URL: | https://iyxwfree.my.id/watch-streaming?video=heres-bethany-and-becca-leaked-original-videos |
Full analysis: | https://app.any.run/tasks/2aedc41d-644e-4458-9c6d-774cab20224f |
Verdict: | Malicious activity |
Analysis date: | December 14, 2024, 01:45:35 |
OS: | Windows 10 Professional (build: 19045, 64 bit) |
Tags: | |
Indicators: | |
MD5: | 8D44AEF2AE946202D4A0B523F94F9443 |
SHA1: | 9DF5E35014663AE171EF25D4933A7D103729C4BB |
SHA256: | 4B1F14FB49D7CBDFC04BB30C1A3A4B622C5F79AF1991539B6CDA01D7A85025AA |
SSDEEP: | 3:N8NhKgXhIKtfTW6ArEoIiBIaEI1IOkKW:2NjRIWb0EViBIwCxN |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
4792 | "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2604 --field-trial-handle=2320,i,16194277592197507296,15814343983252007256,262144 --variations-seed-version /prefetch:3 | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | msedge.exe | |
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Edge Version: 122.0.2365.59 |
PID | Process | Filename | Type | |
---|---|---|---|---|
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000c2 | text | |
MD5:F7A3F9191F03956B18B5397CDA19E6E9 | SHA256:56BD3B192A44E8C544FA54B329F9EA99F3D738A3417E9498D969ABA8DCA77043 | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000be | binary | |
MD5:D17B5A55EC9D8608C1D2B531CCB6DE88 | SHA256:DC2A3600C7CDFAEA40DB03757D6915D67518215DB51397C8A5BB3F132AE89A49 | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000c0 | compressed | |
MD5:D3B6473D81674F69497B253867F8C83A | SHA256:35F512CCD8E200B36468DDFA3B98977EFFD07F254D015A2A84E809357ECF18DC | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\b61b029b-cfde-4ff2-8d33-bd53a2c9d9b3.tmp | binary | |
MD5:ED74D0CC3CAB53CA501F3CD6C50FAA1A | SHA256:331BB0DA5A3BE7843A14503DA9547E7309F3631916C6112882FF36D75025E7EE | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000c4 | image | |
MD5:3682A875DADEE259646725731154F8D3 | SHA256:C415439AF17C5031A70271252F2FA97D4E097D04BFEF298CABE38565A41CF21E | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000c5 | binary | |
MD5:43881A474AB80EA6F793DB5211D28CF1 | SHA256:E50BBFA9012881B4393AB4989A200E78647EE3AE3C0D1FF4BB0F80E6B4BB7BD0 | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000c1 | compressed | |
MD5:B985CE78C3C8F433F0C0662818E36DBB | SHA256:AC7AE0C497ABB3F7314A8B076CFEB3697C58675E389E1CB4A6F4173B622E004A | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State | binary | |
MD5:ED74D0CC3CAB53CA501F3CD6C50FAA1A | SHA256:331BB0DA5A3BE7843A14503DA9547E7309F3631916C6112882FF36D75025E7EE | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\TransportSecurity~RF2b5d90.TMP | binary | |
MD5:15D26FA4E16467BE658F42074AC0DBAA | SHA256:D287407BD901A32E3F38F4392984507184D596C3694FAA69DD0B2E68F9F3A8FE | |||
4792 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000bf | binary | |
MD5:7E3E44049654B6E244C1777E68FFB8E7 | SHA256:4ACAC8B8FF23671D365150818F3C39BBBFA08B1A1842D73DE5933E0FEA26454B |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
— | — | HEAD | 200 | 184.30.17.174:443 | https://fs.microsoft.com/fs/windows/config.json | unknown | — | — | — |
1816 | svchost.exe | GET | 200 | 23.216.77.6:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
4304 | MoUsoCoreWorker.exe | GET | 200 | 23.216.77.6:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
2768 | RUXIMICS.exe | GET | 200 | 23.216.77.6:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | — | 35.156.207.12:443 | https://proftrafficcounter.com/stats | unknown | — | — | — |
1816 | svchost.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
2768 | RUXIMICS.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
4304 | MoUsoCoreWorker.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | OPTIONS | 204 | 172.217.16.196:443 | https://haychalk.com/pixel/pure | unknown | — | — | — |
— | — | GET | 307 | 172.217.16.196:443 | https://flusoprano.com/watch.69927687628.js?key=81b0542cd4b8eb93ce90a4c5369a0a1c&kw=%5B%22watch%22%2C%22now%22%2C%22download%22%5D&refer=https%3A%2F%2Fiyxwfree.my.id%2Fwatch-streaming%2F%3Fvideo%3Dheres-bethany-and-becca-leaked-original-videos&tz=0&dev=r&res=14.31&rb=&uuid= | unknown | — | — | — |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
— | — | 224.0.0.251:5353 | — | — | — | unknown |
1816 | svchost.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
2768 | RUXIMICS.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4304 | MoUsoCoreWorker.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4792 | msedge.exe | 104.208.16.88:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | US | unknown |
5988 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4792 | msedge.exe | 104.21.48.1:443 | iyxwfree.my.id | CLOUDFLARENET | — | unknown |
4792 | msedge.exe | 104.18.10.207:443 | stackpath.bootstrapcdn.com | — | — | whitelisted |
4792 | msedge.exe | 172.240.108.76:443 | pl22894307.highcpmgate.com | — | US | unknown |
4792 | msedge.exe | 172.240.253.132:443 | pl22894307.highcpmgate.com | SERVERS-COM | US | unknown |
Domain | IP | Reputation |
---|---|---|
google.com |
| whitelisted |
iyxwfree.my.id |
| unknown |
stackpath.bootstrapcdn.com |
| whitelisted |
pl22894307.highcpmgate.com |
| unknown |
seduceboozeblackmail.com |
| unknown |
www.topcreativeformat.com |
| unknown |
www.bing.com |
| whitelisted |
fs.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Not Suspicious Traffic | INFO [ANY.RUN] Web apps custom Builder (.my .id) |
— | — | Not Suspicious Traffic | INFO [ANY.RUN] Web apps custom Builder (.my .id) |
— | — | Not Suspicious Traffic | INFO [ANY.RUN] BootstrapCDN (stackpath .bootstrapcdn .com) |
— | — | Not Suspicious Traffic | INFO [ANY.RUN] BootstrapCDN (stackpath .bootstrapcdn .com) |
— | — | Not Suspicious Traffic | INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code .jquery .com) |
— | — | Not Suspicious Traffic | INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code .jquery .com) |
— | — | Not Suspicious Traffic | INFO [ANY.RUN] Cloudflare content delivery network (cdnjs .cloudflare .com) |
— | — | Not Suspicious Traffic | INFO [ANY.RUN] Cloudflare content delivery network (cdnjs .cloudflare .com) |
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspected Phishing domain by CrossDomain (tributeparticle .com) |
— | — | Possible Social Engineering Attempted | PHISHING [ANY.RUN] Suspected Phishing domain by CrossDomain (tributeparticle .com) |