File name:

Client-built.exe

Full analysis: https://app.any.run/tasks/95d70871-2fce-46cc-8f4b-863e822210e0
Verdict: Malicious activity
Analysis date: December 27, 2024, 08:08:54
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

C0A15477ED759CACB6E41C32DF4EE3B6

SHA1:

1105F1A6DA7FC5286FC6BBF3BB09B0640C390475

SHA256:

40B1E1519D9240E23B0052B13F30CAC24DB6C23814FB91EC3C151F6E8A477858

SSDEEP:

49152:EegGOhX02hD2nPiLq3A6770DODdl/rADxXhCk/3DgWoJltEhI/fsbWUzqhLoGdDV:A2nP6q3A6770DODdl/rADxRLDggWHTV

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • Client-built.exe (PID: 5160)
      • Client.exe (PID: 3984)
      • Client.exe (PID: 5316)
      • Client.exe (PID: 2676)
      • Client.exe (PID: 3988)
      • Client.exe (PID: 1536)
      • Client.exe (PID: 5488)
      • Client.exe (PID: 2092)
      • Client.exe (PID: 624)
  • SUSPICIOUS

    • Starts itself from another location

      • Client-built.exe (PID: 5160)
    • Executable content was dropped or overwritten

      • Client-built.exe (PID: 5160)
    • Reads security settings of Internet Explorer

      • Client.exe (PID: 3984)
      • Client.exe (PID: 5316)
      • Client.exe (PID: 2676)
      • Client.exe (PID: 3988)
      • Client.exe (PID: 1536)
      • Client.exe (PID: 5488)
      • Client.exe (PID: 2092)
      • Client.exe (PID: 1328)
      • Client.exe (PID: 624)
      • Client.exe (PID: 4840)
      • Client.exe (PID: 5392)
      • Client.exe (PID: 3824)
    • Reads the date of Windows installation

      • Client.exe (PID: 3984)
      • Client.exe (PID: 5316)
      • Client.exe (PID: 2676)
      • Client.exe (PID: 3988)
      • Client.exe (PID: 1536)
      • Client.exe (PID: 5488)
      • Client.exe (PID: 2092)
      • Client.exe (PID: 624)
      • Client.exe (PID: 1328)
      • Client.exe (PID: 4840)
      • Client.exe (PID: 5392)
    • Starts CMD.EXE for commands execution

      • Client.exe (PID: 3984)
      • Client.exe (PID: 5316)
      • Client.exe (PID: 2676)
      • Client.exe (PID: 3988)
      • Client.exe (PID: 1536)
      • Client.exe (PID: 5488)
      • Client.exe (PID: 2092)
      • Client.exe (PID: 624)
      • Client.exe (PID: 1328)
      • Client.exe (PID: 4840)
      • Client.exe (PID: 5392)
      • Client.exe (PID: 3824)
    • Executing commands from a ".bat" file

      • Client.exe (PID: 3984)
      • Client.exe (PID: 5316)
      • Client.exe (PID: 2676)
      • Client.exe (PID: 3988)
      • Client.exe (PID: 1536)
      • Client.exe (PID: 5488)
      • Client.exe (PID: 2092)
      • Client.exe (PID: 624)
      • Client.exe (PID: 4840)
      • Client.exe (PID: 1328)
      • Client.exe (PID: 5392)
      • Client.exe (PID: 3824)
    • Starts application with an unusual extension

      • cmd.exe (PID: 4144)
      • cmd.exe (PID: 1448)
      • cmd.exe (PID: 624)
      • cmd.exe (PID: 4872)
      • cmd.exe (PID: 5544)
      • cmd.exe (PID: 4528)
      • cmd.exe (PID: 3820)
      • cmd.exe (PID: 3836)
      • cmd.exe (PID: 3552)
      • cmd.exe (PID: 3172)
      • cmd.exe (PID: 4528)
      • cmd.exe (PID: 2792)
    • Runs PING.EXE to delay simulation

      • cmd.exe (PID: 4144)
      • cmd.exe (PID: 624)
      • cmd.exe (PID: 1448)
      • cmd.exe (PID: 5544)
      • cmd.exe (PID: 4872)
      • cmd.exe (PID: 4528)
      • cmd.exe (PID: 3820)
      • cmd.exe (PID: 3836)
      • cmd.exe (PID: 3552)
      • cmd.exe (PID: 3172)
      • cmd.exe (PID: 4528)
      • cmd.exe (PID: 2792)
    • The executable file from the user directory is run by the CMD process

      • Client.exe (PID: 5316)
      • Client.exe (PID: 2676)
      • Client.exe (PID: 3988)
      • Client.exe (PID: 1536)
      • Client.exe (PID: 5488)
      • Client.exe (PID: 2092)
      • Client.exe (PID: 624)
      • Client.exe (PID: 1328)
      • Client.exe (PID: 4840)
      • Client.exe (PID: 5392)
      • Client.exe (PID: 3824)
  • INFO

    • Reads the computer name

      • Client-built.exe (PID: 5160)
      • Client.exe (PID: 3984)
      • Client.exe (PID: 5316)
      • Client.exe (PID: 2676)
      • Client.exe (PID: 3988)
      • Client.exe (PID: 1536)
      • Client.exe (PID: 5488)
      • Client.exe (PID: 2092)
      • Client.exe (PID: 1328)
      • Client.exe (PID: 624)
      • Client.exe (PID: 3824)
    • Checks supported languages

      • Client-built.exe (PID: 5160)
      • Client.exe (PID: 3984)
      • chcp.com (PID: 4388)
      • Client.exe (PID: 5316)
      • chcp.com (PID: 5252)
      • chcp.com (PID: 4300)
      • Client.exe (PID: 2676)
      • chcp.com (PID: 3664)
      • Client.exe (PID: 3988)
      • Client.exe (PID: 1536)
      • Client.exe (PID: 5488)
      • chcp.com (PID: 5536)
      • chcp.com (PID: 2212)
      • Client.exe (PID: 624)
      • Client.exe (PID: 2092)
      • chcp.com (PID: 5588)
      • chcp.com (PID: 420)
      • Client.exe (PID: 1328)
      • Client.exe (PID: 4840)
      • chcp.com (PID: 4516)
      • Client.exe (PID: 5392)
      • chcp.com (PID: 1576)
      • chcp.com (PID: 1556)
      • Client.exe (PID: 3824)
    • Reads Environment values

      • Client.exe (PID: 3984)
      • Client-built.exe (PID: 5160)
      • Client.exe (PID: 5316)
      • Client.exe (PID: 2676)
      • Client.exe (PID: 3988)
      • Client.exe (PID: 1536)
      • Client.exe (PID: 5488)
      • Client.exe (PID: 2092)
      • Client.exe (PID: 1328)
      • Client.exe (PID: 624)
      • Client.exe (PID: 4840)
      • Client.exe (PID: 5392)
      • Client.exe (PID: 3824)
    • Reads the machine GUID from the registry

      • Client-built.exe (PID: 5160)
      • Client.exe (PID: 3984)
      • Client.exe (PID: 5316)
      • Client.exe (PID: 2676)
      • Client.exe (PID: 3988)
      • Client.exe (PID: 1536)
      • Client.exe (PID: 5488)
      • Client.exe (PID: 2092)
      • Client.exe (PID: 1328)
      • Client.exe (PID: 624)
      • Client.exe (PID: 4840)
      • Client.exe (PID: 5392)
      • Client.exe (PID: 3824)
    • Create files in a temporary directory

      • Client.exe (PID: 3984)
      • Client.exe (PID: 5316)
      • Client.exe (PID: 2676)
      • Client.exe (PID: 3988)
      • Client.exe (PID: 1536)
      • Client.exe (PID: 5488)
      • Client.exe (PID: 1328)
      • Client.exe (PID: 4840)
      • Client.exe (PID: 3824)
    • Changes the display of characters in the console

      • cmd.exe (PID: 4144)
      • cmd.exe (PID: 624)
      • cmd.exe (PID: 1448)
      • cmd.exe (PID: 4872)
      • cmd.exe (PID: 5544)
      • cmd.exe (PID: 4528)
      • cmd.exe (PID: 3820)
      • cmd.exe (PID: 3836)
      • cmd.exe (PID: 3552)
      • cmd.exe (PID: 3172)
      • cmd.exe (PID: 4528)
      • cmd.exe (PID: 2792)
    • Process checks computer location settings

      • Client.exe (PID: 3984)
      • Client.exe (PID: 5316)
      • Client.exe (PID: 2676)
      • Client.exe (PID: 3988)
      • Client.exe (PID: 1536)
      • Client.exe (PID: 5488)
      • Client.exe (PID: 2092)
      • Client.exe (PID: 624)
      • Client.exe (PID: 4840)
      • Client.exe (PID: 1328)
      • Client.exe (PID: 5392)
    • The process uses the downloaded file

      • Client.exe (PID: 3984)
      • Client.exe (PID: 5316)
      • Client.exe (PID: 2676)
      • Client.exe (PID: 3988)
      • Client.exe (PID: 1536)
      • Client.exe (PID: 5488)
      • Client.exe (PID: 2092)
      • Client.exe (PID: 1328)
      • Client.exe (PID: 4840)
      • Client.exe (PID: 5392)
      • Client.exe (PID: 3824)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (56.7)
.exe | Win64 Executable (generic) (21.3)
.scr | Windows screen saver (10.1)
.dll | Win32 Dynamic Link Library (generic) (5)
.exe | Win32 Executable (generic) (3.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:03:12 16:16:39+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 3261440
InitializedDataSize: 3584
UninitializedDataSize: -
EntryPoint: 0x31e3ee
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.4.1.0
ProductVersionNumber: 1.4.1.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: Quasar Client
FileVersion: 1.4.1
InternalName: Client.exe
LegalCopyright: Copyright © MaxXor 2023
LegalTrademarks: -
OriginalFileName: Client.exe
ProductName: Quasar
ProductVersion: 1.4.1
AssemblyVersion: 1.4.1.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
180
Monitored processes
61
Malicious processes
14
Suspicious processes
9

Behavior graph

Click at the process to see the details
start client-built.exe client.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs client.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs client.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs client.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs client.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs client.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs client.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs client.exe cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs client.exe no specs cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs client.exe no specs cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs client.exe no specs cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs client.exe no specs cmd.exe no specs conhost.exe no specs chcp.com no specs ping.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
420chcp 65001C:\Windows\System32\chcp.comcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Change CodePage Utility
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\chcp.com
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\fsutilext.dll
520\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
624C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\2EiUN4qszk11.bat" "C:\Windows\System32\cmd.exeClient.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
624"C:\Users\admin\AppData\Roaming\SubDir\Client.exe" C:\Users\admin\AppData\Roaming\SubDir\Client.exe
cmd.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Quasar Client
Exit code:
0
Version:
1.4.1
Modules
Images
c:\users\admin\appdata\roaming\subdir\client.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1144ping -n 10 localhost C:\Windows\System32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\ping.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\mswsock.dll
1328"C:\Users\admin\AppData\Roaming\SubDir\Client.exe" C:\Users\admin\AppData\Roaming\SubDir\Client.execmd.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Quasar Client
Exit code:
0
Version:
1.4.1
Modules
Images
c:\users\admin\appdata\roaming\subdir\client.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1356ping -n 10 localhost C:\Windows\System32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\ping.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\mswsock.dll
1392ping -n 10 localhost C:\Windows\System32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\ping.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\mswsock.dll
1412\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1448C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\8IjwU6vF3wdP.bat" "C:\Windows\System32\cmd.exeClient.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
Total events
14 021
Read events
14 008
Write events
13
Delete events
0

Modification events

(PID) Process:(5160) Client-built.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:file explorer start up
Value:
"C:\Users\admin\AppData\Roaming\SubDir\Client.exe"
(PID) Process:(3984) Client.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:file explorer start up
Value:
"C:\Users\admin\AppData\Roaming\SubDir\Client.exe"
(PID) Process:(5316) Client.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:file explorer start up
Value:
"C:\Users\admin\AppData\Roaming\SubDir\Client.exe"
(PID) Process:(2676) Client.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:file explorer start up
Value:
"C:\Users\admin\AppData\Roaming\SubDir\Client.exe"
(PID) Process:(3988) Client.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:file explorer start up
Value:
"C:\Users\admin\AppData\Roaming\SubDir\Client.exe"
(PID) Process:(1536) Client.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:file explorer start up
Value:
"C:\Users\admin\AppData\Roaming\SubDir\Client.exe"
(PID) Process:(5488) Client.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:file explorer start up
Value:
"C:\Users\admin\AppData\Roaming\SubDir\Client.exe"
(PID) Process:(2092) Client.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:file explorer start up
Value:
"C:\Users\admin\AppData\Roaming\SubDir\Client.exe"
(PID) Process:(624) Client.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:file explorer start up
Value:
"C:\Users\admin\AppData\Roaming\SubDir\Client.exe"
(PID) Process:(1328) Client.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:file explorer start up
Value:
"C:\Users\admin\AppData\Roaming\SubDir\Client.exe"
Executable files
1
Suspicious files
0
Text files
12
Unknown types
0

Dropped files

PID
Process
Filename
Type
5160Client-built.exeC:\Users\admin\AppData\Roaming\SubDir\Client.exeexecutable
MD5:C0A15477ED759CACB6E41C32DF4EE3B6
SHA256:40B1E1519D9240E23B0052B13F30CAC24DB6C23814FB91EC3C151F6E8A477858
3984Client.exeC:\Users\admin\AppData\Local\Temp\0ZqFQTO6pkkQ.battext
MD5:AE37615B81C99AA2732F94E5A0F7A3E7
SHA256:AF40860AB22A301FC03CA5BD702A9BDB6B1AA7CDAB2C731A052962044F3B8021
2676Client.exeC:\Users\admin\AppData\Local\Temp\2EiUN4qszk11.battext
MD5:679177D726D01AAA3A479142D455EEBE
SHA256:380E4B7BCCD5D10888CA3D5C2357A66AFB88BBD1D03B6E95F90F916ACD3DBBC0
3988Client.exeC:\Users\admin\AppData\Local\Temp\P6yY6oaBqzAv.battext
MD5:07826A0F6AA7D18996DC49F84BBB6C82
SHA256:137CC9B9DD8E4E3A6E06905F45F4F6C3086C45BBB3DB3B639115AA8509D49DB4
1536Client.exeC:\Users\admin\AppData\Local\Temp\ziIRhKsXjQN4.battext
MD5:1DB208F8631AF18888BA926154804A5C
SHA256:C87DFEC8AF604EA9004463F51A02890CFDC4A328211D8F697F3BE4ADD595D958
1328Client.exeC:\Users\admin\AppData\Local\Temp\xQ3aM9q7WxeJ.battext
MD5:5EC5E063DD1434B629300AE011A9B7A4
SHA256:66876ACB493D23BF0729794F46154EA8DBFDF44D2BA5FAD70FA02410CEB0A81A
2092Client.exeC:\Users\admin\AppData\Local\Temp\DQS3D7IWoe5v.battext
MD5:3FE80D636F3F38763FFB9D3FDF87DEDD
SHA256:8B83FA10D6AC7AA05ACF246F354E42F930932C838DE61B6FB69045DAA0A6E885
5488Client.exeC:\Users\admin\AppData\Local\Temp\128XX7OpGbdY.battext
MD5:CBB4C132F6FC469EDBA4BF6C6826E49E
SHA256:7536527EC4D185E9E9D5DF65285CE60A3A91AE2139BDC74BE7684F8F7EA448CA
5392Client.exeC:\Users\admin\AppData\Local\Temp\gZQjStSxQKet.battext
MD5:9581008BB448ADA75EA831CDFA68438F
SHA256:D02995A68C08173E119CB2047C3B07E89B46368DD91006D6A2715AA6ACD9E13D
3824Client.exeC:\Users\admin\AppData\Local\Temp\LSW8l7ROL55n.battext
MD5:B9C3A2144D9F5A3CACB8DF9A8440A889
SHA256:79FE785232A9E8F5FDC0BCAF51BB8C7D85229317AB3F75C36915DCF6CF9C29D5
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
42
DNS requests
7
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
440
svchost.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2356
RUXIMICS.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2356
RUXIMICS.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
440
svchost.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
440
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2356
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
192.168.100.255:138
whitelisted
440
svchost.exe
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
2356
RUXIMICS.exe
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
440
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4712
MoUsoCoreWorker.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
whitelisted
google.com
  • 216.58.212.142
whitelisted
crl.microsoft.com
  • 2.16.164.49
  • 2.16.164.120
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted
self.events.data.microsoft.com
  • 51.132.193.105
whitelisted

Threats

No threats detected
No debug info