General Info Watch the FULL Interactive Analysis at ANY.RUN!

URL

http://23.plainfieldinforsale.com/

Verdict
Malicious activity
Analysis date
1/10/2019, 17:07:20
OS:
Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
phishing
Indicators:

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distored by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.

Software environment set and analysis options

Launch configuration

Task duration
180 seconds
Additional time used
120 seconds
Fakenet option
off
Heavy Evaision option
off
MITM proxy
off
Route via Tor
off
Network geolocation
off
Privacy
Public submission
Autoconfirmation of UAC
on

Software preset

  • Internet Explorer 8.0.7601.17514
  • Adobe Acrobat Reader DC MUI (15.023.20070)
  • Adobe Flash Player 26 ActiveX (26.0.0.131)
  • Adobe Flash Player 26 NPAPI (26.0.0.131)
  • Adobe Flash Player 26 PPAPI (26.0.0.131)
  • Adobe Refresh Manager (1.8.0)
  • CCleaner (5.35)
  • FileZilla Client 3.36.0 (3.36.0)
  • Google Chrome (68.0.3440.106)
  • Google Update Helper (1.3.33.17)
  • Java 8 Update 92 (8.0.920.14)
  • Java Auto Updater (2.8.92.14)
  • Microsoft .NET Framework 4.6.1 (4.6.01055)
  • Microsoft Office Access MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Access Setup Metadata MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Excel MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office OneNote MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Outlook MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office PowerPoint MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Professional 2010 (14.0.6029.1000)
  • Microsoft Office Proof (English) 2010 (14.0.6029.1000)
  • Microsoft Office Proof (French) 2010 (14.0.6029.1000)
  • Microsoft Office Proof (Spanish) 2010 (14.0.6029.1000)
  • Microsoft Office Proofing (English) 2010 (14.0.6029.1000)
  • Microsoft Office Publisher MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Shared MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Shared Setup Metadata MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Single Image 2010 (14.0.6029.1000)
  • Microsoft Office Word MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (9.0.30729.6161)
  • Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219 (10.0.40219)
  • Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.30501 (12.0.30501.0)
  • Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005 (12.0.21005)
  • Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005 (12.0.21005)
  • Microsoft Visual C++ 2017 Redistributable (x86) - 14.15.26706 (14.15.26706.0)
  • Microsoft Visual C++ 2017 x86 Additional Runtime - 14.15.26706 (14.15.26706)
  • Microsoft Visual C++ 2017 x86 Minimum Runtime - 14.15.26706 (14.15.26706)
  • Mozilla Firefox 61.0.2 (x86 en-US) (61.0.2)
  • Notepad++ (32-bit x86) (7.5.1)
  • Opera 12.15 (12.15.1748)
  • Skype version 8.29 (8.29)
  • VLC media player (2.2.6)
  • WinRAR 5.60 (32-bit) (5.60.0)

Hotfixes

  • Client LanguagePack Package
  • Client Refresh LanguagePack Package
  • CodecPack Basic Package
  • Foundation Package
  • IE Troubleshooters Package
  • InternetExplorer Optional Package
  • KB2534111
  • KB2999226
  • KB976902
  • LocalPack AU Package
  • LocalPack CA Package
  • LocalPack GB Package
  • LocalPack US Package
  • LocalPack ZA Package
  • ProfessionalEdition
  • UltimateEdition

Behavior activities

MALICIOUS SUSPICIOUS INFO

No malicious indicators.

No suspicious indicators.

Changes internet zones settings
  • iexplore.exe (PID: 2856)
Application launched itself
  • iexplore.exe (PID: 2856)
Reads Internet Cache Settings
  • iexplore.exe (PID: 2856)
  • iexplore.exe (PID: 3272)
Reads internet explorer settings
  • iexplore.exe (PID: 3272)
Creates files in the user directory
  • iexplore.exe (PID: 3272)

Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Screenshots

Processes

Total processes
33
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

+
start iexplore.exe iexplore.exe
Specs description
Program did not start
Integrity level elevation
Task сontains an error or was rebooted
Process has crashed
Task contains several apps running
Executable file was dropped
Debug information is available
Process was injected
Network attacks were detected
Application downloaded the executable file
Actions similar to stealing personal data
Behavior similar to exploiting the vulnerability
Inspected object has sucpicious PE structure
File is detected by antivirus software
CPU overrun
RAM overrun
Process starts the services
Process was added to the startup
Behavior similar to spam
Low-level access to the HDD
Probably Tor was used
System was rebooted
Connects to the network
Known threat

Process information

Click at the process to see the details.

PID
2856
CMD
"C:\Program Files\Internet Explorer\iexplore.exe" -nohome
Path
C:\Program Files\Internet Explorer\iexplore.exe
Indicators
Parent process
––
User
admin
Integrity Level
MEDIUM
Version:
Company
Microsoft Corporation
Description
Internet Explorer
Version
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Image
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\shell32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\psapi.dll
c:\windows\system32\oleacc.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\profapi.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\comdlg32.dll
c:\windows\system32\cryptbase.dll
c:\program files\internet explorer\sqmapi.dll
c:\windows\system32\rpcrtremote.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\rasman.dll
c:\windows\system32\rtutils.dll
c:\windows\system32\sensapi.dll
c:\windows\system32\nlaapi.dll
c:\windows\system32\rasadhlp.dll
c:\windows\system32\ieui.dll
c:\windows\system32\msimg32.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\clbcatq.dll
c:\program files\internet explorer\ieproxy.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\url.dll
c:\windows\system32\version.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\xmllite.dll
c:\windows\system32\propsys.dll
c:\windows\system32\explorerframe.dll
c:\windows\system32\duser.dll
c:\windows\system32\dui70.dll
c:\windows\system32\msfeeds.dll
c:\windows\system32\sxs.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\system32\normaliz.dll
c:\windows\system32\wship6.dll
c:\windows\system32\fwpuclnt.dll
c:\windows\system32\mlang.dll
c:\program files\common files\microsoft shared\ink\tiptsf.dll
c:\windows\system32\mssprxy.dll
c:\windows\system32\naturallanguage6.dll
c:\windows\system32\nlsdata0009.dll
c:\windows\system32\nlslexicons0009.dll
c:\windows\system32\tquery.dll
c:\windows\system32\structuredquery.dll
c:\windows\system32\secur32.dll

PID
3272
CMD
"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2856 CREDAT:71937
Path
C:\Program Files\Internet Explorer\iexplore.exe
Indicators
Parent process
iexplore.exe
User
admin
Integrity Level
LOW
Version:
Company
Microsoft Corporation
Description
Internet Explorer
Version
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Image
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\shell32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\ieframe.dll
c:\windows\system32\psapi.dll
c:\windows\system32\oleacc.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\comdlg32.dll
c:\program files\internet explorer\ieshims.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\rpcrtremote.dll
c:\program files\internet explorer\sqmapi.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\propsys.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\profapi.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\rsaenh.dll
c:\program files\internet explorer\ieproxy.dll
c:\windows\system32\nsi.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\dnsapi.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\winnsi.dll
c:\windows\system32\mlang.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\apphelp.dll
c:\program files\java\jre1.8.0_92\bin\ssv.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\version.dll
c:\progra~1\micros~1\office14\urlredir.dll
c:\windows\system32\secur32.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\progra~1\micros~1\office14\msohev.dll
c:\program files\java\jre1.8.0_92\bin\jp2ssv.dll
c:\program files\java\jre1.8.0_92\bin\msvcr100.dll
c:\program files\java\jre1.8.0_92\bin\deploy.dll
c:\windows\system32\imagehlp.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\sxs.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\rasman.dll
c:\windows\system32\rtutils.dll
c:\windows\system32\sensapi.dll
c:\windows\system32\nlaapi.dll
c:\windows\system32\rasadhlp.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\wshtcpip.dll
c:\windows\system32\normaliz.dll
c:\windows\system32\wship6.dll
c:\windows\system32\fwpuclnt.dll
c:\windows\system32\mshtml.dll
c:\windows\system32\msls31.dll
c:\windows\system32\userenv.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\schannel.dll
c:\windows\system32\msimtf.dll
c:\windows\system32\iepeers.dll
c:\windows\system32\winspool.drv
c:\windows\system32\credssp.dll
c:\windows\system32\t2embed.dll
c:\windows\system32\ncrypt.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\imgutil.dll
c:\windows\system32\pngfilt.dll
c:\windows\system32\gpapi.dll
c:\windows\system32\p2pcollab.dll
c:\windows\system32\qagentrt.dll
c:\windows\system32\fveui.dll
c:\windows\system32\jscript.dll
c:\windows\system32\cryptnet.dll
c:\windows\system32\cabinet.dll
c:\windows\system32\devrtl.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\webio.dll
c:\windows\system32\dhcpcsvc6.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\msimg32.dll
c:\windows\system32\winmm.dll
c:\windows\system32\mmdevapi.dll
c:\windows\system32\wdmaud.drv
c:\windows\system32\ksuser.dll
c:\windows\system32\avrt.dll
c:\windows\system32\audioses.dll
c:\windows\system32\msacm32.drv
c:\windows\system32\msacm32.dll
c:\windows\system32\midimap.dll

Registry activity

Total events
464
Read events
384
Write events
77
Delete events
3

Modification events

PID
Process
Operation
Key
Name
Value
2856
iexplore.exe
delete key
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012018082720180903
2856
iexplore.exe
delete key
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012018090920180910
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
CompatibilityFlags
0
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
SecuritySafe
1
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
ProxyEnable
0
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
SavedLegacySettings
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
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
{DB42877B-14F1-11E9-BAD8-5254004A04AF}
0
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Type
4
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Count
3
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Time
E307010004000A00100007002A003902
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{789FE86F-6FC4-46A1-9849-EDE0DB0C95CA}\iexplore
Type
4
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{789FE86F-6FC4-46A1-9849-EDE0DB0C95CA}\iexplore
Count
3
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{789FE86F-6FC4-46A1-9849-EDE0DB0C95CA}\iexplore
Time
E307010004000A00100007002A003902
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
FullScreen
no
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Window_Placement
2C0000000200000003000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF20000000200000004003000078020000
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Favorites\Links
Order
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
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\iexplore
Type
3
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\iexplore
Count
3
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\iexplore
Time
E307010004000A00100007002A000403
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{761497BB-D6F0-462C-B6EB-D4DAF1D92D43}\iexplore
LoadTime
16
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B4F3A835-0E21-4959-BA22-42B3008E02FF}\iexplore
Type
3
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B4F3A835-0E21-4959-BA22-42B3008E02FF}\iexplore
Count
3
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B4F3A835-0E21-4959-BA22-42B3008E02FF}\iexplore
Time
E307010004000A00100007002A004203
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{B4F3A835-0E21-4959-BA22-42B3008E02FF}\iexplore
LoadTime
37
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore
Type
3
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore
Count
3
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore
Time
E307010004000A00100007002A009103
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{DBC80044-A445-435B-BC74-9C25C1C588A9}\iexplore
LoadTime
35
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
Path
C:\Users\admin\Favorites\Links\Suggested Sites.url
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
Handler
{B0FA7D7C-7195-4F03-B03E-9DC1C9EBC394}
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
FeedUrl
https://ieonline.microsoft.com/#ieslice
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
DisplayName
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
ErrorState
0
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\0
DisplayMask
0
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
Path
C:\Users\admin\Favorites\Links\Web Slice Gallery.url
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
Handler
{B0FA7D7C-7195-4F03-B03E-9DC1C9EBC394}
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
FeedUrl
http://go.microsoft.com/fwlink/?LinkId=121315
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
DisplayName
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
ErrorState
0
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\LinksBar\ItemCache\1
DisplayMask
0
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012019011020190111
CachePath
%USERPROFILE%\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019011020190111
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012019011020190111
CachePrefix
:2019011020190111:
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012019011020190111
CacheLimit
8192
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012019011020190111
CacheOptions
11
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012019011020190111
CacheRepair
0
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\WindowsSearch
UpgradeTime
1EAE7CACFEA8D401
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\WindowsSearch
UpgradeTime
972B7EACFEA8D401
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url1
http://23.plainfieldinforsale.com/
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url2
http://fb.com/
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url3
amazon.co.uk
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url4
paypal.com
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url5
pwwysydh.com
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url6
mozilla.org
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url7
time.com
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url8
alsbbora.com
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url9
liputan
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url10
bukalapak.com
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url11
glassdoor.com
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url12
google.com.pe
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url13
pairade.com
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url14
kaskus.co.id
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url15
google.az
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url16
nba.com
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url17
biobiochile.cl
2856
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs
url18
haber
3272
iexplore.exe
delete key
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\LowCache\Extensible Cache\MSHist012018082820180829
3272
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\LowCache\Extensible Cache\MSHist012019011020190111
CachePath
%USERPROFILE%\AppData\Local\Microsoft\Windows\History\Low\History.IE5\MSHist012019011020190111
3272
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\LowCache\Extensible Cache\MSHist012019011020190111
CachePrefix
:2019011020190111:
3272
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\LowCache\Extensible Cache\MSHist012019011020190111
CacheLimit
8192
3272
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\LowCache\Extensible Cache\MSHist012019011020190111
CacheOptions
11
3272
iexplore.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\LowCache\Extensible Cache\MSHist012019011020190111
CacheRepair
0

Files activity

Executable files
0
Suspicious files
4
Text files
31
Unknown types
2

Dropped files

PID Process Filename Type
2856 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\favicon[1].ico ––
3272 iexplore.exe C:\Users\admin\AppData\Local\Temp\Low\TarCE86.tmp ––
2856 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\R9ZEWH8D\favicon[1].gif ––
3272 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\BWPPCY0O\23_plainfieldinforsale_com[1].txt html
3272 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\amex_eqty[1].jfif image
3272 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\nav-content[1].css text
3272 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\bootstrap[1].css text
3272 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\default[2].css text
3272 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\nav-content[2].css text
3272 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\custom[1].css text
3272 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\styles[1].css text
3272 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2ZG9DE0\cardmembt[1].php ––
3272 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2ZG9DE0\cardmembt[1].htm html
2856 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019011020190111\index.dat dat
3272 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\MSHist012019011020190111\index.dat dat
3272 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\tcc_l.combined.1.0.6.min[1].js text
3272 iexplore.exe C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 binary
3272 iexplore.exe C:\Users\admin\AppData\Local\Temp\Low\TarEA42.tmp ––
3272 iexplore.exe C:\Users\admin\AppData\Local\Temp\Low\CabEA41.tmp ––
3272 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\BWPPCY0O\gt[1].htm html
3272 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\gt[1].php ––
3272 iexplore.exe C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 binary
3272 iexplore.exe C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 compressed
3272 iexplore.exe C:\Users\admin\AppData\Local\Temp\Low\TarCEA9.tmp ––
3272 iexplore.exe C:\Users\admin\AppData\Local\Temp\Low\CabCE99.tmp ––
3272 iexplore.exe C:\Users\admin\AppData\Local\Temp\Low\TarCE98.tmp ––
3272 iexplore.exe C:\Users\admin\AppData\Local\Temp\Low\CabCE97.tmp ––
2856 iexplore.exe C:\Users\admin\AppData\Local\Temp\StructuredQuery.log text
3272 iexplore.exe C:\Users\admin\AppData\Local\Temp\Low\CabCE85.tmp ––
3272 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2ZG9DE0\footerGradient[1].png image
3272 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\BWPPCY0O\business[1].png image
3272 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\insurance[1].png image
3272 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\rewards[1].png image
3272 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2ZG9DE0\cards[1].png image
3272 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\BWPPCY0O\main-bg-tile[1].jpg image
3272 iexplore.exe C:\Users\admin\AppData\Local\Temp\Low\Tar93CD.tmp ––
3272 iexplore.exe C:\Users\admin\AppData\Local\Temp\Low\Cab93CC.tmp ––
3272 iexplore.exe C:\Users\admin\AppData\Local\Temp\Low\Tar93AC.tmp ––
3272 iexplore.exe C:\Users\admin\AppData\Local\Temp\Low\Cab93AB.tmp ––
3272 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2ZG9DE0\23_plainfieldinforsale_com[1].txt html
3272 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\U2ZG9DE0\nav-content[1].css text
3272 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\BWPPCY0O\amex_eqty[1].jfif image
3272 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\bootstrap[1].css text
3272 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\BWPPCY0O\equity-logo[1].png image
3272 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\mobileTitle[1].png image
3272 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\custom[1].css text
3272 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\PP6KS563\amex-logo[1].gif image
3272 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\styles[1].css text
3272 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\default[1].css text
3272 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\nav-content[1].css text
3272 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\23_plainfieldinforsale_com[1].txt ––
3272 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\OCDM6JB6\23_plainfieldinforsale_com[1].htm html
2856 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\favicon[3].png image
2856 iexplore.exe C:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico ––
2856 iexplore.exe C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\favicon[1].ico ––

Find more information of the staic content and download it at the full report

Network activity

HTTP(S) requests
62
TCP/UDP connections
26
DNS requests
4
Threats
2

HTTP requests

PID Process Method HTTP Code IP URL CN Type Size Reputation
2856 iexplore.exe GET 200 204.79.197.200:80 http://www.bing.com/favicon.ico US
image
whitelisted
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/ US
html
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/inav_ngi_nested.css US
html
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/default.css US
text
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/nav-content.css US
text
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/bootstrap-theme.css US
html
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/main.css US
html
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/normalize.css US
html
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/styles.css US
text
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/custom.css US
text
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/bootstrap.css US
text
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/mobileTitle.png US
image
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/amex-logo.gif US
image
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/amex_eqty.jfif US
image
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/equity-logo.png US
image
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/nav-content.css?)%20format("embedded-opentype"),%20url()%20format("woff"),%20url()%20format("truetype" US
text
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/?)%20format("embedded-opentype"),%20url(/)%20format("woff"),%20url()%20format("truetype" US
html
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/fonts/glyphicons-halflings-regular.eot? US
html
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/main-bg-tile.jpg US
image
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/cards.png US
image
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/rewards.png US
image
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/insurance.png US
image
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/business.png US
image
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/kenyaflag.png US
html
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/footerGradient.png US
image
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/headShadowLeft.png US
html
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/headerShadowRight.png US
html
suspicious
3272 iexplore.exe GET 200 205.185.216.10:80 http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab US
compressed
whitelisted
3272 iexplore.exe GET 200 205.185.216.10:80 http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/B51C067CEE2B0C3DF855AB2D92F4FE39D4E70F0E.crt US
der
whitelisted
2856 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/favicon.ico US
image
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/cardmembt.php US
html
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/inav_ngi_nested.css US
html
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/main.css US
html
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/nav-content.css US
text
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/normalize.css US
html
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/styles.css US
text
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/default.css US
text
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/custom.css US
text
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/bootstrap.css US
text
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/bootstrap-theme.css US
html
suspicious
3272 iexplore.exe GET 304 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/mobileTitle.png US
compressed
suspicious
3272 iexplore.exe GET 304 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/amex-logo.gif US
html
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/amex_eqty.jfif US
image
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/nav-content.css?)%20format("embedded-opentype"),%20url()%20format("woff"),%20url()%20format("truetype" US
text
suspicious
3272 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/?)%20format("embedded-opentype"),%20url(/)%20format("woff"),%20url()%20format("truetype" US
html
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/fonts/glyphicons-halflings-regular.eot? US
html
suspicious
3272 iexplore.exe GET 304 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/main-bg-tile.jpg US
html
suspicious
3272 iexplore.exe GET 304 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/cards.png US
compressed
suspicious
3272 iexplore.exe GET 304 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/rewards.png US
compressed
suspicious
3272 iexplore.exe GET 304 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/insurance.png US
compressed
suspicious
3272 iexplore.exe GET 304 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/business.png US
compressed
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/kenyaflag.png US
html
suspicious
3272 iexplore.exe GET 304 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/footerGradient.png US
html
suspicious
2856 iexplore.exe GET 200 148.72.62.89:80 http://23.plainfieldinforsale.com/favicon.ico US
image
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/headShadowLeft.png US
html
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/headerShadowRight.png US
html
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/normalize.css US
html
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/inav_ngi_nested.css US
html
suspicious
3272 iexplore.exe GET –– 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/main.css US
––
––
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/bootstrap-theme.css US
html
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/fonts/glyphicons-halflings-regular.eot? US
html
suspicious
3272 iexplore.exe GET 404 148.72.62.89:80 http://23.plainfieldinforsale.com/American%20Express%20Corporate%20Payment%20Solutions_files/kenyaflag.png US
html
suspicious

Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID Process IP ASN CN Reputation
2856 iexplore.exe 204.79.197.200:80 Microsoft Corporation US whitelisted
3272 iexplore.exe 148.72.62.89:80 US suspicious
3272 iexplore.exe 104.103.108.60:443 Akamai Technologies, Inc. NL whitelisted
3272 iexplore.exe 205.185.216.42:80 Highwinds Network Group, Inc. US whitelisted
3272 iexplore.exe 205.185.216.10:80 Highwinds Network Group, Inc. US whitelisted
2856 iexplore.exe 148.72.62.89:80 US suspicious

DNS requests

Domain IP Reputation
www.bing.com 204.79.197.200
13.107.21.200
whitelisted
23.plainfieldinforsale.com 148.72.62.89
suspicious
img1.wsimg.com 104.103.108.60
unknown
www.download.windowsupdate.com 205.185.216.42
205.185.216.10
205.185.216.10
205.185.216.10
whitelisted

Threats

No threats detected.

Debug output strings

No debug info.