File name:

SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527

Full analysis: https://app.any.run/tasks/6edccd12-d57b-41ce-8bca-c747c1328de2
Verdict: Malicious activity
Analysis date: October 15, 2024, 23:48:57
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

CB17596D65A15B3D0ED298789D41B38D

SHA1:

EC5BE5B1BF1B42AFC70E7A5F50AA1E031E10DA84

SHA256:

32C643694006075F1AC461DCFEE4E7DCCAFA249052F88CCC1D28C25FBF1ADA09

SSDEEP:

6144:xyNc1a7xk4X+sThLfOdB0prjc32EAIPRFyPM0hDFyyFMTI5iS:xok2xkY+qLfOdB09jcGEzjuDiyFEIIS

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exe (PID: 6360)
    • The process creates files with name similar to system file names

      • SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exe (PID: 6360)
    • Executable content was dropped or overwritten

      • SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exe (PID: 6360)
    • Reads security settings of Internet Explorer

      • SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exe (PID: 6360)
    • Checks Windows Trust Settings

      • SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exe (PID: 6360)
    • Process drops legitimate windows executable

      • SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exe (PID: 6360)
    • Application launched itself

      • xt.exe (PID: 3948)
      • xt.exe (PID: 6868)
  • INFO

    • Reads the computer name

      • SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exe (PID: 6360)
    • Checks supported languages

      • SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exe (PID: 6360)
    • Create files in a temporary directory

      • SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exe (PID: 6360)
    • Checks proxy server information

      • SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exe (PID: 6360)
    • Reads the machine GUID from the registry

      • SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exe (PID: 6360)
    • Reads the software policy settings

      • SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exe (PID: 6360)
    • Creates files or folders in the user directory

      • SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exe (PID: 6360)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:11:22 09:54:59+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 9
CodeSize: 28672
InitializedDataSize: 186368
UninitializedDataSize: 2048
EntryPoint: 0x3a0b
OSVersion: 5
ImageVersion: 6
SubsystemVersion: 5
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
146
Monitored processes
10
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start securiteinfo.com.suspected.of.trojan.downloader.gen.18111.15527.exe xt.exe xt.exe xt.exe no specs xt.exe no specs xt.exe xt.exe no specs xt.exe no specs xt.exe no specs securiteinfo.com.suspected.of.trojan.downloader.gen.18111.15527.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1344"C:\Users\admin\AppData\Local\Ctfile PC Client\xt.exe" --type=gpu-process --no-sandbox --user-data-dir="C:\Users\admin\AppData\Local\ctfilepc\User Data" --nwapp-path="C:\Users\admin\AppData\Local\Ctfile PC Client" --start-stack-profiler --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1968 --field-trial-handle=1972,i,13756730630287709540,5581992763927526770,262144 /prefetch:2C:\Users\admin\AppData\Local\Ctfile PC Client\xt.exext.exe
User:
admin
Company:
KingsWills LLC
Integrity Level:
HIGH
Description:
ctfile
Version:
3.5
Modules
Images
c:\users\admin\appdata\local\ctfile pc client\xt.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\users\admin\appdata\local\ctfile pc client\nw_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shcore.dll
c:\windows\system32\combase.dll
3432"C:\Users\admin\AppData\Local\Ctfile PC Client\xt.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\admin\AppData\Local\ctfilepc\User Data" --nwapp-path="C:\Users\admin\AppData\Local\Ctfile PC Client" --start-stack-profiler --mojo-platform-channel-handle=2052 --field-trial-handle=1972,i,13756730630287709540,5581992763927526770,262144 /prefetch:8C:\Users\admin\AppData\Local\Ctfile PC Client\xt.exe
xt.exe
User:
admin
Company:
KingsWills LLC
Integrity Level:
HIGH
Description:
ctfile
Version:
3.5
Modules
Images
c:\users\admin\appdata\local\ctfile pc client\xt.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\users\admin\appdata\local\ctfile pc client\nw_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shcore.dll
c:\windows\system32\combase.dll
3948"C:\Users\admin\AppData\Local\Ctfile PC Client\xt.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\ctfilepc\User Data" /prefetch:7 --monitor-self --monitor-self-argument=--type=crashpad-handler "--monitor-self-argument=--user-data-dir=C:\Users\admin\AppData\Local\ctfilepc\User Data" --monitor-self-argument=/prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\ctfilepc\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\ctfilepc\User Data" --annotation=plat=Win64 --annotation=prod=ctfilepc --annotation=ver= --initial-client-data=0x270,0x274,0x278,0x26c,0x27c,0x7ffbcb29a970,0x7ffbcb29a980,0x7ffbcb29a990C:\Users\admin\AppData\Local\Ctfile PC Client\xt.exe
xt.exe
User:
admin
Company:
KingsWills LLC
Integrity Level:
HIGH
Description:
ctfile
Version:
3.5
Modules
Images
c:\users\admin\appdata\local\ctfile pc client\xt.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\users\admin\appdata\local\ctfile pc client\nw_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shcore.dll
c:\windows\system32\combase.dll
5892"C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exe" C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\securiteinfo.com.suspected.of.trojan.downloader.gen.18111.15527.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6360"C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exe" C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\temp\securiteinfo.com.suspected.of.trojan.downloader.gen.18111.15527.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6472"C:\Users\admin\AppData\Local\Ctfile PC Client\xt.exe" --type=renderer --user-data-dir="C:\Users\admin\AppData\Local\ctfilepc\User Data" --nwapp-path="C:\Users\admin\AppData\Local\Ctfile PC Client" --nwjs --extension-process --first-renderer-process --no-sandbox --file-url-path-alias="/gen=C:\Users\admin\AppData\Local\Ctfile PC Client\gen" --no-zygote --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2792 --field-trial-handle=1972,i,13756730630287709540,5581992763927526770,262144 /prefetch:1C:\Users\admin\AppData\Local\Ctfile PC Client\xt.exext.exe
User:
admin
Company:
KingsWills LLC
Integrity Level:
HIGH
Description:
ctfile
Version:
3.5
Modules
Images
c:\users\admin\appdata\local\ctfile pc client\xt.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\users\admin\appdata\local\ctfile pc client\nw_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shcore.dll
c:\windows\system32\combase.dll
6708"C:\Users\admin\AppData\Local\Ctfile PC Client\xt.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-sandbox --user-data-dir="C:\Users\admin\AppData\Local\ctfilepc\User Data" --nwapp-path="C:\Users\admin\AppData\Local\Ctfile PC Client" --mojo-platform-channel-handle=3356 --field-trial-handle=1972,i,13756730630287709540,5581992763927526770,262144 /prefetch:8C:\Users\admin\AppData\Local\Ctfile PC Client\xt.exext.exe
User:
admin
Company:
KingsWills LLC
Integrity Level:
HIGH
Description:
ctfile
Exit code:
0
Version:
3.5
Modules
Images
c:\users\admin\appdata\local\ctfile pc client\xt.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\users\admin\appdata\local\ctfile pc client\nw_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shcore.dll
c:\windows\system32\combase.dll
6868"C:\Users\admin\AppData\Local\Ctfile PC Client\xt.exe" C:\Users\admin\AppData\Local\Ctfile PC Client\xt.exe
SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exe
User:
admin
Company:
KingsWills LLC
Integrity Level:
HIGH
Description:
ctfile
Version:
3.5
Modules
Images
c:\users\admin\appdata\local\ctfile pc client\xt.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\users\admin\appdata\local\ctfile pc client\nw_elf.dll
c:\windows\system32\shcore.dll
c:\windows\system32\combase.dll
6960"C:\Users\admin\AppData\Local\Ctfile PC Client\xt.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --user-data-dir="C:\Users\admin\AppData\Local\ctfilepc\User Data" --nwapp-path="C:\Users\admin\AppData\Local\Ctfile PC Client" --mojo-platform-channel-handle=2340 --field-trial-handle=1972,i,13756730630287709540,5581992763927526770,262144 /prefetch:8C:\Users\admin\AppData\Local\Ctfile PC Client\xt.exext.exe
User:
admin
Company:
KingsWills LLC
Integrity Level:
HIGH
Description:
ctfile
Version:
3.5
Modules
Images
c:\users\admin\appdata\local\ctfile pc client\xt.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\users\admin\appdata\local\ctfile pc client\nw_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shcore.dll
c:\windows\system32\combase.dll
7144"C:\Users\admin\AppData\Local\Ctfile PC Client\xt.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\ctfilepc\User Data" /prefetch:7 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\ctfilepc\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=ctfilepc --annotation=ver= --initial-client-data=0x1f4,0x1f8,0x1fc,0x1ac,0x200,0x7ff63c4dca30,0x7ff63c4dca40,0x7ff63c4dca50C:\Users\admin\AppData\Local\Ctfile PC Client\xt.exext.exe
User:
admin
Company:
KingsWills LLC
Integrity Level:
HIGH
Description:
ctfile
Version:
3.5
Modules
Images
c:\users\admin\appdata\local\ctfile pc client\xt.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\users\admin\appdata\local\ctfile pc client\nw_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shcore.dll
c:\windows\system32\combase.dll
Total events
3 139
Read events
3 103
Write events
35
Delete events
1

Modification events

(PID) Process:(6360) SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6360) SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6360) SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(6360) SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ctfile
Operation:writeName:URL Protocol
Value:
(PID) Process:(6868) xt.exeKey:HKEY_CURRENT_USER\SOFTWARE\nwjs\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(6868) xt.exeKey:HKEY_CURRENT_USER\SOFTWARE\nwjs
Operation:writeName:metricsid
Value:
ce768fae-404b-4a2e-8f22-c4ec6046e737
(PID) Process:(6868) xt.exeKey:HKEY_CURRENT_USER\SOFTWARE\nwjs
Operation:writeName:metricsid_installdate
Value:
1729036240
(PID) Process:(6868) xt.exeKey:HKEY_CURRENT_USER\SOFTWARE\nwjs
Operation:writeName:metricsid_enableddate
Value:
1729036240
(PID) Process:(6868) xt.exeKey:HKEY_CURRENT_USER\SOFTWARE\nwjs
Operation:writeName:usagestats
Value:
0
(PID) Process:(6868) xt.exeKey:HKEY_CURRENT_USER\SOFTWARE\nwjs
Operation:writeName:metricsid
Value:
Executable files
16
Suspicious files
386
Text files
610
Unknown types
27

Dropped files

PID
Process
Filename
Type
6360SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\3.27[1].zip
MD5:
SHA256:
6360SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exeC:\Users\admin\AppData\Local\Temp\ctfile.zip
MD5:
SHA256:
6360SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exeC:\Users\admin\AppData\Local\Temp\nstB698.tmp\KillProcDLL.dllexecutable
MD5:1CC87D2B5A79B18F133B4F944E2F2F74
SHA256:DE1177A4BD1C56C3555F366D40B37D7DD9CB25E16C4973D0A4D22BF9A8AF7AED
6360SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exeC:\Users\admin\AppData\Local\Temp\nstB698.tmp\System.dllexecutable
MD5:E38D8FF9F749EE1B141A122FEC7280E0
SHA256:00F7604D4F36A728C7759F4D9CF3E30C9728C503557AAC49BBCD55CFC3E4FCB4
6360SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199binary
MD5:E935BC5762068CAF3E24A2683B1B8A88
SHA256:A8ACCFCFEB51BD73DF23B91F4D89FF1A9EB7438EF5B12E8AFDA1A6FF1769E89D
6360SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199binary
MD5:0DC3DA4BED86184F07B0F1FA742452C5
SHA256:E9B039DC09E961AC63536BD25B7A9364C8FFCA8A20D949A4996DA5228436A55E
6360SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAbinary
MD5:7D3AF44EF9F6B19E493F6F921DAB9749
SHA256:CBEE56E948176AF0037AB1252F902CB8E9C238BC17FEA888C8A3E82C161E627B
6360SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exeC:\Users\admin\AppData\Local\Temp\nstB698.tmp\inetc.dllexecutable
MD5:38F2B22967573A872426D05BDC1A1A70
SHA256:83005624A3C515E8E4454A416693BA0FBF384FF5EA0E1471F520DFAE790D4AB7
6360SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exeC:\Users\admin\AppData\Local\Ctfile PC Client\html\assets\css\ace.onpage-help.csstext
MD5:5BC74D7C8DEB68A66718961B76546612
SHA256:F344BE8C59246416707C246630198891C9F207334BBBA1088954FD9CAEEAA52B
6360SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exeC:\Users\admin\AppData\Local\Ctfile PC Client\html\assets\css\ace-part2.csstext
MD5:B9BEFBF4BE5B73628C628C001A28CFD2
SHA256:67E51FB70738AA9AED4599BA41042A3E4A6C61DE694D5F10B7FC708EE0C2F281
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
70
DNS requests
35
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6360
SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exe
GET
200
142.250.184.195:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
whitelisted
2724
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6392
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6392
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
3824
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6944
svchost.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6360
SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exe
GET
200
142.250.184.195:80
http://c.pki.goog/r/r1.crl
unknown
whitelisted
6944
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4360
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6944
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
5488
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1252
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
6360
SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exe
47.56.109.241:443
web.ctfile.com
Alibaba US Technology Co., Ltd.
HK
whitelisted
6360
SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exe
142.250.184.195:80
ocsp.pki.goog
GOOGLE
US
whitelisted
6944
svchost.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
6944
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
6360
SecuriteInfo.com.suspected.of.Trojan.Downloader.gen.18111.15527.exe
8.210.109.65:443
imgstatic.ctfile.com
Alibaba US Technology Co., Ltd.
HK
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.72.205.209
whitelisted
google.com
  • 142.250.181.238
whitelisted
web.ctfile.com
  • 47.56.109.241
  • 47.56.193.8
whitelisted
ocsp.pki.goog
  • 142.250.184.195
whitelisted
c.pki.goog
  • 142.250.184.195
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
imgstatic.ctfile.com
  • 8.210.109.65
  • 8.210.199.131
  • 8.210.147.249
whitelisted
www.bing.com
  • 104.126.37.131
  • 104.126.37.145
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted

Threats

No threats detected
Process
Message
xt.exe
[1015/235040.537:ERROR:filesystem_win.cc(130)] GetFileAttributes C:\Users\admin\AppData\Local\ctfilepc\User Data\Crashpad\attachments\b8c626fd-108b-425d-96ed-9ca9b02a101a: The system cannot find the file specified. (0x2)
xt.exe
[1015/235040.537:ERROR:filesystem_win.cc(130)] GetFileAttributes C:\Users\admin\AppData\Local\ctfilepc\User Data\Crashpad\attachments\b8c626fd-108b-425d-96ed-9ca9b02a101a: The system cannot find the file specified. (0x2)
xt.exe
[1015/235040.553:ERROR:filesystem_win.cc(130)] GetFileAttributes C:\Users\admin\AppData\Local\ctfilepc\User Data\Crashpad\attachments\b8c626fd-108b-425d-96ed-9ca9b02a101a: The system cannot find the file specified. (0x2)