URL:

go.xlivrdr.com

Full analysis: https://app.any.run/tasks/d96c042d-7d03-4efc-bf24-56f06ffb7404
Verdict: Malicious activity
Analysis date: December 24, 2023, 11:37:39
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

B1F68DB2A8C8B3757CDEB9090E9F941D

SHA1:

C3902BC11717D03A1988844D907EDD7D84B2CBBA

SHA256:

1D753931E4D2A60A7D513326D85F6F03C84ED0D156AC73CABF50CAF7B510108A

SSDEEP:

3:CNLKn:SK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 2044)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
36
Monitored processes
2
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
864"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2044 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2044"C:\Program Files\Internet Explorer\iexplore.exe" "go.xlivrdr.com"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
Total events
11 303
Read events
11 239
Write events
62
Delete events
2

Modification events

(PID) Process:(2044) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
0
(PID) Process:(2044) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30847387
(PID) Process:(2044) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30847437
(PID) Process:(2044) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2044) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2044) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2044) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2044) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2044) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2044) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
33
Suspicious files
7
Text files
159
Unknown types
1

Dropped files

PID
Process
Filename
Type
864iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\CO2ZQRAVtext
MD5:FDA44910DEB1A460BE4AC5D56D61D837
SHA256:933B971C6388D594A23FA1559825DB5BEC8ADE2DB1240AA8FC9D0C684949E8C9
864iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\W2OKSOZN.htmhtml
MD5:FD57AC7421F85AD368783BEED585F003
SHA256:3CDFA7756E92129C9E9B65FCAA5654EE8DD128E692AB51DBDE3B902ADC3938DB
864iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\ID4VDTS1.txttext
MD5:1A8B5C0927F4ADE3FB4F319C3482B6EF
SHA256:3C2DB76EF6DEAAD2D2EEC5B5D111276126C1DD5A57CB8140DD56A7BF8E0FB66F
864iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27binary
MD5:1CB6D13E7DC487383716A9BF664F9FB7
SHA256:DC679CB521026B3FBF902D421E15C764072F3E8A3A60281CE36F4017D5389C9C
864iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157compressed
MD5:1BFE591A4FE3D91B03CDF26EAACD8F89
SHA256:9CF94355051BF0F4A45724CA20D1CC02F76371B963AB7D1E38BD8997737B13D8
864iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:D6968DEDFD4CE339A7CA6AEC6AA314B7
SHA256:8FE8358CD33189FEC4772E9E02EF981A8DD2068CE6AFA0CEFB0A70EB191ABDF4
864iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27binary
MD5:A3439917990E5CD5314D5A740519AEE0
SHA256:C080B9412C1BB875CB3E4B4FB963E8D960624FD6B7988475F03A8215E8D2E6FD
864iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\2LMTBDRH.txttext
MD5:23E6322F3D7051444D60E8199FF23CA8
SHA256:E4C8B8A8CBA358DCB97935E786CFCD686B40D98F40DD5F2F51E70883FFF73B14
864iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\L1KM5Q0I.txttext
MD5:D95DC732CA1B11940E952C113141BB5A
SHA256:75DCA3A494FED2EF19E87AE3F9AA776DDC80363F0C97C51CCC292FA9A7866A7A
864iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\F8GBWEWU.txttext
MD5:BB0A15EBAE0A525717D7F36EC90BEA51
SHA256:842B2028F4242992B2426C26C29E297781AAF5F30A411B149329071FC331C19F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
36
DNS requests
11
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
864
iexplore.exe
GET
301
104.18.51.106:80
http://go.xlivrdr.com/
unknown
unknown
864
iexplore.exe
GET
200
2.19.126.137:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?ac001728309fb1e2
unknown
compressed
4.66 Kb
unknown
864
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D
unknown
binary
1.47 Kb
unknown
2044
iexplore.exe
GET
304
2.19.126.137:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?1a6e676fbb64f2cc
unknown
unknown
2044
iexplore.exe
GET
304
2.19.126.137:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?56a48ccbaf965781
unknown
unknown
2044
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAzlnDD9eoNTLi0BRrMy%2BWU%3D
unknown
binary
313 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
864
iexplore.exe
104.18.51.106:80
go.xlivrdr.com
CLOUDFLARENET
shared
4
System
192.168.100.255:138
whitelisted
864
iexplore.exe
104.18.51.106:443
go.xlivrdr.com
CLOUDFLARENET
shared
1080
svchost.exe
224.0.0.252:5355
unknown
864
iexplore.exe
2.19.126.137:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
unknown
864
iexplore.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
864
iexplore.exe
104.18.63.130:443
stripchat.com
CLOUDFLARENET
unknown
864
iexplore.exe
104.18.63.124:443
assets.strpst.com
CLOUDFLARENET
unknown
864
iexplore.exe
104.18.63.132:443
assets.strpst.com
CLOUDFLARENET
shared

DNS requests

Domain
IP
Reputation
go.xlivrdr.com
  • 104.18.51.106
  • 104.18.59.150
unknown
ctldl.windowsupdate.com
  • 2.19.126.137
  • 2.19.126.163
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
stripchat.com
  • 104.18.63.130
  • 104.18.63.126
malicious
assets.strpst.com
  • 104.18.63.132
  • 104.18.63.124
unknown
img.strpst.com
  • 104.18.63.132
  • 104.18.63.124
malicious
static-cdn.strpst.com
  • 104.18.63.124
  • 104.18.63.132
unknown
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 2.16.100.128
  • 2.16.100.131
  • 2.16.100.129
  • 2.16.100.66
  • 2.16.101.66
  • 2.16.100.136
  • 2.16.100.145
  • 2.16.100.144
  • 2.16.100.65
whitelisted

Threats

No threats detected
No debug info