URL:

http://210.74.41.187/UnionPayCertService/jumpCertDown.html

Full analysis: https://app.any.run/tasks/a722a63c-d18e-4e31-90fa-7df6561f5258
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: April 17, 2024, 04:38:32
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MD5:

F355050ACC39D7BC92CF444200AC2572

SHA1:

60FE0EFE5C0CECFD9F4504DFE640AE91151CA1FD

SHA256:

2309526C47ADC356A42C4CB85FE499B1603E5D2A99B270484EF926669F192674

SSDEEP:

3:N1K/Nf4KycQA3dBJ/Q:CBQAnJ/Q

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • CryptoKit.CertEnrollment.UD.x86.exe (PID: 3932)
    • Creates a writable file in the system directory

      • CryptoKit.CertEnrollment.UD.x86.exe (PID: 3932)
    • Registers / Runs the DLL via REGSVR32.EXE

      • CryptoKit.CertEnrollment.UD.x86.exe (PID: 3932)
  • SUSPICIOUS

    • The process creates files with name similar to system file names

      • CryptoKit.CertEnrollment.UD.x86.exe (PID: 3932)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • CryptoKit.CertEnrollment.UD.x86.exe (PID: 3932)
    • Executable content was dropped or overwritten

      • CryptoKit.CertEnrollment.UD.x86.exe (PID: 3932)
    • Creates/Modifies COM task schedule object

      • regsvr32.exe (PID: 2120)
    • Creates a software uninstall entry

      • CryptoKit.CertEnrollment.UD.x86.exe (PID: 3932)
    • Reads the Internet Settings

      • regsvr32.exe (PID: 2120)
    • Adds/modifies Windows certificates

      • regsvr32.exe (PID: 2120)
    • Changes internet zones settings

      • regsvr32.exe (PID: 2120)
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 2068)
      • chrome.exe (PID: 2556)
      • iexplore.exe (PID: 3976)
    • Drops the executable file immediately after the start

      • iexplore.exe (PID: 3172)
      • iexplore.exe (PID: 2068)
    • Manual execution by a user

      • chrome.exe (PID: 2556)
      • iexplore.exe (PID: 3976)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 2068)
    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 2068)
      • iexplore.exe (PID: 3172)
    • Checks supported languages

      • CryptoKit.CertEnrollment.UD.x86.exe (PID: 3932)
    • The process uses the downloaded file

      • iexplore.exe (PID: 2068)
    • Reads the computer name

      • CryptoKit.CertEnrollment.UD.x86.exe (PID: 3932)
    • Create files in a temporary directory

      • CryptoKit.CertEnrollment.UD.x86.exe (PID: 3932)
    • Creates files in the program directory

      • CryptoKit.CertEnrollment.UD.x86.exe (PID: 3932)
    • Creates files or folders in the user directory

      • CryptoKit.CertEnrollment.UD.x86.exe (PID: 3932)
    • Reads security settings of Internet Explorer

      • regsvr32.exe (PID: 2120)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
63
Monitored processes
20
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs cryptokit.certenrollment.ud.x86.exe no specs cryptokit.certenrollment.ud.x86.exe regsvr32.exe no specs iexplore.exe no specs iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
1428"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=109.0.5414.120 --initial-client-data=0xc8,0xcc,0xd0,0x9c,0xd4,0x6ba38b38,0x6ba38b48,0x6ba38b54C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1836"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3776 --field-trial-handle=1188,i,10970575597955410592,1403247840594278445,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
2068"C:\Program Files\Internet Explorer\iexplore.exe" "http://210.74.41.187/UnionPayCertService/jumpCertDown.html"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2120"regsvr32.exe" "C:\Windows\system32\CryptoKit.CertEnrollment.UD.x86.dll" /sC:\Windows\System32\regsvr32.exeCryptoKit.CertEnrollment.UD.x86.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2160"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\CryptoKit.CertEnrollment.UD.x86.exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\CryptoKit.CertEnrollment.UD.x86.exeiexplore.exe
User:
admin
Company:
CFCA
Integrity Level:
MEDIUM
Description:
CFCA Crypto Kit IE ActiveX
Exit code:
3221226540
Version:
3.2.0.3
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\po2hn1x2\cryptokit.certenrollment.ud.x86.exe
c:\windows\system32\ntdll.dll
2256"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --disable-quic --mojo-platform-channel-handle=3648 --field-trial-handle=1188,i,10970575597955410592,1403247840594278445,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
2360"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --disable-quic --mojo-platform-channel-handle=1352 --field-trial-handle=1188,i,10970575597955410592,1403247840594278445,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
2436"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2112 --field-trial-handle=1188,i,10970575597955410592,1403247840594278445,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
2556"C:\Program Files\Google\Chrome\Application\chrome.exe" "--disable-features=OptimizationGuideModelDownloading,OptimizationHintsFetching,OptimizationTargetPrediction,OptimizationHints"C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
2576"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3976 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
Total events
41 720
Read events
39 745
Write events
1 626
Delete events
349

Modification events

(PID) Process:(2068) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(2068) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
506298128
(PID) Process:(2068) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
31101057
(PID) Process:(2068) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
806455628
(PID) Process:(2068) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
31101057
(PID) Process:(2068) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2068) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2068) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2068) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2068) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
6
Suspicious files
44
Text files
107
Unknown types
33

Dropped files

PID
Process
Filename
Type
3172iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\v_input[1].htmhtml
MD5:8B4AD29521C3446BE75FEAF552E7C3F4
SHA256:F741CB2A03A61461201860C3BD5858D301732A5D11B45131BA1F1469E70E407F
3172iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\add2[1].csstext
MD5:62D4E0C16F1604BC303AF80AFB66D54D
SHA256:B02C0BBC98E23372913C7BD6676E062277D60061070F70E9629268771DFB9195
3172iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\css[1].csstext
MD5:2DDB65B0ADF14D153C4A11C7D3239324
SHA256:386493272F8D4EFF03FA852A3CA7F0B23BCB4017EF90D0178086ADAA0DD17B45
3172iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\jumpCertDown[1].htmhtml
MD5:0AE79AF3E20CA7F2122A47059FE36362
SHA256:7CE137CFF017820DF2E9B4E5EB8AB086B709AE29EC78711496CED06F4F811603
3172iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\err[1].csstext
MD5:87AB7BC12DB04FC4F246A810936D76C1
SHA256:1AB832AB5746BEA4B6004445B2E09862824E8FCB9A3D5B4C1DC67AA8A189F376
3172iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\err[1].jstext
MD5:C6C41A485441AD982865D1E31539EC50
SHA256:3D744FDD2EEA7BAECDC093CEEC47EE9B3B4182478211C78F7FF080395794EB01
3172iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\jquery.loadmask[1].csstext
MD5:6C9140CD72ABEF03961CBE9068BB1AA7
SHA256:619321599CA986CFAE4FE230DEF76983457E0FD0C95AE4225745502AEC66B771
3172iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\jquery-impromptu.3.2.min[1].jstext
MD5:6F5727AF8E4F19E5CF14F1E56BEF7143
SHA256:CC9F97C539E5816129510A7D01AA5886E86DAF16D20C26D0F5C3A4386D914141
3172iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\jquery.loadmask.min[1].jshtml
MD5:0DC27962DCF42E5BA9ABB0C8697EA664
SHA256:D9C1DE6C12A700F00ABC9F50ED17DF5FBC29E08AE247F9D01DF84844BEBB119F
2068iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:D41550CEADA43991B40DC4712DA26A19
SHA256:50117711B88E0BA6F0D64E01040FBE13FCC73E444872598A2190CF92309F1793
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
97
TCP/UDP connections
61
DNS requests
33
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3172
iexplore.exe
GET
200
210.74.41.187:80
http://210.74.41.187/UnionPayCertService/jumpCertDown.html
unknown
unknown
2068
iexplore.exe
GET
404
210.74.41.187:80
http://210.74.41.187/favicon.ico
unknown
unknown
3172
iexplore.exe
GET
404
210.74.41.187:80
http://210.74.41.187/UnionPayCertService/certDownload/CryptoKit.CertEnrollment.UD.x86.cab
unknown
unknown
3172
iexplore.exe
GET
200
210.74.41.187:80
http://210.74.41.187/UnionPayCertService/images/logo_03.jpg
unknown
unknown
3172
iexplore.exe
GET
210.74.41.187:80
http://210.74.41.187/UnionPayCertService/images/pic_02.png
unknown
unknown
3172
iexplore.exe
GET
200
210.74.41.187:80
http://210.74.41.187/UnionPayCertService/images/title_11.jpg
unknown
unknown
3172
iexplore.exe
GET
200
210.74.41.187:80
http://210.74.41.187/UnionPayCertService/images/title_09.jpg
unknown
unknown
3172
iexplore.exe
GET
200
210.74.41.187:80
http://210.74.41.187/UnionPayCertService/images/title2_15.jpg
unknown
unknown
3172
iexplore.exe
GET
200
210.74.41.187:80
http://210.74.41.187/UnionPayCertService/images/tittle2_09.jpg
unknown
unknown
2068
iexplore.exe
GET
404
210.74.41.187:80
http://210.74.41.187/favicon.ico
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
224.0.0.252:5355
unknown
3172
iexplore.exe
210.74.41.187:80
China Financial Certification Authority
CN
unknown
2068
iexplore.exe
210.74.41.187:80
China Financial Certification Authority
CN
unknown
1080
svchost.exe
224.0.0.252:5355
unknown
2068
iexplore.exe
23.222.16.42:443
www.bing.com
Akamai International B.V.
US
unknown
2068
iexplore.exe
93.184.221.240:80
ctldl.windowsupdate.com
EDGECAST
GB
whitelisted
2068
iexplore.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
2068
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
dns.msftncsi.com
  • 131.107.255.255
shared
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 23.222.16.42
  • 23.222.16.26
  • 23.222.16.32
whitelisted
ctldl.windowsupdate.com
  • 93.184.221.240
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
clientservices.googleapis.com
  • 142.250.185.227
  • 204.79.197.200
whitelisted
accounts.google.com
  • 142.250.27.84
shared
www.google.com
  • 216.58.206.68
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Potentially Bad Traffic
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
No debug info