analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://file.io/DCesudgJpgbs

Full analysis: https://app.any.run/tasks/946b26ff-8660-4f10-92e5-8488ac1636b2
Verdict: Malicious activity
Analysis date: January 14, 2022, 20:12:18
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
covid19
Indicators:
MD5:

A1A2460FAF977DF54D8497373D243CEB

SHA1:

6CAE262CB5D1F161045AB200EE2D8C589D556F27

SHA256:

DFFBC19583E9B7204946605B36FE624399E0473A499DD68AD767D58A69B80368

SSDEEP:

3:N8a3XWV/n:2aWV/

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 3600)
      • Gold Dork Parser.exe (PID: 3704)
    • Application was dropped or rewritten from another process

      • Gold Dork Parser.exe (PID: 3704)
    • Drops executable file immediately after starts

      • chrome.exe (PID: 6024)
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 3780)
    • Checks supported languages

      • WinRAR.exe (PID: 2276)
      • Gold Dork Parser.exe (PID: 3704)
    • Modifies files in Chrome extension folder

      • chrome.exe (PID: 836)
    • Reads the computer name

      • WinRAR.exe (PID: 2276)
      • Gold Dork Parser.exe (PID: 3704)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2276)
      • chrome.exe (PID: 6024)
    • Drops a file with a compile date too recent

      • WinRAR.exe (PID: 2276)
    • Drops a file that was compiled in debug mode

      • WinRAR.exe (PID: 2276)
      • chrome.exe (PID: 6024)
    • Reads Environment values

      • Gold Dork Parser.exe (PID: 3704)
    • Reads default file associations for system extensions

      • chrome.exe (PID: 3580)
  • INFO

    • Reads the computer name

      • iexplore.exe (PID: 1048)
      • iexplore.exe (PID: 3780)
      • chrome.exe (PID: 836)
      • chrome.exe (PID: 2548)
      • chrome.exe (PID: 2604)
      • chrome.exe (PID: 908)
      • chrome.exe (PID: 2248)
      • chrome.exe (PID: 1432)
      • chrome.exe (PID: 2892)
      • chrome.exe (PID: 4932)
      • chrome.exe (PID: 5368)
      • chrome.exe (PID: 3580)
      • chrome.exe (PID: 5068)
      • chrome.exe (PID: 3604)
    • Checks supported languages

      • iexplore.exe (PID: 3780)
      • iexplore.exe (PID: 1048)
      • chrome.exe (PID: 2548)
      • chrome.exe (PID: 836)
      • chrome.exe (PID: 408)
      • chrome.exe (PID: 2604)
      • chrome.exe (PID: 2516)
      • chrome.exe (PID: 908)
      • chrome.exe (PID: 2292)
      • chrome.exe (PID: 2212)
      • chrome.exe (PID: 1148)
      • chrome.exe (PID: 2664)
      • chrome.exe (PID: 3308)
      • chrome.exe (PID: 832)
      • chrome.exe (PID: 1432)
      • chrome.exe (PID: 492)
      • chrome.exe (PID: 2148)
      • chrome.exe (PID: 2248)
      • chrome.exe (PID: 3628)
      • chrome.exe (PID: 2892)
      • chrome.exe (PID: 4932)
      • chrome.exe (PID: 4844)
      • chrome.exe (PID: 4184)
      • chrome.exe (PID: 5952)
      • chrome.exe (PID: 5368)
      • chrome.exe (PID: 5872)
      • chrome.exe (PID: 5664)
      • chrome.exe (PID: 5376)
      • chrome.exe (PID: 4804)
      • chrome.exe (PID: 5364)
      • chrome.exe (PID: 5628)
      • chrome.exe (PID: 5240)
      • chrome.exe (PID: 5520)
      • chrome.exe (PID: 4664)
      • chrome.exe (PID: 796)
      • chrome.exe (PID: 2988)
      • chrome.exe (PID: 5052)
      • NOTEPAD.EXE (PID: 5376)
      • chrome.exe (PID: 5916)
      • chrome.exe (PID: 6024)
      • chrome.exe (PID: 5956)
      • chrome.exe (PID: 4652)
      • chrome.exe (PID: 3448)
      • chrome.exe (PID: 6028)
      • chrome.exe (PID: 4844)
      • chrome.exe (PID: 5708)
      • chrome.exe (PID: 2836)
      • chrome.exe (PID: 2692)
      • chrome.exe (PID: 3128)
      • chrome.exe (PID: 5668)
      • chrome.exe (PID: 3580)
      • chrome.exe (PID: 240)
      • chrome.exe (PID: 5268)
      • chrome.exe (PID: 5328)
      • chrome.exe (PID: 5472)
      • chrome.exe (PID: 5444)
      • chrome.exe (PID: 5968)
      • chrome.exe (PID: 4928)
      • chrome.exe (PID: 5564)
      • chrome.exe (PID: 5260)
      • chrome.exe (PID: 5476)
      • chrome.exe (PID: 6024)
      • chrome.exe (PID: 4800)
      • chrome.exe (PID: 2548)
      • chrome.exe (PID: 5144)
      • chrome.exe (PID: 5772)
      • chrome.exe (PID: 1168)
      • chrome.exe (PID: 5996)
      • chrome.exe (PID: 5456)
      • chrome.exe (PID: 4724)
      • chrome.exe (PID: 2156)
      • chrome.exe (PID: 4756)
      • chrome.exe (PID: 5068)
      • chrome.exe (PID: 3268)
      • chrome.exe (PID: 3604)
      • chrome.exe (PID: 5480)
      • chrome.exe (PID: 5120)
      • chrome.exe (PID: 4836)
      • chrome.exe (PID: 5696)
      • chrome.exe (PID: 3828)
      • chrome.exe (PID: 1372)
      • chrome.exe (PID: 5924)
      • chrome.exe (PID: 5108)
      • chrome.exe (PID: 852)
      • chrome.exe (PID: 4872)
      • chrome.exe (PID: 3092)
      • chrome.exe (PID: 5612)
      • chrome.exe (PID: 5548)
      • chrome.exe (PID: 2556)
      • chrome.exe (PID: 6084)
      • chrome.exe (PID: 4184)
      • chrome.exe (PID: 2652)
      • chrome.exe (PID: 2556)
      • chrome.exe (PID: 6048)
      • chrome.exe (PID: 6140)
      • chrome.exe (PID: 852)
      • chrome.exe (PID: 3888)
      • chrome.exe (PID: 384)
      • chrome.exe (PID: 3796)
      • chrome.exe (PID: 2080)
      • chrome.exe (PID: 4064)
      • chrome.exe (PID: 4804)
      • chrome.exe (PID: 4928)
      • chrome.exe (PID: 5560)
      • chrome.exe (PID: 3656)
      • chrome.exe (PID: 5908)
      • chrome.exe (PID: 4652)
      • chrome.exe (PID: 3340)
      • chrome.exe (PID: 5084)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3780)
      • iexplore.exe (PID: 1048)
      • chrome.exe (PID: 2604)
      • Gold Dork Parser.exe (PID: 3704)
    • Changes internet zones settings

      • iexplore.exe (PID: 1048)
    • Application launched itself

      • iexplore.exe (PID: 1048)
      • chrome.exe (PID: 836)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3780)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 3780)
      • iexplore.exe (PID: 1048)
    • Creates files in the user directory

      • iexplore.exe (PID: 3780)
      • iexplore.exe (PID: 1048)
    • Manual execution by user

      • chrome.exe (PID: 836)
      • WinRAR.exe (PID: 2276)
      • Gold Dork Parser.exe (PID: 3704)
      • NOTEPAD.EXE (PID: 5376)
    • Reads the hosts file

      • chrome.exe (PID: 836)
      • chrome.exe (PID: 2604)
    • Changes settings of System certificates

      • iexplore.exe (PID: 1048)
    • Drops Coronavirus (possible) decoy

      • Gold Dork Parser.exe (PID: 3704)
    • Reads the date of Windows installation

      • chrome.exe (PID: 4932)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 1048)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
203
Monitored processes
112
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs winrar.exe searchprotocolhost.exe no specs gold dork parser.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs notepad.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1048"C:\Program Files\Internet Explorer\iexplore.exe" "https://file.io/DCesudgJpgbs"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
3780"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1048 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
836"C:\Program Files\Google\Chrome\Application\chrome.exe" C:\Program Files\Google\Chrome\Application\chrome.exe
Explorer.EXE
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
86.0.4240.198
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\86.0.4240.198\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\winmm.dll
c:\windows\system32\user32.dll
408"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=86.0.4240.198 --initial-client-data=0xc8,0xcc,0xd0,0x9c,0xd4,0x6da0d988,0x6da0d998,0x6da0d9a4C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
86.0.4240.198
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\program files\google\chrome\application\86.0.4240.198\chrome_elf.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\api-ms-win-downlevel-shell32-l1-1-0.dll
c:\windows\system32\shell32.dll
2548"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1060,14418474291442828712,6528635150724646580,131072 --enable-features=PasswordImport --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1056 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\version.dll
c:\program files\google\chrome\application\86.0.4240.198\chrome_elf.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\api-ms-win-downlevel-shell32-l1-1-0.dll
c:\windows\system32\shell32.dll
2604"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1060,14418474291442828712,6528635150724646580,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1344 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Version:
86.0.4240.198
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\86.0.4240.198\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\api-ms-win-downlevel-shell32-l1-1-0.dll
c:\windows\system32\shell32.dll
2292"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1060,14418474291442828712,6528635150724646580,131072 --enable-features=PasswordImport --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1904 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
86.0.4240.198
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\api-ms-win-downlevel-shell32-l1-1-0.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\shell32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2664"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1060,14418474291442828712,6528635150724646580,131072 --enable-features=PasswordImport --lang=en-US --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2040 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\86.0.4240.198\chrome_elf.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-shell32-l1-1-0.dll
1148"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1060,14418474291442828712,6528635150724646580,131072 --enable-features=PasswordImport --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2276 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\program files\google\chrome\application\86.0.4240.198\chrome_elf.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\api-ms-win-downlevel-shell32-l1-1-0.dll
c:\windows\system32\shell32.dll
2212"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1060,14418474291442828712,6528635150724646580,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\86.0.4240.198\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\api-ms-win-downlevel-shell32-l1-1-0.dll
c:\windows\system32\shell32.dll
Total events
62 671
Read events
61 980
Write events
675
Delete events
16

Modification events

(PID) Process:(1048) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(1048) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
161444608
(PID) Process:(1048) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30935427
(PID) Process:(1048) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
461451249
(PID) Process:(1048) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30935427
(PID) Process:(1048) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1048) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1048) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(1048) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(1048) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
11
Suspicious files
415
Text files
495
Unknown types
34

Dropped files

PID
Process
Filename
Type
3780iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62der
MD5:9B980225C891790166A8A8535BB4E178
SHA256:EEFABCF46B58056A1447B6A084046FAFDBE7D8F512415EFF473544202FE1E047
3780iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\styles-7d4153d260c0197f0043[1].jstext
MD5:FE6C883223C6F3EC58459E0948DD4CE2
SHA256:1908B23AAF9E1B44DC9A6DB4EED8EDFEB7C0D3CC58CD8DD9080B81B9AC5105CB
3780iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\DCesudgJpgbs[1].htmhtml
MD5:4D0BF7695F33FA0C05B657E5D3A50EA3
SHA256:348A0A7C089DFB7ABD0EDC10C9EBC6BA55E5BBBDEC06B4B939CB46CD5F0C75E9
3780iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FC5A820A001B41D68902E051F36A5282_4ABAE52A42287527D064DE75DA7A1782der
MD5:76B645D64E8E26F509A8279E06398CC1
SHA256:19B02B15C1BB6463E370BB18C7C305B62BB70481CE4B6C2891C4F69445B6218B
3780iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\app-7c1df41d9fbeaafabe11[1].jstext
MD5:96C4E9784BB3409A600204BCF8BCDAF2
SHA256:E2604B93D1A891068AD8039DE0BAFE5D5B764475467AC1720D6E0C9B9F4D674A
3780iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\polyfill-e2a38c22355d86848aff[1].jstext
MD5:975348F141BA18D1BAE558B7CC3F000A
SHA256:3A59C367D67C651B02EFB85B5F8B453A61EF7D9360251FBED3B08198E52E56AC
3780iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\2c2f8e078e1570e5518c4288c734872079b4c4aa-cfe8f057094def3bc006[1].jstext
MD5:A5D266605A23B392F91E70B014217E62
SHA256:D1FD67782BFA8EB3836D68D951D4D7C2ACF9C8C6674C0566BC0DDBEF8D9798FC
3780iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4Fder
MD5:029FB7DD858601813AE129D575D2B242
SHA256:98DBA01C5B1A4C1DD4ABE3819DBB8A9846FECC746BEE19BC15B4626D4C7B62DE
3780iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894der
MD5:1BA78C901BF35F9710BE47AE2A6B3D25
SHA256:7E96651546AE845FCFEB2A1B3149E6B9EDB3198CFB4E6A8155C60951C1874585
3780iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62binary
MD5:D135DBA9A90669AB4D0855FDB6852924
SHA256:1877780317320E83B8519FF06C1604D76B26EDF26DB8B988301B805ACA517901
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6 867
TCP/UDP connections
10 783
DNS requests
196
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3780
iexplore.exe
GET
200
142.250.74.195:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFNZazTHGPUBUGY%3D
US
der
724 b
whitelisted
3780
iexplore.exe
GET
200
18.66.107.220:80
http://ocsp.sca1b.amazontrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQz9arGHWbnBV0DFzpNHz4YcTiFDQQUWaRmBlKge5WSPKOUByeWdFv5PdACEAlJhYBEgElMGstw%2FW7EUqA%3D
US
der
471 b
whitelisted
3704
Gold Dork Parser.exe
GET
204.79.197.200:80
http://www.bing.com/search?q=.aps%2fupcomingorders%3d291&first=0&last=50&count=50
US
whitelisted
1048
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
3780
iexplore.exe
GET
200
142.250.74.195:80
http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQCAnDacZA1UWwoAAAABJ9nq
US
der
472 b
whitelisted
3780
iexplore.exe
GET
200
52.222.250.112:80
http://ocsp.rootg2.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBSIfaREXmfqfJR3TkMYnD7O5MhzEgQUnF8A36oB1zArOIiiuG1KnPIRkYMCEwZ%2FlEoqJ83z%2BsKuKwH5CO65xMY%3D
US
der
1.51 Kb
whitelisted
3704
Gold Dork Parser.exe
GET
204.79.197.200:80
http://www.bing.com/search?q=.php%2f%252fAccount%252fSubmitPayment%3d417&first=0&last=50&count=50
US
whitelisted
3704
Gold Dork Parser.exe
GET
204.79.197.200:80
http://www.bing.com/search?q=.aps%2fmorebonuspayview%26btype%3d894&first=0&last=50&count=50
US
whitelisted
3704
Gold Dork Parser.exe
GET
204.79.197.200:80
http://www.bing.com/search?q=.aps%2f9028%26filter_order%3d236&first=0&last=50&count=50
US
whitelisted
3704
Gold Dork Parser.exe
GET
204.79.197.200:80
http://www.bing.com/search?q=.aps%2fmo_member_credit.php%3fid%3d404&first=0&last=50&count=50
US
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1048
iexplore.exe
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
3780
iexplore.exe
142.250.186.110:443
www.google-analytics.com
Google Inc.
US
whitelisted
3780
iexplore.exe
142.250.74.195:80
ocsp.pki.goog
Google Inc.
US
whitelisted
3780
iexplore.exe
209.197.3.8:80
ctldl.windowsupdate.com
Highwinds Network Group, Inc.
US
whitelisted
3780
iexplore.exe
18.66.112.123:443
www.file.io
Massachusetts Institute of Technology
US
suspicious
3780
iexplore.exe
52.222.250.185:80
ocsp.rootg2.amazontrust.com
Amazon.com, Inc.
US
whitelisted
3780
iexplore.exe
52.222.250.112:80
ocsp.rootg2.amazontrust.com
Amazon.com, Inc.
US
whitelisted
3780
iexplore.exe
54.83.244.134:443
file.io
Amazon.com, Inc.
US
unknown
3780
iexplore.exe
18.66.107.220:80
ocsp.sca1b.amazontrust.com
Massachusetts Institute of Technology
US
whitelisted
18.66.112.123:443
www.file.io
Massachusetts Institute of Technology
US
suspicious

DNS requests

Domain
IP
Reputation
file.io
  • 54.83.244.134
  • 18.215.199.81
whitelisted
ctldl.windowsupdate.com
  • 209.197.3.8
whitelisted
o.ss2.us
  • 18.66.92.70
  • 18.66.92.28
  • 18.66.92.73
  • 18.66.92.207
whitelisted
ocsp.rootg2.amazontrust.com
  • 52.222.250.112
  • 52.222.250.174
  • 52.222.250.185
  • 52.222.250.42
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ocsp.rootca1.amazontrust.com
  • 52.222.250.185
  • 52.222.250.112
  • 52.222.250.174
  • 52.222.250.42
shared
ocsp.sca1b.amazontrust.com
  • 18.66.107.220
  • 18.66.107.5
  • 18.66.107.199
  • 18.66.107.157
whitelisted
www.file.io
  • 18.66.112.123
  • 18.66.112.32
  • 18.66.112.21
  • 18.66.112.9
shared
www.google-analytics.com
  • 142.250.186.110
  • 142.250.186.46
whitelisted

Threats

PID
Process
Class
Message
3704
Gold Dork Parser.exe
Potentially Bad Traffic
ET INFO Suspicious GET Request with Possible COVID-19 URI M1
3704
Gold Dork Parser.exe
Potentially Bad Traffic
ET INFO Suspicious GET Request with Possible COVID-19 URI M1
3704
Gold Dork Parser.exe
Potentially Bad Traffic
ET INFO Suspicious GET Request with Possible COVID-19 URI M1
3704
Gold Dork Parser.exe
Potentially Bad Traffic
ET INFO Suspicious GET Request with Possible COVID-19 URI M1
3704
Gold Dork Parser.exe
Potentially Bad Traffic
ET INFO Suspicious GET Request with Possible COVID-19 URI M1
3704
Gold Dork Parser.exe
Potentially Bad Traffic
ET INFO Suspicious GET Request with Possible COVID-19 URI M1
3704
Gold Dork Parser.exe
Potentially Bad Traffic
ET INFO Suspicious GET Request with Possible COVID-19 URI M1
3704
Gold Dork Parser.exe
Potentially Bad Traffic
ET INFO Suspicious GET Request with Possible COVID-19 URI M1
3704
Gold Dork Parser.exe
Potentially Bad Traffic
ET INFO Suspicious GET Request with Possible COVID-19 URI M1
3704
Gold Dork Parser.exe
Potentially Bad Traffic
ET INFO Suspicious GET Request with Possible COVID-19 URI M1
No debug info