File name:

malwarebytes-4-6-8-370.exe

Full analysis: https://app.any.run/tasks/56a3a325-8cab-4f4c-bde3-19ce1bf302a0
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: July 29, 2024, 00:35:20
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
stealer
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

7CE024E6E2248EE891248469894D8A9C

SHA1:

13DB96C5E8D67B7F1141D22567741CD45D659C1A

SHA256:

377AC497BDEB20E13EA84CA1EAB709946535B77D4231007A7646509386A4AF33

SSDEEP:

98304:OKwXM/rK3cM6d2tYZvcxZhTQnQ22IT1PD2222222721vFdGBeQN0aFvGSSRkrlct:aXi

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • malwarebytes-4-6-8-370.exe (PID: 5832)
      • MBAMInstallerService.exe (PID: 2292)
    • Changes the autorun value in the registry

      • ie4uinit.exe (PID: 7300)
  • SUSPICIOUS

    • Searches for installed software

      • malwarebytes-4-6-8-370.exe (PID: 5832)
      • MBAMInstallerService.exe (PID: 2292)
    • Reads the BIOS version

      • malwarebytes-4-6-8-370.exe (PID: 5832)
    • Creates files in the driver directory

      • malwarebytes-4-6-8-370.exe (PID: 5832)
    • Executable content was dropped or overwritten

      • malwarebytes-4-6-8-370.exe (PID: 5832)
      • MBAMInstallerService.exe (PID: 2292)
    • The process verifies whether the antivirus software is installed

      • MBAMInstallerService.exe (PID: 2292)
      • malwarebytes-4-6-8-370.exe (PID: 5832)
    • Executes as Windows Service

      • MBAMInstallerService.exe (PID: 2292)
    • Drops 7-zip archiver for unpacking

      • MBAMInstallerService.exe (PID: 2292)
    • Drops a system driver (possible attempt to evade defenses)

      • MBAMInstallerService.exe (PID: 2292)
    • Reads Microsoft Outlook installation path

      • FirstLogonAnim.exe (PID: 5808)
    • Process drops legitimate windows executable

      • MBAMInstallerService.exe (PID: 2292)
    • Reads Internet Explorer settings

      • FirstLogonAnim.exe (PID: 5808)
    • The process executes via Task Scheduler

      • PLUGScheduler.exe (PID: 1428)
    • Application launched itself

      • setup.exe (PID: 7872)
      • setup.exe (PID: 7928)
      • ie4uinit.exe (PID: 7300)
      • setup.exe (PID: 8880)
      • setup.exe (PID: 8800)
      • setup.exe (PID: 8044)
    • Write to the desktop.ini file (may be used to cloak folders)

      • ie4uinit.exe (PID: 7300)
    • Changes internet zones settings

      • ie4uinit.exe (PID: 7300)
    • Uses RUNDLL32.EXE to load library

      • ie4uinit.exe (PID: 7356)
  • INFO

    • Checks supported languages

      • malwarebytes-4-6-8-370.exe (PID: 5832)
      • MBAMInstallerService.exe (PID: 2292)
      • PLUGScheduler.exe (PID: 1428)
    • Creates files in the program directory

      • malwarebytes-4-6-8-370.exe (PID: 5832)
      • MBAMInstallerService.exe (PID: 2292)
      • PLUGScheduler.exe (PID: 1428)
      • ie4uinit.exe (PID: 7300)
    • Create files in a temporary directory

      • malwarebytes-4-6-8-370.exe (PID: 5832)
    • Reads the machine GUID from the registry

      • malwarebytes-4-6-8-370.exe (PID: 5832)
    • Reads the computer name

      • malwarebytes-4-6-8-370.exe (PID: 5832)
      • MBAMInstallerService.exe (PID: 2292)
      • PLUGScheduler.exe (PID: 1428)
    • Checks proxy server information

      • malwarebytes-4-6-8-370.exe (PID: 5832)
      • slui.exe (PID: 3968)
    • Reads the software policy settings

      • malwarebytes-4-6-8-370.exe (PID: 5832)
      • MBAMInstallerService.exe (PID: 2292)
      • slui.exe (PID: 3968)
    • Reads security settings of Internet Explorer

      • FirstLogonAnim.exe (PID: 5808)
      • ie4uinit.exe (PID: 7356)
      • ie4uinit.exe (PID: 7300)
    • Manual execution by a user

      • FirstLogonAnim.exe (PID: 5808)
      • ie4uinit.exe (PID: 7300)
      • unregmp2.exe (PID: 7256)
      • chrmstp.exe (PID: 7712)
      • unregmp2.exe (PID: 7680)
      • setup.exe (PID: 7872)
    • Application launched itself

      • chrmstp.exe (PID: 7712)
      • chrmstp.exe (PID: 7780)
      • msedge.exe (PID: 8116)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:01:09 13:24:31+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.16
CodeSize: 744960
InitializedDataSize: 1794560
UninitializedDataSize: -
EntryPoint: 0x6db96
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 4.6.8.370
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Malwarebytes
FileDescription: Malwarebytes Setup
FileVersion: 4.6.8.370
LegalCopyright: Copyright (C) 2017 - 2024 Malwarebytes, Inc. All rights reserved.
InternalName: MBSetup.exe
OriginalFileName: MBSetup.exe
ProductName: Malwarebytes
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
247
Monitored processes
54
Malicious processes
4
Suspicious processes
2

Behavior graph

Click at the process to see the details
start malwarebytes-4-6-8-370.exe slui.exe mbaminstallerservice.exe plugscheduler.exe no specs firstlogonanim.exe no specs sppextcomobj.exe no specs slui.exe no specs slui.exe no specs unregmp2.exe no specs ie4uinit.exe ie4uinit.exe no specs rundll32.exe no specs rundll32.exe no specs unregmp2.exe no specs chrmstp.exe no specs chrmstp.exe no specs chrmstp.exe no specs chrmstp.exe no specs setup.exe no specs setup.exe no specs setup.exe no specs setup.exe no specs setup.exe no specs setup.exe no specs msedge.exe no specs User OOBE Create Elevated Object Server no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs setup.exe no specs setup.exe no specs setup.exe no specs setup.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs malwarebytes-4-6-8-370.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1428"C:\Program Files\RUXIM\PLUGscheduler.exe"C:\Program Files\RUXIM\PLUGScheduler.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Update LifeCycle Component Scheduler
Exit code:
0
Version:
10.0.19041.3623 (WinBuild.160101.0800)
Modules
Images
c:\program files\ruxim\plugscheduler.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
2292"C:\Program Files\Malwarebytes\Anti-Malware\MBAMInstallerService.exe"C:\Program Files\Malwarebytes\Anti-Malware\MBAMInstallerService.exe
services.exe
User:
SYSTEM
Company:
Malwarebytes
Integrity Level:
SYSTEM
Description:
Malwarebytes Installer Service
Version:
4.1.0.579
Modules
Images
c:\program files\malwarebytes\anti-malware\mbaminstallerservice.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\authz.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\cryptbase.dll
3384"C:\Users\admin\AppData\Local\Temp\malwarebytes-4-6-8-370.exe" C:\Users\admin\AppData\Local\Temp\malwarebytes-4-6-8-370.exeexplorer.exe
User:
admin
Company:
Malwarebytes
Integrity Level:
MEDIUM
Description:
Malwarebytes Setup
Exit code:
3221226540
Version:
4.6.8.370
Modules
Images
c:\users\admin\appdata\local\temp\malwarebytes-4-6-8-370.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
3968C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4164"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=UserLogon;SessionId=2C:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4756C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
5808/RunFirstLogonAnim /existinguser /explorerC:\Windows\System32\oobe\FirstLogonAnim.exeexplorer.exe
User:
Administrator
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
First Sign-in Animation
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\oobe\firstlogonanim.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oobe\msoobefirstlogonanim.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5832"C:\Users\admin\AppData\Local\Temp\malwarebytes-4-6-8-370.exe" C:\Users\admin\AppData\Local\Temp\malwarebytes-4-6-8-370.exe
explorer.exe
User:
admin
Company:
Malwarebytes
Integrity Level:
HIGH
Description:
Malwarebytes Setup
Version:
4.6.8.370
Modules
Images
c:\users\admin\appdata\local\temp\malwarebytes-4-6-8-370.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\crypt32.dll
6476C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
Administrator
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7256"C:\Windows\System32\unregmp2.exe" /FirstLogonC:\Windows\System32\unregmp2.exeexplorer.exe
User:
Administrator
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Windows Media Player Setup Utility
Exit code:
0
Version:
12.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\unregmp2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
10 111
Read events
9 713
Write events
371
Delete events
27

Modification events

(PID) Process:(5832) malwarebytes-4-6-8-370.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Malwarebytes
Operation:writeName:id
Value:
bf98e12001ad44b99ee3d954cbebac06
(PID) Process:(5832) malwarebytes-4-6-8-370.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Malwarebytes
Operation:writeName:id
Value:
bf98e12001ad44b99ee3d954cbebac06
(PID) Process:(5832) malwarebytes-4-6-8-370.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\mbamtestkey
Operation:delete keyName:(default)
Value:
(PID) Process:(5832) malwarebytes-4-6-8-370.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Malwarebytes
Operation:delete valueName:IrisFirstRun
Value:
(PID) Process:(5832) malwarebytes-4-6-8-370.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\MBAMInstallerService\Parameters
Operation:writeName:UserName
Value:
admin
(PID) Process:(5832) malwarebytes-4-6-8-370.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\MBAMInstallerService\Parameters
Operation:writeName:ProductCode
Value:
MBAM-C
(PID) Process:(5832) malwarebytes-4-6-8-370.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\MBAMInstallerService\Parameters
Operation:writeName:ProductBuild
Value:
consumer
(PID) Process:(5832) malwarebytes-4-6-8-370.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\MBAMInstallerService\Parameters
Operation:writeName:ProgramDirectory
Value:
C:\Program Files\Malwarebytes\Anti-Malware
(PID) Process:(5832) malwarebytes-4-6-8-370.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\MBAMInstallerService\Parameters
Operation:writeName:LocalAppDataDir
Value:
C:\Users\admin\AppData\Local
(PID) Process:(5832) malwarebytes-4-6-8-370.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\MBAMInstallerService\Parameters
Operation:writeName:Channel
Value:
release
Executable files
58
Suspicious files
308
Text files
604
Unknown types
60

Dropped files

PID
Process
Filename
Type
2292MBAMInstallerService.exeC:\Windows\Temp\MBInstallTemp805b23a14d4211ef893918f7786f96ee\ctlrpkg.7z
MD5:
SHA256:
2292MBAMInstallerService.exeC:\Windows\Temp\MBInstallTemp805b23a14d4211ef893918f7786f96ee\dbclspkg.7z
MD5:
SHA256:
5832malwarebytes-4-6-8-370.exeC:\Windows\SysWOW64\drivers\mbamtestfile.dattext
MD5:9F06243ABCB89C70E0C331C61D871FA7
SHA256:837CCB607E312B170FAC7383D7CCFD61FA5072793F19A25E75FBACB56539B86B
2292MBAMInstallerService.exeC:\Windows\Temp\MBInstallTemp805b23a14d4211ef893918f7786f96ee\uipkg.7z
MD5:
SHA256:
5832malwarebytes-4-6-8-370.exeC:\Program Files (x86)\mbamtestfile.dattext
MD5:9F06243ABCB89C70E0C331C61D871FA7
SHA256:837CCB607E312B170FAC7383D7CCFD61FA5072793F19A25E75FBACB56539B86B
5832malwarebytes-4-6-8-370.exeC:\ProgramData\mbamtestfile.dattext
MD5:9F06243ABCB89C70E0C331C61D871FA7
SHA256:837CCB607E312B170FAC7383D7CCFD61FA5072793F19A25E75FBACB56539B86B
2292MBAMInstallerService.exeC:\Windows\Temp\MBInstallTemp805b23a14d4211ef893918f7786f96ee\servicepkg\BaltimoreCyberTrustRoot.crttext
MD5:379A301592736712C9A60676C50CF19B
SHA256:CC7400692BD90E1B5FC44E11C8DD7C788CBB462F52EA3F3DECB579E4D51EB268
2292MBAMInstallerService.exeC:\Windows\Temp\MBInstallTemp805b23a14d4211ef893918f7786f96ee\7z.dllexecutable
MD5:4DA585F081E096A43A574F4F4167947E
SHA256:623E628393BC4B8131C1F4302B195429DFA67E890D3325CEAA56940660052B1B
2292MBAMInstallerService.exeC:\Windows\Temp\MBInstallTemp805b23a14d4211ef893918f7786f96ee\servicepkg\SectigoRootCA.crttext
MD5:B821EE78C10EDA973C40A382FA5CA457
SHA256:028FD01CCC988386D6718EDA921F6131044A61C06E0F84574D4911918E4659F3
2292MBAMInstallerService.exeC:\Windows\Temp\MBInstallTemp805b23a14d4211ef893918f7786f96ee\servicepkg\starfieldrootcag2_new.crtder
MD5:D63981C6527E9669FCFCCA66ED05F296
SHA256:2CE1CB0BF9D2F9E102993FBE215152C3B2DD0CABDE1C68E5319B839154DBB7F5
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
60
DNS requests
49
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4424
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5368
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
3676
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
5368
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
whitelisted
4752
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
4132
OfficeClickToRun.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
GET
200
23.53.42.121:80
http://assets.msn.com/staticsb/statics/latest/fre/version.json
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl
unknown
whitelisted
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5368
SearchApp.exe
131.253.33.254:443
a-ring-fallback.msedge.net
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
4
System
192.168.100.255:138
whitelisted
6064
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5368
SearchApp.exe
104.126.37.145:443
www.bing.com
Akamai International B.V.
DE
unknown
6012
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6764
slui.exe
40.91.76.224:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
132
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3952
svchost.exe
239.255.255.250:1900
whitelisted
1620
slui.exe
40.91.76.224:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
528
slui.exe
40.91.76.224:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
t-ring-fdv2.msedge.net
  • 13.107.237.254
unknown
a-ring-fallback.msedge.net
  • 131.253.33.254
unknown
settings-win.data.microsoft.com
  • 20.73.194.208
  • 4.231.128.59
whitelisted
www.bing.com
  • 104.126.37.145
  • 104.126.37.139
  • 104.126.37.168
  • 104.126.37.162
whitelisted
google.com
  • 172.217.16.142
whitelisted
api2.amplitude.com
  • 44.240.109.3
  • 54.189.9.181
  • 34.208.121.29
  • 35.82.40.158
  • 54.245.192.52
  • 54.69.96.217
  • 52.10.108.43
  • 52.26.194.234
whitelisted
client.wns.windows.com
  • 40.113.110.67
whitelisted
login.live.com
  • 20.190.160.22
  • 20.190.160.17
  • 40.126.32.134
  • 40.126.32.140
  • 40.126.32.76
  • 40.126.32.68
  • 40.126.32.136
  • 40.126.32.72
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
fp-afd-nocache-ccp.azureedge.net
  • 13.107.246.60
whitelisted

Threats

No threats detected
No debug info