URL:

https://linkvertise.com/73936/xspammer?o=sharing

Full analysis: https://app.any.run/tasks/ab2bfe40-0070-4ee6-a9d8-d2f1cc207d6f
Verdict: Malicious activity
Analysis date: August 02, 2021, 16:14:23
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

DF061CF396FE6CAA5649E210D5407080

SHA1:

DEFF1BA48D466C536255534A509E5EC0A783842C

SHA256:

77A7327397CE6BF529413A2A5D4F1A079BDAFC98199DEB41CD991992FB866F7B

SSDEEP:

3:N8MLRBXAyTKlcRFAXbC:2MNi2fiC

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • XSpammer - Linkvertise Downloader_yG-hd21.exe (PID: 592)
      • XSpammer - Linkvertise Downloader_yG-hd21.exe (PID: 2576)
    • Drops executable file immediately after starts

      • XSpammer - Linkvertise Downloader_yG-hd21.exe (PID: 592)
      • XSpammer - Linkvertise Downloader_yG-hd21.exe (PID: 2576)
      • XSpammer Setup.exe (PID: 1060)
    • Loads dropped or rewritten executable

      • XSpammer Setup.exe (PID: 1060)
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 4036)
      • iexplore.exe (PID: 504)
    • Modifies files in Chrome extension folder

      • chrome.exe (PID: 2728)
    • Executable content was dropped or overwritten

      • chrome.exe (PID: 2728)
      • chrome.exe (PID: 544)
      • XSpammer - Linkvertise Downloader_yG-hd21.exe (PID: 592)
      • XSpammer - Linkvertise Downloader_yG-hd21.exe (PID: 2576)
      • XSpammer - Linkvertise Downloader_yG-hd21.tmp (PID: 2540)
      • XSpammer Setup.exe (PID: 1060)
    • Checks supported languages

      • XSpammer - Linkvertise Downloader_yG-hd21.exe (PID: 592)
      • XSpammer - Linkvertise Downloader_yG-hd21.tmp (PID: 3056)
      • XSpammer - Linkvertise Downloader_yG-hd21.exe (PID: 2576)
      • XSpammer - Linkvertise Downloader_yG-hd21.tmp (PID: 2540)
      • WinRAR.exe (PID: 268)
      • XSpammer Setup.exe (PID: 1060)
    • Reads the computer name

      • XSpammer - Linkvertise Downloader_yG-hd21.tmp (PID: 3056)
      • XSpammer - Linkvertise Downloader_yG-hd21.tmp (PID: 2540)
      • XSpammer Setup.exe (PID: 1060)
      • WinRAR.exe (PID: 268)
    • Reads the Windows organization settings

      • XSpammer - Linkvertise Downloader_yG-hd21.tmp (PID: 2540)
    • Drops a file with too old compile date

      • XSpammer - Linkvertise Downloader_yG-hd21.tmp (PID: 2540)
    • Reads Windows owner or organization settings

      • XSpammer - Linkvertise Downloader_yG-hd21.tmp (PID: 2540)
    • Drops a file that was compiled in debug mode

      • XSpammer - Linkvertise Downloader_yG-hd21.tmp (PID: 2540)
    • Starts Internet Explorer

      • XSpammer - Linkvertise Downloader_yG-hd21.tmp (PID: 2540)
  • INFO

    • Reads the computer name

      • iexplore.exe (PID: 2608)
      • iexplore.exe (PID: 4036)
      • chrome.exe (PID: 2728)
      • chrome.exe (PID: 2800)
      • chrome.exe (PID: 544)
      • chrome.exe (PID: 2804)
      • chrome.exe (PID: 3168)
      • chrome.exe (PID: 3628)
      • chrome.exe (PID: 3140)
      • chrome.exe (PID: 2092)
      • chrome.exe (PID: 3932)
      • explorer.exe (PID: 4084)
      • chrome.exe (PID: 2248)
      • chrome.exe (PID: 2396)
      • chrome.exe (PID: 2824)
      • iexplore.exe (PID: 2060)
      • iexplore.exe (PID: 504)
      • taskmgr.exe (PID: 2060)
    • Checks supported languages

      • iexplore.exe (PID: 2608)
      • iexplore.exe (PID: 4036)
      • chrome.exe (PID: 2800)
      • chrome.exe (PID: 2728)
      • chrome.exe (PID: 2472)
      • chrome.exe (PID: 544)
      • chrome.exe (PID: 648)
      • chrome.exe (PID: 2816)
      • chrome.exe (PID: 3044)
      • chrome.exe (PID: 3264)
      • chrome.exe (PID: 2804)
      • chrome.exe (PID: 3208)
      • chrome.exe (PID: 3168)
      • chrome.exe (PID: 3748)
      • chrome.exe (PID: 3052)
      • chrome.exe (PID: 2212)
      • chrome.exe (PID: 2200)
      • chrome.exe (PID: 2176)
      • chrome.exe (PID: 2872)
      • chrome.exe (PID: 3628)
      • chrome.exe (PID: 2092)
      • chrome.exe (PID: 3140)
      • chrome.exe (PID: 3604)
      • chrome.exe (PID: 3704)
      • chrome.exe (PID: 280)
      • chrome.exe (PID: 3676)
      • chrome.exe (PID: 3932)
      • chrome.exe (PID: 3684)
      • chrome.exe (PID: 2212)
      • chrome.exe (PID: 740)
      • chrome.exe (PID: 2684)
      • chrome.exe (PID: 2696)
      • chrome.exe (PID: 2248)
      • chrome.exe (PID: 1496)
      • chrome.exe (PID: 2376)
      • chrome.exe (PID: 2824)
      • chrome.exe (PID: 2396)
      • chrome.exe (PID: 3092)
      • chrome.exe (PID: 3608)
      • chrome.exe (PID: 364)
      • iexplore.exe (PID: 2060)
      • iexplore.exe (PID: 504)
      • chrome.exe (PID: 2460)
      • explorer.exe (PID: 4084)
      • taskmgr.exe (PID: 2060)
    • Changes internet zones settings

      • iexplore.exe (PID: 2608)
      • iexplore.exe (PID: 2060)
    • Application launched itself

      • iexplore.exe (PID: 2608)
      • chrome.exe (PID: 2728)
      • iexplore.exe (PID: 2060)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 4036)
      • iexplore.exe (PID: 2608)
      • chrome.exe (PID: 544)
      • chrome.exe (PID: 2728)
      • XSpammer - Linkvertise Downloader_yG-hd21.tmp (PID: 2540)
      • iexplore.exe (PID: 2060)
      • iexplore.exe (PID: 504)
    • Reads the date of Windows installation

      • iexplore.exe (PID: 2608)
      • chrome.exe (PID: 2092)
      • iexplore.exe (PID: 2060)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 4036)
      • iexplore.exe (PID: 2608)
      • chrome.exe (PID: 2728)
      • iexplore.exe (PID: 2060)
      • iexplore.exe (PID: 504)
    • Manual execution by user

      • chrome.exe (PID: 2728)
      • explorer.exe (PID: 4084)
      • XSpammer Setup.exe (PID: 1060)
      • taskmgr.exe (PID: 2060)
    • Reads the hosts file

      • chrome.exe (PID: 2728)
      • chrome.exe (PID: 544)
    • Changes settings of System certificates

      • chrome.exe (PID: 544)
      • iexplore.exe (PID: 2060)
    • Application was dropped or rewritten from another process

      • XSpammer - Linkvertise Downloader_yG-hd21.tmp (PID: 2540)
      • XSpammer - Linkvertise Downloader_yG-hd21.tmp (PID: 3056)
    • Loads dropped or rewritten executable

      • XSpammer - Linkvertise Downloader_yG-hd21.tmp (PID: 2540)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 2060)
    • Creates files in the user directory

      • iexplore.exe (PID: 2060)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2060)
    • Dropped object may contain Bitcoin addresses

      • iexplore.exe (PID: 2060)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
97
Monitored processes
51
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start iexplore.exe iexplore.exe chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs explorer.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs xspammer - linkvertise downloader_yg-hd21.exe chrome.exe no specs xspammer - linkvertise downloader_yg-hd21.tmp no specs chrome.exe no specs xspammer - linkvertise downloader_yg-hd21.exe xspammer - linkvertise downloader_yg-hd21.tmp iexplore.exe iexplore.exe chrome.exe no specs winrar.exe no specs xspammer setup.exe taskmgr.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
268"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\78RFYB7Z\XSpammer_5E914.rar"C:\Program Files\WinRAR\WinRAR.exeiexplore.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
HIGH
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\program files\winrar\winrar.exe
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
c:\windows\system32\shlwapi.dll
280"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1036,4404791895560796337,12992134674830711863,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2040 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\program files\google\chrome\application\86.0.4240.198\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\api-ms-win-downlevel-shell32-l1-1-0.dll
c:\windows\system32\shell32.dll
364"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1036,4404791895560796337,12992134674830711863,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4628 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\86.0.4240.198\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\api-ms-win-downlevel-shell32-l1-1-0.dll
c:\windows\system32\shell32.dll
504"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2060 CREDAT:275457 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
544"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1036,4404791895560796337,12992134674830711863,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1324 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\program files\google\chrome\application\86.0.4240.198\chrome_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-shell32-l1-1-0.dll
c:\windows\system32\version.dll
c:\windows\system32\shell32.dll
592"C:\Users\admin\Downloads\XSpammer - Linkvertise Downloader_yG-hd21.exe" C:\Users\admin\Downloads\XSpammer - Linkvertise Downloader_yG-hd21.exe
chrome.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Marc Winter
Exit code:
0
Version:
1.4.1
Modules
Images
c:\users\admin\downloads\xspammer - linkvertise downloader_yg-hd21.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\user32.dll
c:\windows\system32\usp10.dll
648"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1036,4404791895560796337,12992134674830711863,131072 --enable-features=PasswordImport --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1932 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\86.0.4240.198\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-shell32-l1-1-0.dll
c:\windows\system32\shell32.dll
740"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1036,4404791895560796337,12992134674830711863,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=868 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\86.0.4240.198\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\api-ms-win-downlevel-shell32-l1-1-0.dll
c:\windows\system32\shell32.dll
1060"C:\Users\admin\Desktop\XSpammer\XSpammer Setup.exe" C:\Users\admin\Desktop\XSpammer\XSpammer Setup.exe
Explorer.EXE
User:
admin
Company:
Indxgo Development
Integrity Level:
MEDIUM
Description:
A feature-packed nuke bot with a slick and modern user-interface.
Exit code:
2
Version:
1.0.0
Modules
Images
c:\users\admin\desktop\xspammer\xspammer setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
1496"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1036,4404791895560796337,12992134674830711863,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4140 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\86.0.4240.198\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\api-ms-win-downlevel-shell32-l1-1-0.dll
c:\windows\system32\shell32.dll
Total events
57 792
Read events
57 340
Write events
436
Delete events
16

Modification events

(PID) Process:(2608) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(2608) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(2608) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30902201
(PID) Process:(2608) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(2608) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30902201
(PID) Process:(2608) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2608) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2608) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2608) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2608) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
9
Suspicious files
199
Text files
295
Unknown types
28

Dropped files

PID
Process
Filename
Type
2728chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-61081A02-AA8.pma
MD5:
SHA256:
4036iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:
SHA256:
2608iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Last Active\RecoveryStore.{42C873D0-1D90-11EB-BA2C-12A9866C77DE}.datbinary
MD5:
SHA256:
2608iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFA2ADBAB6EABDCE6A.TMPgmc
MD5:
SHA256:
2608iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFA5AA2867F235EBA4.TMPgmc
MD5:
SHA256:
2608iexplore.exeC:\Users\admin\AppData\Local\Temp\~DFF3F0E51D9A429267.TMPgmc
MD5:
SHA256:
2608iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{BD34BA34-F3AC-11EB-8F0C-18C4897E77EE}.datbinary
MD5:
SHA256:
2608iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF36A5EE36AA4834DF.TMPgmc
MD5:
SHA256:
2608iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Last Active\{C5D6DE17-F3AC-11EB-8F0C-18C4897E77EE}.datbinary
MD5:
SHA256:
2608iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\RecoveryStore.{BD34BA32-F3AC-11EB-8F0C-18C4897E77EE}.datbinary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
25
TCP/UDP connections
236
DNS requests
146
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
904
svchost.exe
HEAD
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYTQ3QUFYQzF5VF9DcWNsa0ZkMGdTQmdvQQ/1.0.0.8_llkgjffcdpffmhiakmfcdcblohccpfmo.crx
US
whitelisted
904
svchost.exe
HEAD
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/deblni2wo6646pqyb633d2jvlm_2021.7.19.1143/ggkkehgbnfjpeggfpleeakpidbkibbmn_2021.7.19.1143_all_bjn6q745zymzjliphpkxmd63hu.crx3
US
whitelisted
904
svchost.exe
GET
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYTQ3QUFYQzF5VF9DcWNsa0ZkMGdTQmdvQQ/1.0.0.8_llkgjffcdpffmhiakmfcdcblohccpfmo.crx
US
crx
2.85 Kb
whitelisted
904
svchost.exe
HEAD
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/APhHMzuprJvS7ixvnAk_gdI_1/anGnv31dmOJhheXBnYQ3gw
US
crx
2.85 Kb
whitelisted
2608
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2BnRyLFPYjID1ie%2Bx%2BdSjo%3D
US
der
1.47 Kb
whitelisted
904
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/APhHMzuprJvS7ixvnAk_gdI_1/anGnv31dmOJhheXBnYQ3gw
US
binary
7.50 Kb
whitelisted
904
svchost.exe
GET
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYTQ3QUFYQzF5VF9DcWNsa0ZkMGdTQmdvQQ/1.0.0.8_llkgjffcdpffmhiakmfcdcblohccpfmo.crx
US
crx
2.85 Kb
whitelisted
904
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/APhHMzuprJvS7ixvnAk_gdI_1/anGnv31dmOJhheXBnYQ3gw
US
binary
9.82 Kb
whitelisted
904
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/APhHMzuprJvS7ixvnAk_gdI_1/anGnv31dmOJhheXBnYQ3gw
US
binary
10.0 Kb
whitelisted
504
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2608
iexplore.exe
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
2608
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
544
chrome.exe
142.250.185.195:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
544
chrome.exe
142.250.74.206:443
clients2.google.com
Google Inc.
US
whitelisted
544
chrome.exe
142.250.185.164:443
www.google.com
Google Inc.
US
whitelisted
544
chrome.exe
142.250.185.141:443
accounts.google.com
Google Inc.
US
whitelisted
544
chrome.exe
172.67.199.168:443
linkvertise.com
US
malicious
544
chrome.exe
142.250.186.74:443
fonts.googleapis.com
Google Inc.
US
whitelisted
544
chrome.exe
142.250.185.99:443
www.gstatic.com
Google Inc.
US
whitelisted
544
chrome.exe
142.250.186.35:443
fonts.gstatic.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
linkvertise.com
  • 104.21.21.174
  • 172.67.199.168
whitelisted
ctldl.windowsupdate.com
  • 8.248.135.254
  • 67.26.139.254
  • 8.253.204.120
  • 67.27.233.126
  • 67.27.234.126
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
crl3.digicert.com
  • 93.184.220.29
whitelisted
clientservices.googleapis.com
  • 142.250.185.195
whitelisted
accounts.google.com
  • 142.250.185.141
shared
clients2.google.com
  • 142.250.74.206
whitelisted
www.google.com
  • 142.250.185.164
malicious

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET INFO Observed DNS Query to .cloud TLD
No debug info