeexplorer.exe
User:
Administrator
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft OneDrive (32 bit) Setup
Exit code:
0
Version:
19.043.0304.0013
Modules
Images
c:\windows\syswow64\onedrivesetup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
2336"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5796 --field-trial-handle=2220,i,4676356880953533170,13847606073806001137,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
Administrator
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
2456"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.3636 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAABEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=3000 --field-trial-handle=1904,i,14675689116280963163,137325022897715426,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
Administrator
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Total events
66 787
Read events
63 815
Write events
2 874
Delete events
98

Modification events

(PID) Process:(7220) unregmp2.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Keyboard\Native Media Players\WMP
Operation:writeName:AppName
Value:
Windows Media Player
(PID) Process:(7220) unregmp2.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Keyboard\Native Media Players\WMP
Operation:writeName:ExePath
Value:
C:\Program Files\Windows Media Player\wmplayer.exe
(PID) Process:(7264) ie4uinit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383}
Operation:writeName:IsInstalled
Value:
1
(PID) Process:(7264) ie4uinit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Clients\StartMenuInternet\IEXPLORE.EXE\InstallInfo
Operation:writeName:IconsVisible
Value:
1
(PID) Process:(7264) ie4uinit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Setup\OC Manager\Subcomponents
Operation:writeName:IEAccess
Value:
1
(PID) Process:(7264) ie4uinit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Capabilities
Operation:writeName:Hidden
Value:
0
(PID) Process:(7264) ie4uinit.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main
Operation:writeName:DisableFirstRunCustomize
Value:
1
(PID) Process:(7264) ie4uinit.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\ShellFolder
Operation:writeName:Attributes
Value:
1048576
(PID) Process:(7264) ie4uinit.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-1430448594-2639229838-973813799-439329657-1197984847-4069167804-1277922394
Operation:writeName:DisplayName
Value:
windows_ie_ac_001
(PID) Process:(7264) ie4uinit.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\BrowserEmulation
Operation:writeName:CVListTTL
Value:
0
Executable files
244
Suspicious files
1 265
Text files
742
Unknown types
35

Dropped files

PID
Process
Filename
Type
6924PLUGScheduler.exeC:\ProgramData\PLUG\Logs\RUXIMLog.042.etlbinary
MD5:868E79A00A8204448B2FFC4F4D5C08EA
SHA256:148FE324431CB4C826BCF0436147D946AC389A877732612CF40629048B8517DC
6924PLUGScheduler.exeC:\ProgramData\PLUG\Logs\RUXIMLog.044.etlbinary
MD5:079890A8EC8D5CB6523FCEC2209780AA
SHA256:0E12D2D76DD738CE196BED522E35F75E2CC91294F78CDDCBE8CE7787AAA70049
6924PLUGScheduler.exeC:\ProgramData\PLUG\Logs\RUXIMLog.045.etlbinary
MD5:673727AF7C6805E869C9F8BE1E468F4A
SHA256:6B16B7DE97F397BCEC36EB3F18C7B64CD3DB6D2974DDF319A251CE27B80D837B
6924PLUGScheduler.exeC:\ProgramData\PLUG\Logs\RUXIMLog.047.etlbinary
MD5:FA358BFEE9B4E1FFB7394D13CBBC4898
SHA256:6FF97BBF8A56286A4C71623829514CC14B7F8CBBCF09748D939F733968478A22
6924PLUGScheduler.exeC:\ProgramData\PLUG\Logs\RUXIMLog.034.etlbinary
MD5:89BD161BF7B46C9078937CF832786737
SHA256:2B83DF5532E9F54ED301C8F82E2CDD489799C8D5222A2D44C97DCB151A96FAA9
6924PLUGScheduler.exeC:\ProgramData\PLUG\Logs\RUXIMLog.036.etlbinary
MD5:FED961067F664B5381B65A534B7AB728
SHA256:652F31A8284AE812D1D9D24192BC800976BF74C240591C6AC443A28C4709FB7C
6924PLUGScheduler.exeC:\ProgramData\PLUG\Logs\RUXIMLog.037.etlbinary
MD5:A23907B6FDD47DCABFDFD7CF2FCD7671
SHA256:0C9C33FE9E984A2E5A70EBA51F36B9929A86199E424AF2F8080E1267B87DC970
6924PLUGScheduler.exeC:\ProgramData\PLUG\Logs\RUXIMLog.030.etlbinary
MD5:09359EE89B0634478ADFF73CDA7BFB12
SHA256:4D800AC7C55960B107C9D3E40F63130407835E69DF4F5C558C500FC0BD20D8ED
6924PLUGScheduler.exeC:\ProgramData\PLUG\Logs\RUXIMLog.035.etlbinary
MD5:A7A21FBC9D00F33F186B34A50E170C13
SHA256:64CAC91E46D4FC832958232A658431CBF9D8D9F265653ACA2BEB32428D4688EC
6924PLUGScheduler.exeC:\ProgramData\PLUG\Logs\RUXIMLog.033.etlbinary
MD5:B53B2070E686FFB1FBC8B06994E7C8D7
SHA256:A3ABD06F4E40CB700B1908AB6BCD2E27455E13EF076E0BF2345BB2FA369EF802
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
91
TCP/UDP connections
185
DNS requests
149
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.32.238.107:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4324
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
4324
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
3848
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
5356
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl
unknown
whitelisted
7692
msedge.exe
GET
200
2.23.209.3:80
http://assets.msn.com/staticsb/statics/latest/fre/version.json
unknown
whitelisted
5356
svchost.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
192.168.100.255:137
whitelisted
5732
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
23.32.238.107:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
2.23.181.156:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5064
SearchApp.exe
2.21.110.146:443
www.bing.com
AKAMAI-AS
DE
whitelisted
1176
svchost.exe
20.190.159.64:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5064
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 20.73.194.208
whitelisted
google.com
  • 216.58.206.78
whitelisted
crl.microsoft.com
  • 23.32.238.107
  • 23.32.238.112
  • 2.16.241.12
  • 2.16.241.19
whitelisted
www.microsoft.com
  • 2.23.181.156
  • 2.23.209.3
  • 2.23.209.51
  • 2.23.209.59
  • 2.23.209.20
whitelisted
www.bing.com
  • 2.21.110.146
  • 2.21.110.139
  • 2.23.209.130
  • 2.23.209.187
  • 2.23.209.133
whitelisted
login.live.com
  • 20.190.159.64
  • 20.190.159.68
  • 20.190.159.73
  • 20.190.159.75
  • 40.126.31.69
  • 20.190.159.71
  • 20.190.159.0
  • 20.190.159.23
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 184.30.17.189
whitelisted
arc.msn.com
  • 20.103.156.88
  • 20.199.58.43
  • 20.105.99.58
  • 20.223.36.55
whitelisted
fd.api.iris.microsoft.com
  • 20.103.156.88
whitelisted

Threats

No threats detected
No debug info