URL: | http://9stream.pw/stream_jw5.php?id=85&width=700&height=480&stretching=uniform |
Full analysis: | https://app.any.run/tasks/da136966-32ba-44e5-a17c-793a06c357a7 |
Verdict: | Malicious activity |
Analysis date: | February 18, 2019, 18:54:44 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MD5: | C6DADCA6FCF9361B03D68F8FCE0BA145 |
SHA1: | 05BA720C297B30B81EFCA5BFD47AE1676CF64DF4 |
SHA256: | 77E67AC2BFCD8037D6167CE36CC8C1D6BEC12619A3E34906EC5E490E28406ED1 |
SSDEEP: | 3:N1K2RuSHPSeVHSWJTVpWRYRDWQIZgJ:C2ESHqSfJTVpWYRKTgJ |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3020 | "C:\Program Files\Google\Chrome\Application\chrome.exe" http://9stream.pw/stream_jw5.php?id=85&width=700&height=480&stretching=uniform | C:\Program Files\Google\Chrome\Application\chrome.exe | explorer.exe | |
User: admin Company: Google Inc. Integrity Level: MEDIUM Description: Google Chrome Version: 68.0.3440.106 | ||||
3748 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=68.0.3440.106 --initial-client-data=0x78,0x7c,0x80,0x74,0x84,0x700a00b0,0x700a00c0,0x700a00cc | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe |
User: admin Company: Google Inc. Integrity Level: MEDIUM Description: Google Chrome Version: 68.0.3440.106 | ||||
2996 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=3024 --on-initialized-event-handle=304 --parent-handle=308 /prefetch:6 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe |
User: admin Company: Google Inc. Integrity Level: MEDIUM Description: Google Chrome Version: 68.0.3440.106 | ||||
296 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=944,14626985881982110054,9530921386645269917,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAACAAwBAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --service-request-channel-token=6575CC42F0B4E16380B6B08EDDB17655 --mojo-platform-channel-handle=1000 --ignored=" --type=renderer " /prefetch:2 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe |
User: admin Company: Google Inc. Integrity Level: LOW Description: Google Chrome Version: 68.0.3440.106 | ||||
2580 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=944,14626985881982110054,9530921386645269917,131072 --enable-features=PasswordImport --service-pipe-token=199BA151892DFACE2F2EA4ADA53A00DC --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=199BA151892DFACE2F2EA4ADA53A00DC --renderer-client-id=4 --mojo-platform-channel-handle=1900 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe |
User: admin Company: Google Inc. Integrity Level: LOW Description: Google Chrome Version: 68.0.3440.106 | ||||
3160 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=944,14626985881982110054,9530921386645269917,131072 --enable-features=PasswordImport --service-pipe-token=0F9D308C0060485F721B465EF36B15DF --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=0F9D308C0060485F721B465EF36B15DF --renderer-client-id=3 --mojo-platform-channel-handle=2012 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe |
User: admin Company: Google Inc. Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 68.0.3440.106 | ||||
2436 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=944,14626985881982110054,9530921386645269917,131072 --enable-features=PasswordImport --disable-gpu-sandbox --gpu-preferences=KAAAAAAAAACAAwBAAQAAAAAAAAAAAGAAEAAAAAAAAAAAAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAKAAAAEAAAAAAAAAAAAAAACwAAABAAAAAAAAAAAQAAAAoAAAAQAAAAAAAAAAEAAAALAAAA --service-request-channel-token=6242EA47153A8A1AA62A19ED38D9FD7B --mojo-platform-channel-handle=3536 /prefetch:2 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe |
User: admin Company: Google Inc. Integrity Level: MEDIUM Description: Google Chrome Exit code: 0 Version: 68.0.3440.106 | ||||
3032 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=944,14626985881982110054,9530921386645269917,131072 --enable-features=PasswordImport --lang=en-US --no-sandbox --service-request-channel-token=D3EAC33D7425C3AFA80F7E4865B92F78 --mojo-platform-channel-handle=3772 /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe |
User: admin Company: Google Inc. Integrity Level: MEDIUM Description: Google Chrome Exit code: 0 Version: 68.0.3440.106 |
(PID) Process: | (3020) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
Operation: | write | Name: | failed_count |
Value: 0 | |||
(PID) Process: | (3020) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
Operation: | write | Name: | state |
Value: 2 | |||
(PID) Process: | (3020) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
Operation: | write | Name: | state |
Value: 1 | |||
(PID) Process: | (3020) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96} |
Operation: | write | Name: | dr |
Value: 1 | |||
(PID) Process: | (2996) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes |
Operation: | write | Name: | 3020-13194989700704500 |
Value: 259 | |||
(PID) Process: | (3020) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome |
Operation: | write | Name: | UsageStatsInSample |
Value: 0 | |||
(PID) Process: | (3020) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes |
Operation: | delete value | Name: | 3516-13180984670829101 |
Value: 0 | |||
(PID) Process: | (3020) chrome.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96} |
Operation: | write | Name: | usagestats |
Value: 0 | |||
(PID) Process: | (3020) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes |
Operation: | delete value | Name: | 3020-13194989700704500 |
Value: 259 | |||
(PID) Process: | (3020) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96} |
Operation: | write | Name: | metricsid |
Value: |
PID | Process | Filename | Type | |
---|---|---|---|---|
3020 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\35a242be-c9ca-4db2-9d51-e89784c53dc2.tmp | — | |
MD5:— | SHA256:— | |||
3020 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000016.dbtmp | — | |
MD5:— | SHA256:— | |||
3020 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDB\000016.dbtmp | — | |
MD5:— | SHA256:— | |||
3020 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\1913b57c-d21c-441b-b2b5-04e00cb8a80d.tmp | — | |
MD5:— | SHA256:— | |||
3020 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old~RF20e766.TMP | text | |
MD5:92BE6B127E72365885AD4C3FB6534EE2 | SHA256:54302A2573ACC775720E7DB0AD85873276713302B4F72596A8DCC44B01C70E51 | |||
3020 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Last Version | text | |
MD5:C10EBD4DB49249EFC8D112B2920D5F73 | SHA256:90A1B994CAFE902F22A88A22C0B6CC9CB5B974BF20F8964406DD7D6C9B8867D1 | |||
3020 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\LOG.old~RF20e7b4.TMP | text | |
MD5:1AA66EFDB743FB0A8DCC1CD79B0B6542 | SHA256:28D56532CCED7375A2A1C7731E57C1A1C2EC1AC9827F3E5BEEE7F8069A5F87DD | |||
3020 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF20e7b4.TMP | text | |
MD5:197882774A7ECEC9046BC48F63189B66 | SHA256:27377B0D5F989997C2C3F74ACF163EED44B60631DDAA768F6655D7BE555742B2 | |||
3020 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Thumbnails\LOG.old~RF20e841.TMP | text | |
MD5:F727DD25CDA7B2CC574098CEE1F5764A | SHA256:5F7BD6926940E400EE7FAA6D620192CA299F7B5AAA92D672F8173A767B3FBBFF | |||
3020 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old | text | |
MD5:197882774A7ECEC9046BC48F63189B66 | SHA256:27377B0D5F989997C2C3F74ACF163EED44B60631DDAA768F6655D7BE555742B2 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3020 | chrome.exe | GET | 204 | 35.190.64.167:80 | http://onclickmega.com/script/suurl.php?r=2292163&cbrandom=0.7532909555736991&cbiframe=0&cbWidth=1280&cbHeight=582&cbtitle=HDcast-Embed&cbref=&cbdescription=&cbkeywords=&cbcdn=celeritascdn.com&ufp=1536857942215444448662772835 | US | — | — | whitelisted |
3020 | chrome.exe | GET | 307 | 67.202.94.94:80 | http://whos.amung.us/swidget/u6e42wbiha4y.png | US | — | — | whitelisted |
3020 | chrome.exe | GET | 200 | 185.63.253.101:80 | http://hdcast.pw/addycash.js | NL | text | 3.01 Kb | suspicious |
3020 | chrome.exe | GET | 200 | 13.107.246.10:80 | http://api.peer5.com/peer5.clappr.plugin.js | US | text | 13.2 Kb | whitelisted |
3020 | chrome.exe | GET | 200 | 104.17.196.107:80 | http://celeritascdn.com/script/compatibility.js | US | text | 6.11 Kb | suspicious |
3020 | chrome.exe | GET | 200 | 185.225.208.133:80 | http://widgets.amung.us/small/03/340.png | unknown | image | 331 b | whitelisted |
3020 | chrome.exe | GET | 200 | 185.63.253.101:80 | http://9stream.pw/online.php?c=%3C?php%20echo%20$country;?%3E | NL | html | 485 b | malicious |
3020 | chrome.exe | GET | 200 | 185.225.208.133:80 | http://widgets.amung.us/classic.js | unknown | text | 5.99 Kb | whitelisted |
3020 | chrome.exe | GET | 200 | 67.202.94.94:80 | http://whos.amung.us/pingjs/?k=5jh0upfp181b&t=Vipcast%20-%20%3C%3Fphp%20echo%20%24country%3B%3F%3E&c=c&y=http%3A%2F%2F9stream.pw%2Fstream_jw5.php%3Fid%3D85%26width%3D700%26height%3D480%26stretching%3Duniform&a=0&d=0.201&v=22&r=1822 | US | text | 53 b | whitelisted |
3020 | chrome.exe | GET | 200 | 13.107.246.10:80 | http://api.peer5.com/peer5.js?id=1hqqclndhqjp7bxhjklt | US | text | 228 Kb | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3020 | chrome.exe | 172.217.21.227:443 | www.gstatic.com | Google Inc. | US | whitelisted |
3020 | chrome.exe | 172.217.23.163:443 | clientservices.googleapis.com | Google Inc. | US | whitelisted |
3020 | chrome.exe | 185.63.253.101:80 | 9stream.pw | Host Palace Internet Services | NL | suspicious |
3020 | chrome.exe | 104.19.198.151:443 | cdnjs.cloudflare.com | Cloudflare Inc | US | shared |
3020 | chrome.exe | 216.58.205.237:443 | accounts.google.com | Google Inc. | US | whitelisted |
3020 | chrome.exe | 205.185.208.52:80 | code.jquery.com | Highwinds Network Group, Inc. | US | unknown |
3020 | chrome.exe | 13.107.246.10:80 | api.peer5.com | Microsoft Corporation | US | whitelisted |
3020 | chrome.exe | 35.227.193.212:443 | ws.peer5.com | — | US | unknown |
3020 | chrome.exe | 185.63.253.101:443 | 9stream.pw | Host Palace Internet Services | NL | suspicious |
3020 | chrome.exe | 104.17.194.107:80 | fbcdn2.com | Cloudflare Inc | US | shared |
Domain | IP | Reputation |
---|---|---|
clientservices.googleapis.com |
| whitelisted |
9stream.pw |
| malicious |
www.gstatic.com |
| whitelisted |
accounts.google.com |
| shared |
code.jquery.com |
| whitelisted |
hdcast.pw |
| suspicious |
api.peer5.com |
| whitelisted |
cdnjs.cloudflare.com |
| whitelisted |
livestreamhd.me |
| suspicious |
whos.amung.us |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Potentially Bad Traffic | ET DNS Query to a *.pw domain - Likely Hostile |
3020 | chrome.exe | Potentially Bad Traffic | ET INFO HTTP Request to a *.pw domain |
— | — | Potentially Bad Traffic | ET DNS Query to a *.pw domain - Likely Hostile |
3020 | chrome.exe | Generic Protocol Command Decode | SURICATA HTTP gzip decompression failed |
3020 | chrome.exe | Potentially Bad Traffic | ET INFO HTTP Request to a *.pw domain |
3020 | chrome.exe | Potentially Bad Traffic | ET INFO HTTP Request to a *.pw domain |
3020 | chrome.exe | Potentially Bad Traffic | ET INFO HTTP Request to a *.pw domain |
— | — | Potentially Bad Traffic | ET DNS Query to a *.pw domain - Likely Hostile |
3020 | chrome.exe | Potentially Bad Traffic | ET INFO HTTP Request to a *.pw domain |
3020 | chrome.exe | Potentially Bad Traffic | ET INFO HTTP Request to a *.pw domain |