URL:

http://210.74.41.187/UnionPayCertService/jumpCertDown.html

Full analysis: https://app.any.run/tasks/a722a63c-d18e-4e31-90fa-7df6561f5258
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: April 17, 2024, 04:38:32
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MD5:

F355050ACC39D7BC92CF444200AC2572

SHA1:

60FE0EFE5C0CECFD9F4504DFE640AE91151CA1FD

SHA256:

2309526C47ADC356A42C4CB85FE499B1603E5D2A99B270484EF926669F192674

SSDEEP:

3:N1K/Nf4KycQA3dBJ/Q:CBQAnJ/Q

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • CryptoKit.CertEnrollment.UD.x86.exe (PID: 3932)
    • Creates a writable file in the system directory

      • CryptoKit.CertEnrollment.UD.x86.exe (PID: 3932)
    • Registers / Runs the DLL via REGSVR32.EXE

      • CryptoKit.CertEnrollment.UD.x86.exe (PID: 3932)
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • CryptoKit.CertEnrollment.UD.x86.exe (PID: 3932)
    • Executable content was dropped or overwritten

      • CryptoKit.CertEnrollment.UD.x86.exe (PID: 3932)
    • The process creates files with name similar to system file names

      • CryptoKit.CertEnrollment.UD.x86.exe (PID: 3932)
    • Adds/modifies Windows certificates

      • regsvr32.exe (PID: 2120)
    • Creates/Modifies COM task schedule object

      • regsvr32.exe (PID: 2120)
    • Creates a software uninstall entry

      • CryptoKit.CertEnrollment.UD.x86.exe (PID: 3932)
    • Reads the Internet Settings

      • regsvr32.exe (PID: 2120)
    • Changes internet zones settings

      • regsvr32.exe (PID: 2120)
  • INFO

    • Checks supported languages

      • CryptoKit.CertEnrollment.UD.x86.exe (PID: 3932)
    • Reads the computer name

      • CryptoKit.CertEnrollment.UD.x86.exe (PID: 3932)
    • Application launched itself

      • iexplore.exe (PID: 2068)
      • chrome.exe (PID: 2556)
      • iexplore.exe (PID: 3976)
    • Drops the executable file immediately after the start

      • iexplore.exe (PID: 3172)
      • iexplore.exe (PID: 2068)
    • Create files in a temporary directory

      • CryptoKit.CertEnrollment.UD.x86.exe (PID: 3932)
    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 2068)
      • iexplore.exe (PID: 3172)
    • Manual execution by a user

      • chrome.exe (PID: 2556)
      • iexplore.exe (PID: 3976)
    • The process uses the downloaded file

      • iexplore.exe (PID: 2068)
    • Creates files or folders in the user directory

      • CryptoKit.CertEnrollment.UD.x86.exe (PID: 3932)
    • Creates files in the program directory

      • CryptoKit.CertEnrollment.UD.x86.exe (PID: 3932)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 2068)
    • Reads security settings of Internet Explorer

      • regsvr32.exe (PID: 2120)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
63
Monitored processes
20
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs cryptokit.certenrollment.ud.x86.exe no specs cryptokit.certenrollment.ud.x86.exe regsvr32.exe no specs iexplore.exe no specs iexplore.exe iexplore.exe

Process information

PID
CMD
Path
Indicators
Parent process
1428"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=109.0.5414.120 --initial-client-data=0xc8,0xcc,0xd0,0x9c,0xd4,0x6ba38b38,0x6ba38b48,0x6ba38b54C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1836"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3776 --field-trial-handle=1188,i,10970575597955410592,1403247840594278445,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
2068"C:\Program Files\Internet Explorer\iexplore.exe" "http://210.74.41.187/UnionPayCertService/jumpCertDown.html"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2120"regsvr32.exe" "C:\Windows\system32\CryptoKit.CertEnrollment.UD.x86.dll" /sC:\Windows\System32\regsvr32.exeCryptoKit.CertEnrollment.UD.x86.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2160"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\CryptoKit.CertEnrollment.UD.x86.exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\CryptoKit.CertEnrollment.UD.x86.exeiexplore.exe
User:
admin
Company:
CFCA
Integrity Level:
MEDIUM
Description:
CFCA Crypto Kit IE ActiveX
Exit code:
3221226540
Version:
3.2.0.3
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\po2hn1x2\cryptokit.certenrollment.ud.x86.exe
c:\windows\system32\ntdll.dll
2256"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --disable-quic --mojo-platform-channel-handle=3648 --field-trial-handle=1188,i,10970575597955410592,1403247840594278445,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
2360"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --disable-quic --mojo-platform-channel-handle=1352 --field-trial-handle=1188,i,10970575597955410592,1403247840594278445,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
2436"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2112 --field-trial-handle=1188,i,10970575597955410592,1403247840594278445,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
2556"C:\Program Files\Google\Chrome\Application\chrome.exe" "--disable-features=OptimizationGuideModelDownloading,OptimizationHintsFetching,OptimizationTargetPrediction,OptimizationHints"C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
2576"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3976 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
Total events
41 720
Read events
39 745
Write events
1 626
Delete events
349

Modification events

(PID) Process:(2068) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(2068) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
506298128
(PID) Process:(2068) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
31101057
(PID) Process:(2068) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
806455628
(PID) Process:(2068) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
31101057
(PID) Process:(2068) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2068) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2068) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2068) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2068) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
6
Suspicious files
44
Text files
107
Unknown types
33

Dropped files

PID
Process
Filename
Type
3172iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\jumpCertDown[1].htmhtml
MD5:0AE79AF3E20CA7F2122A47059FE36362
SHA256:7CE137CFF017820DF2E9B4E5EB8AB086B709AE29EC78711496CED06F4F811603
2068iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EAF8AA29A62AB29E614331747385D816_F9E4DC0B9D5C777357D7DB8DEF51118Ader
MD5:
SHA256:
3172iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\jquery-1.4.2.min[1].jstext
MD5:65B352E1BA79F0E2A3B1E014BC2571AF
SHA256:6779927A414CBF0FE75402465415087EB51E26F9A5F466BD8C59ED2DF157D9B2
3172iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\jquery.loadmask.min[1].jshtml
MD5:0DC27962DCF42E5BA9ABB0C8697EA664
SHA256:D9C1DE6C12A700F00ABC9F50ED17DF5FBC29E08AE247F9D01DF84844BEBB119F
3172iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\err[1].jstext
MD5:C6C41A485441AD982865D1E31539EC50
SHA256:3D744FDD2EEA7BAECDC093CEEC47EE9B3B4182478211C78F7FF080395794EB01
3172iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\title_11[1].jpgimage
MD5:C03C2335AC96D8E802313DCBFC57AD4C
SHA256:B7A5C8D23C7868C694FE3A0FC56D1F24EE680E1A11DF1D6AE2B4F7F7A1E8C9FE
3172iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\certDown[1].jstext
MD5:BB144DB1A8222C119C7B4BD9934460FC
SHA256:3DF5FE2BB7896DD446EACF2FF338F2F7CC06DEC4C092D7E256763988BB7A0CB4
2068iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:D41550CEADA43991B40DC4712DA26A19
SHA256:50117711B88E0BA6F0D64E01040FBE13FCC73E444872598A2190CF92309F1793
3172iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\YTOWV792\tittle2_09[1].jpgimage
MD5:061CA8BEB4D7CE64EC4C6E369A0E7C20
SHA256:2DF28C1E59C4E6E48C93BF104FC31F95F96924656CEB3D218F45C3A60EBA7648
3172iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\jquery-impromptu.3.2.min[1].jstext
MD5:6F5727AF8E4F19E5CF14F1E56BEF7143
SHA256:CC9F97C539E5816129510A7D01AA5886E86DAF16D20C26D0F5C3A4386D914141
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
97
TCP/UDP connections
61
DNS requests
33
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3172
iexplore.exe
GET
200
210.74.41.187:80
http://210.74.41.187/UnionPayCertService/jumpCertDown.html
unknown
unknown
3172
iexplore.exe
GET
200
210.74.41.187:80
http://210.74.41.187/UnionPayCertService/scripts/jquery-impromptu.3.2.min.js
unknown
unknown
3172
iexplore.exe
GET
200
210.74.41.187:80
http://210.74.41.187/UnionPayCertService/scripts/err.js
unknown
unknown
3172
iexplore.exe
GET
200
210.74.41.187:80
http://210.74.41.187/UnionPayCertService/scripts/certDown.js
unknown
unknown
3172
iexplore.exe
GET
200
210.74.41.187:80
http://210.74.41.187/UnionPayCertService/images/logo_03.jpg
unknown
unknown
3172
iexplore.exe
GET
404
210.74.41.187:80
http://210.74.41.187/UnionPayCertService/certDownload/CryptoKit.CertEnrollment.UD.x86.cab
unknown
unknown
2068
iexplore.exe
GET
404
210.74.41.187:80
http://210.74.41.187/favicon.ico
unknown
unknown
3172
iexplore.exe
GET
200
210.74.41.187:80
http://210.74.41.187/UnionPayCertService/images/title_11.jpg
unknown
unknown
3172
iexplore.exe
GET
210.74.41.187:80
http://210.74.41.187/UnionPayCertService/images/pic_02.png
unknown
unknown
3172
iexplore.exe
GET
200
210.74.41.187:80
http://210.74.41.187/UnionPayCertService/images/title2_15.jpg
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
224.0.0.252:5355
unknown
3172
iexplore.exe
210.74.41.187:80
China Financial Certification Authority
CN
unknown
2068
iexplore.exe
210.74.41.187:80
China Financial Certification Authority
CN
unknown
1080
svchost.exe
224.0.0.252:5355
unknown
2068
iexplore.exe
23.222.16.42:443
www.bing.com
Akamai International B.V.
US
unknown
2068
iexplore.exe
93.184.221.240:80
ctldl.windowsupdate.com
EDGECAST
GB
whitelisted
2068
iexplore.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
2068
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
dns.msftncsi.com
  • 131.107.255.255
shared
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 23.222.16.42
  • 23.222.16.26
  • 23.222.16.32
whitelisted
ctldl.windowsupdate.com
  • 93.184.221.240
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
clientservices.googleapis.com
  • 142.250.185.227
  • 204.79.197.200
whitelisted
accounts.google.com
  • 142.250.27.84
shared
www.google.com
  • 216.58.206.68
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET INFO Executable Download from dotted-quad Host
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Potentially Bad Traffic
ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
No debug info