URL:

https://www.teamspeak.de/en/download/teamspeak-3-32-Bit-client-windows/

Full analysis: https://app.any.run/tasks/e77277d0-3e61-4628-9cb4-e64186ec6aa9
Verdict: Malicious activity
Analysis date: January 01, 2024, 18:38:14
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

EFB553ECAEC23F10C961A9685984D822

SHA1:

336F4E9F4EAF077A27048C664B6D19CF7EAF4802

SHA256:

E066FDF95423993B3CD110CA2FCE0568150BE69D1684BC8977EBCA5523D327F5

SSDEEP:

3:N8DSLfVAEo9CkzEWrYEBvM1JN:2OLfqRrrUIM1JN

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads the Internet Settings

      • TeamSpeak3-Client-win32-3.5.6.exe (PID: 3264)
      • ts3client_win32.exe (PID: 1608)
      • ts3client_win32.exe (PID: 2520)
    • Searches for installed software

      • vcredist_x86.exe (PID: 3432)
    • The process creates files with name similar to system file names

      • TeamSpeak3-Client-win32-3.5.6.exe (PID: 3264)
    • Reads settings of System Certificates

      • ts3client_win32.exe (PID: 1608)
    • Detected use of alternative data streams (AltDS)

      • ts3client_win32.exe (PID: 2520)
  • INFO

    • Application launched itself

      • chrome.exe (PID: 2448)
      • chrome.exe (PID: 2960)
      • iexplore.exe (PID: 128)
      • vcredist_x86.exe (PID: 3840)
    • Drops the executable file immediately after the start

      • iexplore.exe (PID: 296)
      • chrome.exe (PID: 2960)
      • TeamSpeak3-Client-win32-3.5.6.exe (PID: 3264)
      • vcredist_x86.exe (PID: 3432)
      • package_inst.exe (PID: 2996)
      • package_inst.exe (PID: 3972)
      • package_inst.exe (PID: 3572)
    • Create files in a temporary directory

      • TeamSpeak3-Client-win32-3.5.6.exe (PID: 3264)
      • vcredist_x86.exe (PID: 3432)
      • ts3client_win32.exe (PID: 1608)
      • package_inst.exe (PID: 3972)
      • package_inst.exe (PID: 2996)
      • package_inst.exe (PID: 3572)
    • Checks proxy server information

      • TeamSpeak3-Client-win32-3.5.6.exe (PID: 3264)
    • Creates files in the program directory

      • TeamSpeak3-Client-win32-3.5.6.exe (PID: 3264)
    • Process drops legitimate windows executable

      • TeamSpeak3-Client-win32-3.5.6.exe (PID: 3264)
      • vcredist_x86.exe (PID: 3432)
      • package_inst.exe (PID: 3972)
    • Reads the machine GUID from the registry

      • TeamSpeak3-Client-win32-3.5.6.exe (PID: 3264)
      • ts3client_win32.exe (PID: 1608)
      • package_inst.exe (PID: 2996)
      • package_inst.exe (PID: 3972)
      • package_inst.exe (PID: 3572)
      • ts3client_win32.exe (PID: 2520)
      • ts3client_win32.exe (PID: 2776)
      • ts3client_win32.exe (PID: 2784)
    • Manual execution by a user

      • chrome.exe (PID: 2448)
      • chrome.exe (PID: 2960)
      • ts3client_win32.exe (PID: 2520)
      • ts3client_win32.exe (PID: 2776)
      • ts3client_win32.exe (PID: 3772)
      • ts3client_win32.exe (PID: 2784)
      • ts3client_win32.exe (PID: 3048)
      • ts3client_win32.exe (PID: 3360)
    • The process uses the downloaded file

      • chrome.exe (PID: 1232)
      • chrome.exe (PID: 2960)
    • Reads the computer name

      • TeamSpeak3-Client-win32-3.5.6.exe (PID: 3264)
      • vcredist_x86.exe (PID: 3840)
      • vcredist_x86.exe (PID: 3432)
      • ts3client_win32.exe (PID: 1608)
      • ts3client_win32.exe (PID: 2520)
      • ts3client_win32.exe (PID: 2776)
      • ts3client_win32.exe (PID: 2784)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • TeamSpeak3-Client-win32-3.5.6.exe (PID: 3264)
    • Checks supported languages

      • vcredist_x86.exe (PID: 3840)
      • vcredist_x86.exe (PID: 3432)
      • ts3client_win32.exe (PID: 1608)
      • TeamSpeak3-Client-win32-3.5.6.exe (PID: 3264)
      • package_inst.exe (PID: 2996)
      • package_inst.exe (PID: 3972)
      • package_inst.exe (PID: 3572)
      • QtWebEngineProcess.exe (PID: 1936)
      • ts3client_win32.exe (PID: 2520)
      • ts3client_win32.exe (PID: 2784)
      • ts3client_win32.exe (PID: 2776)
    • Creates files or folders in the user directory

      • ts3client_win32.exe (PID: 1608)
      • package_inst.exe (PID: 2996)
      • package_inst.exe (PID: 3972)
      • package_inst.exe (PID: 3572)
      • ts3client_win32.exe (PID: 2520)
    • Reads Windows Product ID

      • ts3client_win32.exe (PID: 2520)
      • ts3client_win32.exe (PID: 1608)
    • Connects to unusual port

      • ts3client_win32.exe (PID: 2520)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
108
Monitored processes
59
Malicious processes
2
Suspicious processes
4

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs teamspeak3-client-win32-3.5.6.exe no specs teamspeak3-client-win32-3.5.6.exe chrome.exe no specs vcredist_x86.exe no specs vcredist_x86.exe no specs ts3client_win32.exe no specs ts3client_win32.exe package_inst.exe no specs package_inst.exe no specs package_inst.exe no specs qtwebengineprocess.exe chrome.exe no specs ts3client_win32.exe no specs ts3client_win32.exe ts3client_win32.exe no specs ts3client_win32.exe ts3client_win32.exe no specs ts3client_win32.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
128"C:\Program Files\Internet Explorer\iexplore.exe" "https://www.teamspeak.de/en/download/teamspeak-3-32-Bit-client-windows/"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
188"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --mojo-platform-channel-handle=656 --field-trial-handle=1156,i,16174114260867774134,13704040035235581733,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
296"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:128 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
452"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --disable-quic --mojo-platform-channel-handle=1372 --field-trial-handle=1140,i,17937383433306036249,14462899855473955045,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
560"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --disable-quic --mojo-platform-channel-handle=1752 --field-trial-handle=1156,i,16174114260867774134,13704040035235581733,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
840"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --disable-quic --mojo-platform-channel-handle=4012 --field-trial-handle=1156,i,16174114260867774134,13704040035235581733,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
864"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --disable-quic --mojo-platform-channel-handle=3768 --field-trial-handle=1156,i,16174114260867774134,13704040035235581733,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
948"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2156 --field-trial-handle=1156,i,16174114260867774134,13704040035235581733,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1232"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --disable-quic --mojo-platform-channel-handle=3796 --field-trial-handle=1156,i,16174114260867774134,13704040035235581733,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1268"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2152 --field-trial-handle=1140,i,17937383433306036249,14462899855473955045,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
Total events
27 415
Read events
27 159
Write events
251
Delete events
5

Modification events

(PID) Process:(128) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
0
(PID) Process:(128) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30847387
(PID) Process:(128) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30847437
(PID) Process:(128) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(128) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(128) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(128) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(128) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(128) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(128) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
71
Suspicious files
803
Text files
446
Unknown types
40

Dropped files

PID
Process
Filename
Type
296iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506compressed
MD5:AC05D27423A85ADC1622C714F2CB6184
SHA256:C6456E12E5E53287A547AF4103E0397CB9697E466CF75844312DC296D43D144D
296iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\nivo-slider[1].csstext
MD5:8D13E3A428351F7505B359412D91A50E
SHA256:EFA1D1244DF4F3A6B6689BC73CBDD67AD1B789606792EFA07EEB4807B08ECAEB
296iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157compressed
MD5:1BFE591A4FE3D91B03CDF26EAACD8F89
SHA256:9CF94355051BF0F4A45724CA20D1CC02F76371B963AB7D1E38BD8997737B13D8
296iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1851B118FC888B79D80FC2D44CBA9AC7binary
MD5:561882D645149E1641EDD15ADDC85B3C
SHA256:B9AE3B868C5883AF34B46922A2FF486FC69E51831F842565286F470FB5DBFB2D
296iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\jquery.colorbox-min[1].jstext
MD5:4E1E77EE2384DCED6BC5DBF3585D59D9
SHA256:D0829FFD68988EE4E52DBED5E9CC947DEE4E6CEDE6619D4A62DD09FD12C0B6CA
296iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\colorbox[1].csstext
MD5:49F8060E2E9846EE01D5BE01C08F1B2C
SHA256:431CC40BC831A36EF6EED8E285DF2BE036DD8EB4C056D694E7CEC7204CEBD0A8
296iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\teamspeakfonts[1].csstext
MD5:8132E0DF8DCDE988BCC98B3BBDEA7348
SHA256:C60BE0262C2BF9FC8A0B46553EC654ED06E114733005E5F9BCF67284532A6A62
296iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:52AD4C4B4C7CAECB6EA86B73046A694D
SHA256:6222DC5F9ED95A43C8A0C83FF14F14C119FEDE6E3141B931D3B083A674782840
296iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\teamspeak[1].csstext
MD5:2A75E948AD35033F290788756042571C
SHA256:4237D96B10C82A6EB7988BEEBE507E6716A7C21A674C6CC74D80A4B30ACA0FED
296iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\scrollable[1].csstext
MD5:6A9836085E78C5C8C0DDAD6556FB28C5
SHA256:3059A8D316AA87711533DC321F448163E88BB8178AB3BA02F519B40F19FB439C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
59
TCP/UDP connections
136
DNS requests
118
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
296
iexplore.exe
GET
200
184.24.77.188:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?2f131cf452408714
unknown
compressed
65.2 Kb
unknown
296
iexplore.exe
GET
200
69.192.161.44:80
http://x1.c.lencr.org/
unknown
binary
717 b
unknown
296
iexplore.exe
GET
200
184.24.77.76:80
http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgMWYfFgRoA5dQikxhjZ106dfA%3D%3D
unknown
binary
503 b
unknown
296
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbY2QTVWENG9oovp1QifsQ%3D
unknown
binary
471 b
unknown
296
iexplore.exe
GET
200
184.24.77.188:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?712397d87c9bba6b
unknown
compressed
4.66 Kb
unknown
296
iexplore.exe
GET
200
172.217.18.3:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFNZazTHGPUBUGY%3D
unknown
binary
724 b
unknown
296
iexplore.exe
GET
200
172.217.18.3:80
http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEA1uFYrLabZxEtE2U5X5DGM%3D
unknown
binary
471 b
unknown
296
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAqvpsXKY8RRQeo74ffHUxc%3D
unknown
binary
471 b
unknown
296
iexplore.exe
GET
200
184.24.77.76:80
http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgMW%2FV8QC%2BkpXgrtzYFZTD96%2Bg%3D%3D
unknown
binary
503 b
unknown
296
iexplore.exe
GET
200
172.217.18.3:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
binary
1.41 Kb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
296
iexplore.exe
89.49.127.20:443
www.teamspeak.de
freenet Datenkommunikations GmbH
DE
unknown
296
iexplore.exe
184.24.77.188:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
unknown
296
iexplore.exe
69.192.161.44:80
x1.c.lencr.org
AKAMAI-AS
DE
unknown
296
iexplore.exe
184.24.77.76:80
r3.o.lencr.org
Akamai International B.V.
DE
unknown
296
iexplore.exe
104.126.37.153:443
consent.cookiebot.com
Akamai International B.V.
DE
unknown
296
iexplore.exe
142.250.185.106:443
ajax.googleapis.com
GOOGLE
US
whitelisted
296
iexplore.exe
194.97.52.162:443
static.4players.de
freenet Datenkommunikations GmbH
DE
unknown

DNS requests

Domain
IP
Reputation
www.teamspeak.de
  • 89.49.127.20
  • 89.49.127.22
unknown
ctldl.windowsupdate.com
  • 184.24.77.188
  • 184.24.77.174
  • 184.24.77.173
  • 184.24.77.208
  • 184.24.77.203
  • 184.24.77.180
  • 184.24.77.184
  • 184.24.77.202
  • 184.24.77.186
  • 93.184.221.240
whitelisted
x1.c.lencr.org
  • 69.192.161.44
whitelisted
r3.o.lencr.org
  • 184.24.77.76
  • 184.24.77.71
  • 184.24.77.75
  • 184.24.77.61
  • 184.24.77.60
  • 184.24.77.50
shared
ajax.googleapis.com
  • 142.250.185.106
whitelisted
consent.cookiebot.com
  • 104.126.37.153
  • 104.126.37.160
  • 104.126.37.145
whitelisted
static.4players.de
  • 194.97.52.162
  • 194.97.40.242
unknown
ocsp.digicert.com
  • 192.229.221.95
whitelisted
ocsp.pki.goog
  • 172.217.18.3
whitelisted
subpixel.4players.de
  • 194.97.40.226
unknown

Threats

PID
Process
Class
Message
3264
TeamSpeak3-Client-win32-3.5.6.exe
Potentially Bad Traffic
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
Process
Message
ts3client_win32.exe
QWindowsEGLStaticContext::create: When using ANGLE, check if d3dcompiler_4x.dll is available
ts3client_win32.exe
QWindowsEGLStaticContext::create: Could not initialize EGL display: error 0x3001
ts3client_win32.exe
QWindowsEGLStaticContext::create: When using ANGLE, check if d3dcompiler_4x.dll is available
ts3client_win32.exe
QWindowsEGLStaticContext::create: Could not initialize EGL display: error 0x3001
ts3client_win32.exe
QWindowsEGLStaticContext::create: When using ANGLE, check if d3dcompiler_4x.dll is available
ts3client_win32.exe
WebEngineContext used before QtWebEngine::initialize() or OpenGL context creation failed.
ts3client_win32.exe
QWindowsEGLStaticContext::create: Could not initialize EGL display: error 0x3001
ts3client_win32.exe
Qt WebEngine ICU data not found at C:/Qt/Qt5.12.3/5.12.3/msvc2017/resources. Trying parent directory...
ts3client_win32.exe
Installed Qt WebEngine locales directory not found at location C:/Qt/Qt5.12.3/5.12.3/msvc2017/translations\qtwebengine_locales. Trying application directory...
ts3client_win32.exe
Qt WebEngine resources not found at C:/Qt/Qt5.12.3/5.12.3/msvc2017/resources. Trying parent directory...