File name:

EasyBCD 2.4.exe

Full analysis: https://app.any.run/tasks/b47fa2ac-77f6-4705-a5bb-200a2d067ea5
Verdict: Malicious activity
Analysis date: July 11, 2025, 22:15:46
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

2E06476EBE1137F543EE7176D34716E7

SHA1:

6EAA6AA0E829CE8AF54213F6DE77E748C4388E23

SHA256:

0A94A43AF2DB7BDBADA87B34BF03D3B221110D1CA21BBEBEC55B08767C1281CC

SSDEEP:

98304:ilHlURur2ooGWFdzLmi9pimQ43ZIbI7KjDgXC5b7V6n0pWzvx4X1aex55V9WSdzu:hBma

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • EasyBCD 2.4.exe (PID: 2716)
    • The process creates files with name similar to system file names

      • EasyBCD 2.4.exe (PID: 2716)
    • Uses TASKKILL.EXE to kill process

      • EasyBCD 2.4.exe (PID: 2716)
    • Reads security settings of Internet Explorer

      • EasyBCD 2.4.exe (PID: 2716)
      • EasyBCD.exe (PID: 2532)
    • Process drops legitimate windows executable

      • EasyBCD 2.4.exe (PID: 2716)
    • Executable content was dropped or overwritten

      • EasyBCD 2.4.exe (PID: 2716)
    • Creates a software uninstall entry

      • EasyBCD 2.4.exe (PID: 2716)
    • There is functionality for taking screenshot (YARA)

      • EasyBCD 2.4.exe (PID: 2716)
    • Reads Internet Explorer settings

      • EasyBCD.exe (PID: 2532)
    • Reads the date of Windows installation

      • EasyBCD.exe (PID: 2532)
  • INFO

    • Checks supported languages

      • EasyBCD 2.4.exe (PID: 2716)
      • EasyBCD.exe (PID: 2532)
      • UtfRedirect.exe (PID: 2228)
      • BootGrabber.exe (PID: 1984)
      • bcdedit.exe (PID: 5744)
      • UtfRedirect.exe (PID: 5556)
      • bcdedit.exe (PID: 420)
      • UtfRedirect.exe (PID: 4808)
      • bcdedit.exe (PID: 6508)
      • UtfRedirect.exe (PID: 3908)
      • UtfRedirect.exe (PID: 6940)
      • bcdedit.exe (PID: 6360)
      • UtfRedirect.exe (PID: 3720)
      • bcdedit.exe (PID: 4864)
      • bcdedit.exe (PID: 1852)
      • bcdedit.exe (PID: 3872)
      • bcdedit.exe (PID: 4832)
      • UtfRedirect.exe (PID: 4400)
      • bcdedit.exe (PID: 6320)
      • UtfRedirect.exe (PID: 2148)
      • UtfRedirect.exe (PID: 6516)
      • bcdedit.exe (PID: 6680)
      • UtfRedirect.exe (PID: 4520)
    • Reads the computer name

      • EasyBCD 2.4.exe (PID: 2716)
      • EasyBCD.exe (PID: 2532)
    • Process checks computer location settings

      • EasyBCD 2.4.exe (PID: 2716)
      • EasyBCD.exe (PID: 2532)
    • Create files in a temporary directory

      • EasyBCD 2.4.exe (PID: 2716)
      • EasyBCD.exe (PID: 2532)
      • msfeedssync.exe (PID: 5772)
      • msfeedssync.exe (PID: 4860)
    • Creates files in the program directory

      • EasyBCD 2.4.exe (PID: 2716)
    • The sample compiled with english language support

      • EasyBCD 2.4.exe (PID: 2716)
    • Creates files or folders in the user directory

      • EasyBCD.exe (PID: 2532)
    • Reads the machine GUID from the registry

      • EasyBCD.exe (PID: 2532)
    • Reads Environment values

      • EasyBCD.exe (PID: 2532)
    • Checks proxy server information

      • EasyBCD.exe (PID: 2532)
      • msfeedssync.exe (PID: 4860)
      • slui.exe (PID: 6812)
    • Process checks whether UAC notifications are on

      • EasyBCD.exe (PID: 2532)
    • Reads the software policy settings

      • EasyBCD.exe (PID: 2532)
      • slui.exe (PID: 6812)
    • Reads security settings of Internet Explorer

      • msfeedssync.exe (PID: 5772)
      • msfeedssync.exe (PID: 4860)
    • Disables trace logs

      • EasyBCD.exe (PID: 2532)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2018:01:30 03:57:38+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 25088
InitializedDataSize: 118784
UninitializedDataSize: 1024
EntryPoint: 0x3328
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
179
Monitored processes
40
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start easybcd 2.4.exe taskkill.exe no specs conhost.exe no specs easybcd.exe bootgrabber.exe no specs conhost.exe no specs msfeedssync.exe utfredirect.exe no specs msfeedssync.exe no specs conhost.exe no specs utfredirect.exe no specs conhost.exe no specs bcdedit.exe no specs bcdedit.exe no specs slui.exe utfredirect.exe no specs conhost.exe no specs bcdedit.exe no specs utfredirect.exe no specs conhost.exe no specs bcdedit.exe no specs utfredirect.exe no specs conhost.exe no specs bcdedit.exe no specs utfredirect.exe no specs conhost.exe no specs bcdedit.exe no specs utfredirect.exe no specs conhost.exe no specs bcdedit.exe no specs utfredirect.exe no specs conhost.exe no specs bcdedit.exe no specs utfredirect.exe no specs conhost.exe no specs bcdedit.exe no specs utfredirect.exe no specs conhost.exe no specs bcdedit.exe no specs easybcd 2.4.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
304\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeUtfRedirect.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
420"C:\Program Files (x86)\NeoSmart Technologies\EasyBCD\bin\bcdedit.exe" /enum allC:\Program Files (x86)\NeoSmart Technologies\EasyBCD\bin\bcdedit.exeUtfRedirect.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Boot Configuration Data Editor
Exit code:
0
Version:
6.2.8250.0 (winmain_win8beta.120217-1520)
Modules
Images
c:\program files (x86)\neosmart technologies\easybcd\bin\bcdedit.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
864\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeUtfRedirect.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1052\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exetaskkill.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1352\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeBootGrabber.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1852"C:\Program Files (x86)\NeoSmart Technologies\EasyBCD\bin\bcdedit.exe" /set {7cf009c6-239c-11ed-b4aa-99f4f79029c5} systemroot \WindowsC:\Program Files (x86)\NeoSmart Technologies\EasyBCD\bin\bcdedit.exeUtfRedirect.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Boot Configuration Data Editor
Exit code:
0
Version:
6.2.8250.0 (winmain_win8beta.120217-1520)
Modules
Images
c:\program files (x86)\neosmart technologies\easybcd\bin\bcdedit.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
1984"C:\Program Files (x86)\NeoSmart Technologies\EasyBCD\bin\bootgrabber.exe" /tlistC:\Program Files (x86)\NeoSmart Technologies\EasyBCD\bin\BootGrabber.exeEasyBCD.exe
User:
admin
Company:
NeoSmart Technologies
Integrity Level:
HIGH
Description:
EasyBCD boot helper
Exit code:
0
Version:
1.0.0.1
Modules
Images
c:\program files (x86)\neosmart technologies\easybcd\bin\bootgrabber.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
2148"C:\Program Files (x86)\NeoSmart Technologies\EasyBCD\bin\UtfRedirect.exe"C:\Program Files (x86)\NeoSmart Technologies\EasyBCD\bin\UtfRedirect.exeEasyBCD.exe
User:
admin
Company:
NeoSmart Technologies
Integrity Level:
HIGH
Description:
UTF8 codepage proxy application
Exit code:
1
Version:
1.0.0.1
Modules
Images
c:\program files (x86)\neosmart technologies\easybcd\bin\utfredirect.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
2228"C:\Program Files (x86)\NeoSmart Technologies\EasyBCD\bin\UtfRedirect.exe"C:\Program Files (x86)\NeoSmart Technologies\EasyBCD\bin\UtfRedirect.exeEasyBCD.exe
User:
admin
Company:
NeoSmart Technologies
Integrity Level:
HIGH
Description:
UTF8 codepage proxy application
Exit code:
0
Version:
1.0.0.1
Modules
Images
c:\program files (x86)\neosmart technologies\easybcd\bin\utfredirect.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
2532"C:\Program Files (x86)\NeoSmart Technologies\EasyBCD\EasyBCD.exe"C:\Program Files (x86)\NeoSmart Technologies\EasyBCD\EasyBCD.exe
EasyBCD 2.4.exe
User:
admin
Company:
NeoSmart Technologies
Integrity Level:
HIGH
Description:
EasyBCD
Exit code:
0
Version:
2.4.0.237
Modules
Images
c:\program files (x86)\neosmart technologies\easybcd\easybcd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
10 210
Read events
9 390
Write events
552
Delete events
268

Modification events

(PID) Process:(2716) EasyBCD 2.4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\EasyBCD
Operation:writeName:DisplayName
Value:
EasyBCD 2.4
(PID) Process:(2716) EasyBCD 2.4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\EasyBCD
Operation:writeName:UninstallString
Value:
C:\Program Files (x86)\NeoSmart Technologies\EasyBCD\uninstall.exe
(PID) Process:(2716) EasyBCD 2.4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\EasyBCD
Operation:writeName:DisplayIcon
Value:
C:\Program Files (x86)\NeoSmart Technologies\EasyBCD\EasyBCD.exe
(PID) Process:(2716) EasyBCD 2.4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\EasyBCD
Operation:writeName:HelpLink
Value:
http://neosmart.net/forums/
(PID) Process:(2716) EasyBCD 2.4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\EasyBCD
Operation:writeName:URLUpdateInfo
Value:
http://neosmart.net/EasyBCD/
(PID) Process:(2716) EasyBCD 2.4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\EasyBCD
Operation:writeName:VersionMajor
Value:
2
(PID) Process:(2716) EasyBCD 2.4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\EasyBCD
Operation:writeName:VersionMinor
Value:
4
(PID) Process:(2716) EasyBCD 2.4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\EasyBCD
Operation:writeName:NoModify
Value:
1
(PID) Process:(2716) EasyBCD 2.4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\EasyBCD
Operation:writeName:NoRepair
Value:
1
(PID) Process:(2716) EasyBCD 2.4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\EasyBCD
Operation:writeName:DisplayVersion
Value:
2.4
Executable files
18
Suspicious files
51
Text files
310
Unknown types
0

Dropped files

PID
Process
Filename
Type
2716EasyBCD 2.4.exeC:\Users\admin\AppData\Local\Temp\nsp5BDD.tmp\modern-wizard.bmpimage
MD5:1ED71CEF099AE50505B5F495CC50E2A2
SHA256:B177ADA6638B5869390C39405CAF5BEF6FA74AFAFE00BCD14DE5282867E47A26
2716EasyBCD 2.4.exeC:\Users\admin\AppData\Local\Temp\nsp5BDD.tmp\ioSpecial.initext
MD5:E2D5070BC28DB1AC745613689FF86067
SHA256:D95AED234F932A1C48A2B1B0D98C60CA31F962310C03158E2884AB4DDD3EA1E0
2716EasyBCD 2.4.exeC:\Program Files (x86)\NeoSmart Technologies\EasyBCD\Newtonsoft.Json.dllexecutable
MD5:0953851089821550EF013B487DA3915A
SHA256:4A56EF352F84AD19C1B4486C7C9E64FEF9A67C464C62E51BABABA79CD2D89551
2716EasyBCD 2.4.exeC:\Users\admin\AppData\Local\Temp\nsp5BDD.tmp\System.dllexecutable
MD5:B0C77267F13B2F87C084FD86EF51CCFC
SHA256:A0CAC4CF4852895619BC7743EBEB89F9E4927CCDB9E66B1BCD92A4136D0F9C77
2716EasyBCD 2.4.exeC:\Program Files (x86)\NeoSmart Technologies\EasyBCD\NeoSmart.Localization.dllexecutable
MD5:AD0A59AE87D4BA106E965C62F0BC3D88
SHA256:3A56005B2EFB34620019EF432FE90EEB63726FC78B37BE841F25C2AED82EB1DB
2716EasyBCD 2.4.exeC:\Program Files (x86)\NeoSmart Technologies\EasyBCD\LICENSEtext
MD5:2458D2762467CD07CC91448A30A2E572
SHA256:FFBFE4D5757BD4315B79F55B9151625C29110EA16ABF81517D27E17136BF4094
2716EasyBCD 2.4.exeC:\Users\admin\AppData\Local\Temp\nsp5BDD.tmp\InstallOptions.dllexecutable
MD5:8D5A5529462A9BA1AC068EE0502578C7
SHA256:E625DCD0188594B1289891B64DEBDDEB5159ACA182B83A12675427B320BF7790
2716EasyBCD 2.4.exeC:\Program Files (x86)\NeoSmart Technologies\EasyBCD\EasyBCD.exeexecutable
MD5:E478C92160A3C73C77CDC9F515DFD8B0
SHA256:6A6E16C176004128B918EF3F9ECF1D51D828E6099FBA6542B5AC6ABDB67C1030
2716EasyBCD 2.4.exeC:\Program Files (x86)\NeoSmart Technologies\EasyBCD\bin\bcdboot.exeexecutable
MD5:9F9E397630A146E875735F2F42339E6B
SHA256:9898F537B8D3097A05B42F42523CD66FCA7C020E8083EDBE461E6D9A12DD168E
2716EasyBCD 2.4.exeC:\Program Files (x86)\NeoSmart Technologies\EasyBCD\bin\bcdedit.exeexecutable
MD5:A60CBAEA0F8AC802D21C0CC7BC2589BE
SHA256:8BF1B71182FED18D6B4112BDC4D496800B5BF6681DE4C4F6536BA67378F38A12
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
29
DNS requests
23
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3944
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6428
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6428
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
2532
EasyBCD.exe
GET
302
65.182.170.12:80
http://feeds.neosmart.net/neosmart
unknown
whitelisted
2532
EasyBCD.exe
GET
142.250.186.179:80
http://rss.neosmart.net/neosmart
unknown
whitelisted
4860
msfeedssync.exe
GET
302
65.182.170.12:80
http://feeds.neosmart.net/neosmart
unknown
whitelisted
4860
msfeedssync.exe
GET
200
142.250.186.179:80
http://rss.neosmart.net/neosmart
unknown
whitelisted
2940
svchost.exe
GET
200
23.209.209.135:80
http://x1.c.lencr.org/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4844
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
1268
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1268
svchost.exe
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3944
svchost.exe
20.190.159.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3944
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
  • 20.73.194.208
whitelisted
google.com
  • 142.250.185.174
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 2.23.246.101
whitelisted
login.live.com
  • 20.190.159.71
  • 20.190.159.4
  • 40.126.31.69
  • 20.190.159.75
  • 20.190.159.64
  • 20.190.159.68
  • 40.126.31.129
  • 20.190.159.2
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
client.wns.windows.com
  • 172.211.123.250
  • 172.211.123.249
whitelisted
nexusrules.officeapps.live.com
  • 52.111.236.22
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

PID
Process
Class
Message
2532
EasyBCD.exe
Misc activity
ET INFO Observed UA-CPU Header
No debug info