URL:

https://corp.bank.ecitic.com

Full analysis: https://app.any.run/tasks/5b24ade6-162c-409c-80e7-59c6e4717902
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: April 08, 2020, 12:58:00
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MD5:

4CAE741A6676798DC9D615BD4B5F8C83

SHA1:

8337F9F67AB89CE69A9CC50725CD131393C2BE89

SHA256:

A43369006FD2A96A97294C8D6EE854FC5B272BE61E4E7AF87D7A2A8DA2BC6959

SSDEEP:

3:N8XxCkFj:2IG

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • CITICUKeySetup_WD_Win.exe (PID: 440)
      • CITICUKeySetup_WD_Win.exe (PID: 2068)
      • WDKiller32.exe (PID: 2128)
      • registCCID.exe (PID: 1780)
      • CNCBUK2WDMon.exe (PID: 3244)
      • ns6081.tmp (PID: 3224)
      • ns646A.tmp (PID: 3928)
      • ns66AD.tmp (PID: 2936)
      • CNCBUK2WDAdmin.exe (PID: 3968)
      • CNCBUK2WDAdmin.exe (PID: 3712)
      • CNCBUK2WDAdmin.exe (PID: 2820)
      • WDKiller32.exe (PID: 3516)
      • WDKiller32.exe (PID: 1232)
      • CNCBUK2WDAdmin.exe (PID: 2740)
    • Downloads executable files from the Internet

      • iexplore.exe (PID: 2316)
    • Loads dropped or rewritten executable

      • CITICUKeySetup_WD_Win.exe (PID: 2068)
      • CNCBUK2WDMon.exe (PID: 3244)
      • regsvr32.exe (PID: 2400)
      • regsvr32.exe (PID: 3404)
      • CNCBUK2WDAdmin.exe (PID: 3968)
    • Changes settings of System certificates

      • CITICUKeySetup_WD_Win.exe (PID: 2068)
    • Changes the autorun value in the registry

      • CITICUKeySetup_WD_Win.exe (PID: 2068)
    • Changes internet zones settings

      • CITICUKeySetup_WD_Win.exe (PID: 2068)
    • Registers / Runs the DLL via REGSVR32.EXE

      • cmd.exe (PID: 740)
      • cmd.exe (PID: 2796)
    • Loads the Task Scheduler COM API

      • schtasks.exe (PID: 1692)
    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 1232)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 3568)
      • CITICUKeySetup_WD_Win.exe (PID: 2068)
      • iexplore.exe (PID: 2316)
    • Executed as Windows Service

      • WDKiller32.exe (PID: 2128)
      • CNCBUK2WDMon.exe (PID: 3244)
    • Creates files in the Windows directory

      • CITICUKeySetup_WD_Win.exe (PID: 2068)
    • Creates files in the program directory

      • CITICUKeySetup_WD_Win.exe (PID: 2068)
      • CNCBUK2WDAdmin.exe (PID: 3968)
      • regsvr32.exe (PID: 2400)
    • Creates a software uninstall entry

      • CITICUKeySetup_WD_Win.exe (PID: 2068)
    • Creates or modifies windows services

      • CITICUKeySetup_WD_Win.exe (PID: 2068)
    • Starts application with an unusual extension

      • CITICUKeySetup_WD_Win.exe (PID: 2068)
    • Starts CMD.EXE for commands execution

      • ns6081.tmp (PID: 3224)
      • ns646A.tmp (PID: 3928)
      • ns66AD.tmp (PID: 2936)
    • Executed via Task Scheduler

      • CNCBUK2WDAdmin.exe (PID: 3968)
    • Creates COM task schedule object

      • regsvr32.exe (PID: 2400)
      • regsvr32.exe (PID: 3404)
  • INFO

    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3568)
      • iexplore.exe (PID: 2976)
      • iexplore.exe (PID: 2316)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2976)
      • iexplore.exe (PID: 2316)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3568)
      • iexplore.exe (PID: 2316)
      • iexplore.exe (PID: 2976)
    • Application launched itself

      • iexplore.exe (PID: 3568)
    • Changes internet zones settings

      • iexplore.exe (PID: 3568)
    • Creates files in the user directory

      • iexplore.exe (PID: 3568)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 3568)
    • Manual execution by user

      • CNCBUK2WDAdmin.exe (PID: 2740)
      • CNCBUK2WDAdmin.exe (PID: 2820)
      • explorer.exe (PID: 3700)
      • WDKiller32.exe (PID: 1232)
      • WDKiller32.exe (PID: 3516)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 3568)
    • Changes settings of System certificates

      • iexplore.exe (PID: 3568)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
68
Monitored processes
24
Malicious processes
11
Suspicious processes
5

Behavior graph

Click at the process to see the details
drop and start drop and start start drop and start drop and start drop and start drop and start drop and start iexplore.exe iexplore.exe iexplore.exe citicukeysetup_wd_win.exe no specs citicukeysetup_wd_win.exe wdkiller32.exe registccid.exe no specs cncbuk2wdmon.exe no specs ns6081.tmp no specs cmd.exe no specs regsvr32.exe no specs ns646a.tmp no specs cmd.exe no specs regsvr32.exe no specs ns66ad.tmp no specs cmd.exe no specs schtasks.exe no specs cncbuk2wdadmin.exe no specs cncbuk2wdadmin.exe no specs cncbuk2wdadmin.exe no specs cncbuk2wdadmin.exe no specs explorer.exe no specs wdkiller32.exe wdkiller32.exe

Process information

PID
CMD
Path
Indicators
Parent process
440"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\CITICUKeySetup_WD_Win.exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\CITICUKeySetup_WD_Win.exeiexplore.exe
User:
admin
Company:
CHINA CITIC BANK
Integrity Level:
MEDIUM
Description:
CHINA CITIC BANK Enhanced UKEY management tool
Exit code:
3221226540
Version:
2.0.0.0718
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\b6qgx7lp\citicukeysetup_wd_win.exe
c:\systemroot\system32\ntdll.dll
740C:\Windows\system32\cmd.exe /C regsvr32 /s "C:\Windows\system32\citic_WDusbkey.dll"C:\Windows\system32\cmd.exens6081.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1232C:\Windows\System32\cmd.exe /C schtasks /create /sc minute /mo 1 /tn "WDCITICTASK" /tr "\"C:\Program Files\CNCB\WatchData\CNCBUK2WDAdmin.exe\" -task"C:\Windows\System32\cmd.exens66AD.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1232"C:\Users\admin\AppData\Local\Temp\WDKiller32.exe" C:\Users\admin\AppData\Local\Temp\WDKiller32.exe
explorer.exe
User:
admin
Company:
WatchData System Corporation
Integrity Level:
MEDIUM
Description:
WDKiller
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\windows\system32\msctf.dll
c:\windows\system32\usp10.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\kernelbase.dll
c:\systemroot\system32\ntdll.dll
c:\users\admin\appdata\local\temp\wdkiller32.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1692schtasks /create /sc minute /mo 1 /tn "WDCITICTASK" /tr "\"C:\Program Files\CNCB\WatchData\CNCBUK2WDAdmin.exe\" -task"C:\Windows\system32\schtasks.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\schtasks.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
1780"C:\Windows\System32\CNCB\CNCB USBKEY2 CSP WD\registCCID.exe"C:\Windows\System32\CNCB\CNCB USBKEY2 CSP WD\registCCID.exeCITICUKeySetup_WD_Win.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\windows\system32\cncb\cncb usbkey2 csp wd\registccid.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
2068"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\CITICUKeySetup_WD_Win.exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\CITICUKeySetup_WD_Win.exe
iexplore.exe
User:
admin
Company:
CHINA CITIC BANK
Integrity Level:
HIGH
Description:
CHINA CITIC BANK Enhanced UKEY management tool
Exit code:
0
Version:
2.0.0.0718
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\b6qgx7lp\citicukeysetup_wd_win.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
2128C:\Users\admin\AppData\Local\Temp\WDKiller32.exeC:\Users\admin\AppData\Local\Temp\WDKiller32.exe
services.exe
User:
SYSTEM
Company:
WatchData System Corporation
Integrity Level:
SYSTEM
Description:
WDKiller
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\wdkiller32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2316"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3568 CREDAT:595224 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2400regsvr32 /s "C:\Windows\system32\citic_WDusbkey.dll"C:\Windows\system32\regsvr32.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
5 211
Read events
1 399
Write events
2 618
Delete events
1 194

Modification events

(PID) Process:(3568) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
1881608002
(PID) Process:(3568) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30805413
(PID) Process:(3568) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3568) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3568) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3568) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3568) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3568) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(3568) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3568) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
39
Suspicious files
24
Text files
80
Unknown types
11

Dropped files

PID
Process
Filename
Type
3568iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2976iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab524.tmp
MD5:
SHA256:
2976iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar525.tmp
MD5:
SHA256:
2976iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619der
MD5:
SHA256:
2976iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5887976EDAA817EEF5159B09F6FCD000_252EBB04EFD5B7D2B72DC5FEF3D767D4der
MD5:
SHA256:
2976iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\C5MD1VIC.htmhtml
MD5:
SHA256:
2976iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619binary
MD5:
SHA256:
2976iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\5887976EDAA817EEF5159B09F6FCD000_252EBB04EFD5B7D2B72DC5FEF3D767D4binary
MD5:
SHA256:
2976iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\login[1].htmhtml
MD5:
SHA256:
2976iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\bootstrap[1].csstext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
33
DNS requests
13
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2976
iexplore.exe
GET
200
47.246.43.230:80
http://ocsp.dcocsp.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTtKLuhLRfVHmBRzoAZfEF2wNJJHAQUqTu6eliVSDX%2B1gedK4sl%2Fmrh26ACEAdhkzrG20RIvDOHUTfQeBQ%3D
US
der
471 b
whitelisted
3568
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D
US
der
1.47 Kb
whitelisted
2316
iexplore.exe
GET
200
119.188.140.33:80
http://autoload.bank.ecitic.com/ebank/cotb/common/CITICUKeySetup_WD_Win.exe
CN
executable
1.52 Mb
suspicious
2976
iexplore.exe
GET
200
47.246.43.230:80
http://ocsp.dcocsp.cn/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEAWoVAlaUmxCeMdbR0YeCdM%3D
US
der
471 b
whitelisted
3568
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/favicon.ico
US
image
237 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2976
iexplore.exe
223.71.111.106:443
corp.bank.ecitic.com
China Mobile Communicaitons Corporation
CN
unknown
3568
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2976
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2976
iexplore.exe
124.127.247.245:8443
apms.citicbank.com
China Networks Inter-Exchange
CN
unknown
3568
iexplore.exe
223.71.111.106:443
corp.bank.ecitic.com
China Mobile Communicaitons Corporation
CN
unknown
2316
iexplore.exe
223.71.111.106:443
corp.bank.ecitic.com
China Mobile Communicaitons Corporation
CN
unknown
2976
iexplore.exe
47.246.43.230:80
ocsp.dcocsp.cn
US
malicious
3568
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2316
iexplore.exe
119.188.140.33:80
autoload.bank.ecitic.com
CHINA UNICOM China169 Backbone
CN
suspicious
3568
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted

DNS requests

Domain
IP
Reputation
corp.bank.ecitic.com
  • 223.71.111.106
unknown
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
apms.citicbank.com
  • 124.127.247.245
unknown
ocsp.dcocsp.cn
  • 47.246.43.230
  • 47.246.43.223
  • 47.246.43.224
  • 47.246.43.225
  • 47.246.43.226
  • 47.246.43.227
  • 47.246.43.228
  • 47.246.43.229
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
ieonline.microsoft.com
  • 204.79.197.200
whitelisted
autoload.bank.ecitic.com
  • 119.188.140.33
  • 101.69.148.43
  • 221.204.172.34
  • 221.204.172.32
suspicious

Threats

PID
Process
Class
Message
2316
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Process
Message
WDKiller32.exe
SRV ServiceStart 1
WDKiller32.exe
SRV ServiceStart 2
WDKiller32.exe
SRV ServiceStart 3
WDKiller32.exe
SRV ServiceStart 4
WDKiller32.exe
SRV ServiceStart 6
WDKiller32.exe
SRV ServiceStart5
WDKiller32.exe
SRV ServiceStart 2
WDKiller32.exe
SRV ServiceStart 1
WDKiller32.exe
SRV ServiceStart 3
WDKiller32.exe
SRV ServiceStart 4