File name:

248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b

Full analysis: https://app.any.run/tasks/46c1a490-8789-48ae-8855-1ffb5eb2f4ff
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: January 25, 2025, 21:12:17
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
smoke
loader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

18CBE55C3B28754916F1CBF4DFC95CF9

SHA1:

7CCFB7678C34D6A2BEDC040DA04E2B5201BE453B

SHA256:

248FCC901AFF4E4B4C48C91E4D78A939BF681C9A1BC24ADDC3551B32768F907B

SSDEEP:

98304:yn29ufYrBk8hEviaPnwwKLbM/Y30otsb7GYvoPpjtXXL658WrPf/OCdZzuYZHoap:x3p69jVx

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was injected by another process

      • explorer.exe (PID: 4488)
    • Executing a file with an untrusted certificate

      • 5uR3lF9.exe (PID: 3544)
    • SMOKE mutex has been found

      • explorer.exe (PID: 4488)
    • Runs injected code in another process

      • AppLaunch.exe (PID: 4320)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • 248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b.exe (PID: 6212)
      • Yt8ge85.exe (PID: 6276)
      • explorer.exe (PID: 4488)
    • Starts a Microsoft application from unusual location

      • 248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b.exe (PID: 6212)
      • Yt8ge85.exe (PID: 6276)
      • GY4IC43.exe (PID: 6300)
    • Executable content was dropped or overwritten

      • 248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b.exe (PID: 6212)
      • Yt8ge85.exe (PID: 6276)
      • explorer.exe (PID: 4488)
    • Executes application which crashes

      • 3FD62NB.exe (PID: 5000)
      • 4Ii975UD.exe (PID: 2672)
    • Starts CMD.EXE for commands execution

      • 5uR3lF9.exe (PID: 3544)
    • Executing commands from a ".bat" file

      • 5uR3lF9.exe (PID: 3544)
    • Connects to unusual port

      • AppLaunch.exe (PID: 2512)
    • Deletes system .NET executable

      • explorer.exe (PID: 4488)
  • INFO

    • Checks supported languages

      • 248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b.exe (PID: 6212)
      • Yt8ge85.exe (PID: 6276)
      • 3FD62NB.exe (PID: 5000)
      • AppLaunch.exe (PID: 4320)
      • 4Ii975UD.exe (PID: 2672)
      • AppLaunch.exe (PID: 2512)
      • 5uR3lF9.exe (PID: 3544)
      • identity_helper.exe (PID: 6580)
    • The sample compiled with english language support

      • 248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b.exe (PID: 6212)
      • Yt8ge85.exe (PID: 6276)
      • explorer.exe (PID: 4488)
    • Reads security settings of Internet Explorer

      • explorer.exe (PID: 4488)
      • cmd.exe (PID: 1476)
    • Create files in a temporary directory

      • Yt8ge85.exe (PID: 6276)
      • 248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b.exe (PID: 6212)
      • 5uR3lF9.exe (PID: 3544)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 6360)
      • WerFault.exe (PID: 2776)
      • WerFault.exe (PID: 6600)
      • explorer.exe (PID: 4488)
    • Checks proxy server information

      • WerFault.exe (PID: 6360)
      • WerFault.exe (PID: 2776)
      • WerFault.exe (PID: 6600)
      • explorer.exe (PID: 4488)
    • Reads the software policy settings

      • WerFault.exe (PID: 6360)
      • WerFault.exe (PID: 2776)
      • WerFault.exe (PID: 6600)
    • Reads the machine GUID from the registry

      • AppLaunch.exe (PID: 2512)
    • Application launched itself

      • msedge.exe (PID: 7076)
    • Reads Environment values

      • identity_helper.exe (PID: 6580)
    • Reads the computer name

      • AppLaunch.exe (PID: 2512)
      • identity_helper.exe (PID: 6580)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:05:24 22:49:06+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.13
CodeSize: 25600
InitializedDataSize: 1890816
UninitializedDataSize: -
EntryPoint: 0x6a60
OSVersion: 10
ImageVersion: 10
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 11.0.17763.1
ProductVersionNumber: 11.0.17763.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Microsoft Corporation
FileDescription: Win32 Cabinet Self-Extractor
FileVersion: 11.00.17763.1 (WinBuild.160101.0800)
InternalName: Wextract
LegalCopyright: © Microsoft Corporation. All rights reserved.
OriginalFileName: WEXTRACT.EXE .MUI
ProductName: Internet Explorer
ProductVersion: 11.00.17763.1
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
195
Monitored processes
59
Malicious processes
3
Suspicious processes
2

Behavior graph

Click at the process to see the details
start 248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b.exe yt8ge85.exe gy4ic43.exe no specs werfault.exe 3fd62nb.exe applaunch.exe no specs werfault.exe 4ii975ud.exe applaunch.exe werfault.exe 5ur3lf9.exe no specs conhost.exe no specs cmd.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs #SMOKE explorer.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
244"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5632 --field-trial-handle=2504,i,17365654223052495003,3556601438206806259,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
244"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6360 --field-trial-handle=2504,i,17365654223052495003,3556601438206806259,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1476"C:\WINDOWS\sysnative\cmd" /c "C:\Users\admin\AppData\Local\Temp\C9AC.tmp\C9AD.tmp\C9AE.bat C:\Users\admin\AppData\Local\Temp\IXP000.TMP\5uR3lF9.exe"C:\Windows\System32\cmd.exe5uR3lF9.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1752"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6568 --field-trial-handle=2504,i,17365654223052495003,3556601438206806259,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
2512"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
4Ii975UD.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET ClickOnce Launch Utility
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\applaunch.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
2672C:\Users\admin\AppData\Local\Temp\IXP001.TMP\4Ii975UD.exeC:\Users\admin\AppData\Local\Temp\IXP001.TMP\4Ii975UD.exe
Yt8ge85.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226505
Modules
Images
c:\users\admin\appdata\local\temp\ixp001.tmp\4ii975ud.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
2776C:\WINDOWS\SysWOW64\WerFault.exe -u -p 5000 -s 588C:\Windows\SysWOW64\WerFault.exe
3FD62NB.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
3544C:\Users\admin\AppData\Local\Temp\IXP000.TMP\5uR3lF9.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\5uR3lF9.exe248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\ixp000.tmp\5ur3lf9.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
3680"C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.59\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=6300 --field-trial-handle=2504,i,17365654223052495003,3556601438206806259,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.59\identity_helper.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
PWA Identity Proxy Host
Exit code:
3221226029
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\identity_helper.exe
c:\windows\system32\ntdll.dll
3840"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --extension-process --renderer-sub-type=extension --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4136 --field-trial-handle=2504,i,17365654223052495003,3556601438206806259,262144 --variations-seed-version /prefetch:2C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
16 815
Read events
16 785
Write events
30
Delete events
0

Modification events

(PID) Process:(4488) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
Operation:writeName:CheckSetting
Value:
23004100430042006C006F0062000000000000000000000001000000000065006D000000
(PID) Process:(1476) cmd.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
(PID) Process:(1476) cmd.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1476) cmd.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1476) cmd.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(6876) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(7076) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
AD15F596248B2F00
(PID) Process:(7076) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(7076) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(7076) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
Executable files
13
Suspicious files
351
Text files
64
Unknown types
0

Dropped files

PID
Process
Filename
Type
6360WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_2PO9885.exe_3cc2f3b9fc7e60c55fd0dc6cef9ca96f26935_557ea383_82c608c5-bc5f-4eb0-a889-2f18e483648f\Report.wer
MD5:
SHA256:
2776WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_3FD62NB.exe_d4978256db187df0d5ec759b8bdbdf197637c711_a9de4905_aae534dd-dd25-4bca-9b0f-4801a92da3f9\Report.wer
MD5:
SHA256:
6600WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_4Ii975UD.exe_70a1ebfbbaf4ea3ec824894aff5325d72afc67a_2e60b293_9c607a2f-d748-402b-9aaf-b14d76433a1a\Report.wer
MD5:
SHA256:
6212248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\5uR3lF9.exeexecutable
MD5:E0F8B21B36FEE4E7738A6B5A1AB83673
SHA256:C567D825D19E24343647ED36C77033FB1F46F420384745A9734618684CB7D384
4488explorer.exeC:\Users\admin\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.datbinary
MD5:E49C56350AEDF784BFE00E444B879672
SHA256:A8BD235303668981563DFB5AAE338CB802817C4060E2C199B7C84901D57B7E1E
6212248fcc901aff4e4b4c48c91e4d78a939bf681c9a1bc24addc3551b32768f907b.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\Yt8ge85.exeexecutable
MD5:847EE3021803E4ADAEFCC00AA8283017
SHA256:4611614D9C95B0D0E4BF4AA486CC700DB6E49DBEF7FA2726B20F165E6798A9F7
6276Yt8ge85.exeC:\Users\admin\AppData\Local\Temp\IXP001.TMP\4Ii975UD.exeexecutable
MD5:CFBB3BE155B12D0CC69E3D932FBB81EB
SHA256:FD37C07F519F522EB717A372299525F667439B8B0D1AAFFB670A011DBBCD58F2
6276Yt8ge85.exeC:\Users\admin\AppData\Local\Temp\IXP001.TMP\GY4IC43.exeexecutable
MD5:252043D1805587B0E65A07F885D6719E
SHA256:66839BC22B9C9F717198CF8FAA64146FE95DFF51DFBB8C0F61982F2E50E89557
7076msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datbinary
MD5:1E9E15EF6E531C4557100F20C9C76F01
SHA256:46CB063CC268B69B172660F166C4394D5B4EDD802388B3EC16766DEBDB9F86C3
6600WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERC44F.tmp.xmlxml
MD5:02C2004C1D40708518ACAFEF093040F7
SHA256:37790620987FC895EC0C7B78DC47530175D992D8D191466CFB3E97EC527B5A2C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
29
TCP/UDP connections
118
DNS requests
93
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
23.48.23.179:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
DE
binary
1.01 Kb
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
DE
binary
973 b
whitelisted
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
DE
binary
471 b
whitelisted
6536
WerFault.exe
GET
200
23.48.23.179:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
DE
binary
1.01 Kb
whitelisted
6172
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
DE
binary
471 b
whitelisted
7812
svchost.exe
GET
206
199.232.210.172:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/9b9f8fb4-8a65-41e4-bda3-5416858f0aeb?P1=1738156904&P2=404&P3=2&P4=QMAXW%2bEtMsDrzgoEAXgZsYn7gkODUZpA62vDUcX9bYDIxYIQhOr66sqXK4aP0oM4hDkB2pD5JTf33nsrPb1KSA%3d%3d
US
binary
1.09 Kb
whitelisted
7812
svchost.exe
GET
206
199.232.210.172:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/9b9f8fb4-8a65-41e4-bda3-5416858f0aeb?P1=1738156904&P2=404&P3=2&P4=QMAXW%2bEtMsDrzgoEAXgZsYn7gkODUZpA62vDUcX9bYDIxYIQhOr66sqXK4aP0oM4hDkB2pD5JTf33nsrPb1KSA%3d%3d
US
binary
1.80 Kb
whitelisted
7812
svchost.exe
GET
206
199.232.210.172:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/9b9f8fb4-8a65-41e4-bda3-5416858f0aeb?P1=1738156904&P2=404&P3=2&P4=QMAXW%2bEtMsDrzgoEAXgZsYn7gkODUZpA62vDUcX9bYDIxYIQhOr66sqXK4aP0oM4hDkB2pD5JTf33nsrPb1KSA%3d%3d
US
binary
4.24 Kb
whitelisted
7812
svchost.exe
HEAD
200
199.232.210.172:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/2ed1297e-f6c9-4355-aec4-433ea371b116?P1=1738156904&P2=404&P3=2&P4=Mho%2b%2bNmEJDyn9Pyfa1IKFuayotmc92AKh6S0bM9oxpQOIeKLTy22vSgPVSNPKDk1QUg8ILSz9zw%2bTU2MpBLTvA%3d%3d
US
compressed
5.95 Kb
whitelisted
7812
svchost.exe
GET
206
199.232.210.172:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/9b9f8fb4-8a65-41e4-bda3-5416858f0aeb?P1=1738156904&P2=404&P3=2&P4=QMAXW%2bEtMsDrzgoEAXgZsYn7gkODUZpA62vDUcX9bYDIxYIQhOr66sqXK4aP0oM4hDkB2pD5JTf33nsrPb1KSA%3d%3d
US
binary
9.19 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
23.48.23.179:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
92.123.104.34:443
www.bing.com
Akamai International B.V.
DE
whitelisted
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
23.35.238.131:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted
20.190.159.68:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1176
svchost.exe
20.190.159.68:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 23.48.23.179
  • 23.48.23.141
  • 23.48.23.138
  • 23.48.23.191
  • 23.48.23.190
  • 23.48.23.194
  • 23.48.23.137
  • 23.48.23.139
  • 23.48.23.178
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
google.com
  • 142.250.186.110
whitelisted
www.bing.com
  • 92.123.104.34
  • 92.123.104.32
  • 92.123.104.31
  • 92.123.104.38
  • 2.21.65.132
  • 2.21.65.154
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
go.microsoft.com
  • 23.35.238.131
  • 2.23.242.9
whitelisted
login.live.com
  • 20.190.159.68
  • 40.126.31.69
  • 40.126.31.73
  • 20.190.159.0
  • 20.190.159.23
  • 40.126.31.71
  • 20.190.159.73
  • 20.190.159.75
whitelisted
watson.events.data.microsoft.com
  • 20.42.73.29
  • 20.42.65.92
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted

Threats

No threats detected
No debug info