General Info

URL

http://www.econord.it

Full analysis
https://app.any.run/tasks/944be177-775a-4cc3-bcdf-8d84a768fe24
Verdict
Malicious activity
Analysis date
1/11/2019, 09:49:57
OS:
Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distored by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.

Software environment set and analysis options

Launch configuration

Task duration
60 seconds
Additional time used
none
Fakenet option
off
Heavy Evaision option
off
MITM proxy
off
Route via Tor
off
Network geolocation
off
Privacy
Public submission
Autoconfirmation of UAC
on

Software preset

  • Internet Explorer 8.0.7601.17514
  • Adobe Acrobat Reader DC MUI (15.023.20070)
  • Adobe Flash Player 26 ActiveX (26.0.0.131)
  • Adobe Flash Player 26 NPAPI (26.0.0.131)
  • Adobe Flash Player 26 PPAPI (26.0.0.131)
  • Adobe Refresh Manager (1.8.0)
  • CCleaner (5.35)
  • FileZilla Client 3.36.0 (3.36.0)
  • Google Chrome (68.0.3440.106)
  • Google Update Helper (1.3.33.17)
  • Java 8 Update 92 (8.0.920.14)
  • Java Auto Updater (2.8.92.14)
  • Microsoft .NET Framework 4.6.1 (4.6.01055)
  • Microsoft Office Access MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Access Setup Metadata MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Excel MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office OneNote MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Outlook MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office PowerPoint MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Professional 2010 (14.0.6029.1000)
  • Microsoft Office Proof (English) 2010 (14.0.6029.1000)
  • Microsoft Office Proof (French) 2010 (14.0.6029.1000)
  • Microsoft Office Proof (Spanish) 2010 (14.0.6029.1000)
  • Microsoft Office Proofing (English) 2010 (14.0.6029.1000)
  • Microsoft Office Publisher MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Shared MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Shared Setup Metadata MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Single Image 2010 (14.0.6029.1000)
  • Microsoft Office Word MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (9.0.30729.6161)
  • Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219 (10.0.40219)
  • Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.30501 (12.0.30501.0)
  • Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005 (12.0.21005)
  • Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005 (12.0.21005)
  • Microsoft Visual C++ 2017 Redistributable (x86) - 14.15.26706 (14.15.26706.0)
  • Microsoft Visual C++ 2017 x86 Additional Runtime - 14.15.26706 (14.15.26706)
  • Microsoft Visual C++ 2017 x86 Minimum Runtime - 14.15.26706 (14.15.26706)
  • Mozilla Firefox 61.0.2 (x86 en-US) (61.0.2)
  • Notepad++ (32-bit x86) (7.5.1)
  • Opera 12.15 (12.15.1748)
  • Skype version 8.29 (8.29)
  • VLC media player (2.2.6)
  • WinRAR 5.60 (32-bit) (5.60.0)

Hotfixes

  • Client LanguagePack Package
  • Client Refresh LanguagePack Package
  • CodecPack Basic Package
  • Foundation Package
  • IE Troubleshooters Package
  • InternetExplorer Optional Package
  • KB2534111
  • KB2999226
  • KB976902
  • LocalPack AU Package
  • LocalPack CA Package
  • LocalPack GB Package
  • LocalPack US Package
  • LocalPack ZA Package
  • ProfessionalEdition
  • UltimateEdition

Behavior activities

MALICIOUS SUSPICIOUS INFO

No malicious indicators.

No suspicious indicators.

Reads internet explorer settings
  • iexplore.exe (PID: 3144)
Creates files in the user directory
  • iexplore.exe (PID: 2860)
  • iexplore.exe (PID: 3144)
Reads Internet Cache Settings
  • iexplore.exe (PID: 3144)
Changes internet zones settings
  • iexplore.exe (PID: 2860)
Application launched itself
  • iexplore.exe (PID: 2860)
Reads settings of System Certificates
  • iexplore.exe (PID: 3144)

Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Screenshots

Processes

Total processes
31
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

+
start iexplore.exe iexplore.exe
Specs description
Program did not start
Integrity level elevation
Task сontains an error or was rebooted
Process has crashed
Task contains several apps running
Executable file was dropped
Debug information is available
Process was injected
Network attacks were detected
Application downloaded the executable file
Actions similar to stealing personal data
Behavior similar to exploiting the vulnerability
Inspected object has sucpicious PE structure
File is detected by antivirus software
CPU overrun
RAM overrun
Process starts the services
Process was added to the startup
Behavior similar to spam
Low-level access to the HDD
Probably Tor was used
System was rebooted
Connects to the network
Known threat

Process information

Click at the process to see the details.

PID
2860
CMD
"C:\Program Files\Internet Explorer\iexplore.exe" -nohome
Path
C:\Program Files\Internet Explorer\iexplore.exe
Indicators
Parent process
––
User
admin
Integrity Level
MEDIUM
Version:
Company
Microsoft Corporation
Description
Internet Explorer
Version
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Image
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\shell32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\psapi.dll
c:\windows\system32\oleacc.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\profapi.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\comdlg32.dll
c:\windows\system32\cryptbase.dll
c:\program files\internet explorer\sqmapi.dll
c:\windows\system32\rpcrtremote.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\rasman.dll
c:\windows\system32\rtutils.dll
c:\windows\system32\sensapi.dll
c:\windows\system32\nlaapi.dll
c:\windows\system32\rasadhlp.dll
c:\windows\system32\ieui.dll
c:\windows\system32\msimg32.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\clbcatq.dll
c:\program files\internet explorer\ieproxy.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\url.dll
c:\windows\system32\version.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\xmllite.dll
c:\windows\system32\propsys.dll
c:\windows\system32\explorerframe.dll
c:\windows\system32\duser.dll
c:\windows\system32\dui70.dll
c:\windows\system32\msfeeds.dll
c:\windows\system32\sxs.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\system32\normaliz.dll
c:\windows\system32\wship6.dll
c:\windows\system32\fwpuclnt.dll
c:\windows\system32\mlang.dll
c:\windows\system32\mssprxy.dll

PID
3144
CMD
"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2860 CREDAT:71937
Path
C:\Program Files\Internet Explorer\iexplore.exe
Indicators
Parent process
iexplore.exe
User
admin
Integrity Level
LOW
Version:
Company
Microsoft Corporation
Description
Internet Explorer
Version
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Image
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\shell32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\psapi.dll
c:\windows\system32\oleacc.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\comdlg32.dll
c:\program files\internet explorer\ieshims.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\rpcrtremote.dll
c:\program files\internet explorer\sqmapi.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\propsys.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\profapi.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\rsaenh.dll
c:\program files\internet explorer\ieproxy.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\mlang.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\apphelp.dll
c:\program files\java\jre1.8.0_92\bin\ssv.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\version.dll
c:\progra~1\micros~1\office14\urlredir.dll
c:\windows\system32\secur32.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\progra~1\micros~1\office14\msohev.dll
c:\program files\java\jre1.8.0_92\bin\jp2ssv.dll
c:\program files\java\jre1.8.0_92\bin\msvcr100.dll
c:\program files\java\jre1.8.0_92\bin\deploy.dll
c:\windows\system32\imagehlp.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\sxs.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\rasman.dll
c:\windows\system32\rtutils.dll
c:\windows\system32\nlaapi.dll
c:\windows\system32\sensapi.dll
c:\windows\system32\rasadhlp.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\system32\normaliz.dll
c:\windows\system32\wship6.dll
c:\windows\system32\fwpuclnt.dll
c:\windows\system32\mshtml.dll
c:\windows\system32\msls31.dll
c:\windows\system32\iepeers.dll
c:\windows\system32\winspool.drv
c:\windows\system32\msimtf.dll
c:\windows\system32\jscript.dll
c:\windows\system32\userenv.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\schannel.dll
c:\windows\system32\credssp.dll
c:\windows\system32\t2embed.dll
c:\windows\system32\ncrypt.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\gpapi.dll
c:\windows\system32\p2pcollab.dll
c:\windows\system32\qagentrt.dll
c:\windows\system32\fveui.dll
c:\windows\system32\xmllite.dll
c:\windows\system32\imgutil.dll
c:\windows\system32\dxtrans.dll
c:\windows\system32\atl.dll
c:\windows\system32\ddrawex.dll
c:\windows\system32\ddraw.dll
c:\windows\system32\dciman32.dll
c:\windows\system32\pngfilt.dll
c:\windows\system32\dxtmsft.dll
c:\windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\gdiplus.dll
c:\windows\system32\d3dim700.dll

Registry activity

Total events
440
Read events
373
Write events
64
Delete events
3

Modification events

PID
Process
Operation
Key
Name
Value
2860
iexplore.exe
delete key
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012018082720180903
2860
iexplore.exe
delete key
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012018090920180910
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
CompatibilityFlags
0
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
SecuritySafe
1
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
ProxyEnable
0
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
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
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
{E82D470F-157D-11E9-AA93-5254004A04AF}
0
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Type
4
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Count
3
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Time
E307010005000B00080032000D00D601
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{789FE86F-6FC4-46A1-9849-EDE0DB0C95CA}\iexplore
Type
4
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{789FE86F-6FC4-46A1-9849-EDE0DB0C95CA}\iexplore
Count
3
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{789FE86F-6FC4-46A1-9849-EDE0DB0C95CA}\iexplore
Time
E307010005000B00080032000D00D601
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
FullScreen
no
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Window_Placement
2C0000000200000003000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF20000000200000004003000078020000
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Favorites\Links
Order
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
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\iexplore
Type
3
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\iexplore
Count
3
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\iexplore
Time
E307010005000B00080032000D005302
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\iexplore
LoadTime
12
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B4F3A835-0E21-4959-BA22-42B3008E02FF}\iexplore
Type
3
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B4F3A835-0E21-4959-BA22-42B3008E02FF}\iexplore
Count
3
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B4F3A835-0E21-4959-BA22-42B3008E02FF}\iexplore
Time
E307010005000B00080032000D006202
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B4F3A835-0E21-4959-BA22-42B3008E02FF}\iexplore
LoadTime
35
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore
Type
3
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore
Count
3
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore
Time
E307010005000B00080032000D00C002
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore
LoadTime
26
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012019011120190112
CachePath
%USERPROFILE%\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019011120190112
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012019011120190112
CachePrefix
:2019011120190112:
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012019011120190112
CacheLimit
8192
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012019011120190112
CacheOptions
11
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012019011120190112
CacheRepair
0
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\WindowsSearch
UpgradeTime
7233FEAB8AA9D401
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
Path
C:\Users\admin\Favorites\Links\Suggested Sites.url
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
Handler
{B0FA7D7C-7195-4F03-B03E-9DC1C9EBC394}
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
FeedUrl
https://ieonline.microsoft.com/#ieslice
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
DisplayName
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
ErrorState
0
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
DisplayMask
0
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
Path
C:\Users\admin\Favorites\Links\Web Slice Gallery.url
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
Handler
{B0FA7D7C-7195-4F03-B03E-9DC1C9EBC394}
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
FeedUrl
http://go.microsoft.com/fwlink/?LinkId=121315
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
DisplayName
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
ErrorState
0
2860
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
DisplayMask
0
3144
iexplore.exe
delete key
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\LowCache\Extensible Cache\MSHist012018082820180829
3144
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage\Total
18
3144
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage\econord.it
18
3144
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage\Total
0
3144
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage\econord.it
0
3144
iexplore.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Direct3D\MostRecentApplication
Name
iexplore.exe
3144
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\LowCache\Extensible Cache\MSHist012019011120190112
CachePath
%USERPROFILE%\AppData\Local\Microsoft\Windows\History\Low\History.IE5\MSHist012019011120190112
3144
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\LowCache\Extensible Cache\MSHist012019011120190112
CachePrefix
:2019011120190112:
3144
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\LowCache\Extensible Cache\MSHist012019011120190112
CacheLimit
8192
3144
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\LowCache\Extensible Cache\MSHist012019011120190112
CacheOptions
11
3144
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\LowCache\Extensible Cache\MSHist012019011120190112
CacheRepair
0

Files activity

Executable files
0
Suspicious files
0
Text files
40
Unknown types
6

Dropped files

PID
Process
Filename
Type
2860
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019011120190112\index.dat
dat
MD5: 5ea5bf50c7efe7186ce9d343b870a92d
SHA256: 5ae6f7b9097dda22ece727f2b557ab360dec1c1264289aeda3b867c83c55f459
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2ZG9DE0\font-awesome.min[1].css
––
MD5:  ––
SHA256:  ––
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\MSHist012019011120190112\index.dat
dat
MD5: 153887368f748e0946f98a7b5d49e31d
SHA256: 163ce025178b108eb055cd4cec7c78de9c8cabec8267332b652af52cda3c729e
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\home-1[1].jpg
image
MD5: 183205ca21892f67367bd9c3df91d064
SHA256: 67fe2278dd6352722e71edb8734953cde87d9c2e6677eb0b21c4f262da3e7d94
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\home-2[1].jpg
image
MD5: 9b205420eb1e5cffb0b3708732ca981c
SHA256: 17684aea541f37a5bb36e94f44a2e67324e1dc437aaaedfce1c052e16f33a88a
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\home-3[1].jpg
image
MD5: af27c763070f99c93ad570f9bd5c834f
SHA256: adeb426b29516957a2ff8acc1c7dffc0df2c027f0b0eeffde26ce83d1beb6c2f
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\home-4[1].jpg
image
MD5: ccc6d3a8749bb02da2ba2989d08dd6fe
SHA256: c84c7a5e54a4dfdf7ad6e6eeda3f4e80abe945ce145b67dbe375c8220c9272ad
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\ui-bg_inset-hard_100_fcfdfd_1x100[1].png
image
MD5: 2b6a88b05b94c56fb478fe70dad68cdc
SHA256: d175ae345afe14519bca3ebe152a9f863e5116f8993a641c26f619f926436df0
3144
iexplore.exe
C:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\DOMStore\ZP8QT1OD\www.econord[1].xml
text
MD5: c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA256: b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\logo[1].png
image
MD5: b2b467e9333f28f95e1d93792aac3c5e
SHA256: 5d23f39ef8a68e5904dffa137faffe89813d36a81bfe06ce254bd21d0f8dc56b
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2ZG9DE0\fontawesome-webfont[1].eot
eot
MD5: 674f50d287a8c48dc19ba404d20fe713
SHA256: 7bfcab6db99d5cfbf1705ca0536ddc78585432cc5fa41bbd7ad0f009033b2979
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\BWPPCY0O\wp-emoji-release.min[1].js
text
MD5: 1c64b125732c6fe54928ee058ea72595
SHA256: be4e695190bc79c368d6116e18e2f299bf1f4ab58e8fa28aceaa0e739adc30fa
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\stickThis[1].js
text
MD5: 8ea340c7415f939477cbcd321be583d9
SHA256: c983eaa31c0c5d3996321e6c53dada72d32f2c12aa91708274e3ef609b367af8
3144
iexplore.exe
C:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\DOMStore\index.dat
dat
MD5: c974f408a26dff6f3db022c7b467b10f
SHA256: 25c887fe03c8dba37c1dbfb3ac4d10268305de79a78a5f27bc10810f7b59a9c2
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2ZG9DE0\autocomplete.min[1].js
text
MD5: 87848b50d8b543b6fe1a38a97a6aea5c
SHA256: c4234f93bd894572069745f51d2804d462c5a392ff47993fb592e420fa9b76a1
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\search-autocomplete.min[1].js
text
MD5: 077681133eaed32ed40f66338806f7aa
SHA256: d873e5e6bce997cc6b5624185a6fe77b8ec6736ccb0058c4d5a50fc7b9344ecc
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\position.min[1].js
text
MD5: 9396d719a4eadde27896ce30327a3a89
SHA256: 0ac0d8dae396eed714b53c15ed0d4e8699fe0809b91da48fb1075a6403cc8b65
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\menu.min[1].js
text
MD5: 279b59ffd3e6ed2da1397cb06ce13ec0
SHA256: 1e1a77f9f30b38dc1bd684a10c1bda12b47b498992553ea78c4ca6f7eb14781e
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\BWPPCY0O\1Ptug8zYS_SKggPNyC0ISw[1].eot
eot
MD5: b76febefc08cb94a5fd24fa1cecbd382
SHA256: 19f044d90fc9b6870a749bae0387fc2ed2a810869051604f622ea8433e01b8a3
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.dat
dat
MD5: 0d4ba2c16138f229c858814bade40668
SHA256: 8809af1241ff85e94398018300ce0c9ac6d3b287e9411a8100efd5fc3b675a52
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2ZG9DE0\widget.min[1].js
text
MD5: 0bb0af0869341cca0236ba99d4ea092f
SHA256: cf70d14e543cc6d2c59a90614f84c34d4dcd6d0a66813cf5a046a249a3d1a2a3
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\BWPPCY0O\font-awesome.min[1].css
text
MD5: 269550530cc127b6aa5a35925a7de6ce
SHA256: 799aeb25cc0373fdee0e1b1db7ad6c2f6a0e058dfadaa3379689f583213190bd
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\core.min[1].js
text
MD5: 204d1573e5f9ad0d0c9b61bdffe4a37b
SHA256: 191622240e7646a2e888eb318557bcca854828b59b5b2e960545ee08ae142382
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\scripts[2].js
text
MD5: 08a701990407519dbf154d7b720c2ab6
SHA256: a78570824f29a3f60401ced15955c0d464e437850fcbfb940470205d1dbf8fc2
2860
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\favicon[1].ico
image
MD5: 839bc5e97b3c8bd96a73cb8bcd940e66
SHA256: 706d7756673890d219f396085673eacf94ace49351c50320870b588d83af2c62
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\BWPPCY0O\jquery.form.min[1].js
text
MD5: f448c593c242d134e9733a84c7a4d26c
SHA256: c90f0e501d2948fbc2b61bffd654fa4ab64741fd48923782419eeb14d3816fb8
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\jq-sticky-anything.min[1].js
text
MD5: ad9950651095d7da90e7e7df78f0c2b5
SHA256: c2c40325096a344135f8e0f640261ded8e6a045658cc4611b77e68b1e9506451
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\style-ie8[1].css
text
MD5: dc36465ee93ab5dc02bf4f28eef6c0ec
SHA256: 6e1e014838e660586054f342498f00166ed304426dcbf201451c9d9a1cb6431e
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2ZG9DE0\backstretch.min[1].js
text
MD5: 91d4cd427e3b6649cecaa8e689f284c7
SHA256: 579d9d9773858e863e7d802489f84b27b7f557b99900a3c6090a16ce8431ac45
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\BWPPCY0O\front.min[1].js
text
MD5: 008e95f0c8538680691fbf596a036524
SHA256: 365544c5b77e5b0cd07725da81e081d7add6869bb006ce221d47991fa1fbe3a6
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\owl.carousel.min[1].js
text
MD5: ffaa3c82ad2c6e216e68aca44746e1be
SHA256: 83553d22ccd56e5576d544f6ba93475c712b3c02d312893eea2acc16de5fcf91
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\jquery-migrate.min[1].js
text
MD5: 512b871a2830e44259bc3ce3343afcd0
SHA256: c4d24f6b27cc7ceea56fbec786bb1f486fdad9a1f998f760f76d1f44671e105c
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\BWPPCY0O\conditionizr-4.3.0.min[1].js
text
MD5: ebb3be556f2c8b440249b1fd54af4dc5
SHA256: 2ef7d832fabc0394a37115aca932aeeacc791cca46bdc6503e4cf8e07911ca90
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\jquery-ui-1.9.2.custom.min[1].css
text
MD5: e85c4ededa21c1f70bd44e9690ba0dca
SHA256: 9c41daa36d22928a6541faeb4d8a4e10bc5969766dface22293b9694af93d8c4
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2ZG9DE0\jquery[1].js
text
MD5: 207abeb83412721d556faeba36e00822
SHA256: ca32702f36da9bdbaa5463f8e3db9b18d82f3ce8a630d18e8bde6b30a2582d20
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2ZG9DE0\modernizr-2.7.1.min[1].js
html
MD5: da2c1b8dc967ad0e19eb25638216cdc6
SHA256: 0b2a741489fb323cd96e2b546693ca1fc7151cfa0f2111eee4dd512e6b359941
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\BWPPCY0O\css[1].txt
text
MD5: 65087d182213093fc04d4a6543eaaa69
SHA256: e4e805f071f99e321835f01694189fb3f16e4429d931ffcbe65aa72a9c4e9fcd
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\BWPPCY0O\style[1].css
text
MD5: 5be86570e3e0e1960ca9677f331ff6af
SHA256: b15a1597f6f2679878e6c32c37cd7f54985cf82423ee2e0f2410049ba65dcbc0
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2ZG9DE0\front.min[1].css
text
MD5: 177f8b7f2a448ca7a8d3adfbde35875b
SHA256: 6072346067391650cc9f1c7648c4b1db11072aa9972ad5b34c1e5911d33a0412
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\app[1].css
text
MD5: 725dc1e5093171d2780cdd23a5752f35
SHA256: ac37412021fb1b48785fd1e76b3250ca274c73f281b9b7cd9d92aa8cd3c25465
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\grids-responsive-old-ie-min[1].css
text
MD5: 76a07375091fee0497f8dda8d9852be4
SHA256: 7845f387a79a122f72e514b05148d69acf0c86667781c802fdb87a910be03c87
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\owl.carousel[1].css
text
MD5: 8b02912f24410eb6c5779f3ca7683d94
SHA256: c6c071e5272cbf2e6e69f48a7f1ccb2ca3638cc7a2a49cfabb6b7821b24350c0
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\pure-min[1].css
text
MD5: 9a108ac6ff91842e143af3a243fb5ea3
SHA256: 00e83aa5f667c4ee219411f6cf6ba69a0746294f1753dba050f93259a48c2747
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\styles[1].css
text
MD5: febbda4768d2fa237c794ce80866d7a7
SHA256: 96f1810d96a208f1b98ce9ba49368fcb9b8334105e87554602275b978c2c170a
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\econord_it[1].txt
––
MD5:  ––
SHA256:  ––
3144
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\econord_it[1].htm
html
MD5: 604e0b4ecb8dd089961b015474bdfdda
SHA256: 2059f8ac0c9c0c7799d829a77237b47e2d91d8ed39ee9ee630a3c97bf5e9c849
2860
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\favicon[3].png
image
MD5: 9fb559a691078558e77d6848202f6541
SHA256: 6d8a01dc7647bc218d003b58fe04049e24a9359900b7e0cebae76edf85b8b914
2860
iexplore.exe
C:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
––
MD5:  ––
SHA256:  ––
2860
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\favicon[1].ico
––
MD5:  ––
SHA256:  ––

Find more information of the staic content and download it at the full report

Network activity

HTTP(S) requests
42
TCP/UDP connections
16
DNS requests
6
Threats
0

HTTP requests

PID Process Method HTTP Code IP URL CN Type Size Reputation
3144 iexplore.exe GET 200 151.11.48.28:80 http://www.econord.it/ IT
html
unknown
2860 iexplore.exe GET 200 204.79.197.200:80 http://www.bing.com/favicon.ico US
image
whitelisted
3144 iexplore.exe GET 200 151.11.48.28:80 http://www.econord.it/wp-content/plugins/contact-form-7/includes/css/styles.css?ver=4.1.2 IT
text
unknown
3144 iexplore.exe GET 200 151.11.48.28:80 http://www.econord.it/wp-content/plugins/cookie-notice/css/front.min.css?ver=4.3.18 IT
text
unknown
3144 iexplore.exe GET 200 151.11.48.28:80 http://www.econord.it/wp-content/themes/html5blank/style.css?ver=1.0 IT
text
unknown
3144 iexplore.exe GET 200 151.11.48.28:80 http://www.econord.it/wp-content/themes/html5blank/owl.carousel.css?ver=4.3.18 IT
text
unknown
3144 iexplore.exe GET 200 151.11.48.28:80 http://www.econord.it/wp-content/plugins/simple-lightbox/client/css/app.css?ver=2.4.0 IT
text
unknown
3144 iexplore.exe GET 200 151.11.48.28:80 http://www.econord.it/wp-content/themes/html5blank/js/lib/modernizr-2.7.1.min.js?ver=2.7.1 IT
html
unknown
3144 iexplore.exe GET 200 87.248.114.11:80 http://yui.yahooapis.com/pure/0.6.0/grids-responsive-old-ie-min.css GB
text
whitelisted
3144 iexplore.exe GET 200 87.248.114.11:80 http://yui.yahooapis.com/pure/0.6.0/pure-min.css?ver=4.3.18 GB
text
whitelisted
3144 iexplore.exe GET 301 104.16.89.20:80 http://cdn.jsdelivr.net/fontawesome/4.7.0/css/font-awesome.min.css?ver=4.7.0 US
––
––
whitelisted
3144 iexplore.exe GET 200 172.217.22.42:80 http://fonts.googleapis.com/css?family=Raleway%3A400%2C300%2C700&ver=4.3.18 US
text
whitelisted
3144 iexplore.exe GET 200 151.11.48.28:80 http://www.econord.it/wp-includes/js/jquery/jquery.js?ver=1.11.3 IT
text
unknown
3144 iexplore.exe GET 200 151.11.48.28:80 http://www.econord.it/wp-content/plugins/search-autocomplete/css/redmond/jquery-ui-1.9.2.custom.min.css?ver=1.9.2 IT
text
unknown
3144 iexplore.exe GET 200 151.11.48.28:80 http://www.econord.it/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.2.1 IT
text
unknown
3144 iexplore.exe GET 200 151.11.48.28:80 http://www.econord.it/wp-content/themes/html5blank/js/lib/conditionizr-4.3.0.min.js?ver=4.3.0 IT
text
unknown
3144 iexplore.exe GET 200 151.11.48.28:80 http://www.econord.it/wp-content/themes/html5blank/js/scripts.js?ver=1.0.0 IT
compressed
unknown
3144 iexplore.exe GET 200 151.11.48.28:80 http://www.econord.it/wp-content/themes/html5blank/js/owl.carousel.min.js?ver=4.3.18 IT
text
unknown
3144 iexplore.exe GET 200 151.11.48.28:80 http://www.econord.it/wp-content/themes/html5blank/js/backstretch.min.js?ver=4.3.18 IT
text
unknown
3144 iexplore.exe GET 200 151.11.48.28:80 http://www.econord.it/wp-content/plugins/cookie-notice/js/front.min.js?ver=1.2.42 IT
text
unknown
3144 iexplore.exe GET 301 104.16.89.20:80 http://cdn.jsdelivr.net/fontawesome/4.7.0/css/font-awesome.min.css?ver=4.7.0 US
––
––
whitelisted
3144 iexplore.exe GET 200 151.11.48.28:80 http://www.econord.it/wp-content/plugins/sticky-menu-or-anything-on-scroll/assets/js/jq-sticky-anything.min.js?ver=1.3.1 IT
text
unknown
3144 iexplore.exe GET 200 151.11.48.28:80 http://www.econord.it/wp-content/themes/html5blank/style-ie8.css IT
text
unknown
3144 iexplore.exe GET 200 151.11.48.28:80 http://www.econord.it/wp-content/plugins/contact-form-7/includes/js/jquery.form.min.js?ver=3.51.0-2014.06.20 IT
text
unknown
3144 iexplore.exe GET 200 151.11.48.28:80 http://www.econord.it/wp-content/plugins/contact-form-7/includes/js/scripts.js?ver=4.1.2 IT
text
unknown
3144 iexplore.exe GET 200 172.217.21.227:80 http://fonts.gstatic.com/s/raleway/v12/1Ptug8zYS_SKggPNyC0ISw.eot US
eot
whitelisted
3144 iexplore.exe GET 200 151.11.48.28:80 http://www.econord.it/wp-includes/js/jquery/ui/core.min.js?ver=1.11.4 IT
text
unknown
3144 iexplore.exe GET 200 151.11.48.28:80 http://www.econord.it/wp-includes/js/jquery/ui/widget.min.js?ver=1.11.4 IT
text
unknown
3144 iexplore.exe GET 200 151.11.48.28:80 http://www.econord.it/wp-includes/js/jquery/ui/position.min.js?ver=1.11.4 IT
text
unknown
3144 iexplore.exe GET 200 151.11.48.28:80 http://www.econord.it/wp-includes/js/jquery/ui/menu.min.js?ver=1.11.4 IT
text
unknown
3144 iexplore.exe GET 200 151.11.48.28:80 http://www.econord.it/wp-includes/js/jquery/ui/autocomplete.min.js?ver=1.11.4 IT
text
unknown
3144 iexplore.exe GET 200 151.11.48.28:80 http://www.econord.it/wp-content/plugins/search-autocomplete/js/search-autocomplete.min.js?ver=1.0.0 IT
text
unknown
3144 iexplore.exe GET 200 151.11.48.28:80 http://www.econord.it/wp-content/plugins/sticky-menu-or-anything-on-scroll/assets/js/stickThis.js?ver=1.3.1 IT
text
unknown
3144 iexplore.exe GET 200 151.11.48.28:80 http://www.econord.it/wp-includes/js/wp-emoji-release.min.js?ver=4.3.18 IT
text
unknown
3144 iexplore.exe GET 301 104.16.89.20:80 http://cdn.jsdelivr.net/fontawesome/4.7.0/fonts/fontawesome-webfont.eot? US
––
––
whitelisted
3144 iexplore.exe GET 200 151.11.48.28:80 http://www.econord.it/wp-content/themes/html5blank/img/logo.png IT
image
unknown
3144 iexplore.exe GET 200 151.11.48.28:80 http://www.econord.it/wp-content/themes/html5blank/img/home-1.jpg IT
image
unknown
3144 iexplore.exe GET 200 151.11.48.28:80 http://www.econord.it/wp-content/themes/html5blank/img/home-2.jpg IT
image
unknown
3144 iexplore.exe GET 200 151.11.48.28:80 http://www.econord.it/wp-content/themes/html5blank/img/home-3.jpg IT
image
unknown
3144 iexplore.exe GET 200 151.11.48.28:80 http://www.econord.it/wp-content/plugins/search-autocomplete/css/redmond/images/ui-bg_inset-hard_100_fcfdfd_1x100.png IT
image
unknown
3144 iexplore.exe GET 200 151.11.48.28:80 http://www.econord.it/wp-content/themes/html5blank/img/home-4.jpg IT
image
unknown
2860 iexplore.exe GET 200 151.11.48.28:80 http://www.econord.it/wp-content/themes/html5blank/img/icons/favicon.ico IT
image
unknown

Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID Process IP ASN CN Reputation
3144 iexplore.exe 151.11.48.28:80 genesys informatica srl IT unknown
2860 iexplore.exe 204.79.197.200:80 Microsoft Corporation US whitelisted
3144 iexplore.exe 87.248.114.11:80 Yahoo! UK Services Limited GB shared
3144 iexplore.exe 104.16.89.20:80 Cloudflare Inc US shared
3144 iexplore.exe 172.217.22.42:80 Google Inc. US whitelisted
3144 iexplore.exe 104.16.89.20:443 Cloudflare Inc US shared
3144 iexplore.exe 172.217.21.227:80 Google Inc. US whitelisted
2860 iexplore.exe 151.11.48.28:80 genesys informatica srl IT unknown

DNS requests

Domain IP Reputation
www.econord.it 151.11.48.28
unknown
www.bing.com 204.79.197.200
13.107.21.200
whitelisted
yui.yahooapis.com 87.248.114.11
87.248.114.12
whitelisted
fonts.googleapis.com 172.217.22.42
whitelisted
cdn.jsdelivr.net 104.16.89.20
104.16.88.20
104.16.85.20
104.16.86.20
104.16.87.20
whitelisted
fonts.gstatic.com 172.217.21.227
whitelisted

Threats

No threats detected.

Debug output strings

No debug info.