File name:

autoplay.exe

Full analysis: https://app.any.run/tasks/8248ea71-ee0a-40c8-bc88-e713904208b6
Verdict: Malicious activity
Analysis date: July 26, 2024, 05:22:53
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
python
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

76EF16E94F77454AAFFDFA4C700BE85F

SHA1:

9B45B3826706337A11E43248095FB2C62E42D14D

SHA256:

3B9DABD99DC58A5242616CB6D1D876BCA3046119A9B150C7D7868BF02202EA82

SSDEEP:

3072:fNCpBPbYsMn1mx6nWGdN6YROBxQo6PfSPgHvUJjX1qINSxT3OIpkApPxn:fNiGC6nWGdN6YO6Pf9vAjX1qINGLdRz

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • autoplay.exe (PID: 3556)
      • hellminer.exe (PID: 3680)
      • hellminer.exe (PID: 8156)
  • SUSPICIOUS

    • Uses WMI to retrieve WMI-managed resources (SCRIPT)

      • wscript.exe (PID: 7996)
    • Reads security settings of Internet Explorer

      • PCHealthCheck.exe (PID: 2884)
    • Reads the date of Windows installation

      • PCHealthCheck.exe (PID: 2884)
    • Process drops python dynamic module

      • hellminer.exe (PID: 3680)
      • hellminer.exe (PID: 8156)
    • Reads Microsoft Outlook installation path

      • PCHealthCheck.exe (PID: 2884)
    • Reads Internet Explorer settings

      • PCHealthCheck.exe (PID: 2884)
    • The process drops C-runtime libraries

      • hellminer.exe (PID: 3680)
      • hellminer.exe (PID: 8156)
    • Process drops legitimate windows executable

      • hellminer.exe (PID: 3680)
      • hellminer.exe (PID: 8156)
    • Application launched itself

      • hellminer.exe (PID: 3680)
      • hellminer.exe (PID: 5836)
      • hellminer.exe (PID: 8156)
      • hellminer.exe (PID: 3336)
    • Loads Python modules

      • hellminer.exe (PID: 5836)
      • hellminer.exe (PID: 6076)
      • hellminer.exe (PID: 3336)
      • hellminer.exe (PID: 2936)
    • Uses WMIC.EXE to obtain operating system information

      • hellminer.exe (PID: 5836)
      • hellminer.exe (PID: 3336)
    • Executable content was dropped or overwritten

      • hellminer.exe (PID: 3680)
      • hellminer.exe (PID: 8156)
    • Starts CMD.EXE for commands execution

      • hellminer.exe (PID: 5836)
      • hellminer.exe (PID: 6076)
      • hellminer.exe (PID: 3336)
      • hellminer.exe (PID: 2936)
    • Uses WMIC.EXE to obtain CPU information

      • hellminer.exe (PID: 5836)
      • hellminer.exe (PID: 3336)
    • Reads data from a binary Stream object (SCRIPT)

      • wscript.exe (PID: 7996)
    • Gets full path of the running script (SCRIPT)

      • wscript.exe (PID: 7996)
  • INFO

    • Reads the computer name

      • autoplay.exe (PID: 3556)
      • hellminer.exe (PID: 3680)
      • hellminer.exe (PID: 8156)
      • PCHealthCheck.exe (PID: 2884)
    • Manual execution by a user

      • wscript.exe (PID: 7996)
      • EXCEL.EXE (PID: 6036)
      • WINWORD.EXE (PID: 7384)
      • hellminer.exe (PID: 3680)
      • Taskmgr.exe (PID: 5220)
      • Taskmgr.exe (PID: 8068)
      • hellminer.exe (PID: 8156)
      • mspaint.exe (PID: 2828)
      • PCHealthCheck.exe (PID: 2884)
    • Checks supported languages

      • autoplay.exe (PID: 3556)
      • hellminer.exe (PID: 3680)
      • hellminer.exe (PID: 5836)
      • hellminer.exe (PID: 6076)
      • hellminer.exe (PID: 8156)
      • hellminer.exe (PID: 3336)
      • hellminer.exe (PID: 2936)
      • PCHealthCheck.exe (PID: 2884)
    • Checks proxy server information

      • slui.exe (PID: 1432)
      • PCHealthCheck.exe (PID: 2884)
    • Reads the software policy settings

      • slui.exe (PID: 1432)
      • PCHealthCheck.exe (PID: 2884)
    • Process checks Internet Explorer phishing filters

      • PCHealthCheck.exe (PID: 2884)
    • Reads Environment values

      • PCHealthCheck.exe (PID: 2884)
    • Reads CPU info

      • PCHealthCheck.exe (PID: 2884)
      • hellminer.exe (PID: 5836)
      • hellminer.exe (PID: 3336)
    • Create files in a temporary directory

      • hellminer.exe (PID: 3680)
      • hellminer.exe (PID: 5836)
      • hellminer.exe (PID: 6076)
      • hellminer.exe (PID: 8156)
      • hellminer.exe (PID: 3336)
      • hellminer.exe (PID: 2936)
    • Checks operating system version

      • hellminer.exe (PID: 5836)
      • hellminer.exe (PID: 6076)
      • hellminer.exe (PID: 3336)
      • hellminer.exe (PID: 2936)
    • Reads security settings of Internet Explorer

      • WMIC.exe (PID: 2124)
      • Taskmgr.exe (PID: 8068)
      • WMIC.exe (PID: 6636)
      • WMIC.exe (PID: 704)
      • WMIC.exe (PID: 7360)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2008:08:05 15:01:45+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 7.1
CodeSize: 118784
InitializedDataSize: 602112
UninitializedDataSize: -
EntryPoint: 0x1257a
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 6.0.0.0
ProductVersionNumber: 6.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Adobe Systems Incorporated
FileDescription: AutoPlay
FileVersion: 6
InternalName: AutoPlay
LegalCopyright: © 1990-2008 Adobe Systems Incorporated
OriginalFileName: AutoPlay.exe
ProductName: Autoplay
ProductVersion: 6
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
190
Monitored processes
29
Malicious processes
6
Suspicious processes
0

Behavior graph

Click at the process to see the details
start autoplay.exe excel.exe slui.exe winword.exe ai.exe no specs wscript.exe no specs pchealthcheck.exe hellminer.exe conhost.exe no specs hellminer.exe no specs cmd.exe no specs cmd.exe no specs wmic.exe no specs wmic.exe no specs hellminer.exe no specs cmd.exe no specs taskmgr.exe no specs taskmgr.exe hellminer.exe conhost.exe no specs hellminer.exe no specs cmd.exe no specs cmd.exe no specs wmic.exe no specs wmic.exe no specs hellminer.exe no specs cmd.exe no specs mspaint.exe no specs autoplay.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
704wmic os get VersionC:\Windows\System32\wbem\WMIC.exehellminer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
WMI Commandline Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\framedynos.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
1432C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2124wmic os get VersionC:\Windows\System32\wbem\WMIC.exehellminer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
WMI Commandline Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\framedynos.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
2828"C:\WINDOWS\system32\mspaint.exe" "C:\Users\admin\Desktop\completedcareers.jpg"C:\Windows\System32\mspaint.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Paint
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\mspaint.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\acgenral.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
2884"C:\Program Files\PCHealthCheck\PCHealthCheck.exe" C:\Program Files\PCHealthCheck\PCHealthCheck.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\program files\pchealthcheck\pchealthcheck.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
2936"C:\Users\admin\Desktop\hellminer.exe" "--multiprocessing-fork" "parent_pid=3336" "pipe_handle=876"C:\Users\admin\Desktop\hellminer.exehellminer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\hellminer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\users\admin\appdata\local\temp\_mei81562\ucrtbase.dll
2976C:\WINDOWS\system32\cmd.exe /c "ver"C:\Windows\System32\cmd.exehellminer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
3336"C:\Users\admin\Desktop\hellminer.exe" C:\Users\admin\Desktop\hellminer.exehellminer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\hellminer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\users\admin\appdata\local\temp\_mei81562\ucrtbase.dll
3556"C:\Users\admin\AppData\Local\Temp\autoplay.exe" C:\Users\admin\AppData\Local\Temp\autoplay.exe
explorer.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
HIGH
Description:
AutoPlay
Version:
6.0
Modules
Images
c:\users\admin\appdata\local\temp\autoplay.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
3680"C:\Users\admin\Desktop\hellminer.exe" C:\Users\admin\Desktop\hellminer.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\hellminer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
36 720
Read events
34 957
Write events
1 632
Delete events
131

Modification events

(PID) Process:(6036) EXCEL.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\ClientTelemetry\Sampling
Operation:writeName:1
Value:
01D014000000001000B24E9A3E02000000000000000600000000000000
(PID) Process:(6036) EXCEL.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\CrashPersistence\EXCEL\6036
Operation:writeName:0
Value:
0B0E10D2FD6D5903358B46821E1A65BA3B4A49230046B9D4CCEDBEE3B7ED016A04102400449A7D64B29D01008500A907556E6B6E6F776EC906022222CA0DC2190000C91003783634C511942FD2120965007800630065006C002E00650078006500C51620C517808004C91808323231322D44656300
(PID) Process:(6036) EXCEL.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:en-US
Value:
2
(PID) Process:(6036) EXCEL.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:de-de
Value:
2
(PID) Process:(6036) EXCEL.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:fr-fr
Value:
2
(PID) Process:(6036) EXCEL.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:es-es
Value:
2
(PID) Process:(6036) EXCEL.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:it-it
Value:
2
(PID) Process:(6036) EXCEL.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:ja-jp
Value:
2
(PID) Process:(6036) EXCEL.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:ko-kr
Value:
2
(PID) Process:(6036) EXCEL.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\LanguageResources\EnabledEditingLanguages
Operation:writeName:pt-br
Value:
2
Executable files
181
Suspicious files
129
Text files
150
Unknown types
0

Dropped files

PID
Process
Filename
Type
6036EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\49141B6B-39D3-4C76-91EF-31D44E1E3578xml
MD5:CBA23430BF77CB3A25FED551830D827E
SHA256:435CA4D8D2C12C6EFD040D44F330A979A0C9C031E50D4B693CF3B5C0260600A6
6036EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\DTS\en-US{64146E5C-0C25-4BCA-80DF-21942DD6B965}\{6870D108-418E-4CDE-A68C-B589A2AF0836}mt45299826.pngimage
MD5:1A06FCC9279FE0FA76E1E74E2A26A747
SHA256:55704B4D08BC44CB39D7BE93D9C595ECA75D2F6EAA4ADE529754360427F2396E
6036EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbresbinary
MD5:AC0E97888D9948130DE479E53B1AB102
SHA256:ACA9A855CA9D98C9F6037F734F968CC27E7AD61FA8D811DD990D1391195E7974
6036EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\Personalization\Governance\Anonymous\floodgatecampaigns.jsonbinary
MD5:74B82FDE63567F0C4E1C9AD0080B82C7
SHA256:D9519122953AA4C75257216CF15799A0634EC2B7FA9B010406EC5FB1F355CC20
6036EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\DTS\en-US{64146E5C-0C25-4BCA-80DF-21942DD6B965}\{4FCAE75E-AED0-465A-8048-89B9DD390451}mt11829122.pngimage
MD5:3EE6FB71B09A2ECADEEAC7C3B55E1382
SHA256:3A982A3B7E10EC50D2AF3A126277D48F41AE65756C7A5FDD5802049B5350704A
6036EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\DTS\en-US{64146E5C-0C25-4BCA-80DF-21942DD6B965}\{AC34E556-9F63-4864-8835-58480FA35BF1}mt66963475.pngimage
MD5:565A50517A947BCB35AA059AE76DC136
SHA256:3DE17AA75ACA81445352705476C412168CC30993426E94D06265CCAE143CD5C8
6036EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\DTS\en-US{64146E5C-0C25-4BCA-80DF-21942DD6B965}\{BEF93B73-9FCF-4292-809B-C5677C985F8D}mt10000137.pngimage
MD5:DE55D11D4C4071BB9F1B2A91487F41BE
SHA256:57733C40F13A9C7F44584AA52F0C1D1DB26C41C0AF73FD3EDD47C3288B85E892
6036EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\DTS\en-US{64146E5C-0C25-4BCA-80DF-21942DD6B965}\{86DA58C5-9DC3-407E-875D-C6D7A2321B39}mt67739505.pngimage
MD5:FE238D4D994149381553BA0A5CD17B17
SHA256:F25507CB3FAE7439117F05285EC6DE20A5A7356FAE74F5F935D31A63430598DA
6036EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\DTS\en-US{64146E5C-0C25-4BCA-80DF-21942DD6B965}\{387D716A-83CD-4D27-9C5C-1587D507CDBD}mt11414620.pngimage
MD5:E37661AB4A1AEB408D06DDA183117349
SHA256:0AF5FC368F802B927A820673ACFDE18B22B15DA0CE865203C065604939875A3F
6036EXCEL.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xmlxml
MD5:0E3976A929C4878794F96FEF2C441CD0
SHA256:77CE327AFF3AEE07D14AC02AA96347AE3277358DB4D36959E235B782C085AB1E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
14
TCP/UDP connections
192
DNS requests
60
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5368
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
5368
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
whitelisted
4424
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
3676
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6036
EXCEL.EXE
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
4172
SystemSettings.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1328
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
4172
SystemSettings.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
7384
WINWORD.EXE
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D
unknown
whitelisted
7384
WINWORD.EXE
GET
200
23.32.238.34:80
http://crl.microsoft.com/pki/crl/products/microsoftrootcert.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3952
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
5368
SearchApp.exe
131.253.33.254:443
a-ring-fallback.msedge.net
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
5368
SearchApp.exe
104.126.37.162:443
www.bing.com
Akamai International B.V.
DE
unknown
4548
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
6012
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
5284
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6716
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
1320
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:137
whitelisted

DNS requests

Domain
IP
Reputation
t-ring-fdv2.msedge.net
  • 13.107.237.254
unknown
a-ring-fallback.msedge.net
  • 131.253.33.254
unknown
www.bing.com
  • 104.126.37.162
  • 104.126.37.147
  • 104.126.37.178
  • 104.126.37.128
  • 104.126.37.163
  • 104.126.37.146
  • 104.126.37.153
  • 104.126.37.144
  • 104.126.37.171
  • 104.126.37.131
  • 104.126.37.184
  • 104.126.37.137
  • 104.126.37.161
  • 104.126.37.136
  • 104.126.37.152
  • 104.126.37.168
  • 104.126.37.160
  • 2.23.209.189
  • 2.23.209.150
  • 2.23.209.154
  • 2.23.209.158
  • 2.23.209.185
  • 2.23.209.156
  • 2.23.209.183
  • 2.23.209.176
  • 2.23.209.177
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
  • 4.231.128.59
  • 20.73.194.208
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
google.com
  • 216.58.206.46
whitelisted
fp-afd-nocache-ccp.azureedge.net
  • 13.107.246.45
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
fp.msedge.net
  • 204.79.197.222
whitelisted
s-ring.msedge.net
  • 13.107.3.254
unknown

Threats

No threats detected
Process
Message
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.