URL:

www.google.com

Full analysis: https://app.any.run/tasks/3c5b532c-d251-429f-b45a-9ff0057709c3
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: May 17, 2024, 19:28:41
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
cybergate
rat
Indicators:
MD5:

0A137B375CC3881A70E186CE2172C8D1

SHA1:

D8B99F68B208B5453B391CB0C6C3D6A9824F3C3A

SHA256:

191347BFE55D0CA9A574DB77BC8648275CE258461450E793528E0CC6D2DCF8F5

SSDEEP:

3:EcK:jK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Renames files like ransomware

      • explorer.exe (PID: 1180)
    • Drops the executable file immediately after the start

      • 0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe (PID: 560)
      • 0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe (PID: 2404)
      • 0.exe (PID: 2788)
    • Changes the autorun value in the registry

      • 0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe (PID: 560)
    • Runs injected code in another process

      • 0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe (PID: 560)
    • Application was injected by another process

      • explorer.exe (PID: 1180)
    • CYBERGATE mutex has been found

      • explorer.exe (PID: 1180)
      • 0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe (PID: 2404)
      • svchost.exe (PID: 3036)
      • 0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe (PID: 560)
    • CYBERGATE has been detected (YARA)

      • 0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe (PID: 2404)
  • SUSPICIOUS

    • Uses RUNDLL32.EXE to load library

      • explorer.exe (PID: 1180)
    • Executable content was dropped or overwritten

      • 0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe (PID: 560)
      • 0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe (PID: 2404)
      • 0.exe (PID: 2788)
      • explorer.exe (PID: 1180)
    • Application launched itself

      • 0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe (PID: 560)
      • svchost.exe (PID: 3020)
      • 0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe (PID: 2076)
    • The process creates files with name similar to system file names

      • 0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe (PID: 560)
    • Reads the Internet Settings

      • 0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe (PID: 2404)
      • 0.exe (PID: 2788)
    • Reads Microsoft Outlook installation path

      • 0.exe (PID: 2788)
    • Reads security settings of Internet Explorer

      • 0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe (PID: 2404)
      • 0.exe (PID: 2788)
    • Reads the date of Windows installation

      • 0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe (PID: 2404)
    • Starts itself from another location

      • 0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe (PID: 2404)
    • Process drops legitimate windows executable

      • explorer.exe (PID: 1180)
    • Connects to unusual port

      • 0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe (PID: 2404)
    • Reads Internet Explorer settings

      • 0.exe (PID: 2788)
  • INFO

    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 1600)
      • explorer.exe (PID: 1180)
    • Checks supported languages

      • wmpnscfg.exe (PID: 2304)
      • 0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe (PID: 2404)
      • 0.exe (PID: 2788)
      • svchost.exe (PID: 3020)
      • svchost.exe (PID: 3036)
      • 0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe (PID: 2076)
      • 0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe (PID: 560)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 2304)
      • WinRAR.exe (PID: 1600)
      • rundll32.exe (PID: 2448)
      • 0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe (PID: 2076)
    • Application launched itself

      • iexplore.exe (PID: 3976)
    • Reads the computer name

      • 0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe (PID: 560)
      • wmpnscfg.exe (PID: 2304)
      • 0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe (PID: 2404)
      • 0.exe (PID: 2788)
      • svchost.exe (PID: 3036)
    • Reads security settings of Internet Explorer

      • explorer.exe (PID: 1180)
    • Reads the Internet Settings

      • explorer.exe (PID: 1180)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 1600)
    • Creates files or folders in the user directory

      • 0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe (PID: 560)
      • 0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe (PID: 2404)
    • Create files in a temporary directory

      • 0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe (PID: 2404)
      • 0.exe (PID: 2788)
      • 0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe (PID: 560)
    • Reads the machine GUID from the registry

      • 0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe (PID: 2404)
      • 0.exe (PID: 2788)
    • Checks proxy server information

      • 0.exe (PID: 2788)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
50
Monitored processes
12
Malicious processes
6
Suspicious processes
1

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe wmpnscfg.exe no specs winrar.exe rundll32.exe no specs 0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe no specs 0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe #CYBERGATE 0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe 0.exe svchost.exe no specs svchost.exe no specs explorer.exe

Process information

PID
CMD
Path
Indicators
Parent process
560 C:\Users\admin\Desktop\0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe
0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe
User:
admin
Company:
SFX Cabinet Self-Extractor
Integrity Level:
MEDIUM
Description:
SFX Cabinet Self-Extractor
Exit code:
0
Version:
56.0.5.38
Modules
Images
c:\users\admin\desktop\0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
1180C:\Windows\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\sfc.dll
c:\windows\system32\sfc_os.dll
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
1600"C:\Program Files\WinRAR\WinRAR.exe" x -iext -ow -ver -- "C:\Users\admin\Desktop\0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.7z" C:\Users\admin\Desktop\C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2076"C:\Users\admin\Desktop\0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe" C:\Users\admin\Desktop\0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exeexplorer.exe
User:
admin
Company:
SFX Cabinet Self-Extractor
Integrity Level:
MEDIUM
Description:
SFX Cabinet Self-Extractor
Exit code:
0
Version:
56.0.5.38
Modules
Images
c:\users\admin\desktop\0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
2304"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2404"C:\Users\admin\Desktop\0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe"C:\Users\admin\Desktop\0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe
0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe
User:
admin
Company:
SFX Cabinet Self-Extractor
Integrity Level:
MEDIUM
Description:
SFX Cabinet Self-Extractor
Version:
56.0.5.38
Modules
Images
c:\users\admin\desktop\0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
2448"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\admin\Desktop\0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000C:\Windows\System32\rundll32.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
2788"C:\Users\admin\AppData\Local\Temp\0.exe" C:\Users\admin\AppData\Local\Temp\0.exe
0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3
Modules
Images
c:\users\admin\appdata\local\temp\0.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3020"C:\Users\admin\AppData\Roaming\WinDir\svchost.exe" C:\Users\admin\AppData\Roaming\WinDir\svchost.exe0c0711e1ddfb60af1a4a6cdef6d181f23603fa956cf0e4cd96036ffa169ae000.exe
User:
admin
Company:
SFX Cabinet Self-Extractor
Integrity Level:
MEDIUM
Description:
SFX Cabinet Self-Extractor
Exit code:
0
Version:
56.0.5.38
Modules
Images
c:\users\admin\appdata\roaming\windir\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
3036 C:\Users\admin\AppData\Roaming\WinDir\svchost.exesvchost.exe
User:
admin
Company:
SFX Cabinet Self-Extractor
Integrity Level:
MEDIUM
Description:
SFX Cabinet Self-Extractor
Exit code:
0
Version:
56.0.5.38
Modules
Images
c:\users\admin\appdata\roaming\windir\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
Total events
36 713
Read events
36 399
Write events
275
Delete events
39

Modification events

(PID) Process:(3976) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(3976) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(3976) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
31107216
(PID) Process:(3976) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(3976) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
31107216
(PID) Process:(3976) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3976) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3976) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3976) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3976) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
16
Suspicious files
22
Text files
112
Unknown types
5

Dropped files

PID
Process
Filename
Type
3976iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776der
MD5:F646488E081A5C175CE1FB03BA482264
SHA256:E6312E65983DF0745340CF492DE216BE2CF14F34CEBA56A53B26A5F196C31F8F
3976iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EAF8AA29A62AB29E614331747385D816_F9E4DC0B9D5C777357D7DB8DEF51118Ader
MD5:EA1DD749AB0C7EA0E002F788CFF5A77E
SHA256:2F5BCF7533FEFEF33C1ED6F79391218FFAC7C6462793D7757252BEE701326D90
3976iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\favicon[1].icoimage
MD5:DA597791BE3B6E732F0BC8B20E38EE62
SHA256:5B2C34B3C4E8DD898B664DBA6C3786E2FF9869EFF55D673AA48361F11325ED07
3976iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\favicon[2].icoimage
MD5:DA597791BE3B6E732F0BC8B20E38EE62
SHA256:5B2C34B3C4E8DD898B664DBA6C3786E2FF9869EFF55D673AA48361F11325ED07
4032iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\WKCMR3AR.txttext
MD5:DCF7D3F23B4254A76FE64EF40505D586
SHA256:EC616DFDCF2BB480CD044CC230F4A71E0D54A23B429016367F28E67F8A98D82F
3976iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EAF8AA29A62AB29E614331747385D816_F9E4DC0B9D5C777357D7DB8DEF51118Abinary
MD5:D66575D180870DD8712617FC18D0EE53
SHA256:72F10B7FE4E52249A2728262EB3FACEEE16CF7A8AA04A9D70CBA05BB6A0A3E8D
4032iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B3513D73A177A2707D910183759B389B_F8F6C069508885E4D6FA02C336AA15B6binary
MD5:42564CA4068B8E6287AF3394AB69A3EC
SHA256:D499B6131181BB3D992FFF030AAEB8DD897A87085CD8B2E1646DA6E0D6D787F8
3976iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.icoimage
MD5:DA597791BE3B6E732F0BC8B20E38EE62
SHA256:5B2C34B3C4E8DD898B664DBA6C3786E2FF9869EFF55D673AA48361F11325ED07
4032iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAbinary
MD5:386FEB72B6BFBE77ADCE5960E28786B2
SHA256:C7A2114ADBEB20C2C94F5D50EA910F9796B722C3C7E51F945F5FD4F58C53EECD
4032iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAder
MD5:53862D1AB988D34291A2AD4F3B89992D
SHA256:B83171BA7B968AC2192074760279D30F354D9E8DB162039BA98C979DE99F63B0
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
14
TCP/UDP connections
28
DNS requests
23
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4032
iexplore.exe
GET
302
142.250.186.164:80
http://www.google.com/
unknown
unknown
3976
iexplore.exe
GET
304
80.239.138.74:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?a0d881e768a03905
unknown
unknown
3976
iexplore.exe
GET
304
80.239.138.33:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?260f79dbb405aab9
unknown
unknown
3976
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAzlnDD9eoNTLi0BRrMy%2BWU%3D
unknown
unknown
4032
iexplore.exe
GET
429
142.250.186.164:80
http://www.google.com/sorry/index?continue=http://www.google.com/&q=EgRX-YQsGPHfnrIGIjCR9x7VOLQNAnf2A-qDGmHJ_SlpJX5UYWPHHZeB1YXL11A2OWq9wlGl_trSHbgol7oyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
unknown
unknown
4032
iexplore.exe
GET
200
142.250.181.227:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
unknown
4032
iexplore.exe
GET
200
142.250.181.227:80
http://c.pki.goog/r/r1.crl
unknown
unknown
4032
iexplore.exe
GET
200
142.250.181.227:80
http://o.pki.goog/wr2/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRTQtSEi8EX%2BbYUTXd8%2ByMxD3s1zQQU3hse7XkV1D43JMMhu%2Bw0OW1CsjACEQCJpTHr%2BknHZxDj7EG2XHs5
unknown
unknown
3976
iexplore.exe
GET
200
142.250.186.164:80
http://www.google.com/favicon.ico
unknown
unknown
3976
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
unknown
4
System
192.168.100.255:137
whitelisted
224.0.0.252:5355
unknown
4032
iexplore.exe
142.250.186.164:80
www.google.com
GOOGLE
US
whitelisted
3976
iexplore.exe
92.123.236.65:443
www.bing.com
Akamai International B.V.
FR
unknown
3976
iexplore.exe
80.239.138.74:80
ctldl.windowsupdate.com
Telia Company AB
DE
unknown
3976
iexplore.exe
80.239.138.33:80
ctldl.windowsupdate.com
Telia Company AB
DE
unknown
3976
iexplore.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4032
iexplore.exe
142.250.186.164:443
www.google.com
GOOGLE
US
whitelisted
4032
iexplore.exe
142.250.181.227:80
ocsp.pki.goog
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
www.google.com
  • 142.250.186.164
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 92.123.236.50
  • 92.123.236.34
  • 92.123.236.41
  • 92.123.236.35
  • 92.123.236.65
  • 92.123.236.72
  • 92.123.236.51
  • 92.123.236.57
  • 92.123.236.75
whitelisted
ctldl.windowsupdate.com
  • 80.239.138.33
  • 80.239.138.35
  • 80.239.138.74
  • 80.239.138.83
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
ocsp.pki.goog
  • 142.250.181.227
whitelisted
c.pki.goog
  • 142.250.181.227
unknown
o.pki.goog
  • 142.250.181.227
unknown
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted

Threats

PID
Process
Class
Message
1088
svchost.exe
Potentially Bad Traffic
ET INFO DYNAMIC_DNS Query to a *.doesntexist .com Domain
No debug info