analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
download:

PADK502.swf

Full analysis: https://app.any.run/tasks/b6e00dc2-66d6-40de-94c8-0d21829f17d1
Verdict: Malicious activity
Analysis date: May 15, 2019, 09:08:19
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-shockwave-flash
File info: Macromedia Flash data (compressed), version 10
MD5:

E79CF4C5C86DBC2F73BCDE1278200E03

SHA1:

BDAEF65E1976349FC8792F1D1D6CB0C092C39612

SHA256:

556D83AF693316581F10690966943863DD05CA3FFEFC97424BB8F087D2FB5E50

SSDEEP:

384:1ENPr4gA/BtrNmp8dssbesk5mzaIWhcvYqGGQqUFcc75sIhfbJfUy5+:1ENPs/XRmSdgs+IcgYqGDqhcKiJfB+

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • flashplayer32ax_ra_install[1].exe (PID: 2820)
      • flashplayer32ax_ra_install[1].exe (PID: 3456)
      • gtcheck.exe (PID: 1860)
      • gccheck_small.exe (PID: 1900)
      • gccheck_small.exe (PID: 2724)
      • 4D8D4B61-8366-40E4-AD80-4F50E7E2AC27 (PID: 2576)
      • FlashPlayerUpdateService.exe (PID: 2912)
      • FlashPlayerUpdateService.exe (PID: 1244)
      • FlashPlayerUpdateService.exe (PID: 1520)
    • Changes settings of System certificates

      • flashplayer32ax_ra_install[1].exe (PID: 3456)
    • Loads the Task Scheduler COM API

      • FlashPlayerUpdateService.exe (PID: 2912)
      • FlashPlayerUpdateService.exe (PID: 1244)
    • Loads dropped or rewritten executable

      • 4D8D4B61-8366-40E4-AD80-4F50E7E2AC27 (PID: 2576)
      • iexplore.exe (PID: 3680)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 1088)
      • iexplore.exe (PID: 3336)
      • flashplayer32ax_ra_install[1].exe (PID: 2820)
      • 4D8D4B61-8366-40E4-AD80-4F50E7E2AC27 (PID: 2576)
    • Application launched itself

      • flashplayer32ax_ra_install[1].exe (PID: 2820)
    • Adds / modifies Windows certificates

      • flashplayer32ax_ra_install[1].exe (PID: 3456)
    • Creates files in the user directory

      • flashplayer32ax_ra_install[1].exe (PID: 2820)
    • Reads internet explorer settings

      • flashplayer32ax_ra_install[1].exe (PID: 2820)
    • Starts application with an unusual extension

      • flashplayer32ax_ra_install[1].exe (PID: 3456)
    • Modifies the open verb of a shell class

      • 4D8D4B61-8366-40E4-AD80-4F50E7E2AC27 (PID: 2576)
    • Creates files in the Windows directory

      • 4D8D4B61-8366-40E4-AD80-4F50E7E2AC27 (PID: 2576)
    • Creates a software uninstall entry

      • 4D8D4B61-8366-40E4-AD80-4F50E7E2AC27 (PID: 2576)
    • Removes files from Windows directory

      • 4D8D4B61-8366-40E4-AD80-4F50E7E2AC27 (PID: 2576)
    • Disables SEHOP

      • 4D8D4B61-8366-40E4-AD80-4F50E7E2AC27 (PID: 2576)
    • Starts CMD.EXE for commands execution

      • 4D8D4B61-8366-40E4-AD80-4F50E7E2AC27 (PID: 2576)
  • INFO

    • Reads Internet Cache Settings

      • iexplore.exe (PID: 392)
      • iexplore.exe (PID: 1088)
      • iexplore.exe (PID: 3680)
      • iexplore.exe (PID: 1892)
    • Reads internet explorer settings

      • iexplore.exe (PID: 392)
      • iexplore.exe (PID: 1088)
      • iexplore.exe (PID: 3680)
      • iexplore.exe (PID: 1892)
    • Creates files in the user directory

      • iexplore.exe (PID: 1088)
      • iexplore.exe (PID: 3336)
      • FlashUtil32_26_0_0_131_ActiveX.exe (PID: 1812)
      • iexplore.exe (PID: 3680)
    • Changes internet zones settings

      • iexplore.exe (PID: 3336)
      • iexplore.exe (PID: 4076)
    • Dropped object may contain Bitcoin addresses

      • iexplore.exe (PID: 1088)
    • Application launched itself

      • iexplore.exe (PID: 3336)
      • iexplore.exe (PID: 4076)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3336)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 3336)
    • Changes settings of System certificates

      • iexplore.exe (PID: 3336)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.swf | Macromedia Flash Player Compressed Movie (100)

EXIF

Composite

Megapixels: 0.257
ImageSize: 660x390

Flash

FlashAttributes: ActionScript3
Duration: 1.00 s
FrameCount: 1
FrameRate: 1
ImageHeight: 390
ImageWidth: 660
Compressed:
FlashVersion: 10
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
66
Monitored processes
19
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start drop and start drop and start drop and start iexplore.exe iexplore.exe no specs iexplore.exe flashutil32_26_0_0_131_activex.exe no specs flashplayer32ax_ra_install[1].exe flashplayer32ax_ra_install[1].exe gtcheck.exe no specs gccheck_small.exe no specs gccheck_small.exe no specs 4d8d4b61-8366-40e4-ad80-4f50e7e2ac27 flashplayerupdateservice.exe no specs flashplayerupdateservice.exe no specs flashplayerupdateservice.exe no specs cmd.exe no specs iexplore.exe explorer.exe no specs explorer.exe no specs iexplore.exe iexplore.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3336"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\admin\AppData\Local\Temp\PADK502.swfC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
392"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3336 CREDAT:79873C:\Program Files\Internet Explorer\iexplore.exeiexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1088"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3336 CREDAT:203009C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1812C:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_26_0_0_131_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe® Flash® Player Installer/Uninstaller 26.0 r0
Exit code:
0
Version:
26,0,0,131
Modules
Images
c:\windows\system32\macromed\flash\flashutil32_26_0_0_131_activex.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2820"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\flashplayer32ax_ra_install[1].exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\flashplayer32ax_ra_install[1].exe
iexplore.exe
User:
admin
Company:
Adobe Inc
Integrity Level:
MEDIUM
Description:
Adobe Download Manager
Exit code:
0
Version:
2.0.0.363s
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\h6qnmhe9\flashplayer32ax_ra_install[1].exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
3456"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\flashplayer32ax_ra_install[1].exe" --pipename={54D7EBDD-3DEA-477B-B1B1-56F424721303} --pid=2820C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\flashplayer32ax_ra_install[1].exe
flashplayer32ax_ra_install[1].exe
User:
admin
Company:
Adobe Inc
Integrity Level:
HIGH
Description:
Adobe Download Manager
Exit code:
0
Version:
2.0.0.363s
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\h6qnmhe9\flashplayer32ax_ra_install[1].exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1860"C:\Users\admin\AppData\Local\Adobe\950EE43E-8831-4F28-9D72-2AD52B1A19C1\gtcheck.exe" C:\Users\admin\AppData\Local\Adobe\950EE43E-8831-4F28-9D72-2AD52B1A19C1\gtcheck.exeflashplayer32ax_ra_install[1].exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\adobe\950ee43e-8831-4f28-9d72-2ad52b1a19c1\gtcheck.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2724"C:\Users\admin\AppData\Local\Adobe\950EE43E-8831-4F28-9D72-2AD52B1A19C1\gccheck_small.exe" -chromeEligibilityTest -shellMode:standard C:\Users\admin\AppData\Local\Adobe\950EE43E-8831-4F28-9D72-2AD52B1A19C1\gccheck_small.exeflashplayer32ax_ra_install[1].exe
User:
admin
Company:
Google Inc.
Integrity Level:
MEDIUM
Description:
Google Chrome Pre-Install
Exit code:
2
Version:
1.0
Modules
Images
c:\users\admin\appdata\local\adobe\950ee43e-8831-4f28-9d72-2ad52b1a19c1\gccheck_small.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
1900"C:\Users\admin\AppData\Local\Adobe\950EE43E-8831-4F28-9D72-2AD52B1A19C1\gccheck_small.exe" -canOfferReactivation -shellMode:standard -brandCode:AFRC C:\Users\admin\AppData\Local\Adobe\950EE43E-8831-4F28-9D72-2AD52B1A19C1\gccheck_small.exeflashplayer32ax_ra_install[1].exe
User:
admin
Company:
Google Inc.
Integrity Level:
MEDIUM
Description:
Google Chrome Pre-Install
Exit code:
0
Version:
1.0
Modules
Images
c:\users\admin\appdata\local\adobe\950ee43e-8831-4f28-9d72-2ad52b1a19c1\gccheck_small.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
2576"C:\Users\admin\AppData\Local\Adobe\950EE43E-8831-4F28-9D72-2AD52B1A19C1\50B9A6D2-E1BA-4023-808D-1ABCE0BFF518\4D8D4B61-8366-40E4-AD80-4F50E7E2AC27" -install -iv 8 -au 1 C:\Users\admin\AppData\Local\Adobe\950EE43E-8831-4F28-9D72-2AD52B1A19C1\50B9A6D2-E1BA-4023-808D-1ABCE0BFF518\4D8D4B61-8366-40E4-AD80-4F50E7E2AC27
flashplayer32ax_ra_install[1].exe
User:
admin
Company:
Adobe
Integrity Level:
HIGH
Description:
Adobe® Flash® Player Installer/Uninstaller 32.0 r0
Exit code:
3
Version:
32,0,0,192
Modules
Images
c:\users\admin\appdata\local\adobe\950ee43e-8831-4f28-9d72-2ad52b1a19c1\50b9a6d2-e1ba-4023-808d-1abce0bff518\4d8d4b61-8366-40e4-ad80-4f50e7e2ac27
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
Total events
2 710
Read events
2 055
Write events
491
Delete events
164

Modification events

(PID) Process:(3336) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3336) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3336) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(3336) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(3336) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3336) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
4600000071000000010000000000000000000000000000000000000000000000C0E333BBEAB1D301000000000000000000000000020000001700000000000000FE800000000000007D6CB050D9C573F70B000000000000006D00330032005C004D00530049004D004700330032002E0064006C000100000004AA400014AA4000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000C0A8016400000000000000000000000000000000000000000800000000000000805D3F00983740000008000002000000000000600000002060040000B8A94000020000008802000060040000B8A9400004000000F8010000B284000088B64000B84B400043003A000000000000000000000000000000000000000000
(PID) Process:(3336) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Recovery\Active
Operation:writeName:{06871909-76F1-11E9-A09E-5254004A04AF}
Value:
0
(PID) Process:(3336) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Type
Value:
4
(PID) Process:(3336) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Count
Value:
1
(PID) Process:(3336) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Ext\Stats\{2670000A-7350-4F3C-8081-5663EE0C6C49}\iexplore
Operation:writeName:Time
Value:
E307050003000F00090008002700BC01
Executable files
12
Suspicious files
10
Text files
177
Unknown types
18

Dropped files

PID
Process
Filename
Type
3336iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\favicon[1].ico
MD5:
SHA256:
3336iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
1088iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\admin@bing[2].txt
MD5:
SHA256:
3336iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFC5E71333000664DB.TMP
MD5:
SHA256:
1088iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\1803SA0H\search[1].txt
MD5:
SHA256:
3336iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I0488CJO\favicon[1].ico
MD5:
SHA256:
1088iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\[email protected][1].txttext
MD5:B444BB2D250F707C30B9FE0B394A0E9C
SHA256:B6738F688BA0462DF2FCF9870A382EAAB22646D98F7926D8FAF11E7ADBF724E8
3336iexplore.exeC:\Users\admin\AppData\Local\Temp\StructuredQuery.logtext
MD5:D818564ECC80B0D3BF3ED475E37AC215
SHA256:B51BD33CCB1925F650D3E5D4E3289A3F714E833F09CCFDFF49FC233BC0F7038C
3336iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{0687190A-76F1-11E9-A09E-5254004A04AF}.datbinary
MD5:20D950A63DB566668B07795107AE7176
SHA256:4D220CF0F4FE497E81543405378349882004206A76592D0DCD36133A2623900F
1088iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\UB60WTIW\desktop.iniini
MD5:4A3DEB274BB5F0212C2419D3D8D08612
SHA256:2842973D15A14323E08598BE1DFB87E54BF88A76BE8C7BC94C56B079446EDF38
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
36
TCP/UDP connections
75
DNS requests
34
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1088
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/sa/simg/SharedSpriteDesktopRewards_022118.png
US
image
5.73 Kb
whitelisted
1088
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/fd/ls/l?IG=EBAF39316088469E89B66EDC3C52C015&CID=0425E5ADAD1F6CC809C7E8F0ACD56D28&Type=Event.ClientInst&DATA=[{"T":"CI.GetError","FID":"CI","Name":"JSGetError","Text":"%27SVGElement%27%20is%20undefined","Meta":"http%3A//www.bing.com/search%3Fq%3Dadobe+flsdhplayer%26src%3DIE-SearchBox%26FORM%3DIE8SRC","Line":9731743,"Char":%20undefined}]
US
compressed
181 b
whitelisted
1088
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/rb/5n/cj,nj/c44ec255/9a358300.js?bu=Eq0fzB_wHvUe4wSDH4Uf2B-HH44fmR_EH8Ifth-jHqwdrx2mHg
US
text
4.95 Kb
whitelisted
1088
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/rs/6q/4N/cj,nj/347afee2/33036ea1.js
US
text
1.77 Kb
whitelisted
1088
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/fd/ls/l?IG=EBAF39316088469E89B66EDC3C52C015&CID=0425E5ADAD1F6CC809C7E8F0ACD56D28&Type=Event.CPT&DATA={"pp":{"S":"L","FC":129,"BC":209,"SE":-1,"TC":-1,"H":287,"BP":365,"CT":381,"IL":3},"ad":[164,82,772,444,1089,498,0]}&P=SERP&DA=DUB02
US
image
5.73 Kb
whitelisted
1088
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/fd/ls/l?IG=EBAF39316088469E89B66EDC3C52C015&CID=0425E5ADAD1F6CC809C7E8F0ACD56D28&Type=Event.ClientInst&DATA=[{"T":"CI.GetError","FID":"CI","Name":"JSGetError","Text":"Member%20not%20found.%0D%0A","Meta":"http%3A//www.bing.com/rb/16/cj%2Cnj/1b7dfb88/cc8437ad.js%3Fbu%3DDikuX29zd2tjZ68BswEuowEu","Line":2,"Char":%20undefined}]
US
compressed
2.85 Kb
whitelisted
1088
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/search?q=adobe+flsdhplayer&src=IE-SearchBox&FORM=IE8SRC
US
html
36.9 Kb
whitelisted
1088
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/rs/32/21/cj,nj/4c7364c5/40e1b425.js
US
text
816 b
whitelisted
1088
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/rs/25/4a/cj,nj/76efe231/c6376e53.js
US
text
198 b
whitelisted
1088
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/rb/16/cj,nj/1b7dfb88/cc8437ad.js?bu=DikuX29zd2tjZ68BswEuowEu
US
text
7.54 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1088
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
1088
iexplore.exe
204.79.197.222:80
e25ad161165f1be2e25b8353d58ce8bc.clo.footprintdns.com
Microsoft Corporation
US
whitelisted
3336
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
1088
iexplore.exe
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
1088
iexplore.exe
94.245.88.12:80
7a6aa7eead06b11d8c9098bb3330b189.clo.footprintdns.com
Microsoft Corporation
IE
whitelisted
1088
iexplore.exe
65.52.7.224:80
5b3c6d009643ee5d830d0002a089f09c.clo.footprintdns.com
Microsoft Corporation
US
whitelisted
1088
iexplore.exe
65.55.163.90:443
login.live.com
Microsoft Corporation
US
unknown
1088
iexplore.exe
192.147.130.63:443
get.adobe.com
Adobe Systems Inc.
US
whitelisted
1088
iexplore.exe
2.16.123.22:443
wwwimages2.adobe.com
Akamai International B.V.
whitelisted
3336
iexplore.exe
192.147.130.63:443
get.adobe.com
Adobe Systems Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
login.live.com
  • 65.55.163.90
  • 65.55.163.91
  • 65.55.163.78
whitelisted
7a6aa7eead06b11d8c9098bb3330b189.clo.footprintdns.com
  • 94.245.88.12
unknown
5b3c6d009643ee5d830d0002a089f09c.clo.footprintdns.com
  • 65.52.7.224
unknown
e25ad161165f1be2e25b8353d58ce8bc.clo.footprintdns.com
  • 204.79.197.222
suspicious
fp.msedge.net
  • 204.79.197.222
whitelisted
get.adobe.com
  • 192.147.130.63
  • 193.104.215.66
whitelisted
wwwimages2.adobe.com
  • 2.16.123.22
whitelisted
fonts.adobe.com
  • 52.203.95.19
  • 35.169.161.115
whitelisted
assets.adobedtm.com
  • 23.210.248.45
whitelisted

Threats

No threats detected
No debug info