General Info

URL

http://infop.world/login.php?cmd=login_submit&id=cfe1bae9441470f7d25f0ea2c29fce2dcfe1bae9441470f7d25f0ea2c29fce2d&session=cfe1bae9441470f7d25f0ea2c29fce2dcfe1bae9441470f7d25f0ea2c29fce2d

Full analysis
https://app.any.run/tasks/ae3cbea7-ce86-431a-8e60-c03e54af4d18
Verdict
Malicious activity
Analysis date
12/6/2018, 17:30:38
OS:
Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distored by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.

Software environment set and analysis options

Launch configuration

Task duration
120 seconds
Additional time used
60 seconds
Fakenet option
off
Heavy Evaision option
off
MITM proxy
off
Route via Tor
off
Network geolocation
off
Privacy
Public submission
Autoconfirmation of UAC
on

Software preset

  • Internet Explorer 8.0.7601.17514
  • Adobe Acrobat Reader DC MUI (15.023.20070)
  • Adobe Flash Player 26 ActiveX (26.0.0.131)
  • Adobe Flash Player 26 NPAPI (26.0.0.131)
  • Adobe Flash Player 26 PPAPI (26.0.0.131)
  • Adobe Refresh Manager (1.8.0)
  • CCleaner (5.35)
  • FileZilla Client 3.36.0 (3.36.0)
  • Google Chrome (68.0.3440.106)
  • Google Update Helper (1.3.33.17)
  • Java 8 Update 92 (8.0.920.14)
  • Java Auto Updater (2.8.92.14)
  • Microsoft .NET Framework 4.6.1 (4.6.01055)
  • Microsoft Office Access MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Access Setup Metadata MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Excel MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office OneNote MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Outlook MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office PowerPoint MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Professional 2010 (14.0.6029.1000)
  • Microsoft Office Proof (English) 2010 (14.0.6029.1000)
  • Microsoft Office Proof (French) 2010 (14.0.6029.1000)
  • Microsoft Office Proof (Spanish) 2010 (14.0.6029.1000)
  • Microsoft Office Proofing (English) 2010 (14.0.6029.1000)
  • Microsoft Office Publisher MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Shared MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Shared Setup Metadata MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Single Image 2010 (14.0.6029.1000)
  • Microsoft Office Word MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (9.0.30729.6161)
  • Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219 (10.0.40219)
  • Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.30501 (12.0.30501.0)
  • Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005 (12.0.21005)
  • Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005 (12.0.21005)
  • Microsoft Visual C++ 2017 Redistributable (x86) - 14.15.26706 (14.15.26706.0)
  • Microsoft Visual C++ 2017 x86 Additional Runtime - 14.15.26706 (14.15.26706)
  • Microsoft Visual C++ 2017 x86 Minimum Runtime - 14.15.26706 (14.15.26706)
  • Mozilla Firefox 61.0.2 (x86 en-US) (61.0.2)
  • Notepad++ (32-bit x86) (7.5.1)
  • Opera 12.15 (12.15.1748)
  • Skype version 8.29 (8.29)
  • VLC media player (2.2.6)
  • WinRAR 5.60 (32-bit) (5.60.0)

Hotfixes

  • Client LanguagePack Package
  • Client Refresh LanguagePack Package
  • CodecPack Basic Package
  • Foundation Package
  • IE Troubleshooters Package
  • InternetExplorer Optional Package
  • KB2534111
  • KB2999226
  • KB976902
  • LocalPack AU Package
  • LocalPack CA Package
  • LocalPack GB Package
  • LocalPack US Package
  • LocalPack ZA Package
  • ProfessionalEdition
  • UltimateEdition

Behavior activities

MALICIOUS SUSPICIOUS INFO

No malicious indicators.

Uses IPCONFIG.EXE to discover IP address
  • sdiagnhost.exe (PID: 3956)
Executable content was dropped or overwritten
  • msdt.exe (PID: 2452)
Reads Internet Cache Settings
  • iexplore.exe (PID: 3192)
Application launched itself
  • iexplore.exe (PID: 2816)
Changes internet zones settings
  • iexplore.exe (PID: 2816)
Reads internet explorer settings
  • iexplore.exe (PID: 3192)

Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Screenshots

Processes

Total processes
38
Monitored processes
7
Malicious processes
0
Suspicious processes
0

Behavior graph

+
start iexplore.exe iexplore.exe msdt.exe sdiagnhost.exe no specs ipconfig.exe no specs route.exe no specs makecab.exe no specs
Specs description
Program did not start
Integrity level elevation
Task сontains an error or was rebooted
Process has crashed
Task contains several apps running
Executable file was dropped
Debug information is available
Process was injected
Network attacks were detected
Application downloaded the executable file
Actions similar to stealing personal data
Behavior similar to exploiting the vulnerability
Inspected object has sucpicious PE structure
File is detected by antivirus software
CPU overrun
RAM overrun
Process starts the services
Process was added to the startup
Behavior similar to spam
Low-level access to the HDD
Probably Tor was used
System was rebooted
Connects to the network
Known threat

Process information

Click at the process to see the details.

PID
2816
CMD
"C:\Program Files\Internet Explorer\iexplore.exe" -nohome
Path
C:\Program Files\Internet Explorer\iexplore.exe
Indicators
Parent process
––
User
admin
Integrity Level
MEDIUM
Version:
Company
Microsoft Corporation
Description
Internet Explorer
Version
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Image
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\shell32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\psapi.dll
c:\windows\system32\oleacc.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\profapi.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\comdlg32.dll
c:\windows\system32\cryptbase.dll
c:\program files\internet explorer\sqmapi.dll
c:\windows\system32\rpcrtremote.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\rasman.dll
c:\windows\system32\rtutils.dll
c:\windows\system32\sensapi.dll
c:\windows\system32\nlaapi.dll
c:\windows\system32\rasadhlp.dll
c:\windows\system32\ieui.dll
c:\windows\system32\msimg32.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\clbcatq.dll
c:\program files\internet explorer\ieproxy.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\url.dll
c:\windows\system32\version.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\xmllite.dll
c:\windows\system32\propsys.dll
c:\windows\system32\explorerframe.dll
c:\windows\system32\duser.dll
c:\windows\system32\dui70.dll
c:\windows\system32\msfeeds.dll
c:\windows\system32\sxs.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\system32\normaliz.dll
c:\windows\system32\wship6.dll
c:\windows\system32\fwpuclnt.dll
c:\windows\system32\mlang.dll
c:\windows\system32\ndfapi.dll
c:\windows\system32\wdi.dll
c:\windows\system32\msdt.exe

PID
3192
CMD
"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2816 CREDAT:71937
Path
C:\Program Files\Internet Explorer\iexplore.exe
Indicators
Parent process
iexplore.exe
User
admin
Integrity Level
LOW
Version:
Company
Microsoft Corporation
Description
Internet Explorer
Version
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Image
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\shell32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\psapi.dll
c:\windows\system32\oleacc.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\comdlg32.dll
c:\program files\internet explorer\ieshims.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\rpcrtremote.dll
c:\program files\internet explorer\sqmapi.dll
c:\windows\system32\devobj.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\propsys.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\profapi.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\rsaenh.dll
c:\program files\internet explorer\ieproxy.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\mlang.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\apphelp.dll
c:\program files\java\jre1.8.0_92\bin\ssv.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\version.dll
c:\progra~1\micros~1\office14\urlredir.dll
c:\windows\system32\secur32.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\progra~1\micros~1\office14\msohev.dll
c:\program files\java\jre1.8.0_92\bin\jp2ssv.dll
c:\program files\java\jre1.8.0_92\bin\msvcr100.dll
c:\program files\java\jre1.8.0_92\bin\deploy.dll
c:\windows\system32\imagehlp.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\sxs.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\rasman.dll
c:\windows\system32\rtutils.dll
c:\windows\system32\sensapi.dll
c:\windows\system32\nlaapi.dll
c:\windows\system32\rasadhlp.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\system32\normaliz.dll
c:\windows\system32\wship6.dll
c:\windows\system32\fwpuclnt.dll
c:\windows\system32\mshtml.dll
c:\windows\system32\msls31.dll
c:\windows\system32\iepeers.dll
c:\windows\system32\winspool.drv
c:\windows\system32\msimtf.dll
c:\windows\system32\jscript.dll
c:\windows\system32\imgutil.dll
c:\windows\system32\pngfilt.dll
c:\windows\system32\msimg32.dll
c:\windows\system32\dhcpcsvc6.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\winmm.dll
c:\windows\system32\mmdevapi.dll
c:\windows\system32\wdmaud.drv
c:\windows\system32\ksuser.dll
c:\windows\system32\avrt.dll
c:\windows\system32\audioses.dll
c:\windows\system32\msacm32.drv
c:\windows\system32\msacm32.dll
c:\windows\system32\midimap.dll

PID
2452
CMD
-modal 131350 -skip TRUE -path C:\Windows\diagnostics\system\networking -af C:\Users\admin\AppData\Local\Temp\NDFAA99.tmp -ep NetworkDiagnosticsWeb
Path
C:\Windows\system32\msdt.exe
Indicators
Parent process
iexplore.exe
User
admin
Integrity Level
MEDIUM
Exit code
2
Version:
Company
Microsoft Corporation
Description
Diagnostics Troubleshooting Wizard
Version
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Image
c:\windows\system32\msdt.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\atl.dll
c:\windows\system32\comdlg32.dll
c:\windows\system32\duser.dll
c:\windows\system32\wer.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\dui70.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\msxml6.dll
c:\windows\system32\sdiageng.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\ncrypt.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\gpapi.dll
c:\windows\system32\cryptnet.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\msftedit.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\xmllite.dll
c:\windows\system32\oleacc.dll
c:\windows\system32\imageres.dll
c:\windows\system32\explorerframe.dll
c:\windows\system32\rpcrtremote.dll
c:\windows\system32\sxs.dll
c:\windows\system32\version.dll
c:\windows\system32\sensapi.dll

PID
3956
CMD
C:\Windows\System32\sdiagnhost.exe -Embedding
Path
C:\Windows\System32\sdiagnhost.exe
Indicators
No indicators
Parent process
––
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
Microsoft Corporation
Description
Scripted Diagnostics Native Host
Version
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Image
c:\windows\system32\sdiagnhost.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\rpcrtremote.dll
c:\windows\system32\sxs.dll
c:\windows\system32\mscoree.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\version.dll
c:\windows\microsoft.net\framework\v2.0.50727\mscorwks.dll
c:\windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.4940_none_d08cc06a442b34fc\msvcr80.dll
c:\windows\system32\shell32.dll
c:\windows\system32\profapi.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\mscorlib\62a0b3e4b40ec0e8c5cfaa0c8848e64a\mscorlib.ni.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\microsoft.windows.d#\1c755e2849bee87c5f0f4758d2d51ae6\microsoft.windows.diagnosis.sdhost.ni.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\system\9e0a3b9b9f457233a335d7fba8f95419\system.ni.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\system.management.a#\a8e3a41ecbcc4bb1598ed5719f965110\system.management.automation.ni.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\microsoft.windows.d#\8ac2425807a71c8133cfe1d40ba9ba67\microsoft.windows.diagnosis.commands.updatediagrootcause.ni.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\microsoft.windows.d#\9582f4042bd63965d8282ea15f63c934\microsoft.windows.diagnosis.commands.getdiaginput.ni.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\microsoft.windows.d#\a3c1bc5bfd402b4232df98aa5e5df103\microsoft.windows.diagnosis.commands.updatediagreport.ni.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\microsoft.windows.d#\b83e03dd807fb456c0bcceb3704c9702\microsoft.windows.diagnosis.commands.writediagprogress.ni.dll
c:\windows\microsoft.net\framework\v2.0.50727\culture.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\system.xml\461d3b6b3f43e6fbe6c897d5936e17e4\system.xml.ni.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\system.management\6f3b99ed0b791ff4d8aa52f2f0cd0bcf\system.management.ni.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\system.directoryser#\45ec12795950a7d54691591c615a9e3c\system.directoryservices.ni.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\system.data\1e85062785e286cd9eae9c26d2c61f73\system.data.ni.dll
c:\windows\assembly\gac_32\system.data\2.0.0.0__b77a5c561934e089\system.data.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\microsoft.net\framework\v2.0.50727\mscorjit.dll
c:\windows\assembly\gac_msil\system.management.automation\1.0.0.0__31bf3856ad364e35\system.management.automation.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\system.core\fbc05b5b05dc6366b02b8e2f77d080f1\system.core.ni.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\microsoft.powershel#\e112e4460a0c9122de8c382126da4a2f\microsoft.powershell.commands.diagnostics.ni.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\system.configuratio#\f02737c83305687a68c088927a6c5a98\system.configuration.install.ni.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\microsoft.wsman.man#\f1865caa683ceb3d12b383a94a35da14\microsoft.wsman.management.ni.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\system.transactions\ad18f93fc713db2c4b29b25116c13bd8\system.transactions.ni.dll
c:\windows\assembly\gac_32\system.transactions\2.0.0.0__b77a5c561934e089\system.transactions.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\microsoft.powershel#\82d7758f278f47dc4191abab1cb11ce3\microsoft.powershell.commands.utility.ni.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\microsoft.powershel#\4bdde288f147e3b3f2c090ecdf704e6d\microsoft.powershell.consolehost.ni.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\microsoft.powershel#\583c7b9f52114c026088bdb9f19f64e8\microsoft.powershell.commands.management.ni.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\system.serviceproce#\20008c75bb41e2febf84d4d4aea5b4e8\system.serviceprocess.ni.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\microsoft.powershel#\6c5bef3ab74c06a641444eff648c0dde\microsoft.powershell.security.ni.dll
c:\windows\system32\shfolder.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\msisip.dll
c:\windows\system32\wshext.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\windowspowershell\v1.0\pwrshsip.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\microsoft.net\framework\v2.0.50727\diasymreader.dll
c:\windows\system32\ndfapi.dll
c:\windows\system32\wdi.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\msxml3.dll
c:\windows\system32\wevtapi.dll
c:\windows\system32\ipconfig.exe
c:\windows\system32\apphelp.dll
c:\windows\system32\route.exe
c:\windows\system32\makecab.exe

PID
2928
CMD
"C:\Windows\system32\ipconfig.exe" /all
Path
C:\Windows\system32\ipconfig.exe
Indicators
No indicators
Parent process
sdiagnhost.exe
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
Microsoft Corporation
Description
IP Configuration Utility
Version
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Image
c:\windows\system32\ipconfig.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\dhcpcsvc6.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\rpcrtremote.dll
c:\windows\system32\qagent.dll
c:\windows\system32\qutil.dll
c:\windows\system32\wevtapi.dll

PID
3772
CMD
"C:\Windows\system32\ROUTE.EXE" print
Path
C:\Windows\system32\ROUTE.EXE
Indicators
No indicators
Parent process
sdiagnhost.exe
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
Microsoft Corporation
Description
TCP/IP Route Command
Version
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Image
c:\windows\system32\route.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\dhcpcsvc6.dll
c:\windows\system32\dhcpcsvc.dll

PID
2480
CMD
"C:\Windows\system32\makecab.exe" /f NetworkConfiguration.ddf
Path
C:\Windows\system32\makecab.exe
Indicators
No indicators
Parent process
sdiagnhost.exe
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
Microsoft Corporation
Description
Microsoft® Cabinet Maker
Version
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Image
c:\windows\system32\makecab.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll

Registry activity

Total events
442
Read events
383
Write events
59
Delete events
0

Modification events

PID
Process
Operation
Key
Name
Value
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
CompatibilityFlags
0
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
SecuritySafe
1
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
ProxyEnable
0
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
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
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
{50407329-F974-11E8-BAD8-5254004A04AF}
0
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Type
4
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Count
3
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Time
E2070C000400060010001F0000002303
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{789FE86F-6FC4-46A1-9849-EDE0DB0C95CA}\iexplore
Type
4
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{789FE86F-6FC4-46A1-9849-EDE0DB0C95CA}\iexplore
Count
3
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{789FE86F-6FC4-46A1-9849-EDE0DB0C95CA}\iexplore
Time
E2070C000400060010001F0000003303
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
FullScreen
no
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Window_Placement
2C0000000200000003000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF20000000200000004003000078020000
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Favorites\Links
Order
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
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\iexplore
Type
3
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\iexplore
Count
3
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\iexplore
Time
E2070C000400060010001F0001000600
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\iexplore
LoadTime
13
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B4F3A835-0E21-4959-BA22-42B3008E02FF}\iexplore
Type
3
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B4F3A835-0E21-4959-BA22-42B3008E02FF}\iexplore
Count
3
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B4F3A835-0E21-4959-BA22-42B3008E02FF}\iexplore
Time
E2070C000400060010001F0001003500
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B4F3A835-0E21-4959-BA22-42B3008E02FF}\iexplore
LoadTime
39
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore
Type
3
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore
Count
3
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore
Time
E2070C000400060010001F0001009300
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore
LoadTime
28
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
Path
C:\Users\admin\Favorites\Links\Suggested Sites.url
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
Handler
{B0FA7D7C-7195-4F03-B03E-9DC1C9EBC394}
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
FeedUrl
https://ieonline.microsoft.com/#ieslice
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
DisplayName
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
ErrorState
0
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
DisplayMask
0
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
Path
C:\Users\admin\Favorites\Links\Web Slice Gallery.url
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
Handler
{B0FA7D7C-7195-4F03-B03E-9DC1C9EBC394}
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
FeedUrl
http://go.microsoft.com/fwlink/?LinkId=121315
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
DisplayName
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
ErrorState
0
2816
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
DisplayMask
0
2452
msdt.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
LanguageList
en-US
3956
sdiagnhost.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
3956
sdiagnhost.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1

Files activity

Executable files
2
Suspicious files
9
Text files
39
Unknown types
3

Dropped files

PID
Process
Filename
Type
2452
msdt.exe
C:\Users\admin\AppData\Local\Temp\SDIAG_2891af28-9582-4a51-9acb-242173db8bec\en-US\DiagPackage.dll.mui
executable
MD5: 5d7936806e6855e2ecc2b095316d45d8
SHA256: 71a4559f9fd122914a95998e8685be638b8f81e581987708497e8f8a7a2f4dcb
2452
msdt.exe
C:\Users\admin\AppData\Local\Temp\SDIAG_2891af28-9582-4a51-9acb-242173db8bec\DiagPackage.dll
executable
MD5: 2433e09c08c21455000f7e36d7653759
SHA256: ea9400e719fb15cd82d5dab4b7d8e3870bb375bbe11bb95b0d957a84fee2891c
2480
makecab.exe
C:\Users\admin\AppData\Local\Temp\cab_2480_7
––
MD5:  ––
SHA256:  ––
2452
msdt.exe
C:\Users\admin\AppData\Local\Temp\PLA41F4.tmp
––
MD5:  ––
SHA256:  ––
2452
msdt.exe
C:\Users\admin\AppData\Local\Temp\PLAC09.tmp
––
MD5:  ––
SHA256:  ––
2452
msdt.exe
C:\Users\admin\AppData\Local\Temp\PLA73F8.tmp
––
MD5:  ––
SHA256:  ––
2452
msdt.exe
C:\Users\admin\AppData\Local\Temp\PLA282E.tmp
––
MD5:  ––
SHA256:  ––
2452
msdt.exe
C:\Users\admin\AppData\Local\Diagnostics\460911090\2018120616.000\DebugReport.xml
––
MD5:  ––
SHA256:  ––
2452
msdt.exe
C:\Users\admin\AppData\Local\Temp\SDIAG_2891af28-9582-4a51-9acb-242173db8bec\result\ResultReport.xml
––
MD5:  ––
SHA256:  ––
2452
msdt.exe
C:\Users\admin\AppData\Local\Temp\SDIAG_2891af28-9582-4a51-9acb-242173db8bec\result\DebugReport.xml
––
MD5:  ––
SHA256:  ––
2452
msdt.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\WER\ReportQueue\NonCritical_Microsoft Window_bd5996727e9ea1acda90841fa2c99a88df4fb9d6_cab_098efcb1\Report.wer
binary
MD5: bf91feaf96f9f9cc68bd1264590b9ec8
SHA256: 41126f1892606c8294f318bc0b0aa3ab87414511bfe01aaad9eba916f6db3a58
2452
msdt.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\WER\ReportQueue\NonCritical_Microsoft Window_bd5996727e9ea1acda90841fa2c99a88df4fb9d6_cab_098efcb1\PkgFC34.cab
compressed
MD5: 0e5e1c25eda4c3c341753501543a9e9e
SHA256: 4248c01bd8fec407ca863fdd4eb3bdb2a794d9e4b9e4015da13e05157af13957
2452
msdt.exe
C:\Users\admin\AppData\Local\Temp\PLA1C0F.tmp
––
MD5:  ––
SHA256:  ––
2452
msdt.exe
C:\Users\admin\AppData\Local\Temp\msdt\_8DA26508-12EC-4F45-8662-CC7A46180939_\PkgFC34.cab
––
MD5:  ––
SHA256:  ––
2452
msdt.exe
C:\Users\admin\AppData\Local\Temp\PLA7F9F.tmp
––
MD5:  ––
SHA256:  ––
2452
msdt.exe
C:\Users\admin\AppData\Local\Temp\PLA183A.tmp
––
MD5:  ––
SHA256:  ––
2452
msdt.exe
C:\Users\admin\AppData\Local\Temp\PLA79ED.tmp
––
MD5:  ––
SHA256:  ––
2452
msdt.exe
C:\Users\admin\AppData\Local\Temp\PLA2415.tmp
––
MD5:  ––
SHA256:  ––
2452
msdt.exe
C:\Users\admin\AppData\Local\Diagnostics\460911090\latest.cab
compressed
MD5: 0e5e1c25eda4c3c341753501543a9e9e
SHA256: 4248c01bd8fec407ca863fdd4eb3bdb2a794d9e4b9e4015da13e05157af13957
2452
msdt.exe
C:\Users\admin\AppData\Local\Diagnostics\460911090\2018120616.000\results.xml
text
MD5: 840b413cbf5e57a93deecff7e76cf260
SHA256: de5825ee63dd98ca86f86652ff81ac75380b3ac4d880ab44d8984b8bf531ffae
2452
msdt.exe
C:\Users\admin\AppData\Local\Temp\SDIAG_2891af28-9582-4a51-9acb-242173db8bec\result\DebugReport.xml
xml
MD5: b84127f293da660df78e850af0149223
SHA256: 7c05590fb81462661102d5e6e67a36f21e6b8cf75256fc893cac1b0a35b0add4
2452
msdt.exe
C:\Users\admin\AppData\Local\Diagnostics\460911090\2018120616.000\529029E3-837E-4E7E-A33A-42E292F12E10.Diagnose.0.etl
etl
MD5: 931b4aa4eb3a876ab0760313ceee583d
SHA256: a5e08eb899130fa74e9cdb24a5d2f8dfae1ace98b9cc56e958301266dbaf9497
2452
msdt.exe
C:\Users\admin\AppData\Local\Diagnostics\460911090\2018120616.000\NetworkDiagnostics.0.debugreport.xml
xml
MD5: b84127f293da660df78e850af0149223
SHA256: 7c05590fb81462661102d5e6e67a36f21e6b8cf75256fc893cac1b0a35b0add4
2452
msdt.exe
C:\Users\admin\AppData\Local\Diagnostics\460911090\2018120616.000\results.xsl
xml
MD5: 310e1da2344ba6ca96666fb639840ea9
SHA256: 67401342192babc27e62d4c1e0940409cc3f2bd28f77399e71d245eae8d3f63c
2452
msdt.exe
C:\Users\admin\AppData\Local\Diagnostics\460911090\2018120616.000\resultreport.xml
xml
MD5: 142396cf3c17a0a00b2677b8542a23d6
SHA256: 096f6ae5042d15b7d987eaaa5e9b8e2e2aac363246929880898b84a2d7f05963
2452
msdt.exe
C:\Users\admin\AppData\Local\Diagnostics\460911090\2018120616.000\ResultReport.xml
xml
MD5: 142396cf3c17a0a00b2677b8542a23d6
SHA256: 096f6ae5042d15b7d987eaaa5e9b8e2e2aac363246929880898b84a2d7f05963
2452
msdt.exe
C:\Users\admin\AppData\Local\Temp\SDIAG_2891af28-9582-4a51-9acb-242173db8bec\result\ResultReport.xml
xml
MD5: 5565a8fcb01b15d7959755e351988d3e
SHA256: add32d0eeba19bbd1df97caca552884d959db7d49866986de322d1a8f341e4bc
2452
msdt.exe
C:\Users\admin\AppData\Local\Diagnostics\460911090\2018120616.000\NetworkConfiguration.cab
compressed
MD5: 5f39fe5d6d8fd6bd77d2191f80809bc9
SHA256: b1affa51a4694afe993b4bddd8340aabb6aaaf68ac98ef376a3d99bba1efa680
2452
msdt.exe
C:\Users\admin\AppData\Local\Temp\SDIAG_2891af28-9582-4a51-9acb-242173db8bec\result\NetworkConfiguration.cab
compressed
MD5: 5f39fe5d6d8fd6bd77d2191f80809bc9
SHA256: b1affa51a4694afe993b4bddd8340aabb6aaaf68ac98ef376a3d99bba1efa680
2480
makecab.exe
C:\Users\admin\AppData\Local\Temp\tmpF907.tmp\setup.inf
text
MD5: 741817463dc6dc366820460e381426fe
SHA256: a8bbbfce3c9f6cac2dca4a8574ec5e8c7d9c1bc7ba0969c160a075791bce85e7
2480
makecab.exe
C:\Users\admin\AppData\Local\Temp\tmpF907.tmp\setup.rpt
text
MD5: 9c411d398b4ab63068b180d969ddb897
SHA256: 9d64256ae70c0c967ec9411a3d3fd31c3f283feef86a3850fce549a33b02cab3
2480
makecab.exe
C:\Users\admin\AppData\Local\Temp\inf_2480_3
––
MD5:  ––
SHA256:  ––
2480
makecab.exe
C:\Users\admin\AppData\Local\Temp\inf_2480_4
––
MD5:  ––
SHA256:  ––
2480
makecab.exe
C:\Users\admin\AppData\Local\Temp\inf_2480_2
––
MD5:  ––
SHA256:  ––
2480
makecab.exe
C:\Users\admin\AppData\Local\Temp\tmpF907.tmp\NetworkConfiguration.cab
––
MD5:  ––
SHA256:  ––
2480
makecab.exe
C:\Users\admin\AppData\Local\Temp\cab_2480_9
––
MD5:  ––
SHA256:  ––
2816
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\favicon[1].ico
––
MD5:  ––
SHA256:  ––
2480
makecab.exe
C:\Users\admin\AppData\Local\Temp\cab_2480_6
––
MD5:  ––
SHA256:  ––
2480
makecab.exe
C:\Users\admin\AppData\Local\Temp\cab_2480_8
––
MD5:  ––
SHA256:  ––
2480
makecab.exe
C:\Users\admin\AppData\Local\Temp\cab_2480_5
––
MD5:  ––
SHA256:  ––
3956
sdiagnhost.exe
C:\Users\admin\AppData\Local\Temp\tmpF907.tmp\NetworkConfiguration.ddf
––
MD5:  ––
SHA256:  ––
3956
sdiagnhost.exe
C:\Users\admin\AppData\Local\Temp\tmpF907.tmp\route.print.txt
––
MD5:  ––
SHA256:  ––
3956
sdiagnhost.exe
C:\Users\admin\AppData\Local\Temp\tmpF907.tmp\ipconfig.all.txt
––
MD5:  ––
SHA256:  ––
2452
msdt.exe
C:\Users\admin\AppData\Local\Temp\SDIAG_2891af28-9582-4a51-9acb-242173db8bec\result\529029E3-837E-4E7E-A33A-42E292F12E10.Diagnose.0.etl
etl
MD5: 931b4aa4eb3a876ab0760313ceee583d
SHA256: a5e08eb899130fa74e9cdb24a5d2f8dfae1ace98b9cc56e958301266dbaf9497
3956
sdiagnhost.exe
C:\Users\admin\AppData\Local\Temp\529029E3-837E-4E7E-A33A-42E292F12E10.Diagnose.0.etl
––
MD5:  ––
SHA256:  ––
2452
msdt.exe
C:\Users\admin\AppData\Local\Temp\SDIAG_2891af28-9582-4a51-9acb-242173db8bec\result\results.xsl
xml
MD5: 310e1da2344ba6ca96666fb639840ea9
SHA256: 67401342192babc27e62d4c1e0940409cc3f2bd28f77399e71d245eae8d3f63c
3192
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\login[1].htm
html
MD5: ef9bc271eaf50e1f01f3dc8ccc56c86e
SHA256: 69b77ac1e34bea6c4a36934075a0b9021682559738b29cd09e4de7c8e82d6865
2452
msdt.exe
C:\Users\admin\AppData\Local\Temp\SDIAG_2891af28-9582-4a51-9acb-242173db8bec\UtilityFunctions.ps1
text
MD5: 2f7c3db0c268cf1cf506fe6e8aecb8a0
SHA256: 886a625f71e0c35e5722423ed3aa0f5bff8d120356578ab81a64de2ab73d47f3
2452
msdt.exe
C:\Users\admin\AppData\Local\Temp\SDIAG_2891af28-9582-4a51-9acb-242173db8bec\UtilityFirewall.ps1
text
MD5: b004afc224e9216115ec3b0bf5d43ba2
SHA256: 31b97632ca31d1bb21917a07757b2ff415dbb6a4e7dd7b533ecc52431acf65b5
2452
msdt.exe
C:\Users\admin\AppData\Local\Temp\SDIAG_2891af28-9582-4a51-9acb-242173db8bec\UtilitySetConstants.ps1
text
MD5: 0c75ae5e75c3e181d13768909c8240ba
SHA256: de5c231c645d3ae1e13694284997721509f5de64ee5c96c966cdfda9e294db3f
2452
msdt.exe
C:\Users\admin\AppData\Local\Temp\SDIAG_2891af28-9582-4a51-9acb-242173db8bec\StartDPSService.ps1
text
MD5: a660422059d953c6d681b53a6977100e
SHA256: d19677234127c38a52aec23686775a8eb3f4e3a406f4a11804d97602d6c31813
2452
msdt.exe
C:\Users\admin\AppData\Local\Temp\SDIAG_2891af28-9582-4a51-9acb-242173db8bec\en-US\LocalizationData.psd1
text
MD5: dfc212122eade84d83607ba672a06114
SHA256: cec7595c6607862fb8b633468272c2118253ec77b47901aace7cd94f4f6c1f0b
2452
msdt.exe
C:\Users\admin\AppData\Local\Temp\PLA12F0.tmp
––
MD5:  ––
SHA256:  ––
2452
msdt.exe
C:\Users\admin\AppData\Local\Temp\SDIAG_2891af28-9582-4a51-9acb-242173db8bec\NetworkDiagnosticsVerify.ps1
text
MD5: c0bb6343bd0f6f9b46b33e4b66106953
SHA256: eb9bc61668a93759d0127a11cdfc03e924100d69c7e6457feaa89330474c90c3
2452
msdt.exe
C:\Users\admin\AppData\Local\Temp\SDIAG_2891af28-9582-4a51-9acb-242173db8bec\DiagPackage.diagpkg
xml
MD5: c9fb87fa3460fae6d5d599236cfd77e2
SHA256: cde728c08a4e50a02fcff35c90ee2b3b33ab24c8b858f180b6a67bfa94def35f
2452
msdt.exe
C:\Users\admin\AppData\Local\Temp\SDIAG_2891af28-9582-4a51-9acb-242173db8bec\HTInteractiveRes.ps1
text
MD5: c25ed2111c6ee9299e6d9bf51012f2f5
SHA256: 8e326ee0475208d4c943d885035058fad7146bba02b66305f7c9f31f6a57e81b
2452
msdt.exe
C:\Users\admin\AppData\Local\Temp\SDIAG_2891af28-9582-4a51-9acb-242173db8bec\NetworkDiagnosticsTroubleshoot.ps1
text
MD5: 1d192ce36953dbb7dc7ee0d04c57ad8d
SHA256: 935a231924ae5d4a017b0c99d4a5f3904ef280cea4b3f727d365283e26e8a756
2452
msdt.exe
C:\Users\admin\AppData\Local\Temp\SDIAG_2891af28-9582-4a51-9acb-242173db8bec\NetworkDiagnosticsResolve.ps1
text
MD5: a7b957f221c643580184665be57e6ac8
SHA256: 8582ef50174cb74233f196f193e04c0ccbbee2aed5ce50964cbb95822c218e7f
2452
msdt.exe
C:\Users\admin\AppData\Local\Temp\SDIAG_2891af28-9582-4a51-9acb-242173db8bec\InteractiveRes.ps1
text
MD5: 25b8543dbf571f040118423bc3c7a75e
SHA256: d78e6291d6f27ac6febdcf0a4d5a34521e7f033af8875e026df21ba7513ab64a
2816
iexplore.exe
C:\Users\admin\AppData\Local\Temp\NDFAA99.tmp
binary
MD5: d4163a37f06338c6c1e155cd5a8e2217
SHA256: 16d81e2827c7dbffff945c17a2e6b97b11d8bacdce59ddf7880d588afe3a2552
3192
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\down[1]
image
MD5: 555e83ce7f5d280d7454af334571fb25
SHA256: 70f316a5492848bb8242d49539468830b353ddaa850964db4e60a6d2d7db4880
3192
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2ZG9DE0\tools[1]
image
MD5: 6f20ba58551e13cfd87ec059327effd0
SHA256: 62a7038cc42c1482d70465192318f21fc1ce0f0c737cb8804137f38a1f9d680b
3192
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\BWPPCY0O\favcenter[1]
image
MD5: 25d76ee5fb5b890f2cc022d94a42fe19
SHA256: 07d07a467e4988d3c377acd6dc9e53abca6b64e8fbf70f6be19d795a1619289b
3192
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\background_gradient[1]
image
MD5: 20f0110ed5e4e0d5384a496e4880139b
SHA256: 1471693be91e53c2640fe7baeecbc624530b088444222d93f2815dfce1865d5b
3192
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\BWPPCY0O\httpErrorPagesScripts[1]
text
MD5: e7ca76a3c9ee0564471671d500e3f0f3
SHA256: 58268ca71a28973b756a48bbd7c9dc2f6b87b62ae343e582ce067c725275b63c
3192
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2ZG9DE0\noConnect[1]
image
MD5: 3cb8faccd5de434d415ab75c17e8fd86
SHA256: 6976c426e3ac66d66303c114b22b2b41109a7de648ba55ffc3e5a53bd0db09e7
3192
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\errorPageStrings[1]
text
MD5: 1a0563f7fb85a678771450b131ed66fd
SHA256: eb5678de9d8f29ca6893d4e6ca79bd5ab4f312813820fe4997b009a2b1a1654c
3192
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\ErrorPageTemplate[1]
text
MD5: f4fe1cb77e758e1ba56b8a8ec20417c5
SHA256: 8d018639281b33da8eb3ce0b21d11e1d414e59024c3689f92be8904eb5779b5f
3192
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\dnserror[1]
html
MD5: 68e03ed57ec741a4afbbcd11fab1bdbe
SHA256: 1ff3334c3eb27033f8f37029fd72f648edd4551fce85fc1f5159feaea1439630
2816
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\favicon[3].png
image
MD5: 9fb559a691078558e77d6848202f6541
SHA256: 6d8a01dc7647bc218d003b58fe04049e24a9359900b7e0cebae76edf85b8b914
2816
iexplore.exe
C:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
––
MD5:  ––
SHA256:  ––
2452
msdt.exe
C:\Users\admin\AppData\Local\Diagnostics\460911090\latest.cab
compressed
MD5: a08cbc7417154efbb92c2cb2fc208cc5
SHA256: 00f2e3fb1a8897139fa8033ab09c2214992379aecce92d7161a772c8c01ba0c5

Find more information of the staic content and download it at the full report

Network activity

HTTP(S) requests
3
TCP/UDP connections
6
DNS requests
4
Threats
2

HTTP requests

PID Process Method HTTP Code IP URL CN Type Size Reputation
2816 iexplore.exe GET 200 13.107.21.200:80 http://www.bing.com/favicon.ico US
image
whitelisted
–– –– GET –– 191.209.26.45:80 http://infop.world/ BR
––
––
malicious
3192 iexplore.exe GET –– 191.209.26.45:80 http://infop.world/login.php?cmd=login_submit&id=cfe1bae9441470f7d25f0ea2c29fce2dcfe1bae9441470f7d25f0ea2c29fce2d&session=cfe1bae9441470f7d25f0ea2c29fce2dcfe1bae9441470f7d25f0ea2c29fce2d BR
––
––
malicious

Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID Process IP ASN CN Reputation
2816 iexplore.exe 204.79.197.200:80 Microsoft Corporation US whitelisted
3192 iexplore.exe 191.209.26.45:80 TELEFÔNICA BRASIL S.A BR suspicious
2816 iexplore.exe 13.107.21.200:80 Microsoft Corporation US whitelisted
–– –– 191.209.26.45:80 TELEFÔNICA BRASIL S.A BR suspicious

DNS requests

Domain IP Reputation
infop.world 191.209.26.45
malicious
www.bing.com 204.79.197.200
13.107.21.200
whitelisted
dns.msftncsi.com 131.107.255.255
whitelisted

Threats

PID Process Class Message
3192 iexplore.exe A Network Trojan was detected SC PHISHING PDF/Phishing - unknown malware
3192 iexplore.exe A Network Trojan was detected MALWARE [PTsecurity] Google Drive Phishing Landing

Debug output strings

No debug info.