General Info

URL

http://www.mining.com/las-bambas-copper-markets-68-day-blockade/?utm_source=digest-en-mining-190414&utm_medium=email&utm_campaign=digest

Full analysis
https://app.any.run/tasks/1a08d824-f2b5-44fe-849c-e36a55c34b44
Verdict
Malicious activity
Analysis date
4/15/2019, 07:28:36
OS:
Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distored by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.

Software environment set and analysis options

Launch configuration

Task duration
60 seconds
Additional time used
none
Fakenet option
off
Heavy Evaision option
off
MITM proxy
off
Route via Tor
off
Network geolocation
off
Privacy
Public submission
Autoconfirmation of UAC
on

Software preset

  • Internet Explorer 8.0.7601.17514
  • Adobe Acrobat Reader DC MUI (15.023.20070)
  • Adobe Flash Player 26 ActiveX (26.0.0.131)
  • Adobe Flash Player 26 NPAPI (26.0.0.131)
  • Adobe Flash Player 26 PPAPI (26.0.0.131)
  • Adobe Refresh Manager (1.8.0)
  • CCleaner (5.35)
  • FileZilla Client 3.36.0 (3.36.0)
  • Google Chrome (73.0.3683.75)
  • Google Update Helper (1.3.33.23)
  • Java 8 Update 92 (8.0.920.14)
  • Java Auto Updater (2.8.92.14)
  • Microsoft .NET Framework 4.6.1 (4.6.01055)
  • Microsoft Office Access MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Access Setup Metadata MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Excel MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office OneNote MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Outlook MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office PowerPoint MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Professional 2010 (14.0.6029.1000)
  • Microsoft Office Proof (English) 2010 (14.0.6029.1000)
  • Microsoft Office Proof (French) 2010 (14.0.6029.1000)
  • Microsoft Office Proof (Spanish) 2010 (14.0.6029.1000)
  • Microsoft Office Proofing (English) 2010 (14.0.6029.1000)
  • Microsoft Office Publisher MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Shared MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Shared Setup Metadata MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Single Image 2010 (14.0.6029.1000)
  • Microsoft Office Word MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (9.0.30729.6161)
  • Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219 (10.0.40219)
  • Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.30501 (12.0.30501.0)
  • Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005 (12.0.21005)
  • Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005 (12.0.21005)
  • Microsoft Visual C++ 2017 Redistributable (x86) - 14.15.26706 (14.15.26706.0)
  • Microsoft Visual C++ 2017 x86 Additional Runtime - 14.15.26706 (14.15.26706)
  • Microsoft Visual C++ 2017 x86 Minimum Runtime - 14.15.26706 (14.15.26706)
  • Mozilla Firefox 65.0.2 (x86 en-US) (65.0.2)
  • Notepad++ (32-bit x86) (7.5.1)
  • Opera 12.15 (12.15.1748)
  • Skype version 8.29 (8.29)
  • VLC media player (2.2.6)
  • WinRAR 5.60 (32-bit) (5.60.0)

Hotfixes

  • Client LanguagePack Package
  • Client Refresh LanguagePack Package
  • CodecPack Basic Package
  • Foundation Package
  • IE Troubleshooters Package
  • InternetExplorer Optional Package
  • KB2534111
  • KB2999226
  • KB976902
  • LocalPack AU Package
  • LocalPack CA Package
  • LocalPack GB Package
  • LocalPack US Package
  • LocalPack ZA Package
  • ProfessionalEdition
  • UltimateEdition

Behavior activities

MALICIOUS SUSPICIOUS INFO

No malicious indicators.

No suspicious indicators.

Creates files in the user directory
  • iexplore.exe (PID: 2556)
  • iexplore.exe (PID: 3004)
Reads settings of System Certificates
  • iexplore.exe (PID: 3004)
Reads internet explorer settings
  • iexplore.exe (PID: 3004)
Changes internet zones settings
  • iexplore.exe (PID: 2556)
Application launched itself
  • iexplore.exe (PID: 2556)
Reads Internet Cache Settings
  • iexplore.exe (PID: 2556)
  • iexplore.exe (PID: 3004)

Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Screenshots

Processes

Total processes
33
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

+
start iexplore.exe iexplore.exe
Specs description
Program did not start
Integrity level elevation
Task сontains an error or was rebooted
Process has crashed
Task contains several apps running
Executable file was dropped
Debug information is available
Process was injected
Network attacks were detected
Application downloaded the executable file
Actions similar to stealing personal data
Behavior similar to exploiting the vulnerability
Inspected object has sucpicious PE structure
File is detected by antivirus software
CPU overrun
RAM overrun
Process starts the services
Process was added to the startup
Behavior similar to spam
Low-level access to the HDD
Probably Tor was used
System was rebooted
Connects to the network
Known threat

Process information

Click at the process to see the details.

PID
2556
CMD
"C:\Program Files\Internet Explorer\iexplore.exe" -nohome
Path
C:\Program Files\Internet Explorer\iexplore.exe
Indicators
Parent process
––
User
admin
Integrity Level
MEDIUM
Version:
Company
Microsoft Corporation
Description
Internet Explorer
Version
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Image
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\shell32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\psapi.dll
c:\windows\system32\oleacc.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\profapi.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\comdlg32.dll
c:\windows\system32\cryptbase.dll
c:\program files\internet explorer\sqmapi.dll
c:\windows\system32\rpcrtremote.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\rasman.dll
c:\windows\system32\rtutils.dll
c:\windows\system32\sensapi.dll
c:\windows\system32\nlaapi.dll
c:\windows\system32\rasadhlp.dll
c:\windows\system32\ieui.dll
c:\windows\system32\msimg32.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\clbcatq.dll
c:\program files\internet explorer\ieproxy.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\url.dll
c:\windows\system32\version.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\propsys.dll
c:\windows\system32\xmllite.dll
c:\windows\system32\explorerframe.dll
c:\windows\system32\duser.dll
c:\windows\system32\dui70.dll
c:\windows\system32\msfeeds.dll
c:\windows\system32\sxs.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\system32\normaliz.dll
c:\windows\system32\wship6.dll
c:\windows\system32\fwpuclnt.dll
c:\windows\system32\mlang.dll
c:\windows\system32\mssprxy.dll

PID
3004
CMD
"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2556 CREDAT:71937
Path
C:\Program Files\Internet Explorer\iexplore.exe
Indicators
Parent process
iexplore.exe
User
admin
Integrity Level
LOW
Version:
Company
Microsoft Corporation
Description
Internet Explorer
Version
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Image
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\shell32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\psapi.dll
c:\windows\system32\oleacc.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\comdlg32.dll
c:\program files\internet explorer\ieshims.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\rpcrtremote.dll
c:\program files\internet explorer\sqmapi.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\propsys.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\profapi.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\rsaenh.dll
c:\program files\internet explorer\ieproxy.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\mlang.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\apphelp.dll
c:\program files\java\jre1.8.0_92\bin\ssv.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\version.dll
c:\progra~1\micros~1\office14\urlredir.dll
c:\windows\system32\secur32.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\progra~1\micros~1\office14\msohev.dll
c:\program files\java\jre1.8.0_92\bin\jp2ssv.dll
c:\program files\java\jre1.8.0_92\bin\msvcr100.dll
c:\program files\java\jre1.8.0_92\bin\deploy.dll
c:\windows\system32\imagehlp.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\sxs.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\rasman.dll
c:\windows\system32\rtutils.dll
c:\windows\system32\sensapi.dll
c:\windows\system32\nlaapi.dll
c:\windows\system32\rasadhlp.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\system32\normaliz.dll
c:\windows\system32\wship6.dll
c:\windows\system32\fwpuclnt.dll
c:\windows\system32\mshtml.dll
c:\windows\system32\msls31.dll
c:\windows\system32\msimtf.dll
c:\windows\system32\feclient.dll
c:\windows\system32\t2embed.dll
c:\windows\system32\iepeers.dll
c:\windows\system32\winspool.drv
c:\windows\system32\userenv.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\schannel.dll
c:\windows\system32\credssp.dll
c:\windows\system32\ncrypt.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\gpapi.dll
c:\windows\system32\p2pcollab.dll
c:\windows\system32\qagentrt.dll
c:\windows\system32\fveui.dll
c:\windows\system32\jscript.dll
c:\windows\system32\msxml3.dll
c:\windows\system32\imgutil.dll
c:\windows\system32\pngfilt.dll
c:\windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\gdiplus.dll
c:\windows\system32\xmllite.dll
c:\windows\system32\cryptnet.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\dhcpcsvc6.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\dxtrans.dll
c:\windows\system32\atl.dll
c:\windows\system32\ddrawex.dll
c:\windows\system32\ddraw.dll
c:\windows\system32\dciman32.dll
c:\windows\system32\dxtmsft.dll
c:\windows\system32\d3dim700.dll

Registry activity

Total events
440
Read events
373
Write events
66
Delete events
1

Modification events

PID
Process
Operation
Key
Name
Value
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
CompatibilityFlags
0
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
SecuritySafe
1
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
ProxyEnable
0
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
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
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
{5905E44F-5F3F-11E9-B63D-5254004A04AF}
0
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Type
4
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Count
1
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Time
E307040001000F0005001C003200D703
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{789FE86F-6FC4-46A1-9849-EDE0DB0C95CA}\iexplore
Type
4
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{789FE86F-6FC4-46A1-9849-EDE0DB0C95CA}\iexplore
Count
1
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{789FE86F-6FC4-46A1-9849-EDE0DB0C95CA}\iexplore
Time
E307040001000F0005001C003200E703
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
FullScreen
no
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Window_Placement
2C0000000200000003000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF20000000200000004003000078020000
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Favorites\Links
Order
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
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\iexplore
Type
3
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\iexplore
Count
1
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\iexplore
Time
E307040001000F0005001C0033008B00
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\iexplore
LoadTime
16
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B4F3A835-0E21-4959-BA22-42B3008E02FF}\iexplore
Type
3
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B4F3A835-0E21-4959-BA22-42B3008E02FF}\iexplore
Count
1
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B4F3A835-0E21-4959-BA22-42B3008E02FF}\iexplore
Time
E307040001000F0005001C003300AB00
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B4F3A835-0E21-4959-BA22-42B3008E02FF}\iexplore
LoadTime
305
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore
Type
3
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore
Count
1
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore
Time
E307040001000F0005001C003300D301
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore
LoadTime
97
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012019041520190416
CachePath
%USERPROFILE%\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019041520190416
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012019041520190416
CachePrefix
:2019041520190416:
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012019041520190416
CacheLimit
8192
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012019041520190416
CacheOptions
11
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012019041520190416
CacheRepair
0
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\WindowsSearch
UpgradeTime
A095811E4CF3D401
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2933BF90-7B36-11D2-B20E-00C04F983E60}\iexplore
Type
1
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2933BF90-7B36-11D2-B20E-00C04F983E60}\iexplore
Flags
0
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2933BF90-7B36-11D2-B20E-00C04F983E60}\iexplore
Count
1
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2933BF90-7B36-11D2-B20E-00C04F983E60}\iexplore
Time
E307040001000F0005001C0037001C03
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
Path
C:\Users\admin\Favorites\Links\Suggested Sites.url
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
Handler
{B0FA7D7C-7195-4F03-B03E-9DC1C9EBC394}
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
FeedUrl
https://ieonline.microsoft.com/#ieslice
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
DisplayName
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
ErrorState
0
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
DisplayMask
0
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
Path
C:\Users\admin\Favorites\Links\Web Slice Gallery.url
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
Handler
{B0FA7D7C-7195-4F03-B03E-9DC1C9EBC394}
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
FeedUrl
http://go.microsoft.com/fwlink/?LinkId=121315
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
DisplayName
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
ErrorState
0
2556
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
DisplayMask
0
3004
iexplore.exe
delete key
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\LowCache\Extensible Cache\MSHist012018082820180829
3004
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage\Total
12
3004
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage\mining.com
12
3004
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\LowCache\Extensible Cache\MSHist012019041520190416
CachePath
%USERPROFILE%\AppData\Local\Microsoft\Windows\History\Low\History.IE5\MSHist012019041520190416
3004
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\LowCache\Extensible Cache\MSHist012019041520190416
CachePrefix
:2019041520190416:
3004
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\LowCache\Extensible Cache\MSHist012019041520190416
CacheLimit
8192
3004
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\LowCache\Extensible Cache\MSHist012019041520190416
CacheOptions
11
3004
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\LowCache\Extensible Cache\MSHist012019041520190416
CacheRepair
0
3004
iexplore.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Direct3D\MostRecentApplication
Name
iexplore.exe

Files activity

Executable files
0
Suspicious files
1
Text files
88
Unknown types
19

Dropped files

PID
Process
Filename
Type
3004
iexplore.exe
C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
text
MD5: 4fb5ab8d7783d40ac440dee073db1852
SHA256: 6e1bde47eafd28d4ef30ca763fec2056688a3a81bb99c6e2220b70de52b35a3f
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\GA101TV5\pdfmake.min[1].js
s
MD5: c01e290b6ca8d0b977df2bd99130d74b
SHA256: 70bc19eb6a5b08b6d910b3c9cfd4461ec6b08a3db91d4d73eea6026812b56675
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\M3GNG98O\rules-p-bfI4QheHhA6gU[1].js
text
MD5: 8a80554c91d9fca8acb82f023de02f11
SHA256: ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\VZ3ACW19\default[1].css
text
MD5: e0fd7befe6970db2d83111a3c72c4e78
SHA256: 8cda73e6a0e5533a80c6bf94cf5a7b2a0e399ea1c482399b11a21096a8081faa
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\FRTURU9F\count[1].js
text
MD5: 64932a1e2564351aa7642475acdf3fbf
SHA256: 3487ef2baf0c08ba660a8a143cdeb8ebeec961eea04bccd7c49096b4eb26b875
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\VZ3ACW19\quant[1].js
text
MD5: e2b9884a917fabcb8015a0d44f734043
SHA256: 404a9b0ffbcc813e8ddbb8d8510a24a69c09079282f8083ee94f4adc5d627176
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\GA101TV5\cse_element__en[1].js
text
MD5: 11b9d842d134f7b88f644bc2bedeca05
SHA256: bef2c35556f018e7d587288311be2415dfc5dbedaafc3eebb926bfb4a3301b9d
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\GA101TV5\default+en[1].css
text
MD5: 037b53a0640623703333a0a976484777
SHA256: a295bcfa91664e0dfac547516febc524302c24be2ddb9cf90ceda80b1e8f19aa
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\M3GNG98O\Screen-Shot-2019-04-13-at-5.10.21-PM[1].png
image
MD5: 3b4b47a90da43efe39d91e0a41a5e47a
SHA256: b34d9b8bf99e79864e78403c52b6569becb7fcac67094498714a641f1ae2e4a0
2556
iexplore.exe
C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\[email protected][1].txt
text
MD5: 128a6662e9c0f5ccf520f998184c37cb
SHA256: 57dd28d1fcaf706ed63708e1c73ed3fc2ea431b157768d4fb4970574002e8a5f
2556
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0488CJO\favicon[1].ico
image
MD5: 678b9e6cb13e33a165a993bcd653c31e
SHA256: 170db62628d3d768ed501d4a357f5cf5f7adf74e4e53969fcf4516c341fa2f8d
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\FRTURU9F\stock-ticker[1].txt
text
MD5: 73fc990c2e2208747b2db5e576b60268
SHA256: d8fb2f7bfa0b48f4eac414155476a39b24ca2bc5c7c76ad7a273e15f75da3d45
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\M3GNG98O\GetProfileInfo[1]
text
MD5: 78cbb3f62599622c77abe2ea3a7b94e4
SHA256: 1a9619ca79af06f4849907d039328efaf17e3e2cb3dba9a5491a139a6a3489af
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\VZ3ACW19\authenticateservice[1].ashx
text
MD5: 193264773f99bd1e15747d2b6ea65d45
SHA256: 5a044f1525b32836cc48fa85cd501e3fbb5dfeb72b8a8183f896ba0083fcc366
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\FRTURU9F\f[1].txt
text
MD5: d5277cc63eafd041aba6e77ea09780b8
SHA256: 4fe8b2e45b9017320b540e5057552ff55db4adadc04922c29784a8da788e5c2f
3004
iexplore.exe
C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][2].txt
text
MD5: c7306c60cc1ccf6de72c704264a51806
SHA256: 257622037cc703cecc75d73e8fb4857b667b74d95c0fcb382de7c4dff1da086c
3004
iexplore.exe
C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
––
MD5:  ––
SHA256:  ––
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\M3GNG98O\pd[1].js
text
MD5: 39012949e20c3c81a6ac5ba08f788929
SHA256: f6652dacc3641651bf842bb18861c6fbb66581a3dd2c41dde3226764740684b6
3004
iexplore.exe
C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\74FBF93595CFC8459196065CE54AD928
der
MD5: 1edaf9ae99ce2920667d0e9a8b3f8c9c
SHA256: 4f32d5dc00f715250abcc486511e37f501a899deb3bf7ea8adbbd3aef1c412da
3004
iexplore.exe
C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\74FBF93595CFC8459196065CE54AD928
binary
MD5: aa9842e33589ac97946fbec6c3d4a362
SHA256: 2db3632f2742212ec11a06f590725a1d0aae1e39fff28c69ef33062111e61dfd
2556
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019041520190416\index.dat
dat
MD5: 5b706582456efdd4394df1fe29f6ff95
SHA256: e08773031036a2f11c4daac0b70e9b5dd332c78c4eca6a1046b1d435ae8cc502
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\MSHist012019041520190416\index.dat
dat
MD5: 0eaa212c2d125a6e7f41c6e443af6bb2
SHA256: 7410975487c26b788287b4624af24d073e9a4af736bb2834331e9cb8579e0487
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\FRTURU9F\zone[1]
text
MD5: b9f6fd3de12e717a6e45c626e932ff52
SHA256: a5141417f05db2ef2616e04564418176625823cd3da4fbf25c6bbd0f0ee35056
3004
iexplore.exe
C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][2].txt
text
MD5: 95b5f279b2671c60eafc9ad138daecee
SHA256: 2a4b7b9ceb314a9633b0904e3e86316a020399c3b2385314d1e7d163dea0e1a5
3004
iexplore.exe
C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
––
MD5:  ––
SHA256:  ––
3004
iexplore.exe
C:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\DOMStore\U2WYBL81\www.mining[1].xml
text
MD5: c48afe959434915c5abbaca135791f4c
SHA256: 33157bfa58773c1476c5a880e58ef195cb309da4321f9422a3b5ac15df0d4f98
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\GA101TV5\MDC-icon-footer[1].png
image
MD5: 139f881aca021b1ffa22fd906c3388c6
SHA256: ed44f1739e09cfd8ea009db65bd6a29306d117f555b3421eb3c6ebea4a378243
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\GA101TV5\MDC-big-icon-footer[1].png
image
MD5: 183a7884d7a3640475a1823840d56d7f
SHA256: ffeb53a3d9ec2e5ff3cfafdc3c0640d6f775fb7e6581ab495adcf0949e2158c8
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\VZ3ACW19\GetProfileInfo[1]
text
MD5: 78cbb3f62599622c77abe2ea3a7b94e4
SHA256: 1a9619ca79af06f4849907d039328efaf17e3e2cb3dba9a5491a139a6a3489af
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\GA101TV5\infomine-logo[1].png
image
MD5: 20f3a18dd490725fdbf9276aee8c96bf
SHA256: e674f9e0a010e5506a0d8671499414c78f054376cd269e7bffbe02416c3cd788
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\VZ3ACW19\MiningDotCom-logo[1].png
image
MD5: 30883409c43175fe1c0e106d9aceca5f
SHA256: aaa678aa9d1ad153d4441cdb11a9d0a79ebbe02edc34868a876477ace439ec43
3004
iexplore.exe
C:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\DOMStore\index.dat
dat
MD5: a18980ae60281215d40878453bca40f4
SHA256: e8b6bd3af413732809e62e053910293e079b38aba744cccbf641c644529c41f6
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\FRTURU9F\image[1].jpg
image
MD5: 9db3336115565cb58ceddf30f8eb92aa
SHA256: c065a2701b132799d4c7b1b789dd5e0a158b945377368e55054c435835331330
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\GA101TV5\BannerClickTrack[1].js
text
MD5: ad6ee558a27b59b071d51b4545c77518
SHA256: 2fce92ff0f5b963e3520fae70bf3b9622533621c7dafb52b379eb0b5192376da
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\VZ3ACW19\lazy-load[1].js
text
MD5: c208b892d5e834b4932b43e67037f290
SHA256: 40a7f2b25ea8c45af8993aa57c19e576ea8eab5cbe9f467d45d4be7a537e7a47
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\GA101TV5\adsbygoogle[1].js
text
MD5: b2df3a982a04aba2a5577ad90fc71815
SHA256: 13255d73f44dda63903222eed467c154d8fc9167ee7139dd2b73ff8faa3af494
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\FRTURU9F\8833[1].js
text
MD5: 46327a6f5dab761ee3d134f6bb3198f6
SHA256: 737dcaa735529c7b59032ab758cd7294950f473e8fec752c3eb55527d058f7de
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\VZ3ACW19\wp-embed.min[1].js
text
MD5: 5a03f97cc479b9f5d7efdaccec31bc17
SHA256: dcb5e540e62fc85857254a1066afb6a7e8999279c6d4c583eef855d39f9289c0
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\FRTURU9F\bootstrap.min[1].js
text
MD5: 4becdc9104623e891fbb9d38bba01be4
SHA256: 4a4de7903ea62d330e17410ea4db6c22bcbeb350ac6aa402d6b54b4c0cbed327
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\M3GNG98O\kessel.functions[1].js
text
MD5: f35dc89da0adb6c02e3c9b9b5f6aa85b
SHA256: a7d6fd48a4c7057f9220ec75daa60ebc9f44003430904ec75dda4c86529e0156
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\M3GNG98O\auth.min[1].js
html
MD5: 68ef0c438deabca36927c143782f345e
SHA256: 89c2cfc98c79227339a510405f2bab3240bf790f50ca47bd2b9f881fe9a1ba39
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\M3GNG98O\jquery.sonar.min[1].js
text
MD5: 2f5b4ade9c7514b244e204c138cf4a06
SHA256: c3dd5c4ff63478b87ed9670be1b4c688725d53c9ff84a233cfec8ff2bb83a72d
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\M3GNG98O\infomine-auth-onload[1].js
text
MD5: 5280791715d524c47bed84e1ffc387d6
SHA256: 07230990e5ac047f45416035884709b21610af7da96a7579846f37a8c53b1bb5
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\VZ3ACW19\gpt[1].js
text
MD5: 5945445383e587a09888692952b5310a
SHA256: b2baa54c40a82b1402fbd9625f378f9ae7cfa9536e9e7088592df842cdd7b97f
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\GA101TV5\1x1.trans[1].gif
image
MD5: d89746888da2d9510b64a9f031eaecd5
SHA256: ef1955ae757c8b966c83248350331bd3a30f658ced11f387f8ebf05ab3368629
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\FRTURU9F\email-decode.min[1].js
html
MD5: 9e8f56e8e1806253ba01a95cfc3d392c
SHA256: 2595496fe48df6fcf9b1bc57c29a744c121eb4dd11566466bc13d2e52e6bbcc8
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\M3GNG98O\MDC-site-logo[1].png
image
MD5: b5ff237654eedfc485d4332cab9c0e5f
SHA256: 50d491734aaa59c498f4990ca8eca6ac95b180291929339f20e4e28556376a28
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\MSIMGSIZ.DAT
smt
MD5: 4c36e11cb0f7c4d755c888ef3e2f06fe
SHA256: c9f774707abc57132382b9f2b8ff23f1395581770f026b3fe9945d8350e75757
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\VZ3ACW19\annotatedtimeline[1].css
text
MD5: f4d0e38528c8dc841de1accc61f7abcd
SHA256: 7580b57f7a2f402f803d33fd8146b3639c457991345f9e86bd08868c1cd8949c
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\GA101TV5\dygraph,format+en,default+en,ui+en,timeline+en,geochart+en,table+en,gauge+en,annotatedtimeline+en,controls+en,corechart+en,annotationchart+en.I[1].js
text
MD5: b2236c5384e21a7b481e887c12ae0180
SHA256: 14ee0846799663a09393aea44c298315f48d11c4e1e5df446578af3878404f68
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.dat
dat
MD5: 67e0369361d74324d366802affe6cda6
SHA256: 1b5b673a968191477728c1d0cff2260d0e4c7bbc2801bfbc3d7868f0f1cd5b1f
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\M3GNG98O\ui+en,table+en,controls+en,annotationchart+en[1].css
text
MD5: eb2f689fb46cf7d1064386b602806103
SHA256: 0bc761f096c31ea128949404b40888f063fe8afa8754f2e76aaf2d0130bd073e
3004
iexplore.exe
C:\Users\admin\AppData\Roaming\Microsoft\Windows\PrivacIE\Low\index.dat
dat
MD5: ead74d9d6ca9de3e0fbfdc6fb3e13fa7
SHA256: fc3c86a0b9b223c0e69c062e5a575156b0402fa11ac62b738d65ee24e38074bb
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\VZ3ACW19\uds[1]
text
MD5: c487ee35e05fb1c886f045fee72a786c
SHA256: 74a89729316b5e30e5861af3a20618ebfdd1c892cf049cb4024fe7805b862d78
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\FRTURU9F\vfs_fonts[1].js
text
MD5: 86918a5cf56ab5ec693f29ec3d3bed32
SHA256: 1cce3ba25673d6843c91e6264b8510cbf132a5567c82915e9e9b8d7984226fe8
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\M3GNG98O\jszip.min[1].js
s
MD5: 62db1c2504bd4d030ffc37880227d5fd
SHA256: 45b3ffadbc785de6091fa798527891eb7264e4d115e3c1a37acb60e3d70d4966
3004
iexplore.exe
C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][2].txt
text
MD5: 803c79f3ed6702509e2b311a6c51c512
SHA256: 972766194772d2a247415c16adf42ec24a200418f0cc609f74094261c44ba8a4
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\VZ3ACW19\dataTables.fixedHeader.min[1].js
text
MD5: 9d3ba9ac7a9a52e647c605509b5612e4
SHA256: e7d69419d22ed7f85e290c989700b83203884a81bb88f75b5b8d1af38ac8d576
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\FRTURU9F\jquery-ui.min[1].js
text
MD5: 9437c5f272e511ee7835f307a210eae0
SHA256: 72d9830a52597d534ae8f47eabb35eef20d343180a2e06417b7aa9784fc8e40c
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\GA101TV5\dataTables.responsive.min[1].js
text
MD5: 25cb49ae209d7eb00ae591a449e72913
SHA256: 7d71991621f034f495fc391569f6e58cf41e382cf7a1897c81de41d6dc2ce16b
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\M3GNG98O\dataTables.fixedColumns.min[1].js
text
MD5: 330a3d695954457173eef53565c81891
SHA256: 97af9a7bb116bf47ba0da42a0b2e09f37b8d41d0021f208eb879d931582b573a
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\GA101TV5\dataTables.select.min[1].js
text
MD5: 6d957c49f5f4bb7fc1d651b582df40b0
SHA256: 280aa4963df2583164e49f5585482ae6f5e236a8c15793d5bec45174fc2f9f6c
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\VZ3ACW19\dataTables.buttons.min[1].js
text
MD5: dbf6da6cc1559032ca75d0592ee614f4
SHA256: 257f00d35a2d64d53067ff7a7e0dfca89244aa3783107520a2f0d8221bac6f2e
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\VZ3ACW19\buttons.html5.min[1].js
text
MD5: adbaca2f0275a04a0c99df4e11cedf26
SHA256: dd0edf1397e2ca5bf76a065c54b282cb01d5b6e0d21d25ca339608aff6741693
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\FRTURU9F\BngMUXZYTXPIvIBgJJSb6ufN5qE[1].eot
eot
MD5: 115915069f155a9f2046ff6b09bb3fa3
SHA256: ca3de924a1603d750ffe314d023509cbb0bae02a6b697586513be2f4433749fe
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\FRTURU9F\glyphicons-halflings-regular[1].eot
eot
MD5: 7ad17c6085dee9a33787bac28fb23d46
SHA256: f495f34e4f177cf0115af995bbbfeb3fcabc88502876e76fc51a4ab439bc8431
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\GA101TV5\select.dataTables.min[1].css
text
MD5: aebdacb509c7a9f9579a6b9aa15dec99
SHA256: 053e24e51e6f01f4284058a32b02bc972986d765e5a024f892de3e1c97bd635e
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\FRTURU9F\jquery.dataTables.min[1].js
text
MD5: 114c26084cb472c6a5f8b58908472ad7
SHA256: a9c575c2bf9b9f836806dc58aa0866cb558806fc5ea1ef2f4250a8c0b1be7278
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\VZ3ACW19\buttons.print.min[1].js
html
MD5: c18cbe3bda10908b5e29d23235881392
SHA256: 82c7f8183e16960efa6432e09561c5831e01d10e2bbe20314b498e911b05b3de
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\GA101TV5\wp-emoji-release.min[1].js
text
MD5: 15d0c302dc74fd87bd9cfeab513e13e4
SHA256: d2458b9fd9089fdcb9de317093e004ef3a65597dc68b9adfdeb15a7c9968d0d5
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\M3GNG98O\KFOmCnqEu92Fr1Mu4mxO[1].eot
eot
MD5: 4be1a572fca40bcb2202504cb17aed91
SHA256: 64d06eeb18abad7d4ef1b1ef7409cf108bd4774c50a64e2c7b49ffb708ff24f4
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\FRTURU9F\buttons.colVis.min[1].js
text
MD5: 18d718d978cfb584abc937475b62357d
SHA256: c0a4591447db9181959d1b8083acf512175996c4fc79800bdd85539125d98909
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\M3GNG98O\glyphicons-halflings-regular[1].eot
eot
MD5: f4769f9bdb7466be65088239c12046d1
SHA256: 13634da87d9e23f8c3ed9108ce1724d183a39ad072e73e1b3d8cbf646d2d0407
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\M3GNG98O\jquery.dataTables.min[1].css
text
MD5: 01660835fe229de543497371787d0c8e
SHA256: 618d62ceaca1223e16de2c8939a1963a95c34b0ac75852f835f93e5b42f20871
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\FRTURU9F\fixedColumns.dataTables.min[1].css
text
MD5: 194c3762df658fd5e90b39903c937591
SHA256: 2cac99438be2f9aacaf1a63f220f5a4e0fb5f54d443ecde09652a650b0509f8b
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\VZ3ACW19\responsive.dataTables.min[1].css
text
MD5: da7262fc183e15ecaceee9f0efaa4655
SHA256: 2ec1d2032daf47da420abf0f0e67ab2654648aabdda55e89e6da392b6158c382
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\VZ3ACW19\fixedHeader.dataTables.min[1].css
text
MD5: 446a1fe52d8ce74449ab8199e1134f6c
SHA256: 85bdcc2d09902654f8a90043ac9c77e00251d8d30ae75d6510a8605279e8fdaf
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\M3GNG98O\buttons.dataTables.min[1].css
text
MD5: 675306abc9d3239314f2c66c0e22ef7a
SHA256: d5086a5a45fefdad773ef7071aed5e7fa729cc1d9f4c2d4041228ed7f08d97ba
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\GA101TV5\html5shiv[1].js
html
MD5: 0ce8f355891c26c28f057e195e97dcd5
SHA256: 8c7a9c0470563367ab00307b4fb9bb3052d0a27f0b94e63b9dc0bb8c369449cb
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\GA101TV5\respond.min[1].js
html
MD5: afc1984a3d17110449dc90cf22de0c27
SHA256: 83a8807ef669fa70d0d9375347f5552897f76c6ae8e2e6f97ef592595462d8d1
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.dat
dat
MD5: 2db51cbe913354f916f3cce7847983e9
SHA256: a3a030f30bc0857c4d09e99ba72554a6b8156722af3ea76a8e3b0a5946e40466
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\FRTURU9F\jsapi[1]
html
MD5: ec86dba25f022f3071bd04f3c8070168
SHA256: 339d392e6ecceae50cb42e49818f16edcf49d404a82d920e27824863429efd87
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\M3GNG98O\header-search[1].js
text
MD5: 49c8ceeadd21d5068ff0eda46f9d0959
SHA256: 1c2cd2d555bf4865f462c2d9a329731d6ab7a23ccf2422da593be332f9d47af5
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\GA101TV5\jquery.timeago[1].js
text
MD5: 5054a01e9c4a56a080222b6c72935f35
SHA256: 0949d7c871a48d5a4d1f5a86b4bb4bfd7f37958653a02009a8260028a4f87867
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\FRTURU9F\igsv-datatables[1].js
text
MD5: cb7d64b12e01e51282e82bcdb683e09f
SHA256: 5f2dc01137b309e3157f83ce1fd18fd6bcd3d423796495242bd461b95db960ac
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\VZ3ACW19\jquery[1].js
text
MD5: 8610f03fe77640dee8c4cc924e060f12
SHA256: fc48d1d80ece71a79a7b39877f4104d49d3da6c3665cf6dc203000fb7df4447e
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\M3GNG98O\igsv-gvizcharts[1].js
text
MD5: 0a48823446d1a567efec7347e1f03e7f
SHA256: 4bf6f48bb2621f0f9a8a087ab2c025ee103e028fed9587a2bfd7d345397a4abc
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\VZ3ACW19\jquery-migrate.min[1].js
text
MD5: 7121994eec5320fbe6586463bf9651c2
SHA256: 48eb8b500ae6a38617b5738d2b3faec481922a7782246e31d2755c034a45cd5d
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\FRTURU9F\fontawesome-webfont[1].eot
eot
MD5: 674f50d287a8c48dc19ba404d20fe713
SHA256: 7bfcab6db99d5cfbf1705ca0536ddc78585432cc5fa41bbd7ad0f009033b2979
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\M3GNG98O\css[1].txt
text
MD5: 9d884a8d52acac785d18e4adc5fb42a9
SHA256: f05b8631b23eb9eba46207a49e22c97e4226aa66d0dd0248d127a9aa22531fb1
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\FRTURU9F\css[1].txt
text
MD5: a30fe3c600d6a0f53fd75b9c2678b58d
SHA256: e5553d4505567aba080d933a7e073aaf67abec7db52236043f263d3704c2eeb1
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\M3GNG98O\infomine[1].eot
eot
MD5: 9ac857a09191633a5f6e704b51752054
SHA256: d41319c312eb46ad16affdfe1fc604b1b42a69f778264962e5968a0c9ee4652e
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\GA101TV5\font-awesome.min[1].css
text
MD5: f993d274e8ddbc50ce01a3f8cc2fe820
SHA256: 380431898c13af36e22089ea27655a76649197f8f2ecd716836f341d47cc2983
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\VZ3ACW19\bootstrap.min[1].css
text
MD5: 5d5357cb3704e1f43a1f5bfed2aebf42
SHA256: 31fbd99641c212a6ad3681a2397bde13c148c0ccd98385bce6a7eb7c81417d87
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\GA101TV5\style[1].css
text
MD5: 0e57a27626c18a05fa69c2dd62cbb68e
SHA256: 2fc62c4f48a21c1a29abfe434f43a071108902ff61642e06012491215e99e508
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\VZ3ACW19\theme.min[1].css
text
MD5: 77a1910da4936a2aa30f3763f76c9609
SHA256: 635527e70ef7f5b1b161dfe3fb4ffe8a867292adc59e767b2417676806d45abc
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\GA101TV5\las-bambas-copper-markets-68-day-blockade[1].txt
––
MD5:  ––
SHA256:  ––
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\index.dat
dat
MD5: 8e4649722cee32cc1dc81333c4142b35
SHA256: 4d3ca9f27c2e747d7b617ccf2133480874584fad3eb1d123ceeb317b34444f53
3004
iexplore.exe
C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txt
text
MD5: 4172712d9e41c0989812771eb9b2c28d
SHA256: 4d6896f2537fd14adbeba3d3f601e2f60f48662d900aa3e238c4168aae2eff5a
3004
iexplore.exe
C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\index.dat
dat
MD5: 6901bc38dcfc35fa803d7e7faded50c4
SHA256: 20d476231ebb6034a0db87511b86f79eabcb508b99ec87c16d55ec4582c0befe
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\GA101TV5\las-bambas-copper-markets-68-day-blockade[1].htm
html
MD5: 1471bb7cd24d36ffb4e599da2e4e5936
SHA256: 7d730556e679a13bbfe404864e196bad165be20e1e0233241f37d12783ef9436
2556
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\favicon[1].png
image
MD5: 9fb559a691078558e77d6848202f6541
SHA256: 6d8a01dc7647bc218d003b58fe04049e24a9359900b7e0cebae76edf85b8b914
2556
iexplore.exe
C:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
––
MD5:  ––
SHA256:  ––
2556
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\favicon[1].ico
––
MD5:  ––
SHA256:  ––
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\FRTURU9F\desktop.ini
ini
MD5: 4a3deb274bb5f0212c2419d3d8d08612
SHA256: 2842973d15a14323e08598be1dfb87e54bf88a76be8c7bc94c56b079446edf38
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\index.dat
dat
MD5: 59ad02f4c64308b083e10fa47de5fdc5
SHA256: bce46cbe73ac3ad3dce4739a6c5f07f635775e0856445d65365ca615114301b3
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\VZ3ACW19\desktop.ini
ini
MD5: 4a3deb274bb5f0212c2419d3d8d08612
SHA256: 2842973d15a14323e08598be1dfb87e54bf88a76be8c7bc94c56b079446edf38
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\M3GNG98O\desktop.ini
ini
MD5: 4a3deb274bb5f0212c2419d3d8d08612
SHA256: 2842973d15a14323e08598be1dfb87e54bf88a76be8c7bc94c56b079446edf38
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\GA101TV5\desktop.ini
ini
MD5: 4a3deb274bb5f0212c2419d3d8d08612
SHA256: 2842973d15a14323e08598be1dfb87e54bf88a76be8c7bc94c56b079446edf38
2556
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini
ini
MD5: 4a3deb274bb5f0212c2419d3d8d08612
SHA256: 2842973d15a14323e08598be1dfb87e54bf88a76be8c7bc94c56b079446edf38
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\desktop.ini
ini
MD5: 4a3deb274bb5f0212c2419d3d8d08612
SHA256: 2842973d15a14323e08598be1dfb87e54bf88a76be8c7bc94c56b079446edf38
3004
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\desktop.ini
ini
MD5: 4a3deb274bb5f0212c2419d3d8d08612
SHA256: 2842973d15a14323e08598be1dfb87e54bf88a76be8c7bc94c56b079446edf38

Find more information of the staic content and download it at the full report

Network activity

HTTP(S) requests
62
TCP/UDP connections
69
DNS requests
29
Threats
0

HTTP requests

PID Process Method HTTP Code IP URL CN Type Size Reputation
2556 iexplore.exe GET 200 204.79.197.200:80 http://www.bing.com/favicon.ico US
image
whitelisted
3004 iexplore.exe GET 200 104.16.108.75:80 http://www.mining.com/las-bambas-copper-markets-68-day-blockade/?utm_source=digest-en-mining-190414&utm_medium=email&utm_campaign=digest US
html
unknown
3004 iexplore.exe GET 200 104.16.108.75:80 http://www.mining.com/wp-content/themes/Kessel/css/theme.min.css US
text
unknown
3004 iexplore.exe GET 200 104.16.108.75:80 http://www.mining.com/wp-content/themes/Kessel/css/style.css US
text
unknown
3004 iexplore.exe GET 200 104.16.108.75:80 http://www.mining.com/wp-content/themes/Kessel/css/font-awesome.min.css US
text
unknown
3004 iexplore.exe GET 200 104.16.108.75:80 http://www.mining.com/wp-content/themes/Kessel/css/bootstrap.min.css US
text
unknown
3004 iexplore.exe GET 200 104.16.108.75:80 http://www.mining.com/wp-content/themes/Kessel/fonts/fontawesome-webfont.eot? US
eot
unknown
3004 iexplore.exe GET 200 104.16.108.75:80 http://www.mining.com/wp-content/themes/Kessel/fonts/infomine.eot? US
eot
unknown
3004 iexplore.exe GET 200 104.16.108.75:80 http://www.mining.com/wp-content/themes/Kessel/fonts/glyphicons-halflings-regular.eot? US
eot
unknown
3004 iexplore.exe GET 301 104.28.13.229:80 http://bootstrap-live-customizer.com/bootstrap-3.3.5/fonts/glyphicons-halflings-regular.eot? US
––
––
unknown
3004 iexplore.exe GET 200 104.16.108.75:80 http://www.mining.com/wp-includes/js/jquery/jquery.js?ver=1.12.4 US
text
unknown
3004 iexplore.exe GET 200 104.16.108.75:80 http://www.mining.com/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1 US
text
unknown
3004 iexplore.exe GET 200 104.16.108.75:80 http://www.mining.com/wp-content/plugins/inline-google-spreadsheet-viewer/igsv-gvizcharts.js?ver=4.9.8 US
text
unknown
3004 iexplore.exe GET 200 104.16.108.75:80 http://www.mining.com/wp-content/plugins/inline-google-spreadsheet-viewer/igsv-datatables.js?ver=4.9.8 US
text
unknown
3004 iexplore.exe GET 200 104.19.199.151:80 http://cdnjs.cloudflare.com/ajax/libs/pdfmake/0.1.32/vfs_fonts.js?ver=4.9.8 US
text
whitelisted
3004 iexplore.exe GET 200 104.19.199.151:80 http://cdnjs.cloudflare.com/ajax/libs/pdfmake/0.1.32/pdfmake.min.js?ver=4.9.8 US
s
whitelisted
3004 iexplore.exe GET 200 172.217.23.164:80 http://www.google.com/jsapi?ver=4.9.8 US
html
whitelisted
3004 iexplore.exe GET 200 104.16.108.75:80 http://www.mining.com/wp-content/themes/Kessel/js/jquery.timeago.js US
text
unknown
3004 iexplore.exe GET 200 104.16.108.75:80 http://www.mining.com/wp-content/themes/Kessel/js/header-search.js US
text
unknown
3004 iexplore.exe GET 200 104.16.108.75:80 http://www.mining.com/wp-includes/js/wp-emoji-release.min.js?ver=4.9.8 US
text
unknown
3004 iexplore.exe GET 200 104.20.42.93:80 http://cdn.datatables.net/buttons/1.4.2/js/buttons.colVis.min.js?ver=4.9.8 US
text
shared
3004 iexplore.exe GET 200 104.20.42.93:80 http://cdn.datatables.net/buttons/1.4.2/js/buttons.print.min.js?ver=4.9.8 US
html
shared
3004 iexplore.exe GET 200 104.20.42.93:80 http://cdn.datatables.net/buttons/1.4.2/js/buttons.html5.min.js?ver=4.9.8 US
text
shared
3004 iexplore.exe GET 200 104.19.199.151:80 http://cdnjs.cloudflare.com/ajax/libs/jszip/3.1.3/jszip.min.js?ver=4.9.8 US
s
whitelisted
3004 iexplore.exe GET 200 172.217.23.164:80 http://www.google.com/uds/?file=visualization&v=1.0&packages=annotatedtimeline%2Cannotationchart%2Ccorechart%2Cgauge%2Cgeochart%2Ctimeline US
text
whitelisted
3004 iexplore.exe GET 200 172.217.23.164:80 http://www.google.com/uds/api/visualization/1.0/40ff64b1d9d6b3213524485974f36cc0/ui+en,table+en,controls+en,annotationchart+en.css US
text
whitelisted
3004 iexplore.exe GET 200 172.217.23.164:80 http://www.google.com/uds/api/visualization/1.0/40ff64b1d9d6b3213524485974f36cc0/dygraph,format+en,default+en,ui+en,timeline+en,geochart+en,table+en,gauge+en,annotatedtimeline+en,controls+en,corechart+en,annotationchart+en.I.js US
text
whitelisted
3004 iexplore.exe GET 200 172.217.16.202:80 http://ajax.googleapis.com/ajax/static/modules/gviz/1.0/annotatedtimeline/annotatedtimeline.css US
text
whitelisted
3004 iexplore.exe GET 200 104.16.108.75:80 http://www.mining.com/wp-content/themes/Kessel/images/MDC-site-logo.png US
image
unknown
3004 iexplore.exe GET 200 216.58.210.2:80 http://www.googletagservices.com/tag/js/gpt.js US
text
whitelisted
3004 iexplore.exe GET 200 104.16.108.75:80 http://www.mining.com/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js US
html
unknown
3004 iexplore.exe GET 200 52.38.215.160:80 http://ims.infomine.com/106798/image.jpg US
image
unknown
3004 iexplore.exe GET 200 104.16.108.75:80 http://www.mining.com/wp-content/plugins/lazy-load/images/1x1.trans.gif US
image
unknown
3004 iexplore.exe GET 200 104.18.72.18:80 http://www.infomine.com/crm/api/profile/GetProfileInfo?callback=jQuery1124032074203280289526_1555306133280&_=1555306133281 US
text
unknown
3004 iexplore.exe GET 200 104.16.108.75:80 http://www.mining.com/wp-content/themes/Kessel/js/bootstrap.min.js US
text
unknown
3004 iexplore.exe GET 200 104.16.108.75:80 http://www.mining.com/wp-content/themes/Kessel/js/auth.min.js US
html
unknown
3004 iexplore.exe GET 200 104.16.108.75:80 http://www.mining.com/wp-content/themes/Kessel/js/infomine-auth-onload.js US
text
unknown
3004 iexplore.exe GET 200 104.16.108.75:80 http://www.mining.com/wp-content/themes/Kessel/js/kessel.functions.js US
text
unknown
3004 iexplore.exe GET 200 104.16.108.75:80 http://www.mining.com/wp-content/plugins/lazy-load/js/jquery.sonar.min.js?ver=0.6.1 US
text
unknown
3004 iexplore.exe GET 200 104.16.108.75:80 http://www.mining.com/wp-content/plugins/lazy-load/js/lazy-load.js?ver=0.6.1 US
text
unknown
3004 iexplore.exe GET 200 104.16.108.75:80 http://www.mining.com/wp-includes/js/wp-embed.min.js?ver=4.9.8 US
text
unknown
3004 iexplore.exe GET 200 104.16.108.75:80 http://www.mining.com/wp-content/themes/Kessel/js/adsbygoogle.js US
text
unknown
3004 iexplore.exe GET 200 104.19.147.8:80 http://script.crazyegg.com/pages/scripts/0007/8833.js US
text
whitelisted
3004 iexplore.exe GET 200 104.16.108.75:80 http://www.mining.com/wp-content/themes/Kessel/images/MDC-big-icon-footer.png US
image
unknown
3004 iexplore.exe GET 200 104.16.108.75:80 http://www.mining.com/wp-content/themes/Kessel/images/MDC-icon-footer.png US
image
unknown
3004 iexplore.exe GET 200 104.16.108.75:80 http://www.mining.com/wp-content/themes/Kessel/images/infomine-logo.png US
image
unknown
3004 iexplore.exe GET 200 104.16.108.75:80 http://www.mining.com/wp-content/themes/Kessel/images/MiningDotCom-logo.png US
image
unknown
3004 iexplore.exe GET 302 52.89.159.237:80 http://tanzanite.infomine.com/servlet/view/dynamic/javascript/zone?zid=747&pid=0&random=46609949&millis=1555306134717&referrer=http%3A%2F%2Fwww.mining.com%2Flas-bambas-copper-markets-68-day-blockade%2F%3Futm_source%3Ddigest-en-mining-190414%26utm_medium%3Demail%26utm_campaign%3Ddigest US
––
––
unknown
3004 iexplore.exe GET 200 52.89.159.237:80 http://tanzanite.infomine.com/servlet/view/dynamic/javascript/zone?cookied=yes&position=0&os=19&test=false&random=46609949&hostname=192.168.128.48&pid=0&resolution=unsupported&agent=Mozilla/4.0+(compatible;+MSIE+8.0;+Windows+NT+6.1;+Trident/4.0;+SLCC2;+.NET+CLR+2.0.50727;+.NET+CLR+3.5.30729;+.NET+CLR+3.0.30729;+Media+Center+PC+6.0;+.NET4.0C;+.NET4.0E)&millis=1555306134717&cid=0&lookup=false&ip=185.217.117.168&timestamp=20190414222854&referrer=http://mining.com/las-bambas-copper-markets-68-day-blockade/?utm_source=digest-en-mining-190414&utm_medium=email&utm_campaign=digest&default=false&zid=747&browser=9&language=en&mid=0&refresh=0 US
text
unknown
3004 iexplore.exe GET 302 172.217.23.164:80 http://www.google.com/cse/cse.js?cx=018218841143827414887:goxjbxzv_nc US
html
whitelisted
3004 iexplore.exe GET 200 91.199.212.52:80 http://crt.comodoca.com/COMODORSAAddTrustCA.crt GB
der
whitelisted
3004 iexplore.exe GET 200 104.16.108.75:80 http://www.mining.com/stock-ticker/?type=15&code=t10.kxau|t10.kxag&root=MixedData&rows=6&cols=FullName|NavigateUrl|AbsoluteValue|AbsoluteChange|PercentChange|Color US
text
unknown
3004 iexplore.exe GET 200 104.18.72.18:80 http://www.infomine.com/crm/api/profile/GetProfileInfo?callback=jQuery1124032074203280289526_1555306133280&_=1555306133284 US
text
unknown
2556 iexplore.exe GET 200 104.16.108.75:80 http://www.mining.com/favicon.ico US
image
unknown
3004 iexplore.exe GET 200 104.16.108.75:80 http://www.mining.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-13-at-5.10.21-PM.png US
image
unknown
3004 iexplore.exe GET 200 108.161.188.128:80 http://cdn.pardot.com/pd.js US
text
malicious
3004 iexplore.exe GET 200 91.228.74.156:80 http://edge.quantserve.com/quant.js GB
text
whitelisted
3004 iexplore.exe GET 301 143.204.181.108:80 http://rules.quantcount.com/rules-p-bfI4QheHhA6gU.js US
html
whitelisted
3004 iexplore.exe GET 301 151.101.120.134:80 http://miningdotcom.disqus.com/count.js US
html
unknown
3004 iexplore.exe GET –– 104.16.108.75:80 http://www.mining.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-13-at-5.34.27-PM-300x167.png US
––
––
unknown
3004 iexplore.exe GET 200 91.228.74.212:80 http://pixel.quantserve.com/pixel;r=777134726;rf=2;a=p-bfI4QheHhA6gU;url=http%3A%2F%2Fwww.mining.com%2Flas-bambas-copper-markets-68-day-blockade%2F%3Futm_source%3Ddigest-en-mining-190414%26utm_medium%3Demail%26utm_campaign%3Ddigest;fpan=1;fpa=P0-239722070-1555306173655;ns=0;ce=1;qjs=1;qv=4c19192-20180628134937;cm=;ref=;je=1;sr=1280x720x32;enc=n;dst=1;et=1555306173655;tzo=-60;ogl=locale.en_US%2Ctype.article%2Ctitle.Las%20Bambas%E2%80%99%20copper%20out%20to%20the%20markets%20after%2068-day%20blockade%20%7C%20MINING%252Ecom%2Cdescription.The%20Nueva%20Fuerabamba%20community%20agreed%20to%20let%20Las%20Bambas'%20trucks%20circulate%20throug%2Curl.http%3A%2F%2Fwww%252Emining%252Ecom%2Flas-bambas-copper-markets-68-day-blockade%2F%2Csite_name.MINING%252Ecom%2Cupdated_time.2019-04-14T11%3A13%3A48-07%3A00%2Cimage.http%3A%2F%2Fwww%252Emining%252Ecom%2Fwp-content%2Fuploads%2F2019%2F04%2FScreen-Shot-2019-04-13-at-5%252E10%252E%2Cimage%3Awidth.900%2Cimage%3Aheight.500 GB
image
whitelisted
3004 iexplore.exe GET –– 104.16.108.75:80 http://www.mining.com/wp-content/uploads/2019/04/Screen-Shot-2019-04-13-at-5.34.27-PM-300x167.png US
––
––
unknown

Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID Process IP ASN CN Reputation
–– –– 204.79.197.200:80 Microsoft Corporation US whitelisted
3004 iexplore.exe 104.16.108.75:80 Cloudflare Inc US unknown
3004 iexplore.exe 172.217.18.10:443 Google Inc. US whitelisted
3004 iexplore.exe 104.28.13.229:80 Cloudflare Inc US unknown
3004 iexplore.exe 104.28.13.229:443 Cloudflare Inc US unknown
3004 iexplore.exe 23.111.8.154:443 netDNA US unknown
3004 iexplore.exe 104.19.199.151:80 Cloudflare Inc US shared
3004 iexplore.exe 172.217.22.3:443 Google Inc. US whitelisted
3004 iexplore.exe 104.20.42.93:443 Cloudflare Inc US shared
3004 iexplore.exe 172.217.23.164:80 Google Inc. US whitelisted
3004 iexplore.exe 172.217.16.202:443 Google Inc. US whitelisted
3004 iexplore.exe 104.20.42.93:80 Cloudflare Inc US shared
–– –– 172.217.16.202:80 Google Inc. US whitelisted
–– –– 216.58.210.2:80 Google Inc. US whitelisted
–– –– 52.38.215.160:80 Amazon.com, Inc. US unknown
3004 iexplore.exe 104.18.72.18:80 Cloudflare Inc US unknown
–– –– 104.19.147.8:80 Cloudflare Inc US unknown
–– –– 104.18.72.18:443 Cloudflare Inc US unknown
–– –– 13.32.219.26:443 Amazon.com, Inc. US unknown
3004 iexplore.exe 13.32.219.26:443 Amazon.com, Inc. US unknown
3004 iexplore.exe 52.89.159.237:80 Amazon.com, Inc. US unknown
3004 iexplore.exe 52.38.215.160:443 Amazon.com, Inc. US unknown
3004 iexplore.exe 93.184.220.66:80 MCI Communications Services, Inc. d/b/a Verizon Business US whitelisted
3004 iexplore.exe 216.58.208.40:80 Google Inc. US whitelisted
3004 iexplore.exe 151.101.120.134:80 Fastly US unknown
3004 iexplore.exe 91.228.74.188:80 Quantcast Corporation GB unknown
3004 iexplore.exe 91.199.212.52:80 Comodo CA Ltd GB unknown
3004 iexplore.exe 216.58.206.14:443 Google Inc. US whitelisted
2556 iexplore.exe 104.16.108.75:80 Cloudflare Inc US unknown
3004 iexplore.exe 108.161.188.128:80 netDNA US malicious
3004 iexplore.exe 35.174.78.146:80 Amazon.com, Inc. US unknown
3004 iexplore.exe 172.217.23.164:443 Google Inc. US whitelisted
3004 iexplore.exe 91.228.74.156:80 Quantcast Corporation GB unknown
–– –– 143.204.181.108:80 US unknown
3004 iexplore.exe 143.204.181.108:443 US unknown
3004 iexplore.exe 151.101.120.134:443 Fastly US unknown
–– –– 91.228.74.212:80 Quantcast Corporation GB unknown

DNS requests

Domain IP Reputation
www.bing.com 204.79.197.200
13.107.21.200
whitelisted
www.mining.com 104.16.108.75
104.16.109.75
unknown
fonts.googleapis.com 172.217.18.10
whitelisted
bootstrap-live-customizer.com 104.28.13.229
104.28.12.229
unknown
www.bootstrap-live-customizer.com 104.28.13.229
104.28.12.229
unknown
fonts.gstatic.com 172.217.22.3
whitelisted
cdn.datatables.net 104.20.42.93
104.20.43.93
unknown
oss.maxcdn.com 23.111.8.154
whitelisted
cdnjs.cloudflare.com 104.19.199.151
104.19.197.151
104.19.196.151
104.19.198.151
104.19.195.151
whitelisted
www.google.com 172.217.23.164
whitelisted
ajax.googleapis.com 172.217.16.202
172.217.18.106
172.217.23.170
216.58.205.234
172.217.18.170
172.217.23.138
216.58.206.10
172.217.16.170
216.58.208.42
172.217.16.138
172.217.22.42
172.217.22.74
172.217.22.106
216.58.210.10
whitelisted
www.googletagservices.com 216.58.210.2
whitelisted
ims.infomine.com 52.38.215.160
unknown
www.infomine.com 104.18.72.18
104.18.73.18
unknown
disutgh7q0ncc.cloudfront.net 13.32.219.26
13.32.219.53
13.32.219.249
13.32.219.141
suspicious
script.crazyegg.com 104.19.147.8
104.19.148.8
whitelisted
uls.infomine.com 104.18.72.18
104.18.73.18
unknown
tanzanite.infomine.com 52.89.159.237
unknown
secure.infomine.com 52.38.215.160
unknown
platform.twitter.com 93.184.220.66
whitelisted
miningdotcom.disqus.com 151.101.120.134
unknown
www.googletagmanager.com 216.58.208.40
whitelisted
edge.quantserve.com 91.228.74.188
91.228.74.156
91.228.74.157
91.228.74.196
91.228.74.164
91.228.74.195
91.228.74.169
91.228.74.197
whitelisted
crt.comodoca.com 91.199.212.52
whitelisted
cse.google.com 216.58.206.14
whitelisted
cdn.pardot.com 108.161.188.128
malicious
pi.pardot.com 35.174.78.146
unknown
rules.quantcount.com 143.204.181.108
143.204.181.90
143.204.181.121
143.204.181.38
whitelisted
pixel.quantserve.com 91.228.74.212
91.228.74.254
91.228.74.218
91.228.74.232
91.228.74.250
91.228.74.238
91.228.74.239
91.228.74.227
whitelisted

Threats

No threats detected.

Debug output strings

No debug info.