File name:

re_webhook.exe

Full analysis: https://app.any.run/tasks/053d2baf-d0e6-499b-a2c4-26c9b0e1f41b
Verdict: Malicious activity
Analysis date: April 29, 2025, 00:53:20
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
telegram
ims-api
generic
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, 3 sections
MD5:

5EC17EDA2C560A5A97C712B3ED12B9B5

SHA1:

1F6C552FB3ECDDFF16BAB417DF9F916F1B4D02A9

SHA256:

018453B2C579EDBEC83248F6CFC2D0426279F543B8729D9561960B164A585773

SSDEEP:

1536:j/Rnm90YLSRoXSrQ1YM5iN+foNjT9PdRhhNUR7FJ07h5H2lryAnKX:j/oeYLSSqCYai/XRPQ7Fm7h5H2lGx

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Possible usage of Discord/Telegram API has been detected (YARA)

      • re_webhook.exe (PID: 4208)
    • Reads security settings of Internet Explorer

      • re_webhook.exe (PID: 4208)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • re_webhook.exe (PID: 4208)
  • INFO

    • Reads the software policy settings

      • re_webhook.exe (PID: 4208)
    • Attempting to use instant messaging service

      • re_webhook.exe (PID: 4208)
    • Creates files or folders in the user directory

      • re_webhook.exe (PID: 4208)
    • Reads the machine GUID from the registry

      • re_webhook.exe (PID: 4208)
    • Checks supported languages

      • re_webhook.exe (PID: 4208)
    • Reads the computer name

      • re_webhook.exe (PID: 4208)
    • Checks proxy server information

      • re_webhook.exe (PID: 4208)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

ims-api

(PID) Process(4208) re_webhook.exe
Telegram-Tokens (1)8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ
Telegram-Info-Links
8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ
Get info about bothttps://api.telegram.org/bot8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ/getMe
Get incoming updateshttps://api.telegram.org/bot8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ/getUpdates
Get webhookhttps://api.telegram.org/bot8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ/getWebhookInfo
Delete webhookhttps://api.telegram.org/bot8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ/deleteWebhook
Drop incoming updateshttps://api.telegram.org/bot8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ/deleteWebhook?drop_pending_updates=true
Telegram-Requests
Token8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ
End-PointsendMessage
Args
Token8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ
End-PointgetUpdates
Args
offset (1)ld
timeout (1)60 HTTP/1.1
Token8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ
End-PointgetUpdates
Args
Token8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ
End-PointgetUpdates
Args
offset (1)ld
timeout (1)60 HTTP/1.1 Host: api.telegram.org Cache-Control: no-cache
Token8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ
End-PointgetUpdates
Args
offset (1)ld
timeout (1)60 HTTP/1.1r
Token8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ
End-PointgetUpdates
Args
offset (1)ld
timeout (1)60
Telegram-Tokens (1)8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ
Telegram-Info-Links
8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ
Get info about bothttps://api.telegram.org/bot8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ/getMe
Get incoming updateshttps://api.telegram.org/bot8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ/getUpdates
Get webhookhttps://api.telegram.org/bot8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ/getWebhookInfo
Delete webhookhttps://api.telegram.org/bot8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ/deleteWebhook
Drop incoming updateshttps://api.telegram.org/bot8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ/deleteWebhook?drop_pending_updates=true
Telegram-Requests
Token8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ
End-PointgetUpdates
Args
offset (1)ld
timeout (1)60
Telegram-Tokens (1)8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ
Telegram-Info-Links
8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ
Get info about bothttps://api.telegram.org/bot8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ/getMe
Get incoming updateshttps://api.telegram.org/bot8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ/getUpdates
Get webhookhttps://api.telegram.org/bot8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ/getWebhookInfo
Delete webhookhttps://api.telegram.org/bot8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ/deleteWebhook
Drop incoming updateshttps://api.telegram.org/bot8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ/deleteWebhook?drop_pending_updates=true
Telegram-Requests
Token8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ
End-PointgetUpdates
Args
offset (1)ld
timeout (1)60
Telegram-Responses
oktrue
result
message_id403
from
id8178043038
is_bottrue
first_namewestedc2
usernamewestedjoshbot
chat
id5391086364
first_namewest
usernamesquishythighs
typeprivate
date1745888006
text🔄 Connected: DESKTOP-JGLLJLD IP: 192.168.100.5 127.0.0.1
entities
offset34
length13
typeurl
offset48
length9
typeurl
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (87.1)
.exe | Generic Win/DOS Executable (6.4)
.exe | DOS Executable Generic (6.4)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:04:29 00:35:09+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Large address aware, No debug
PEType: PE32+
LinkerVersion: 2.39
CodeSize: 73728
InitializedDataSize: 4096
UninitializedDataSize: 155648
EntryPoint: 0x37b50
OSVersion: 4
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
129
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start re_webhook.exe sppextcomobj.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4208"C:\Users\admin\AppData\Local\Temp\re_webhook.exe" C:\Users\admin\AppData\Local\Temp\re_webhook.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\re_webhook.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
ims-api
(PID) Process(4208) re_webhook.exe
Telegram-Tokens (1)8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ
Telegram-Info-Links
8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ
Get info about bothttps://api.telegram.org/bot8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ/getMe
Get incoming updateshttps://api.telegram.org/bot8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ/getUpdates
Get webhookhttps://api.telegram.org/bot8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ/getWebhookInfo
Delete webhookhttps://api.telegram.org/bot8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ/deleteWebhook
Drop incoming updateshttps://api.telegram.org/bot8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ/deleteWebhook?drop_pending_updates=true
Telegram-Requests
Token8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ
End-PointsendMessage
Args
Token8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ
End-PointgetUpdates
Args
offset (1)ld
timeout (1)60 HTTP/1.1
Token8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ
End-PointgetUpdates
Args
Token8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ
End-PointgetUpdates
Args
offset (1)ld
timeout (1)60 HTTP/1.1 Host: api.telegram.org Cache-Control: no-cache
Token8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ
End-PointgetUpdates
Args
offset (1)ld
timeout (1)60 HTTP/1.1r
Token8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ
End-PointgetUpdates
Args
offset (1)ld
timeout (1)60
(PID) Process(4208) re_webhook.exe
Telegram-Tokens (1)8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ
Telegram-Info-Links
8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ
Get info about bothttps://api.telegram.org/bot8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ/getMe
Get incoming updateshttps://api.telegram.org/bot8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ/getUpdates
Get webhookhttps://api.telegram.org/bot8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ/getWebhookInfo
Delete webhookhttps://api.telegram.org/bot8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ/deleteWebhook
Drop incoming updateshttps://api.telegram.org/bot8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ/deleteWebhook?drop_pending_updates=true
Telegram-Requests
Token8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ
End-PointgetUpdates
Args
offset (1)ld
timeout (1)60
(PID) Process(4208) re_webhook.exe
Telegram-Tokens (1)8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ
Telegram-Info-Links
8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ
Get info about bothttps://api.telegram.org/bot8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ/getMe
Get incoming updateshttps://api.telegram.org/bot8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ/getUpdates
Get webhookhttps://api.telegram.org/bot8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ/getWebhookInfo
Delete webhookhttps://api.telegram.org/bot8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ/deleteWebhook
Drop incoming updateshttps://api.telegram.org/bot8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ/deleteWebhook?drop_pending_updates=true
Telegram-Requests
Token8178043038:AAFtcZ4x9Lv9W8s3MkOU3h-kcM5MAW2QIOQ
End-PointgetUpdates
Args
offset (1)ld
timeout (1)60
Telegram-Responses
oktrue
result
message_id403
from
id8178043038
is_bottrue
first_namewestedc2
usernamewestedjoshbot
chat
id5391086364
first_namewest
usernamesquishythighs
typeprivate
date1745888006
text🔄 Connected: DESKTOP-JGLLJLD IP: 192.168.100.5 127.0.0.1
entities
offset34
length13
typeurl
offset48
length9
typeurl
6800C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
6972"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
833
Read events
830
Write events
3
Delete events
0

Modification events

(PID) Process:(4208) re_webhook.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(4208) re_webhook.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(4208) re_webhook.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
0
Suspicious files
6
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
4208re_webhook.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2Dbinary
MD5:7EBB4F29083EA5B2C2A87EB2B2A98D92
SHA256:7A777C2C0DD704DD7C9D02B730BA4A785E9AB4B2721AC168FD48A163839F9C60
4208re_webhook.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2Dbinary
MD5:E1F170B0812F6AAA6F20A31DA190C431
SHA256:4A3AF71CC782D88467B9E3CCD73EA991195E6CF1B381DC5555802DAA81EAE9E3
4208re_webhook.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771binary
MD5:B57BE63C13DB2A03D167B7A8018A3FB1
SHA256:49D91B52207C4C8BCA2C7F1624C471BC7812D47BC33A4CA131ABE32B5C49DCC8
4208re_webhook.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\ACA7D89F79C6EF86F63EB2FF5D5C876A_8AD14988285EE6F6CBBCCEE3BD7C8E58binary
MD5:919787F1CE802E8EEC4A31EC32C84859
SHA256:B61B404F6B2CCFB2157086E6E43FA7979F749DE1A22309A174EAB8E751F07F15
4208re_webhook.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\ACA7D89F79C6EF86F63EB2FF5D5C876A_8AD14988285EE6F6CBBCCEE3BD7C8E58binary
MD5:2D8F54F3E97350D82EEDACC7CBA477F5
SHA256:E1CAFAB0D058F8681DDD7340F68649FC8048C416C45A68B5D8031EB37EFD7367
4208re_webhook.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771binary
MD5:BC8BF5F50F4F0C6A6C6D25C4F60C50C2
SHA256:DD3C0B5B61935FD7949A03733FC9345F386259C6608F5188C11EB88F8161421A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
16
DNS requests
10
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4208
re_webhook.exe
GET
200
192.124.249.36:80
http://ocsp.godaddy.com//MEQwQjBAMD4wPDAJBgUrDgMCGgUABBTkIInKBAzXkF0Qh0pel3lfHJ9GPAQU0sSw0pHUTBFxs2HLPaH%2B3ahq1OMCAxvnFQ%3D%3D
unknown
whitelisted
4208
re_webhook.exe
GET
200
192.124.249.36:80
http://ocsp.godaddy.com//MEkwRzBFMEMwQTAJBgUrDgMCGgUABBS2CA1fbGt26xPkOKX4ZguoUjM0TgQUQMK9J47MNIMwojPX%2B2yz8LQsgM4CCEVy5zGFpEO7
unknown
whitelisted
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4208
re_webhook.exe
GET
200
192.124.249.36:80
http://ocsp.godaddy.com//MEIwQDA%2BMDwwOjAJBgUrDgMCGgUABBQdI2%2BOBkuXH93foRUj4a7lAr4rGwQUOpqFBxBnKLbv9r0FQW4gwZTaD94CAQc%3D
unknown
whitelisted
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
4
System
192.168.100.255:138
whitelisted
4208
re_webhook.exe
149.154.167.220:443
api.telegram.org
Telegram Messenger Inc
GB
whitelisted
4208
re_webhook.exe
192.124.249.36:80
ocsp.godaddy.com
SUCURI-SEC
US
whitelisted
2112
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 2.16.241.12
  • 2.16.241.19
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
google.com
  • 142.250.185.78
whitelisted
api.telegram.org
  • 149.154.167.220
whitelisted
ocsp.godaddy.com
  • 192.124.249.36
  • 192.124.249.24
  • 192.124.249.41
  • 192.124.249.22
  • 192.124.249.23
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 40.126.32.68
  • 20.190.160.22
  • 40.126.32.133
  • 20.190.160.67
  • 20.190.160.128
  • 20.190.160.2
  • 40.126.32.76
  • 20.190.160.5
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Misc activity
ET HUNTING Telegram API Domain in DNS Lookup
4208
re_webhook.exe
Misc activity
ET HUNTING Telegram API Certificate Observed
4208
re_webhook.exe
Misc activity
ET HUNTING Observed Telegram API Domain (api .telegram .org in TLS SNI)
No debug info