General Info

URL

http://23.plainfieldinforsale.com/

Full analysis
https://app.any.run/tasks/a29a5892-528b-4967-8ef0-b2d55ae34894
Verdict
Malicious activity
Analysis date
1/10/2019, 17:07:20
OS:
Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:

phishing

Indicators:

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distored by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.

Software environment set and analysis options

Launch configuration

Task duration
180 seconds
Additional time used
120 seconds
Fakenet option
off
Heavy Evaision option
off
MITM proxy
off
Route via Tor
off
Network geolocation
off
Privacy
Public submission
Autoconfirmation of UAC
on

Software preset

  • Internet Explorer 8.0.7601.17514
  • Adobe Acrobat Reader DC MUI (15.023.20070)
  • Adobe Flash Player 26 ActiveX (26.0.0.131)
  • Adobe Flash Player 26 NPAPI (26.0.0.131)
  • Adobe Flash Player 26 PPAPI (26.0.0.131)
  • Adobe Refresh Manager (1.8.0)
  • CCleaner (5.35)
  • FileZilla Client 3.36.0 (3.36.0)
  • Google Chrome (68.0.3440.106)
  • Google Update Helper (1.3.33.17)
  • Java 8 Update 92 (8.0.920.14)
  • Java Auto Updater (2.8.92.14)
  • Microsoft .NET Framework 4.6.1 (4.6.01055)
  • Microsoft Office Access MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Access Setup Metadata MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Excel MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office OneNote MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Outlook MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office PowerPoint MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Professional 2010 (14.0.6029.1000)
  • Microsoft Office Proof (English) 2010 (14.0.6029.1000)
  • Microsoft Office Proof (French) 2010 (14.0.6029.1000)
  • Microsoft Office Proof (Spanish) 2010 (14.0.6029.1000)
  • Microsoft Office Proofing (English) 2010 (14.0.6029.1000)
  • Microsoft Office Publisher MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Shared MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Shared Setup Metadata MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Single Image 2010 (14.0.6029.1000)
  • Microsoft Office Word MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (9.0.30729.6161)
  • Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219 (10.0.40219)
  • Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.30501 (12.0.30501.0)
  • Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005 (12.0.21005)
  • Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005 (12.0.21005)
  • Microsoft Visual C++ 2017 Redistributable (x86) - 14.15.26706 (14.15.26706.0)
  • Microsoft Visual C++ 2017 x86 Additional Runtime - 14.15.26706 (14.15.26706)
  • Microsoft Visual C++ 2017 x86 Minimum Runtime - 14.15.26706 (14.15.26706)
  • Mozilla Firefox 61.0.2 (x86 en-US) (61.0.2)
  • Notepad++ (32-bit x86) (7.5.1)
  • Opera 12.15 (12.15.1748)
  • Skype version 8.29 (8.29)
  • VLC media player (2.2.6)
  • WinRAR 5.60 (32-bit) (5.60.0)

Hotfixes

  • Client LanguagePack Package
  • Client Refresh LanguagePack Package
  • CodecPack Basic Package
  • Foundation Package
  • IE Troubleshooters Package
  • InternetExplorer Optional Package
  • KB2534111
  • KB2999226
  • KB976902
  • LocalPack AU Package
  • LocalPack CA Package
  • LocalPack GB Package
  • LocalPack US Package
  • LocalPack ZA Package
  • ProfessionalEdition
  • UltimateEdition

Behavior activities

MALICIOUS SUSPICIOUS INFO

No malicious indicators.

No suspicious indicators.

Changes internet zones settings
  • iexplore.exe (PID: 2856)
Reads internet explorer settings
  • iexplore.exe (PID: 3272)
Application launched itself
  • iexplore.exe (PID: 2856)
Reads Internet Cache Settings
  • iexplore.exe (PID: 2856)
  • iexplore.exe (PID: 3272)
Creates files in the user directory
  • iexplore.exe (PID: 3272)

Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Screenshots

Processes

Total processes
33
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

+
start iexplore.exe iexplore.exe
Specs description
Program did not start
Integrity level elevation
Task сontains an error or was rebooted
Process has crashed
Task contains several apps running
Executable file was dropped
Debug information is available
Process was injected
Network attacks were detected
Application downloaded the executable file
Actions similar to stealing personal data
Behavior similar to exploiting the vulnerability
Inspected object has sucpicious PE structure
File is detected by antivirus software
CPU overrun
RAM overrun
Process starts the services
Process was added to the startup
Behavior similar to spam
Low-level access to the HDD
Probably Tor was used
System was rebooted
Connects to the network
Known threat

Process information

Click at the process to see the details.

PID
2856
CMD
"C:\Program Files\Internet Explorer\iexplore.exe" -nohome
Path
C:\Program Files\Internet Explorer\iexplore.exe
Indicators
Parent process
––
User
admin
Integrity Level
MEDIUM
Version:
Company
Microsoft Corporation
Description
Internet Explorer
Version
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Image
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\shell32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\psapi.dll
c:\windows\system32\oleacc.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\profapi.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\comdlg32.dll
c:\windows\system32\cryptbase.dll
c:\program files\internet explorer\sqmapi.dll
c:\windows\system32\rpcrtremote.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\rasman.dll
c:\windows\system32\rtutils.dll
c:\windows\system32\sensapi.dll
c:\windows\system32\nlaapi.dll
c:\windows\system32\rasadhlp.dll
c:\windows\system32\ieui.dll
c:\windows\system32\msimg32.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\clbcatq.dll
c:\program files\internet explorer\ieproxy.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\url.dll
c:\windows\system32\version.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\xmllite.dll
c:\windows\system32\propsys.dll
c:\windows\system32\explorerframe.dll
c:\windows\system32\duser.dll
c:\windows\system32\dui70.dll
c:\windows\system32\msfeeds.dll
c:\windows\system32\sxs.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\system32\normaliz.dll
c:\windows\system32\wship6.dll
c:\windows\system32\fwpuclnt.dll
c:\windows\system32\mlang.dll
c:\program files\common files\microsoft shared\ink\tiptsf.dll
c:\windows\system32\mssprxy.dll
c:\windows\system32\naturallanguage6.dll
c:\windows\system32\nlsdata0009.dll
c:\windows\system32\nlslexicons0009.dll
c:\windows\system32\tquery.dll
c:\windows\system32\structuredquery.dll
c:\windows\system32\secur32.dll

PID
3272
CMD
"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2856 CREDAT:71937
Path
C:\Program Files\Internet Explorer\iexplore.exe
Indicators
Parent process
iexplore.exe
User
admin
Integrity Level
LOW
Version:
Company
Microsoft Corporation
Description
Internet Explorer
Version
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Image
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\shell32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\psapi.dll
c:\windows\system32\oleacc.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\comdlg32.dll
c:\program files\internet explorer\ieshims.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\rpcrtremote.dll
c:\program files\internet explorer\sqmapi.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\propsys.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\profapi.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\rsaenh.dll
c:\program files\internet explorer\ieproxy.dll
c:\windows\system32\nsi.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\mlang.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\apphelp.dll
c:\program files\java\jre1.8.0_92\bin\ssv.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\version.dll
c:\progra~1\micros~1\office14\urlredir.dll
c:\windows\system32\secur32.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\progra~1\micros~1\office14\msohev.dll
c:\program files\java\jre1.8.0_92\bin\jp2ssv.dll
c:\program files\java\jre1.8.0_92\bin\msvcr100.dll
c:\program files\java\jre1.8.0_92\bin\deploy.dll
c:\windows\system32\imagehlp.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\sxs.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\rasman.dll
c:\windows\system32\rtutils.dll
c:\windows\system32\sensapi.dll
c:\windows\system32\nlaapi.dll
c:\windows\system32\rasadhlp.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\system32\normaliz.dll
c:\windows\system32\wship6.dll
c:\windows\system32\fwpuclnt.dll
c:\windows\system32\mshtml.dll
c:\windows\system32\msls31.dll
c:\windows\system32\userenv.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\schannel.dll
c:\windows\system32\msimtf.dll
c:\windows\system32\iepeers.dll
c:\windows\system32\winspool.drv
c:\windows\system32\credssp.dll
c:\windows\system32\t2embed.dll
c:\windows\system32\ncrypt.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\imgutil.dll
c:\windows\system32\pngfilt.dll
c:\windows\system32\gpapi.dll
c:\windows\system32\p2pcollab.dll
c:\windows\system32\qagentrt.dll
c:\windows\system32\fveui.dll
c:\windows\system32\jscript.dll
c:\windows\system32\cryptnet.dll
c:\windows\system32\cabinet.dll
c:\windows\system32\devrtl.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\dhcpcsvc6.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\msimg32.dll
c:\windows\system32\winmm.dll
c:\windows\system32\mmdevapi.dll
c:\windows\system32\wdmaud.drv
c:\windows\system32\ksuser.dll
c:\windows\system32\avrt.dll
c:\windows\system32\audioses.dll
c:\windows\system32\msacm32.drv
c:\windows\system32\msacm32.dll
c:\windows\system32\midimap.dll

Registry activity

Total events
464
Read events
384
Write events
77
Delete events
3

Modification events

PID
Process
Operation
Key
Name
Value
2856
iexplore.exe
delete key
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012018082720180903
2856
iexplore.exe
delete key
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012018090920180910
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
CompatibilityFlags
0
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
SecuritySafe
1
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
ProxyEnable
0
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
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
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
{DB42877B-14F1-11E9-BAD8-5254004A04AF}
0
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Type
4
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Count
3
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Time
E307010004000A00100007002A003902
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{789FE86F-6FC4-46A1-9849-EDE0DB0C95CA}\iexplore
Type
4
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{789FE86F-6FC4-46A1-9849-EDE0DB0C95CA}\iexplore
Count
3
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{789FE86F-6FC4-46A1-9849-EDE0DB0C95CA}\iexplore
Time
E307010004000A00100007002A003902
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
FullScreen
no
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Window_Placement
2C0000000200000003000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF20000000200000004003000078020000
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Favorites\Links
Order
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
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\iexplore
Type
3
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\iexplore
Count
3
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\iexplore
Time
E307010004000A00100007002A000403
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\iexplore
LoadTime
16
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B4F3A835-0E21-4959-BA22-42B3008E02FF}\iexplore
Type
3
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B4F3A835-0E21-4959-BA22-42B3008E02FF}\iexplore
Count
3
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B4F3A835-0E21-4959-BA22-42B3008E02FF}\iexplore
Time
E307010004000A00100007002A004203
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B4F3A835-0E21-4959-BA22-42B3008E02FF}\iexplore
LoadTime
37
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore
Type
3
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore
Count
3
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore
Time
E307010004000A00100007002A009103
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore
LoadTime
35
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
Path
C:\Users\admin\Favorites\Links\Suggested Sites.url
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
Handler
{B0FA7D7C-7195-4F03-B03E-9DC1C9EBC394}
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
FeedUrl
https://ieonline.microsoft.com/#ieslice
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
DisplayName
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
ErrorState
0
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
DisplayMask
0
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
Path
C:\Users\admin\Favorites\Links\Web Slice Gallery.url
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
Handler
{B0FA7D7C-7195-4F03-B03E-9DC1C9EBC394}
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
FeedUrl
http://go.microsoft.com/fwlink/?LinkId=121315
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
DisplayName
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
ErrorState
0
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
DisplayMask
0
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012019011020190111
CachePath
%USERPROFILE%\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019011020190111
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012019011020190111
CachePrefix
:2019011020190111:
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012019011020190111
CacheLimit
8192
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012019011020190111
CacheOptions
11
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012019011020190111
CacheRepair
0
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\WindowsSearch
UpgradeTime
1EAE7CACFEA8D401
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\WindowsSearch
UpgradeTime
972B7EACFEA8D401
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url1
http://23.plainfieldinforsale.com/
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url2
http://fb.com/
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url3
amazon.co.uk
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url4
paypal.com
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url5
pwwysydh.com
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url6
mozilla.org
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url7
time.com
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url8
alsbbora.com
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url9
liputan
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url10
bukalapak.com
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url11
glassdoor.com
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url12
google.com.pe
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url13
pairade.com
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url14
kaskus.co.id
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url15
google.az
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url16
nba.com
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url17
biobiochile.cl
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url18
haber
3272
iexplore.exe
delete key
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\LowCache\Extensible Cache\MSHist012018082820180829
3272
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\LowCache\Extensible Cache\MSHist012019011020190111
CachePath
%USERPROFILE%\AppData\Local\Microsoft\Windows\History\Low\History.IE5\MSHist012019011020190111
3272
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\LowCache\Extensible Cache\MSHist012019011020190111
CachePrefix
:2019011020190111:
3272
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\LowCache\Extensible Cache\MSHist012019011020190111
CacheLimit
8192
3272
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\LowCache\Extensible Cache\MSHist012019011020190111
CacheOptions
11
3272
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\LowCache\Extensible Cache\MSHist012019011020190111
CacheRepair
0

Files activity

Executable files
0
Suspicious files
4
Text files
31
Unknown types
2

Dropped files

PID
Process
Filename
Type
2856
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\favicon[1].ico
––
MD5:  ––
SHA256:  ––
3272
iexplore.exe
C:\Users\admin\AppData\Local\Temp\Low\TarCE86.tmp
––
MD5:  ––
SHA256:  ––
2856
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\favicon[1].gif
––
MD5:  ––
SHA256:  ––
3272
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\BWPPCY0O\23_plainfieldinforsale_com[1].txt
html
MD5: 3b58f13cc48e019fd6b2d6996ca90b68
SHA256: 143286fc70923318f6074d0e35d9e428bd5ab8ff711a27fd8d4c6102d7701f0e
3272
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\amex_eqty[1].jfif
image
MD5: 43aa68519d3c44e5b76c9c0cb0b2bea1
SHA256: 0fcaa93bd9f2e1d6e8ef6e3a65fd7cf584c169bc1c9ad447fa4c0f8ac6a630ef
3272
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\nav-content[1].css
text
MD5: 92f38e52027488654b64815ab8c5df31
SHA256: 36aaf36573849de99e48f65cdbce707bd346c19c89fa6533af91eee14dc7f839
3272
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\bootstrap[1].css
text
MD5: 6e5b774abcd4dbe77aecc259e9d7991a
SHA256: 0b07f045cfd1e0ae8ba72159eeb1d521da5c01052e46f1a674e4682b20ce14ea
3272
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\default[2].css
text
MD5: ac68822416e37e9f52ad332ee450cf21
SHA256: d221309764d1d8b94534a805187afc1d976297ed6cc4de47f5509f7c3da6ddd9
3272
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\nav-content[2].css
text
MD5: 92f38e52027488654b64815ab8c5df31
SHA256: 36aaf36573849de99e48f65cdbce707bd346c19c89fa6533af91eee14dc7f839
3272
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\custom[1].css
text
MD5: be6a68b22bd61a032466711e62e2f205
SHA256: 752243f1655525a7b3ad884b3f1aa1b93c7b4ca1d0b85980cd16d3803c606130
3272
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\styles[1].css
text
MD5: 883148b407d78d4482cbccdd28c90417
SHA256: 145137bda6c272fa3d6e1458b041f2ec9dc55b8e0fd74434b45975269c641acc
3272
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2ZG9DE0\cardmembt[1].php
––
MD5:  ––
SHA256:  ––
3272
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2ZG9DE0\cardmembt[1].htm
html
MD5: 96e449b6a7ace76f9fde59c9d103ef1a
SHA256: c5746cf30ddada0ead0215cf7eb8babd1f608514ce969fd9b3ec36f31f13b3c2
2856
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019011020190111\index.dat
dat
MD5: 8b31b154bf8bc1e349475f169f637627
SHA256: 9dfc6d3ec427491fa0b5d2a2fe6e1c8536b7318725ea25d393f2e707470666a9
3272
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\MSHist012019011020190111\index.dat
dat
MD5: 025e9b76b2bba3cacbd06aa5d324beef
SHA256: 376996c1eeffb58b74b71337b2111e7cb4ee55f099b98f49bc4b7cfa2942dab5
3272
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\tcc_l.combined.1.0.6.min[1].js
text
MD5: ee887a633917e8b3d698620c323d28ba
SHA256: aa5c1ec4d2ea00eb517eadeb3b65e55b577b7a5ed42d7c2611d15d9050c18350
3272
iexplore.exe
C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
binary
MD5: cb391cd343cb8f3a6f0ae425cf412484
SHA256: 53ac30c066a1d5a873659ec996f46aca82623b0a7af55b1fa0ed1d666489222e
3272
iexplore.exe
C:\Users\admin\AppData\Local\Temp\Low\TarEA42.tmp
––
MD5:  ––
SHA256:  ––
3272
iexplore.exe
C:\Users\admin\AppData\Local\Temp\Low\CabEA41.tmp
––
MD5:  ––
SHA256:  ––
3272
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\BWPPCY0O\gt[1].htm
html
MD5: 1e41dcab26168a507b71325a36a4e107
SHA256: 367515a7d8369072c9017c25d1d0278ae42e9645103ca3e44490cba85a77c834
3272
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\gt[1].php
––
MD5:  ––
SHA256:  ––
3272
iexplore.exe
C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
compressed
MD5: a902cf373e02f7dc34f456ed7449279c
SHA256: ea0c12aedea644678014991a96534145e85aa12cd8955396dfdc98a4fc96f0d5
3272
iexplore.exe
C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
binary
MD5: 330b0ff3e5f4a067783cde7e825a38fa
SHA256: f87f6fe5fd3145b327bf7511d6b1bf812e2415bf7e3a692b6154879ec527fae4
3272
iexplore.exe
C:\Users\admin\AppData\Local\Temp\Low\TarCEA9.tmp
––
MD5:  ––
SHA256:  ––
3272
iexplore.exe
C:\Users\admin\AppData\Local\Temp\Low\CabCE99.tmp
––
MD5:  ––
SHA256:  ––
3272
iexplore.exe
C:\Users\admin\AppData\Local\Temp\Low\TarCE98.tmp
––
MD5:  ––
SHA256:  ––
3272
iexplore.exe
C:\Users\admin\AppData\Local\Temp\Low\CabCE97.tmp
––
MD5:  ––
SHA256:  ––
2856
iexplore.exe
C:\Users\admin\AppData\Local\Temp\StructuredQuery.log
text
MD5: 9e2d30774bbd856f8bdbaf6c1c93896c
SHA256: 116ed15dba65bf345f7d2ace29dc5772d80fa0235f08f8132f6b818f342c424f
3272
iexplore.exe
C:\Users\admin\AppData\Local\Temp\Low\CabCE85.tmp
––
MD5:  ––
SHA256:  ––
3272
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2ZG9DE0\footerGradient[1].png
image
MD5: c029558c6ced0b16889308854a292c88
SHA256: 432d7b47777bc6905505ac2df7a05bff824bff142968586bba9938196c06c745
3272
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\BWPPCY0O\business[1].png
image
MD5: 7d7f492c1c84ef901f57a020a60a99d0
SHA256: 91988a1a55704e5ef02c92234b25384303b5bc851e5251acbaab6d6dedb25e1c
3272
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\rewards[1].png
image
MD5: ec3c25f9710dc8783a5c1fa36e7839b5
SHA256: d2865dd9acf599ee949b1a0b71951fc73ef8a8db403386539fa308069ba605d0
3272
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\insurance[1].png
image
MD5: cf2c130517c864f074f16b54b9cde9a5
SHA256: 3ee3d8296893d177b07bfa777920b686335e4ef5403249ad6f0a5fd5d15af53e
3272
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2ZG9DE0\cards[1].png
image
MD5: bde4a1b2f72854adc3c8b2d0c1cdaa70
SHA256: 3304a008df6a4e6d41d444d3e4a2eb8f518678f402666096cfd9c8b492bdc494
3272
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\BWPPCY0O\main-bg-tile[1].jpg
image
MD5: d17b0e6a94f921a8a2f50d44ac39cd9c
SHA256: 8a10cc04f97b3849d10a405263bda0b615421e62b0bc32c02cac99c70e2f997c
3272
iexplore.exe
C:\Users\admin\AppData\Local\Temp\Low\Tar93CD.tmp
––
MD5:  ––
SHA256:  ––
3272
iexplore.exe
C:\Users\admin\AppData\Local\Temp\Low\Cab93CC.tmp
––
MD5:  ––
SHA256:  ––
3272
iexplore.exe
C:\Users\admin\AppData\Local\Temp\Low\Tar93AC.tmp
––
MD5:  ––
SHA256:  ––
3272
iexplore.exe
C:\Users\admin\AppData\Local\Temp\Low\Cab93AB.tmp
––
MD5:  ––
SHA256:  ––
3272
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2ZG9DE0\23_plainfieldinforsale_com[1].txt
html
MD5: 3b58f13cc48e019fd6b2d6996ca90b68
SHA256: 143286fc70923318f6074d0e35d9e428bd5ab8ff711a27fd8d4c6102d7701f0e
3272
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2ZG9DE0\nav-content[1].css
text
MD5: 92f38e52027488654b64815ab8c5df31
SHA256: 36aaf36573849de99e48f65cdbce707bd346c19c89fa6533af91eee14dc7f839
3272
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\BWPPCY0O\amex_eqty[1].jfif
image
MD5: 43aa68519d3c44e5b76c9c0cb0b2bea1
SHA256: 0fcaa93bd9f2e1d6e8ef6e3a65fd7cf584c169bc1c9ad447fa4c0f8ac6a630ef
3272
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\bootstrap[1].css
text
MD5: 6e5b774abcd4dbe77aecc259e9d7991a
SHA256: 0b07f045cfd1e0ae8ba72159eeb1d521da5c01052e46f1a674e4682b20ce14ea
3272
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\BWPPCY0O\equity-logo[1].png
image
MD5: 4f3fdbf10cbcf38eed221ab5a952e55d
SHA256: 6ee01e793c48d046ef050c714acfdf04e943f79b17cff3983262ea820e23e0ed
3272
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\amex-logo[1].gif
image
MD5: 4dc2311148cea88bd3a7a2eb782032cb
SHA256: 128f465ce476ddda9cb9fa6da55982a8c6e7e132659cada4944b21038685eb94
3272
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\mobileTitle[1].png
image
MD5: f61396c2a0309dad55a6bf9f0e9d8be6
SHA256: 77df63d5473a641a5fd6cb25970f6bd64016259822502999b6100a02a42dd658
3272
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\custom[1].css
text
MD5: be6a68b22bd61a032466711e62e2f205
SHA256: 752243f1655525a7b3ad884b3f1aa1b93c7b4ca1d0b85980cd16d3803c606130
3272
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\default[1].css
text
MD5: ac68822416e37e9f52ad332ee450cf21
SHA256: d221309764d1d8b94534a805187afc1d976297ed6cc4de47f5509f7c3da6ddd9
3272
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\nav-content[1].css
text
MD5: 92f38e52027488654b64815ab8c5df31
SHA256: 36aaf36573849de99e48f65cdbce707bd346c19c89fa6533af91eee14dc7f839
3272
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\styles[1].css
text
MD5: 883148b407d78d4482cbccdd28c90417
SHA256: 145137bda6c272fa3d6e1458b041f2ec9dc55b8e0fd74434b45975269c641acc
3272
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\23_plainfieldinforsale_com[1].txt
––
MD5:  ––
SHA256:  ––
3272
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\23_plainfieldinforsale_com[1].htm
html
MD5: 3b58f13cc48e019fd6b2d6996ca90b68
SHA256: 143286fc70923318f6074d0e35d9e428bd5ab8ff711a27fd8d4c6102d7701f0e
2856
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\favicon[3].png
image
MD5: 9fb559a691078558e77d6848202f6541
SHA256: 6d8a01dc7647bc218d003b58fe04049e24a9359900b7e0cebae76edf85b8b914
2856
iexplore.exe
C:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
––
MD5:  ––
SHA256:  ––
2856
iexplore.exe
C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\favicon[1].ico
––
MD5:  ––
SHA256:  ––

Find more information of the staic content and download it at the full report

Network activity

HTTP(S) requests
62
TCP/UDP connections
26
DNS requests
4
Threats
2

HTTP requests

PID Process Method HTTP Code IP URL CN Type Size Reputation
2856 iexplore.exe GET 200 204.79.197.200:80 http://www.bing.com/favicon.ico US
image
whitelisted
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/ US
html
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/inav_ngi_nested.css US
html
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/nav-content.css US
text
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/default.css US
text
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/bootstrap-theme.css US
html
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/main.css US
html
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/normalize.css US
html
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/styles.css US
text
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/custom.css US
text
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/bootstrap.css US
text
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/mobileTitle.png US
image
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/amex-logo.gif US
image
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/amex_eqty.jfif US
image
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/equity-logo.png US
image
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/nav-content.css?)%20format("embedded-opentype"),%20url()%20format("woff"),%20url()%20format("truetype" US
text
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/?)%20format("embedded-opentype"),%20url(/)%20format("woff"),%20url()%20format("truetype" US
html
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/fonts/glyphicons-halflings-regular.eot? US
html
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/main-bg-tile.jpg US
image
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/cards.png US
image
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/rewards.png US
image
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/insurance.png US
image
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/business.png US
image
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/kenyaflag.png US
html
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/footerGradient.png US
image
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/headShadowLeft.png US
html
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/headerShadowRight.png US
html
suspicious
3272 iexplore.exe GET 200 205.185.216.10:80 http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab US
compressed
whitelisted
3272 iexplore.exe GET 200 205.185.216.10:80 http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/B51C067CEE2B0C3DF855AB2D92F4FE39D4E70F0E.crt US
der
whitelisted
2856 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/favicon.ico US
image
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/cardmembt.php US
html
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/inav_ngi_nested.css US
html
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/nav-content.css US
text
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/main.css US
html
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/normalize.css US
html
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/styles.css US
text
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/default.css US
text
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/custom.css US
text
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/bootstrap.css US
text
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/bootstrap-theme.css US
html
suspicious
3272 iexplore.exe GET 304 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/mobileTitle.png US
compressed
suspicious
3272 iexplore.exe GET 304 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/amex-logo.gif US
html
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/amex_eqty.jfif US
image
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/nav-content.css?)%20format("embedded-opentype"),%20url()%20format("woff"),%20url()%20format("truetype" US
text
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/?)%20format("embedded-opentype"),%20url(/)%20format("woff"),%20url()%20format("truetype" US
html
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/fonts/glyphicons-halflings-regular.eot? US
html
suspicious
3272 iexplore.exe GET 304 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/main-bg-tile.jpg US
html
suspicious
3272 iexplore.exe GET 304 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/cards.png US
compressed
suspicious
3272 iexplore.exe GET 304 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/rewards.png US
compressed
suspicious
3272 iexplore.exe GET 304 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/insurance.png US
compressed
suspicious
3272 iexplore.exe GET 304 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/business.png US
compressed
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/kenyaflag.png US
html
suspicious
3272 iexplore.exe GET 304 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/footerGradient.png US
html
suspicious
2856 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/favicon.ico US
image
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/headShadowLeft.png US
html
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/headerShadowRight.png US
html
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/normalize.css US
html
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/inav_ngi_nested.css US
html
suspicious
3272 iexplore.exe GET –– 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/main.css US
––
––
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/bootstrap-theme.css US
html
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/fonts/glyphicons-halflings-regular.eot? US
html
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/kenyaflag.png US
html
suspicious

Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID Process IP ASN CN Reputation
2856 iexplore.exe 204.79.197.200:80 Microsoft Corporation US whitelisted
3272 iexplore.exe 148.72.62.89:80 US suspicious
3272 iexplore.exe 104.103.108.60:443 Akamai Technologies, Inc. NL whitelisted
3272 iexplore.exe 205.185.216.42:80 Highwinds Network Group, Inc. US whitelisted
3272 iexplore.exe 205.185.216.10:80 Highwinds Network Group, Inc. US whitelisted
2856 iexplore.exe 148.72.62.89:80 US suspicious

DNS requests

Domain IP Reputation
www.bing.com 204.79.197.200
13.107.21.200
whitelisted
23.plainfieldinforsale.com 148.72.62.89
suspicious
img1.wsimg.com 104.103.108.60
unknown
www.download.windowsupdate.com 205.185.216.42
205.185.216.10
205.185.216.10
205.185.216.10
whitelisted

Threats

No threats detected.

Debug output strings

No debug info.