analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://github.com/EarsKilla/Steam-Account-Generator/releases

Full analysis: https://app.any.run/tasks/a151ea93-f9aa-4963-ac12-c3fcba7185eb
Verdict: Malicious activity
Analysis date: February 04, 2022, 11:09:13
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

0D4F27DBD9B44FD92E81B828EE534788

SHA1:

A53B57C309D00E919BF58DD5013FE18AAEAB96E5

SHA256:

10F67C94F21D094158DF1C5D37F32EC21670A7CC6834433FA037BE48A07AE0AC

SSDEEP:

3:N8tEd3mhd0aOE2n:2u5knOrn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • SteamAccCreator.exe (PID: 976)
      • Setup.exe (PID: 1376)
      • ndp48-web.exe (PID: 3768)
      • SetupUtility.exe (PID: 912)
      • ndp48-web.exe (PID: 3044)
      • SetupUtility.exe (PID: 2860)
    • Actions looks like stealing of personal data

      • ndp48-web.exe (PID: 3768)
    • Loads dropped or rewritten executable

      • Setup.exe (PID: 1376)
    • Drops executable file immediately after starts

      • ndp48-web.exe (PID: 3768)
  • SUSPICIOUS

    • Reads the computer name

      • WinRAR.exe (PID: 3952)
      • ndp48-web.exe (PID: 3768)
      • Setup.exe (PID: 1376)
      • SetupUtility.exe (PID: 912)
      • SetupUtility.exe (PID: 2860)
      • TMPD2CA.tmp.exe (PID: 2072)
    • Checks supported languages

      • WinRAR.exe (PID: 3952)
      • SteamAccCreator.exe (PID: 976)
      • SetupUtility.exe (PID: 912)
      • ndp48-web.exe (PID: 3768)
      • Setup.exe (PID: 1376)
      • SetupUtility.exe (PID: 2860)
      • TMPD2CA.tmp.exe (PID: 2072)
    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 2244)
      • iexplore.exe (PID: 3128)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3952)
      • iexplore.exe (PID: 3744)
      • iexplore.exe (PID: 3128)
      • ndp48-web.exe (PID: 3768)
      • TMPD2CA.tmp.exe (PID: 2072)
    • Drops a file that was compiled in debug mode

      • iexplore.exe (PID: 3128)
      • iexplore.exe (PID: 3744)
      • WinRAR.exe (PID: 3952)
      • ndp48-web.exe (PID: 3768)
    • Drops a file with a compile date too recent

      • WinRAR.exe (PID: 3952)
    • Reads Environment values

      • Setup.exe (PID: 1376)
    • Reads CPU info

      • Setup.exe (PID: 1376)
  • INFO

    • Checks supported languages

      • iexplore.exe (PID: 3744)
      • iexplore.exe (PID: 2244)
      • iexplore.exe (PID: 3128)
    • Reads the computer name

      • iexplore.exe (PID: 3744)
      • iexplore.exe (PID: 2244)
      • iexplore.exe (PID: 3128)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2244)
      • iexplore.exe (PID: 3744)
      • iexplore.exe (PID: 3128)
      • Setup.exe (PID: 1376)
    • Creates files in the user directory

      • iexplore.exe (PID: 2244)
      • iexplore.exe (PID: 3128)
      • iexplore.exe (PID: 3744)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 3744)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 2244)
      • iexplore.exe (PID: 3744)
      • iexplore.exe (PID: 3128)
      • Setup.exe (PID: 1376)
    • Application launched itself

      • iexplore.exe (PID: 3744)
    • Changes internet zones settings

      • iexplore.exe (PID: 3744)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2244)
      • iexplore.exe (PID: 3128)
    • Dropped object may contain Bitcoin addresses

      • iexplore.exe (PID: 3128)
      • SetupUtility.exe (PID: 912)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 3744)
    • Changes settings of System certificates

      • iexplore.exe (PID: 3744)
    • Reads the date of Windows installation

      • iexplore.exe (PID: 3744)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
50
Monitored processes
11
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start drop and start iexplore.exe iexplore.exe winrar.exe steamacccreator.exe no specs iexplore.exe ndp48-web.exe no specs ndp48-web.exe setup.exe setuputility.exe no specs setuputility.exe no specs tmpd2ca.tmp.exe

Process information

PID
CMD
Path
Indicators
Parent process
3744"C:\Program Files\Internet Explorer\iexplore.exe" "https://github.com/EarsKilla/Steam-Account-Generator/releases"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
2244"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3744 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\iertutil.dll
3952"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\DEV-windows-2.1.1.zip"C:\Program Files\WinRAR\WinRAR.exe
iexplore.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
976"C:\Users\admin\AppData\Local\Temp\Rar$EXa3952.15927\SteamAccCreator.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3952.15927\SteamAccCreator.exeWinRAR.exe
User:
admin
Company:
@DedSec1337
Integrity Level:
MEDIUM
Description:
SteamAccountGenerator
Exit code:
2148734720
Version:
2.1.1
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3952.15927\steamacccreator.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3128"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3744 CREDAT:3544365 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
3044"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\ndp48-web.exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\ndp48-web.exeiexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Framework 4.8 Setup
Exit code:
3221226540
Version:
4.8.04115.00
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\po2hn1x2\ndp48-web.exe
c:\windows\system32\ntdll.dll
3768"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\ndp48-web.exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\ndp48-web.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft .NET Framework 4.8 Setup
Version:
4.8.04115.00
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\po2hn1x2\ndp48-web.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\rpcrt4.dll
1376C:\58e1eeaac7ba15117a\\Setup.exe /x86 /x64 /webC:\58e1eeaac7ba15117a\Setup.exe
ndp48-web.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Setup Installer
Version:
14.8.4110.0 built by: NET48REL1LAST_B
Modules
Images
c:\58e1eeaac7ba15117a\setup.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ntdll.dll
c:\58e1eeaac7ba15117a\setupengine.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
912SetupUtility.exe /aupauseC:\58e1eeaac7ba15117a\SetupUtility.exeSetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft .NET Framework 4.5 Setup
Exit code:
0
Version:
14.8.4110.0 built by: NET48REL1LAST_B
Modules
Images
c:\58e1eeaac7ba15117a\setuputility.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2860SetupUtility.exe /screbootC:\58e1eeaac7ba15117a\SetupUtility.exeSetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft .NET Framework 4.5 Setup
Exit code:
0
Version:
14.8.4110.0 built by: NET48REL1LAST_B
Modules
Images
c:\58e1eeaac7ba15117a\setuputility.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
28 631
Read events
28 362
Write events
266
Delete events
3

Modification events

(PID) Process:(3744) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(3744) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(3744) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30939575
(PID) Process:(3744) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(3744) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30939575
(PID) Process:(3744) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3744) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3744) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3744) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3744) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
74
Suspicious files
29
Text files
158
Unknown types
26

Dropped files

PID
Process
Filename
Type
2244iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\light-764b98156fab6bcc984addf8d9ee6924[1].csstext
MD5:5AEA45CDC1C70BB203DF458BAECB4F45
SHA256:6F2CDD415F1D8FE4F9ED028A39CD920D5B86B7C9CEBB6AE76B70874179712348
2244iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\NUFVLZQ1.txttext
MD5:78E58857A6362A29E2F631F153F08B2D
SHA256:A3AAFEE3C0482E93BEE3CE738782BBFA15804FC01BFDD7C3528CEB19E0069E55
2244iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:3B37D7C7E9C084BA4F1005E509025F84
SHA256:CBA7CC52D21B89E549DB80779A9DE577FC06B08F7565F89AD2B12FB211E4E4E7
2244iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C20E0DA2D0F89FE526E1490F4A2EE5ABbinary
MD5:446D13A5DE9AE8FA8C332D54D9578DD7
SHA256:1F53BEC084521B5947A953DFCE062A9D86B2C66BC8122A6A54738F7345C147D3
2244iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\17800772[1].jpgimage
MD5:D080FF49E7F72AE92A267324D6757537
SHA256:173DB13BC4057534C32F75086D3F8C3EDF542E5C73A0C15C825153C814B408A1
2244iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2A7611428D62805A3E4E5BC4103D82E4_D0FA13DADFB59BDF00C474952E166CC1der
MD5:860310F350567ADE934CFBB33F830220
SHA256:224E4524FB4565539F85886A6A1AF0A44ACEF88E47534F57CA253048AE2D5CF1
2244iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04binary
MD5:A699F09C72B469655324548D4508437D
SHA256:BF74873526597A3319F00C6042487325B7BED3548717B4210FA0E4D0B254F2E2
2244iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\behaviors-2f55d612807773e61530b4cb5141d70a[1].csstext
MD5:BC24B958EF16F2E5D01355423459CE6B
SHA256:F8999372A6E866DAD34D8B97BC3206FFF9D5C03F46BA69D427412E032C432BFB
2244iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\12B578593FDE07EC53D020B1D5DEBF3B_5D74C2DB556F94499BCD6D74A36958A3der
MD5:48D84C391B05C4C18DC6CBCB31E19E97
SHA256:D3708010635F02686AB281F112560644D497ED48E87485BC1A78B9AE1FF78C81
2244iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\tab-size-fix-30224561f6d0a13e045c2e9a5b1e5682[1].csstext
MD5:6E8D07142334B17B10652CD5C277746C
SHA256:25B2EF9F4DC3BCF3B5CDFCAFDB61946F5E5F813576010AACFBF4D12CBE05D27C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
20
TCP/UDP connections
74
DNS requests
31
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
872
svchost.exe
HEAD
302
104.111.242.51:80
http://go.microsoft.com/fwlink/?prd=11324&pver=netfx&sbp=Net48Rel1&plcid=0x409&clcid=0x409&ar=03761.00&sar=x86&o1=netfx_Full.mzz
NL
whitelisted
872
svchost.exe
HEAD
302
104.111.242.51:80
http://go.microsoft.com/fwlink/?prd=11324&pver=netfx&sbp=Net48Rel1&plcid=0x409&clcid=0x409&ar=03761.00&sar=amd64&o1=netfx_Full_x86.msi
NL
whitelisted
872
svchost.exe
GET
302
104.111.242.51:80
http://go.microsoft.com/fwlink/?prd=11324&pver=netfx&sbp=Net48Rel1&plcid=0x409&clcid=0x409&ar=03761.00&sar=amd64&o1=netfx_Full_x86.msi
NL
whitelisted
2244
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTGMlruL6P9M9B3if1rTM7wyj%2FQKQQUUGGmoNI1xBEqII0fD6xC8M0pz0sCEA6L83cNktGW8Lth%2BTxBZr4%3D
US
der
279 b
whitelisted
872
svchost.exe
GET
302
104.111.242.51:80
http://go.microsoft.com/fwlink/?prd=11324&pver=netfx&sbp=Net48Rel1&plcid=0x409&clcid=0x409&ar=03761.00&sar=x86&o1=netfx_Full.mzz
NL
whitelisted
3744
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA177el9ggmWelJjG4vdGL0%3D
US
der
471 b
whitelisted
2244
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEAZnA1u7FP1jr8DWqFNO%2FhY%3D
US
der
471 b
whitelisted
3128
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA9bw6F2y3ieICDHiTyBZ7Q%3D
US
der
1.47 Kb
whitelisted
2244
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbY2QTVWENG9oovp1QifsQ%3D
US
der
471 b
whitelisted
3128
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAxq6XzO1ZmDhpCgCp6lMhQ%3D
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3744
iexplore.exe
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
2244
iexplore.exe
185.199.109.133:443
avatars.githubusercontent.com
GitHub, Inc.
NL
malicious
2244
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3744
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2244
iexplore.exe
185.199.108.154:443
github.githubassets.com
GitHub, Inc.
NL
suspicious
2244
iexplore.exe
95.140.236.128:80
ctldl.windowsupdate.com
Limelight Networks, Inc.
GB
malicious
2244
iexplore.exe
140.82.121.4:443
github.com
US
malicious
3744
iexplore.exe
185.199.108.154:443
github.githubassets.com
GitHub, Inc.
NL
suspicious
2244
iexplore.exe
185.199.109.154:443
github.githubassets.com
GitHub, Inc.
NL
suspicious
3744
iexplore.exe
152.199.19.161:443
r20swj13mr.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted

DNS requests

Domain
IP
Reputation
github.com
  • 140.82.121.4
shared
api.bing.com
  • 13.107.13.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ctldl.windowsupdate.com
  • 95.140.236.128
  • 178.79.242.128
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
github.githubassets.com
  • 185.199.108.154
  • 185.199.109.154
  • 185.199.111.154
  • 185.199.110.154
whitelisted
avatars.githubusercontent.com
  • 185.199.109.133
  • 185.199.110.133
  • 185.199.111.133
  • 185.199.108.133
whitelisted
github-cloud.s3.amazonaws.com
  • 52.216.18.88
  • 52.217.132.153
shared
user-images.githubusercontent.com
  • 185.199.108.133
  • 185.199.111.133
  • 185.199.110.133
  • 185.199.109.133
whitelisted
objects.githubusercontent.com
  • 185.199.111.133
  • 185.199.110.133
  • 185.199.109.133
  • 185.199.108.133
shared

Threats

No threats detected
No debug info