URL:

http://www.mediafire.com/file/jdxff8bsksd7ee9/MegaHack_v5.4_SETUP.exe/file

Full analysis: https://app.any.run/tasks/e9a11f63-6943-4956-bae6-b22f3161834a
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: April 10, 2020, 13:52:58
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MD5:

D3A27D7B7BF6F5530E4D7D48FE9BD849

SHA1:

40DB9479359A7E4969A770032946754FE6DEAFDD

SHA256:

FD17056DB04109340AC2F000D69C113AD8C64586283A5458A20B1F6634600C39

SSDEEP:

3:N1KJS4w3eGUoJTGgvVR20aKcA:Cc4w3eGbvnx

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Downloads executable files from the Internet

      • iexplore.exe (PID: 3360)
    • Application was dropped or rewritten from another process

      • MegaHack v5.4 SETUP.exe (PID: 3588)
      • MegaHack.exe (PID: 3332)
      • MegaHack v5.4 SETUP.exe (PID: 2748)
      • MegaHack.exe (PID: 1228)
    • Loads dropped or rewritten executable

      • MegaHack.exe (PID: 3332)
      • MegaHack.exe (PID: 1228)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 3360)
      • iexplore.exe (PID: 3168)
      • MegaHack v5.4 SETUP.tmp (PID: 3460)
      • MegaHack v5.4 SETUP.exe (PID: 3588)
      • MegaHack v5.4 SETUP.exe (PID: 2748)
  • INFO

    • Reads Internet Cache Settings

      • iexplore.exe (PID: 3360)
      • iexplore.exe (PID: 3244)
      • iexplore.exe (PID: 3168)
      • iexplore.exe (PID: 3176)
    • Creates files in the user directory

      • iexplore.exe (PID: 3168)
      • iexplore.exe (PID: 3360)
      • iexplore.exe (PID: 3244)
    • Reads internet explorer settings

      • iexplore.exe (PID: 3360)
      • iexplore.exe (PID: 3244)
      • iexplore.exe (PID: 3176)
    • Changes internet zones settings

      • iexplore.exe (PID: 3168)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 3168)
    • Application launched itself

      • iexplore.exe (PID: 3168)
    • Application was dropped or rewritten from another process

      • MegaHack v5.4 SETUP.tmp (PID: 2584)
      • MegaHack v5.4 SETUP.tmp (PID: 3460)
    • Creates files in the program directory

      • MegaHack v5.4 SETUP.tmp (PID: 3460)
    • Creates a software uninstall entry

      • MegaHack v5.4 SETUP.tmp (PID: 3460)
    • Manual execution by user

      • MegaHack.exe (PID: 1228)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3244)
      • iexplore.exe (PID: 3360)
      • iexplore.exe (PID: 3176)
      • iexplore.exe (PID: 3168)
    • Changes settings of System certificates

      • iexplore.exe (PID: 3168)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 3168)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
52
Monitored processes
10
Malicious processes
6
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start iexplore.exe iexplore.exe iexplore.exe iexplore.exe megahack v5.4 setup.exe megahack v5.4 setup.tmp no specs megahack v5.4 setup.exe megahack v5.4 setup.tmp megahack.exe megahack.exe

Process information

PID
CMD
Path
Indicators
Parent process
1228"C:\Program Files\Mega Hack\MegaHack.exe" C:\Program Files\Mega Hack\MegaHack.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
0.0.0.0
Modules
Images
c:\program files\mega hack\megahack.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mega hack\qt5core.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\program files\mega hack\libgcc_s_dw2-1.dll
2584"C:\Users\admin\AppData\Local\Temp\is-POUME.tmp\MegaHack v5.4 SETUP.tmp" /SL5="$801B2,15016215,57856,C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\MegaHack v5.4 SETUP.exe" C:\Users\admin\AppData\Local\Temp\is-POUME.tmp\MegaHack v5.4 SETUP.tmpMegaHack v5.4 SETUP.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.52.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-poume.tmp\megahack v5.4 setup.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
2748"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\MegaHack v5.4 SETUP.exe" /SPAWNWND=$4029E /NOTIFYWND=$801B2 C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\MegaHack v5.4 SETUP.exe
MegaHack v5.4 SETUP.tmp
User:
admin
Company:
Absolute
Integrity Level:
HIGH
Description:
Mega Hack Setup
Exit code:
0
Version:
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\po2hn1x2\megahack v5.4 setup.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
3168"C:\Program Files\Internet Explorer\iexplore.exe" http://www.mediafire.com/file/jdxff8bsksd7ee9/MegaHack_v5.4_SETUP.exe/fileC:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3176"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3168 CREDAT:3478799 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3244"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3168 CREDAT:1447200 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3332"C:\Program Files\Mega Hack\MegaHack.exe"C:\Program Files\Mega Hack\MegaHack.exe
MegaHack v5.4 SETUP.tmp
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
0.0.0.0
Modules
Images
c:\program files\mega hack\megahack.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mega hack\qt5core.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\program files\mega hack\libgcc_s_dw2-1.dll
3360"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3168 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3460"C:\Users\admin\AppData\Local\Temp\is-G5H49.tmp\MegaHack v5.4 SETUP.tmp" /SL5="$602A0,15016215,57856,C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\MegaHack v5.4 SETUP.exe" /SPAWNWND=$4029E /NOTIFYWND=$801B2 C:\Users\admin\AppData\Local\Temp\is-G5H49.tmp\MegaHack v5.4 SETUP.tmp
MegaHack v5.4 SETUP.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.52.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-g5h49.tmp\megahack v5.4 setup.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
3588"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\MegaHack v5.4 SETUP.exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\MegaHack v5.4 SETUP.exe
iexplore.exe
User:
admin
Company:
Absolute
Integrity Level:
MEDIUM
Description:
Mega Hack Setup
Exit code:
0
Version:
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\po2hn1x2\megahack v5.4 setup.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\usp10.dll
Total events
9 175
Read events
3 252
Write events
4 035
Delete events
1 888

Modification events

(PID) Process:(3168) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
1918572892
(PID) Process:(3168) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30805823
(PID) Process:(3168) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3168) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3168) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3168) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3168) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3168) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(3168) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3168) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
38
Suspicious files
224
Text files
222
Unknown types
143

Dropped files

PID
Process
Filename
Type
3360iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\MNLX2XUF.txt
MD5:
SHA256:
3360iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\WMQ5CWM6.txt
MD5:
SHA256:
3360iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\file[1].htmhtml
MD5:
SHA256:
3360iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\74GS8CA3.txttext
MD5:
SHA256:
3360iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\CabEE9E.tmp
MD5:
SHA256:
3360iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\TarEE9F.tmp
MD5:
SHA256:
3360iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\f[1].txttext
MD5:
SHA256:
3360iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_74167E25E5476CCA2A5946AAA61BF9E1der
MD5:
SHA256:
3360iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BE8B021F9E811DFC8C8A28572A17C05A_423042B51CF5C248407C4873B9E09019der
MD5:
SHA256:
3360iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_9487BC0D4381A7CDEB9A8CC43F66D27Cder
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
135
TCP/UDP connections
279
DNS requests
111
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3360
iexplore.exe
GET
200
104.16.203.237:80
http://www.mediafire.com/js/prebid2.44.1.js
US
text
52.9 Kb
shared
3360
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAVG%2Fhgj9%2BGUHaOfzhTEYXM%3D
US
der
471 b
whitelisted
3360
iexplore.exe
GET
200
172.217.21.227:80
http://ocsp.pki.goog/gsr2/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTgXIsxbvr2lBkPpoIEVRE6gHlCnAQUm%2BIHV2ccHsBqBt5ZtJot39wZhi4CDQHjtJqhjYqpgSVpULg%3D
US
der
468 b
whitelisted
3360
iexplore.exe
GET
200
104.16.203.237:80
http://www.mediafire.com/file/jdxff8bsksd7ee9/MegaHack_v5.4_SETUP.exe/file
US
html
82.2 Kb
shared
3360
iexplore.exe
GET
200
72.21.91.29:80
http://status.geotrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBR3enuod9bxDxzpICGW%2B2sabjf17QQUkFj%2FsJx1qFFUd7Ht8qNDFjiebMUCEAqGuQR2WDHiQMxiERAfVzY%3D
US
der
471 b
whitelisted
3360
iexplore.exe
GET
200
172.217.21.227:80
http://ocsp.pki.goog/gts1o1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEHZvSyilxdrBAgAAAABfmDc%3D
US
der
471 b
whitelisted
3360
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQrBBNpPfHTPX6Jy6BVzyBPnBWMnQQUPnQtH89FdQR%2BP8Cihz5MQ4NRE8YCEAzMl%2FYajM4BIeVAdBxX0gw%3D
US
der
279 b
whitelisted
3360
iexplore.exe
GET
200
72.21.91.29:80
http://status.geotrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBR3enuod9bxDxzpICGW%2B2sabjf17QQUkFj%2FsJx1qFFUd7Ht8qNDFjiebMUCEAqGuQR2WDHiQMxiERAfVzY%3D
US
der
471 b
whitelisted
3360
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2Fz5hY5qj0aEmX0H4s05bY%3D
US
der
1.47 Kb
whitelisted
3360
iexplore.exe
GET
200
104.16.203.237:80
http://www.mediafire.com/images/icons/svg_light/icons_sprite.svg
US
image
8.28 Kb
shared
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3360
iexplore.exe
172.217.16.162:443
securepubads.g.doubleclick.net
Google Inc.
US
whitelisted
3360
iexplore.exe
2.20.168.110:443
c.aaxads.com
Akamai Technologies, Inc.
unknown
3360
iexplore.exe
104.19.214.37:443
cdn.otnolatrnup.com
Cloudflare Inc
US
shared
3360
iexplore.exe
34.95.120.147:443
mediafire-d.openx.net
US
unknown
3360
iexplore.exe
185.33.223.83:80
ib.adnxs.com
AppNexus, Inc
unknown
3360
iexplore.exe
216.58.206.10:443
translate.googleapis.com
Google Inc.
US
whitelisted
3360
iexplore.exe
104.16.202.237:80
www.mediafire.com
Cloudflare Inc
US
unknown
3360
iexplore.exe
216.58.206.8:443
www.googletagmanager.com
Google Inc.
US
whitelisted
3360
iexplore.exe
151.139.128.14:80
ocsp.usertrust.com
Highwinds Network Group, Inc.
US
suspicious
3360
iexplore.exe
185.64.189.112:443
hbopenbid.pubmatic.com
PubMatic, Inc.
GB
unknown

DNS requests

Domain
IP
Reputation
www.mediafire.com
  • 172.217.23.98
  • 104.16.202.237
  • 104.16.203.237
shared
www.googletagmanager.com
  • 216.58.206.8
whitelisted
translate.google.com
  • 172.217.23.142
whitelisted
securepubads.g.doubleclick.net
  • 172.217.16.162
whitelisted
c.aaxads.com
  • 2.20.168.110
whitelisted
cdn.otnolatrnup.com
  • 104.19.214.37
  • 104.19.215.37
whitelisted
translate.googleapis.com
  • 216.58.206.10
whitelisted
static.mediafire.com
  • 104.16.202.237
  • 104.16.203.237
shared
hbopenbid.pubmatic.com
  • 185.64.189.112
whitelisted
mediafire-d.openx.net
  • 34.95.120.147
whitelisted

Threats

PID
Process
Class
Message
3360
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3360
iexplore.exe
Misc activity
ET INFO EXE - Served Attached HTTP
3360
iexplore.exe
Generic Protocol Command Decode
SURICATA HTTP unable to match response to request
3360
iexplore.exe
Generic Protocol Command Decode
SURICATA HTTP unable to match response to request
No debug info