URL:

https://pixeldrain.com/api/file/AStj56s2?download

Full analysis: https://app.any.run/tasks/558a1fbd-2d9b-4fc4-bdb0-6281f06eab14
Verdict: Malicious activity
Analysis date: March 18, 2024, 04:26:51
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

2C1C1D221FED739A3CC37B2BCFCC1702

SHA1:

E990000BB6CD38472B51237FC4538F2B98EE9A8C

SHA256:

F0F38E9400DB7CF58AE9D29497961F99F9C8137FBD95723EA3A37E2B9C1226ED

SSDEEP:

3:N8Icl/GK09saBFJKo:2IG/d01BFz

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • IDMan.exe (PID: 1092)
    • Changes the autorun value in the registry

      • rundll32.exe (PID: 3508)
      • IDMan.exe (PID: 1092)
    • Starts NET.EXE for service management

      • Uninstall.exe (PID: 3912)
      • net.exe (PID: 2388)
    • Creates a writable file in the system directory

      • rundll32.exe (PID: 3508)
  • SUSPICIOUS

    • Executing commands from ".cmd" file

      • WinRAR.exe (PID: 2724)
      • powershell.exe (PID: 492)
    • Starts CMD.EXE for commands execution

      • WinRAR.exe (PID: 2724)
      • cmd.exe (PID: 2260)
      • powershell.exe (PID: 492)
      • cmd.exe (PID: 1596)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 2724)
      • IDM1.tmp (PID: 3268)
      • IDMan.exe (PID: 1092)
      • Uninstall.exe (PID: 3912)
      • IDMan.exe (PID: 2228)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 880)
      • cmd.exe (PID: 2020)
    • Hides command output

      • cmd.exe (PID: 880)
      • cmd.exe (PID: 2020)
      • cmd.exe (PID: 2808)
      • cmd.exe (PID: 2640)
      • cmd.exe (PID: 3504)
    • Application launched itself

      • cmd.exe (PID: 2260)
      • cmd.exe (PID: 1596)
      • WinRAR.exe (PID: 2724)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 2260)
    • Reads the Internet Settings

      • powershell.exe (PID: 492)
      • IDM1.tmp (PID: 3268)
      • IDMan.exe (PID: 1092)
      • Uninstall.exe (PID: 3912)
      • runonce.exe (PID: 848)
      • IDMan.exe (PID: 2228)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 1596)
    • Start notepad (likely ransomware note)

      • WinRAR.exe (PID: 2724)
    • Starts application with an unusual extension

      • 1. Setup.exe (PID: 2088)
      • 1. Setup.exe (PID: 3364)
    • Creates a software uninstall entry

      • IDM1.tmp (PID: 3268)
    • Creates/Modifies COM task schedule object

      • IDM1.tmp (PID: 3268)
      • IDMan.exe (PID: 1092)
      • Uninstall.exe (PID: 3912)
    • The process creates files with name similar to system file names

      • IDM1.tmp (PID: 3268)
    • Checks Windows Trust Settings

      • IDMan.exe (PID: 1092)
      • IDMan.exe (PID: 2228)
    • Reads settings of System Certificates

      • IDMan.exe (PID: 1092)
      • IDMan.exe (PID: 2228)
    • Executable content was dropped or overwritten

      • IDMan.exe (PID: 1092)
      • rundll32.exe (PID: 3508)
    • Uses RUNDLL32.EXE to load library

      • Uninstall.exe (PID: 3912)
    • Creates or modifies Windows services

      • Uninstall.exe (PID: 3912)
    • Drops a system driver (possible attempt to evade defenses)

      • rundll32.exe (PID: 3508)
  • INFO

    • The process uses the downloaded file

      • iexplore.exe (PID: 1696)
      • WinRAR.exe (PID: 2724)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 1696)
    • Application launched itself

      • iexplore.exe (PID: 1696)
      • firefox.exe (PID: 240)
      • firefox.exe (PID: 2156)
    • Checks operating system version

      • cmd.exe (PID: 2260)
      • cmd.exe (PID: 1596)
    • Checks supported languages

      • mode.com (PID: 2052)
      • Patch.exe (PID: 668)
      • IDM1.tmp (PID: 3596)
      • 1. Setup.exe (PID: 2088)
      • idmBroker.exe (PID: 3276)
      • IDMan.exe (PID: 1092)
      • 1. Setup.exe (PID: 3364)
      • IDM1.tmp (PID: 3268)
      • Uninstall.exe (PID: 3912)
      • MediumILStart.exe (PID: 3032)
      • IDMan.exe (PID: 2228)
      • IEMonitor.exe (PID: 1836)
    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 2724)
      • rundll32.exe (PID: 3508)
    • Create files in a temporary directory

      • 1. Setup.exe (PID: 2088)
      • IDM1.tmp (PID: 3596)
      • IDM1.tmp (PID: 3268)
      • 1. Setup.exe (PID: 3364)
      • IDMan.exe (PID: 1092)
      • IDMan.exe (PID: 2228)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2724)
    • Reads the machine GUID from the registry

      • IDM1.tmp (PID: 3596)
      • IDM1.tmp (PID: 3268)
      • IDMan.exe (PID: 1092)
      • MediumILStart.exe (PID: 3032)
      • IDMan.exe (PID: 2228)
    • Creates files in the program directory

      • IDM1.tmp (PID: 3268)
      • IDMan.exe (PID: 1092)
    • Creates files or folders in the user directory

      • IDM1.tmp (PID: 3268)
      • IDMan.exe (PID: 1092)
    • Reads the computer name

      • IDM1.tmp (PID: 3268)
      • IDMan.exe (PID: 1092)
      • Uninstall.exe (PID: 3912)
      • MediumILStart.exe (PID: 3032)
      • IDMan.exe (PID: 2228)
      • IEMonitor.exe (PID: 1836)
    • Reads the software policy settings

      • IDMan.exe (PID: 1092)
      • IDMan.exe (PID: 2228)
    • Checks proxy server information

      • IDMan.exe (PID: 1092)
    • Manual execution by a user

      • firefox.exe (PID: 240)
    • Reads the time zone

      • runonce.exe (PID: 848)
    • Reads security settings of Internet Explorer

      • runonce.exe (PID: 848)
    • Creates files in the driver directory

      • rundll32.exe (PID: 3508)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
118
Monitored processes
64
Malicious processes
11
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe winrar.exe cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs reg.exe no specs reg.exe no specs powershell.exe no specs cmd.exe cmd.exe no specs cmd.exe no specs cmd.exe no specs reg.exe no specs reg.exe no specs find.exe no specs reg.exe no specs mode.com no specs reg.exe no specs cmd.exe no specs cmd.exe no specs reg.exe no specs reg.exe no specs cmd.exe no specs findstr.exe no specs findstr.exe no specs findstr.exe no specs findstr.exe no specs choice.exe no specs notepad.exe no specs patch.exe no specs patch.exe 1. setup.exe no specs 1. setup.exe idm1.tmp no specs 1. setup.exe no specs 1. setup.exe idm1.tmp no specs idmbroker.exe no specs idman.exe firefox.exe no specs firefox.exe no specs uninstall.exe no specs firefox.exe rundll32.exe runonce.exe no specs grpconv.exe no specs net.exe no specs net1.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs mediumilstart.exe no specs idman.exe no specs winrar.exe no specs winrar.exe no specs iemonitor.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
240"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.internetdownloadmanager.com/support/installffextfrommozillasite.html --attempting-deelevationC:\Program Files\Mozilla Firefox\firefox.exeexplorer.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
115.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
316C:\Windows\system32\cmd.exe /c "prompt $H&for %B in (1) do rem"C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
492C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "start cmd.exe -arg '/c \""""C:\Users\admin\AppData\Local\Temp\Rar$DIa2724.5621\Activation.cmd""" -el \"' -verb runas" C:\Windows\System32\WindowsPowerShell\v1.0\powershell.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
572"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2156.7.1678536682\57992673" -childID 6 -isForBrowser -prefsHandle 4204 -prefMapHandle 4208 -prefsLen 29209 -prefMapSize 244195 -jsInitHandle 924 -jsInitLen 240908 -parentBuildID 20230710165010 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0bae5ed2-f5f0-4e95-a763-5f328a2184d2} 2156 "\\.\pipe\gecko-crash-server-pipe.2156" 4012 18e93560 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
115.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
668"C:\Users\admin\AppData\Local\Temp\Rar$EXa2724.11926\IDM.6.41.Build.20\3. Ptch\Patch.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2724.11926\IDM.6.41.Build.20\3. Ptch\Patch.exe
WinRAR.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa2724.11926\idm.6.41.build.20\3. ptch\patch.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
764reg query HKU\S-1-5-19 C:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
784findstr /a:0E /f:`.txt "."C:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imm32.dll
848"C:\Windows\system32\runonce.exe" -rC:\Windows\System32\runonce.exerundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Run Once Wrapper
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\runonce.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
880C:\Windows\system32\cmd.exe /c reg query "HKCU\Software\DownloadManager" /v ExePath 2>nulC:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
924find /i "x86" C:\Windows\System32\find.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (grep) Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\find.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
62 131
Read events
61 276
Write events
727
Delete events
128

Modification events

(PID) Process:(1696) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(1696) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(1696) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
31095020
(PID) Process:(1696) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(1696) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
31095020
(PID) Process:(1696) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1696) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1696) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(1696) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(1696) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
18
Suspicious files
107
Text files
60
Unknown types
64

Dropped files

PID
Process
Filename
Type
2692iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\IDM.6.41.Build.20.rar.v3k9p51.partial
MD5:
SHA256:
1696iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6DB145CFEEC544B1582FED1ADA3370DDbinary
MD5:EA230D21B5A4E9A277BBC1A285E75CB8
SHA256:3D6EE5525AB794AE3595AE7DE049CE6B2C9630091801788123E4090F3C5A13CA
2692iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506binary
MD5:57611D4A5C32EC82FBAF56662BD4B6C3
SHA256:B6B56DD36B4629981D9EFA1EC1D05AA7B202000AA80F2187E4FE03163B0C30C1
1696iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\IDM.6.41.Build.20.rar
MD5:
SHA256:
2692iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar7F6D.tmpcat
MD5:DD73CEAD4B93366CF3465C8CD32E2796
SHA256:A6752B7851B591550E4625B832A393AABCC428DE18D83E8593CD540F7D7CAE22
2692iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab7F6C.tmpcompressed
MD5:753DF6889FD7410A2E9FE333DA83A429
SHA256:B42DC237E44CBC9A43400E7D3F9CBD406DBDEFD62BFE87328F8663897D69DF78
1696iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EAF8AA29A62AB29E614331747385D816_F9E4DC0B9D5C777357D7DB8DEF51118Abinary
MD5:01A57655041C73E447F99101E69ECFC8
SHA256:EB6ABDAC06E331F3A78B0AE7322016C61CF2F7C695FAE19EF62559D03E86A20A
2692iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:525F4B85FD27497D2E1A276877A8A752
SHA256:85450D167111AD556F7111DC2CC3759F805CFB7E92A958385760C25ACBC94813
1696iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF61871CD7AFC317F8.TMPgmc
MD5:07FDBA05542F5DE47E3D20AFB9393889
SHA256:149730E68B36FD8A5492039A15A9D484B4004ADFC283530740B06C32C2B92FCE
1696iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EAF8AA29A62AB29E614331747385D816_F9E4DC0B9D5C777357D7DB8DEF51118Ader
MD5:03286F86A6340EF1EB71162CA877B4CA
SHA256:F6E395EAB531C2331F213B764ECB38E1B4A1E883299D15C1D8B688291E26F20A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
34
TCP/UDP connections
102
DNS requests
155
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2692
iexplore.exe
GET
304
23.53.40.35:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?545e1839169dd0e6
unknown
unknown
2156
firefox.exe
POST
200
184.24.77.54:80
http://r3.o.lencr.org/
unknown
binary
503 b
unknown
2156
firefox.exe
POST
200
216.58.206.67:80
http://ocsp.pki.goog/gts1c3
unknown
binary
471 b
unknown
1696
iexplore.exe
GET
304
23.53.40.35:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?12f52c1127979e35
unknown
unknown
2692
iexplore.exe
GET
200
23.53.40.35:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?a08f35fbea17b647
unknown
compressed
67.5 Kb
unknown
1696
iexplore.exe
GET
304
23.53.40.35:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?719f0b64dcb4a601
unknown
unknown
1696
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAzlnDD9eoNTLi0BRrMy%2BWU%3D
unknown
binary
314 b
unknown
1696
iexplore.exe
GET
200
192.229.221.95:80
http://crl4.digicert.com/DigiCertGlobalRootCA.crl
unknown
binary
779 b
unknown
1696
iexplore.exe
GET
304
23.53.40.49:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?70d85e3b0e586cab
unknown
unknown
1696
iexplore.exe
GET
304
23.53.40.49:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?e55f0cb727843010
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
2692
iexplore.exe
50.7.24.66:443
COGENT-174
NL
unknown
1080
svchost.exe
224.0.0.252:5355
unknown
1696
iexplore.exe
104.126.37.131:443
www.bing.com
Akamai International B.V.
DE
unknown
2692
iexplore.exe
50.7.236.50:443
COGENT-174
NL
unknown
2692
iexplore.exe
23.53.40.35:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
unknown
2692
iexplore.exe
69.192.161.44:80
x1.c.lencr.org
AKAMAI-AS
DE
unknown
1696
iexplore.exe
104.126.37.139:443
www.bing.com
Akamai International B.V.
DE
unknown
1696
iexplore.exe
23.53.40.35:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
unknown

DNS requests

Domain
IP
Reputation
pixeldrain.com
  • 2a00:1450:4001:811::200e
  • 2a00:1450:4001:82b::200e
  • 2a00:1450:4001:813::200e
  • 2a00:1450:4001:812::200e
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 104.126.37.139
  • 104.126.37.131
whitelisted
dns.msftncsi.com
  • 131.107.255.255
shared
ctldl.windowsupdate.com
  • 23.53.40.35
  • 23.53.40.49
whitelisted
x1.c.lencr.org
  • 69.192.161.44
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
r3.o.lencr.org
  • 184.24.77.54
  • 184.24.77.48
shared

Threats

PID
Process
Class
Message
1080
svchost.exe
Misc activity
ET INFO File Sharing Related Domain in DNS Lookup (pixeldrain .com)
2692
iexplore.exe
Misc activity
ET INFO File Sharing Domain Observed in TLS SNI (pixeldrain .com)
2692
iexplore.exe
Misc activity
ET INFO File Sharing Domain Observed in TLS SNI (pixeldrain .com)
2692
iexplore.exe
Misc activity
ET INFO File Sharing Domain Observed in TLS SNI (pixeldrain .com)
No debug info