analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqa3ZaNVlDXzVva2xxYncyeVpSaW5mNVEzUlNLd3xBQ3Jtc0ttTGZWbkF0cEd2b1VTcDBHY2hOSzFLSmhJMl81X2NScjFGWl9QVXlKR3NFaWk1NHdFaVZNV2dmN0RVejNLRXRsejM0WDJOZHJOVG4yRjdzY1NDdDJNOS13aU1seGF6elpMYWM4emdfMlVxVW5wYVJOZw&q=https%3A%2F%2Ftelegra.ph%2FVAPE-V4-LITE-CRACKED--DOWNLOAD-VAPE-V4-LITE-CRACKED-09-20&v=zqON_kTYE_0

Full analysis: https://app.any.run/tasks/58292fe8-40b7-4c69-842b-e3f661ad2177
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: October 05, 2022, 03:19:37
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
rat
redline
Indicators:
MD5:

9C9312299BE39F25C73D36024F2C087E

SHA1:

ECC14D36BD6669F303744FE52E4607253076602F

SHA256:

D172C4B9F5A70EEBACC6CD3E05A2BF570970DC77646550B5915019CBF2010A8E

SSDEEP:

6:2OLUxGKmKLqZ3I0XU+V2bQZfjYtXpv9/Vtiv+Bu935hW2zT2q3z0Or1Duj2uO6:2jGRfLxZfU3pTYR5924BZDS7O6

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops executable file immediately after starts

      • firefox.exe (PID: 1188)
      • WinRAR.exe (PID: 1408)
    • Application was dropped or rewritten from another process

      • start.exe (PID: 2264)
      • server.exe (PID: 4856)
    • REDLINE was detected

      • AppLaunch.exe (PID: 101132)
    • Connects to CnC server

      • AppLaunch.exe (PID: 101132)
    • Steals credentials from Web Browsers

      • AppLaunch.exe (PID: 101132)
    • Actions looks like stealing of personal data

      • AppLaunch.exe (PID: 101132)
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 1064)
      • iexplore.exe (PID: 2844)
    • Reads the computer name

      • WinRAR.exe (PID: 1408)
      • cmd.exe (PID: 328)
      • AppLaunch.exe (PID: 101132)
    • Drops a file with a compile date too recent

      • firefox.exe (PID: 1188)
      • WinRAR.exe (PID: 1408)
    • Executable content was dropped or overwritten

      • firefox.exe (PID: 1188)
      • WinRAR.exe (PID: 1408)
    • Checks supported languages

      • WinRAR.exe (PID: 1408)
      • start.exe (PID: 2264)
      • server.exe (PID: 4856)
      • cmd.exe (PID: 328)
      • AppLaunch.exe (PID: 101132)
    • Starts CMD.EXE for commands execution

      • start.exe (PID: 2264)
    • Reads the cookies of Mozilla Firefox

      • AppLaunch.exe (PID: 101132)
    • Reads Environment values

      • AppLaunch.exe (PID: 101132)
    • Reads the cookies of Google Chrome

      • AppLaunch.exe (PID: 101132)
    • Searches for installed software

      • AppLaunch.exe (PID: 101132)
  • INFO

    • Checks supported languages

      • iexplore.exe (PID: 2724)
      • iexplore.exe (PID: 1064)
      • iexplore.exe (PID: 2844)
      • firefox.exe (PID: 2756)
      • firefox.exe (PID: 1188)
      • firefox.exe (PID: 1176)
      • firefox.exe (PID: 1404)
      • firefox.exe (PID: 2704)
      • firefox.exe (PID: 468)
      • firefox.exe (PID: 552)
      • firefox.exe (PID: 628)
      • firefox.exe (PID: 2708)
    • Reads the computer name

      • iexplore.exe (PID: 1064)
      • iexplore.exe (PID: 2724)
      • iexplore.exe (PID: 2844)
      • firefox.exe (PID: 1188)
      • firefox.exe (PID: 1176)
      • firefox.exe (PID: 1404)
      • firefox.exe (PID: 468)
      • firefox.exe (PID: 2704)
      • firefox.exe (PID: 552)
      • firefox.exe (PID: 2708)
      • firefox.exe (PID: 628)
    • Changes internet zones settings

      • iexplore.exe (PID: 2724)
    • Application launched itself

      • iexplore.exe (PID: 2724)
      • firefox.exe (PID: 2756)
      • firefox.exe (PID: 1188)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2724)
      • iexplore.exe (PID: 1064)
      • iexplore.exe (PID: 2844)
    • Creates files in the user directory

      • iexplore.exe (PID: 1064)
      • iexplore.exe (PID: 2724)
      • firefox.exe (PID: 1188)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 1064)
      • iexplore.exe (PID: 2724)
      • iexplore.exe (PID: 2844)
      • firefox.exe (PID: 1188)
    • Reads internet explorer settings

      • iexplore.exe (PID: 1064)
      • iexplore.exe (PID: 2844)
    • Manual execution by user

      • firefox.exe (PID: 2756)
      • WinRAR.exe (PID: 1408)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2724)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2724)
    • Reads CPU info

      • firefox.exe (PID: 1188)
    • Creates files in the program directory

      • firefox.exe (PID: 1188)
    • Reads the date of Windows installation

      • firefox.exe (PID: 1188)
    • Dropped object may contain Bitcoin addresses

      • WinRAR.exe (PID: 1408)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
56
Monitored processes
17
Malicious processes
6
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start iexplore.exe iexplore.exe iexplore.exe firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs winrar.exe start.exe no specs cmd.exe no specs server.exe no specs #REDLINE applaunch.exe

Process information

PID
CMD
Path
Indicators
Parent process
2724"C:\Program Files\Internet Explorer\iexplore.exe" "https://www.youtube.com/redirect?event=video_description&redir_token=QUFFLUhqa3ZaNVlDXzVva2xxYncyeVpSaW5mNVEzUlNLd3xBQ3Jtc0ttTGZWbkF0cEd2b1VTcDBHY2hOSzFLSmhJMl81X2NScjFGWl9QVXlKR3NFaWk1NHdFaVZNV2dmN0RVejNLRXRsejM0WDJOZHJOVG4yRjdzY1NDdDJNOS13aU1seGF6elpMYWM4emdfMlVxVW5wYVJOZw&q=https%3A%2F%2Ftelegra.ph%2FVAPE-V4-LITE-CRACKED--DOWNLOAD-VAPE-V4-LITE-CRACKED-09-20&v=zqON_kTYE_0"C:\Program Files\Internet Explorer\iexplore.exe
Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
1064"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2724 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
2844"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2724 CREDAT:4003093 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
2756"C:\Program Files\Mozilla Firefox\firefox.exe" C:\Program Files\Mozilla Firefox\firefox.exeExplorer.EXE
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
83.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\msasn1.dll
1188"C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
83.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\msasn1.dll
1176"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1188.0.1832057186\379663438" -parentBuildID 20201112153044 -prefsHandle 1116 -prefMapHandle 1104 -prefsLen 1 -prefMapSize 238726 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1188 "\\.\pipe\gecko-crash-server-pipe.1188" 1184 gpuC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
83.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\msasn1.dll
1404"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1188.6.485286333\2130780721" -childID 1 -isForBrowser -prefsHandle 3012 -prefMapHandle 3008 -prefsLen 181 -prefMapSize 238726 -parentBuildID 20201112153044 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1188 "\\.\pipe\gecko-crash-server-pipe.1188" 3024 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
83.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\crypt32.dll
468"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1188.13.449908484\327330269" -childID 2 -isForBrowser -prefsHandle 1916 -prefMapHandle 1932 -prefsLen 6644 -prefMapSize 238726 -parentBuildID 20201112153044 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1188 "\\.\pipe\gecko-crash-server-pipe.1188" 1852 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
83.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
628"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1188.20.1582419806\459684951" -childID 3 -isForBrowser -prefsHandle 1784 -prefMapHandle 1776 -prefsLen 7470 -prefMapSize 238726 -parentBuildID 20201112153044 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1188 "\\.\pipe\gecko-crash-server-pipe.1188" 3212 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Version:
83.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
2704"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1188.21.997408788\159034479" -childID 4 -isForBrowser -prefsHandle 3636 -prefMapHandle 3632 -prefsLen 7470 -prefMapSize 238726 -parentBuildID 20201112153044 -appdir "C:\Program Files\Mozilla Firefox\browser" - 1188 "\\.\pipe\gecko-crash-server-pipe.1188" 3668 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
83.0
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\version.dll
Total events
34 683
Read events
34 462
Write events
217
Delete events
4

Modification events

(PID) Process:(2724) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(2724) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(2724) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30988393
(PID) Process:(2724) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(2724) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30988393
(PID) Process:(2724) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2724) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2724) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2724) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2724) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
107
Suspicious files
170
Text files
217
Unknown types
661

Dropped files

PID
Process
Filename
Type
2724iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442der
MD5:B8BDA0B382A7D056A4241B388338B778
SHA256:7BAA967F6686CCE471826B20FFA5CB7FEB4BF3C5C0BF43F51F08E84EB5850DD2
1064iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAder
MD5:F7983D8FD8DDD6DF665E3E5EB736D1C4
SHA256:173C1E435668AB7C8E2D30A020D2E63D66979911CDF19E0D50F68E697D2CAFC6
1064iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\redirect[1].htmhtml
MD5:87C0C13CB1AE8D2C6786CD9E8077023A
SHA256:E94A44830D4FC1D7284679F05BBCB7190251D142DCF8084DA11F05EFB78A24C5
1064iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_14F2E352CCFE495001982FFDAAC3BE84binary
MD5:AB8BC88174DBDECB1A72349E1B2C7B9C
SHA256:6AEF182B886DAC5C2285D3B35F37E8E58CB3DAA0B399BCC2F6085BEF7C4A974F
1064iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAbinary
MD5:227AB206C300E2D2C1FA950CE897DA29
SHA256:C6A1FFAA2C3C13373B9ACBC09CFBDFDC4128CAEB98D709675E34A9C8AE117C44
1064iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAbinary
MD5:A0100A83CA79C7B0C665EFA77ADB814B
SHA256:5F85E0D8228AA4CB0FF4D5B3831A605F8E4361F186469C87403D08CBEE287D7E
2724iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:4BE2B174C8E8D92927419FE834806773
SHA256:251A39446D324379F3D33BE8B0BEDBC1F7B3975539C1F5BA286724EB0F3E0D3D
1064iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAder
MD5:5A11C6099B9E5808DFB08C5C9570C92F
SHA256:91291A5EDC4E10A225D3C23265D236ECC74473D9893BE5BD07E202D95B3FB172
1064iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2Dbinary
MD5:23360AFF76A3C313779FEEE5E3D91128
SHA256:36FBA27A9E7B632B3C1794C23A5AFFD92B30478A85A2AB080DEA1F8EA2E7CE56
1064iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_1ACD2B4A039DF3260017F7BF28EE7323der
MD5:F936B953FDF91692463E6745F5151375
SHA256:21C4C1A25E3F41EA5D0262216D19CB081023A79500EAE7DAB8B8C1F5022AD18E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
44
TCP/UDP connections
118
DNS requests
165
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2724
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2BnRyLFPYjID1ie%2Bx%2BdSjo%3D
US
der
1.47 Kb
whitelisted
1064
iexplore.exe
GET
200
192.124.249.41:80
http://ocsp.godaddy.com//MEQwQjBAMD4wPDAJBgUrDgMCGgUABBTkIInKBAzXkF0Qh0pel3lfHJ9GPAQU0sSw0pHUTBFxs2HLPaH%2B3ahq1OMCAxvnFQ%3D%3D
US
der
1.66 Kb
whitelisted
1064
iexplore.exe
GET
200
172.217.17.131:80
http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCECY%2B0YL3%2ByMOCtPdrqPffYg%3D
US
der
471 b
whitelisted
1064
iexplore.exe
GET
200
172.217.17.131:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFNZazTHGPUBUGY%3D
US
der
724 b
whitelisted
2844
iexplore.exe
GET
200
104.18.32.68:80
http://ocsp.sectigo.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRDC9IOTxN6GmyRjyTl2n4yTUczyAQUjYxexFStiuF36Zv5mwXhuAGNYeECEQDqXkroZv5KiI1sJCfGNIam
US
der
472 b
whitelisted
2844
iexplore.exe
GET
200
104.18.32.68:80
http://crl.comodoca.com/AAACertificateServices.crl
US
der
506 b
whitelisted
1064
iexplore.exe
GET
200
172.217.17.131:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
US
der
1.41 Kb
whitelisted
2724
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
1064
iexplore.exe
GET
200
192.124.249.41:80
http://ocsp.godaddy.com//MEIwQDA%2BMDwwOjAJBgUrDgMCGgUABBQdI2%2BOBkuXH93foRUj4a7lAr4rGwQUOpqFBxBnKLbv9r0FQW4gwZTaD94CAQc%3D
US
der
1.69 Kb
whitelisted
1064
iexplore.exe
GET
200
192.124.249.41:80
http://ocsp.godaddy.com//MEowSDBGMEQwQjAJBgUrDgMCGgUABBS2CA1fbGt26xPkOKX4ZguoUjM0TgQUQMK9J47MNIMwojPX%2B2yz8LQsgM4CCQC2T6rhHiP0ng%3D%3D
US
der
1.74 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2724
iexplore.exe
13.107.21.200:443
www.bing.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
1064
iexplore.exe
149.154.164.13:443
telegra.ph
Telegram Messenger Inc
GB
suspicious
13.107.21.200:443
www.bing.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
1064
iexplore.exe
142.250.187.110:443
www.youtube.com
GOOGLE
US
whitelisted
2724
iexplore.exe
209.197.3.8:80
ctldl.windowsupdate.com
STACKPATH-CDN
US
whitelisted
2724
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
EDGECAST
GB
whitelisted
1064
iexplore.exe
209.197.3.8:80
ctldl.windowsupdate.com
STACKPATH-CDN
US
whitelisted
1064
iexplore.exe
172.217.17.131:80
ocsp.pki.goog
GOOGLE
US
whitelisted
1064
iexplore.exe
172.217.169.195:443
www.gstatic.com
GOOGLE
US
whitelisted
1064
iexplore.exe
192.124.249.41:80
ocsp.godaddy.com
SUCURI-SEC
US
suspicious

DNS requests

Domain
IP
Reputation
www.youtube.com
  • 142.250.187.110
  • 142.250.187.142
  • 142.250.187.174
  • 172.217.17.110
  • 172.217.17.142
  • 172.217.20.78
  • 172.217.169.110
  • 172.217.169.174
  • 172.217.169.206
  • 216.58.214.142
  • 142.250.184.142
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 13.107.21.200
  • 204.79.197.200
whitelisted
ctldl.windowsupdate.com
  • 209.197.3.8
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
ocsp.pki.goog
  • 172.217.17.131
  • 142.250.186.131
whitelisted
www.gstatic.com
  • 172.217.169.195
whitelisted
telegra.ph
  • 149.154.164.13
malicious
ocsp.godaddy.com
  • 192.124.249.41
  • 192.124.249.23
  • 192.124.249.24
  • 192.124.249.36
  • 192.124.249.22
whitelisted
t.me
  • 149.154.167.99
  • 2001:67c:4e8:f004::9
whitelisted

Threats

PID
Process
Class
Message
1188
firefox.exe
Potentially Bad Traffic
ET INFO Terse Request for .txt - Likely Hostile
1188
firefox.exe
Potentially Bad Traffic
ET INFO Terse Request for .txt - Likely Hostile
1188
firefox.exe
Potentially Bad Traffic
ET INFO Terse Request for .txt - Likely Hostile
1188
firefox.exe
Potentially Bad Traffic
ET INFO Terse Request for .txt - Likely Hostile
9 ETPRO signatures available at the full report
No debug info