File name:

HackerDz.exe

Full analysis: https://app.any.run/tasks/6f5b4914-1071-4d7c-8c42-4fc1a81b90c9
Verdict: Malicious activity
Analysis date: May 19, 2025, 11:45:26
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
jeefo
auto-reg
discord
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 3 sections
MD5:

9CD9B382CBFF666A39A1EC2BDE607891

SHA1:

49F6972C21C59F89284C2F0904FBEF9B30A6C800

SHA256:

08FE1D79059D1DEF2822C7C222BFA749C20B13137B8B82367FB8C42B123274AB

SSDEEP:

6144:i0/1Thw5w4qjPRrf2VrRZHMrbLcPN7QLi8NiTbXA:5cPNCNiTLA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • JEEFO has been detected

      • HackerDz.exe (PID: 4408)
      • icsys.icn.exe (PID: 3240)
      • svchost.exe (PID: 4220)
      • explorer.exe (PID: 4980)
    • Changes the autorun value in the registry

      • explorer.exe (PID: 4980)
      • svchost.exe (PID: 4220)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • HackerDz.exe (PID: 4408)
      • icsys.icn.exe (PID: 3240)
      • explorer.exe (PID: 4980)
      • spoolsv.exe (PID: 1276)
    • Starts application with an unusual extension

      • HackerDz.exe (PID: 4408)
    • Starts itself from another location

      • HackerDz.exe (PID: 4408)
      • explorer.exe (PID: 4980)
      • spoolsv.exe (PID: 1276)
      • svchost.exe (PID: 4220)
      • icsys.icn.exe (PID: 3240)
    • The process creates files with name similar to system file names

      • icsys.icn.exe (PID: 3240)
      • spoolsv.exe (PID: 1276)
    • Executing commands from a ".bat" file

      • hackerdz.exe  (PID: 920)
    • Starts CMD.EXE for commands execution

      • hackerdz.exe  (PID: 920)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 4448)
    • Creates or modifies Windows services

      • svchost.exe (PID: 4220)
  • INFO

    • The sample compiled with english language support

      • HackerDz.exe (PID: 4408)
    • Create files in a temporary directory

      • HackerDz.exe (PID: 4408)
      • icsys.icn.exe (PID: 3240)
      • hackerdz.exe  (PID: 920)
      • explorer.exe (PID: 4980)
      • spoolsv.exe (PID: 1276)
      • svchost.exe (PID: 4220)
      • spoolsv.exe (PID: 4696)
    • Checks supported languages

      • HackerDz.exe (PID: 4408)
      • icsys.icn.exe (PID: 3240)
      • hackerdz.exe  (PID: 920)
      • spoolsv.exe (PID: 1276)
      • svchost.exe (PID: 4220)
      • explorer.exe (PID: 4980)
      • spoolsv.exe (PID: 4696)
      • identity_helper.exe (PID: 5600)
    • Auto-launch of the file from Registry key

      • svchost.exe (PID: 4220)
      • explorer.exe (PID: 4980)
    • Reads security settings of Internet Explorer

      • cmd.exe (PID: 4448)
    • Reads the computer name

      • svchost.exe (PID: 4220)
      • identity_helper.exe (PID: 5600)
    • Manual execution by a user

      • svchost.exe (PID: 7880)
      • explorer.exe (PID: 7936)
      • msedge.exe (PID: 5968)
      • svchost.exe (PID: 7952)
      • msedge.exe (PID: 4164)
    • Application launched itself

      • msedge.exe (PID: 4920)
      • msedge.exe (PID: 5968)
    • Reads Environment values

      • identity_helper.exe (PID: 5600)
    • Attempting to use instant messaging service

      • msedge.exe (PID: 2516)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2013:04:01 07:08:22+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 106496
InitializedDataSize: 12288
UninitializedDataSize: -
EntryPoint: 0x290c
OSVersion: 4
ImageVersion: 1
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
ProductName: Project1
FileVersion: 1
ProductVersion: 1
InternalName: TJprojMain
OriginalFileName: TJprojMain.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
184
Monitored processes
57
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #JEEFO hackerdz.exe hackerdz.exe  no specs #JEEFO icsys.icn.exe conhost.exe no specs cmd.exe no specs #JEEFO explorer.exe powershell.exe no specs spoolsv.exe #JEEFO svchost.exe spoolsv.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs svchost.exe no specs explorer.exe no specs svchost.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs slui.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs hackerdz.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
684"C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.59\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=6592 --field-trial-handle=2380,i,16354387876830473594,14277515331972283930,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.59\identity_helper.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
PWA Identity Proxy Host
Exit code:
3221226029
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\identity_helper.exe
c:\windows\system32\ntdll.dll
920c:\users\admin\desktop\hackerdz.exe  C:\Users\admin\Desktop\hackerdz.exe HackerDz.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\hackerdz.exe 
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1072"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.59 --initial-client-data=0x310,0x314,0x318,0x308,0x320,0x7ffc89dd5fd8,0x7ffc89dd5fe4,0x7ffc89dd5ff0C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
1276c:\windows\resources\spoolsv.exe SEC:\Windows\Resources\spoolsv.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
1.00
Modules
Images
c:\windows\resources\spoolsv.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvbvm60.dll
1600"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --mojo-platform-channel-handle=7376 --field-trial-handle=2380,i,16354387876830473594,14277515331972283930,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1628"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=2564 --field-trial-handle=2380,i,16354387876830473594,14277515331972283930,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2236"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2584 --field-trial-handle=2400,i,5814528047996816622,12851423638111982961,262144 --variations-seed-version /prefetch:3C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
2516"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2556 --field-trial-handle=2380,i,16354387876830473594,14277515331972283930,262144 --variations-seed-version /prefetch:3C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2800"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --no-appcompat-clear --mojo-platform-channel-handle=5744 --field-trial-handle=2380,i,16354387876830473594,14277515331972283930,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2908"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5972 --field-trial-handle=2380,i,16354387876830473594,14277515331972283930,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
13 642
Read events
13 593
Write events
45
Delete events
4

Modification events

(PID) Process:(4408) HackerDz.exeKey:HKEY_CURRENT_USER\SOFTWARE\VB and VBA Program Settings\Explorer\Process
Operation:writeName:LO
Value:
1
(PID) Process:(3240) icsys.icn.exeKey:HKEY_CURRENT_USER\SOFTWARE\VB and VBA Program Settings\Explorer\Process
Operation:writeName:LO
Value:
1
(PID) Process:(4980) explorer.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
Operation:writeName:Explorer
Value:
c:\windows\resources\themes\explorer.exe RO
(PID) Process:(4980) explorer.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
Operation:writeName:Svchost
Value:
c:\windows\resources\svchost.exe RO
(PID) Process:(4980) explorer.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
Operation:delete valueName:Explorer
Value:
(PID) Process:(4980) explorer.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
Operation:delete valueName:Svchost
Value:
(PID) Process:(4220) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
Operation:writeName:Explorer
Value:
c:\windows\resources\themes\explorer.exe RO
(PID) Process:(4220) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
Operation:writeName:Svchost
Value:
c:\windows\resources\svchost.exe RO
(PID) Process:(4220) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
Operation:delete valueName:Explorer
Value:
(PID) Process:(4220) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
Operation:delete valueName:Svchost
Value:
Executable files
11
Suspicious files
261
Text files
34
Unknown types
2

Dropped files

PID
Process
Filename
Type
920hackerdz.exe C:\Users\admin\AppData\Local\Temp\C3DE.tmp\C3DF.tmp\C3E0.battext
MD5:040D7AAE1959776134A7469923D7B3AE
SHA256:D5666B9881D9027B109FC0BFF36DFB56A91F6E5561D3648A30293230A2F20D6B
4980explorer.exeC:\Windows\Resources\spoolsv.exeexecutable
MD5:85184D2C799CE48FCDE96F323BDF0F12
SHA256:11E9005DCECED5D1CE94AF3F2405CD2D1F6BDC12D5B357D678FC7D0FFE69033E
3240icsys.icn.exeC:\Windows\Resources\Themes\explorer.exeexecutable
MD5:53682A0B64380F880767340C9E2C3478
SHA256:039F9A456E3E0F3D6E938F2686046628190BC8F5EB028F926AFE46BBE7B20B71
4408HackerDz.exeC:\Windows\Resources\Themes\icsys.icn.exeexecutable
MD5:7FE0BC03CDA586BF51CC2DBD97446C1D
SHA256:1D23DC303CB0AA018B3283CEE1848844C61083A9380C19B790BD3E1F5D007456
1276spoolsv.exeC:\Windows\Resources\svchost.exeexecutable
MD5:3B18680CEEC3490116560597A8B7072F
SHA256:4B8C44F7AE31912299AB29FD33F837DF0C60260C288F60589303DE934B89D358
6044powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_2nvfa5ia.u3l.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
5968msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF10d999.TMP
MD5:
SHA256:
5968msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old~RF10d999.TMP
MD5:
SHA256:
5968msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
4408HackerDz.exeC:\Users\admin\Desktop\hackerdz.exe executable
MD5:26E601FA0FDD4E13EDAC588799400E41
SHA256:DC9F5820E60DC7A99C4763D992381B45FE937AA254B77DDC99721D0304151F9D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
16
TCP/UDP connections
79
DNS requests
53
Threats
29

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5364
svchost.exe
GET
200
23.48.23.7:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/bf8090eb-6e5c-4c51-9250-5bf9b46cf160?P1=1747700501&P2=404&P3=2&P4=axBsSRF4kIz%2bSvAldVwzJ5Na1iDigSBab0U56fsrhOPhzBNGgDceis9btppeVOboLNd18V3o8ijnmCVwVLqFvw%3d%3d
unknown
whitelisted
5364
svchost.exe
GET
206
23.48.23.7:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/a575cead-e662-4f4d-b0c3-81f1438d0388?P1=1747700501&P2=404&P3=2&P4=n6oBNLHhID0kMwKunixrJ%2bjWxKpfB%2f8r32lmQpGZ5c8hEL3VlqrA%2bGsZB8ewiBn9BXQUaG0LRrCoSCsiDR3yeQ%3d%3d
unknown
whitelisted
5364
svchost.exe
GET
206
23.48.23.7:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/a575cead-e662-4f4d-b0c3-81f1438d0388?P1=1747700501&P2=404&P3=2&P4=n6oBNLHhID0kMwKunixrJ%2bjWxKpfB%2f8r32lmQpGZ5c8hEL3VlqrA%2bGsZB8ewiBn9BXQUaG0LRrCoSCsiDR3yeQ%3d%3d
unknown
whitelisted
5364
svchost.exe
HEAD
200
23.48.23.7:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/bf8090eb-6e5c-4c51-9250-5bf9b46cf160?P1=1747700501&P2=404&P3=2&P4=axBsSRF4kIz%2bSvAldVwzJ5Na1iDigSBab0U56fsrhOPhzBNGgDceis9btppeVOboLNd18V3o8ijnmCVwVLqFvw%3d%3d
unknown
whitelisted
5364
svchost.exe
HEAD
200
23.48.23.7:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/9b9f8fb4-8a65-41e4-bda3-5416858f0aeb?P1=1747700501&P2=404&P3=2&P4=EsFMo2qX83a%2f0gskYyYj6ehtchBhVjNhz%2fzyH0R5i8uWkkyf3aSHKZLsCGCqYMBuRx2FiJX4bcu6zztkEVsU%2bQ%3d%3d
unknown
whitelisted
2104
svchost.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5364
svchost.exe
HEAD
200
23.48.23.7:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/a575cead-e662-4f4d-b0c3-81f1438d0388?P1=1747700501&P2=404&P3=2&P4=n6oBNLHhID0kMwKunixrJ%2bjWxKpfB%2f8r32lmQpGZ5c8hEL3VlqrA%2bGsZB8ewiBn9BXQUaG0LRrCoSCsiDR3yeQ%3d%3d
unknown
whitelisted
5364
svchost.exe
GET
206
23.48.23.7:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/a575cead-e662-4f4d-b0c3-81f1438d0388?P1=1747700501&P2=404&P3=2&P4=n6oBNLHhID0kMwKunixrJ%2bjWxKpfB%2f8r32lmQpGZ5c8hEL3VlqrA%2bGsZB8ewiBn9BXQUaG0LRrCoSCsiDR3yeQ%3d%3d
unknown
whitelisted
2104
svchost.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5364
svchost.exe
GET
206
23.48.23.7:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/a575cead-e662-4f4d-b0c3-81f1438d0388?P1=1747700501&P2=404&P3=2&P4=n6oBNLHhID0kMwKunixrJ%2bjWxKpfB%2f8r32lmQpGZ5c8hEL3VlqrA%2bGsZB8ewiBn9BXQUaG0LRrCoSCsiDR3yeQ%3d%3d
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2104
svchost.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2104
svchost.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5968
msedge.exe
239.255.255.250:1900
whitelisted
2516
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2516
msedge.exe
13.107.246.45:443
edge-mobile-static.azureedge.net
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.206
whitelisted
crl.microsoft.com
  • 2.16.241.12
  • 2.16.241.19
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
discord.gg
  • 162.159.134.234
  • 162.159.136.234
  • 162.159.130.234
  • 162.159.133.234
  • 162.159.135.234
whitelisted
edge.microsoft.com
  • 150.171.27.11
  • 150.171.28.11
  • 150.171.30.11
  • 150.171.29.11
whitelisted
edge-mobile-static.azureedge.net
  • 13.107.246.45
whitelisted
business.bing.com
  • 13.107.6.158
whitelisted
discord.com
  • 162.159.136.232
  • 162.159.128.233
  • 162.159.138.232
  • 162.159.135.232
  • 162.159.137.232
whitelisted

Threats

PID
Process
Class
Message
2516
msedge.exe
Misc activity
ET INFO Observed Discord Domain in DNS Lookup (discord .com)
2516
msedge.exe
Misc activity
ET INFO Observed Discord Domain in DNS Lookup (discord .com)
2516
msedge.exe
Misc activity
ET INFO Discord Chat Service Domain in DNS Lookup (discord .com)
2516
msedge.exe
Misc activity
ET INFO Discord Chat Service Domain in DNS Lookup (discord .com)
2516
msedge.exe
Misc activity
ET INFO Observed Discord Domain in DNS Lookup (discord .com)
2516
msedge.exe
Misc activity
ET INFO Observed Discord Domain in DNS Lookup (discord .com)
2516
msedge.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
2516
msedge.exe
Misc activity
ET INFO Discord Chat Service Domain in DNS Lookup (discord .com)
2516
msedge.exe
Misc activity
ET INFO Observed Discord Service Domain (discord .com) in TLS SNI
2516
msedge.exe
Misc activity
ET INFO Discord Chat Service Domain in DNS Lookup (discord .com)
No debug info