File name:

123.7z

Full analysis: https://app.any.run/tasks/dc60d77e-5932-4489-a583-f452245c7b96
Verdict: Malicious activity
Threats:

njRAT is a remote access trojan. It is one of the most widely accessible RATs on the market that features an abundance of educational information. Interested attackers can even find tutorials on YouTube. This allows it to become one of the most popular RATs in the world.

Analysis date: September 05, 2024, 17:45:49
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
rat
njrat
bladabindi
stealer
crypto-regex
quasar
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

C415931D5354EA21661ED60B4CE93F60

SHA1:

27EDF60C1EED6A7FD29291A837BAD5B45712306D

SHA256:

41E3E29AC43446DB05A854A94FB81788D15060C24C526AB049FDFAC60C112DF3

SSDEEP:

98304:KBDnUzxg54OmbhwoyfrZmLfakCOT7VTpwTcRplE9xZ7wPJISYlhIWVsCO33ZtKO8:jKIU0nIQBVg

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • Server.exe (PID: 6280)
    • Uses base64 encoding (SCRIPT)

      • wscript.exe (PID: 5372)
    • Creates internet connection object (SCRIPT)

      • wscript.exe (PID: 5372)
    • Steals credentials from Web Browsers

      • Server.exe (PID: 6280)
    • Creates a new registry key or changes the value of an existing one (SCRIPT)

      • wscript.exe (PID: 5372)
    • Modifies registry startup key (SCRIPT)

      • wscript.exe (PID: 5372)
    • Create files in the Startup directory

      • wscript.exe (PID: 5372)
    • Copies file to a new location (SCRIPT)

      • wscript.exe (PID: 5372)
    • Opens an HTTP connection (SCRIPT)

      • wscript.exe (PID: 5372)
    • NjRAT is detected

      • Server.exe (PID: 6280)
    • Sends HTTP request (SCRIPT)

      • wscript.exe (PID: 5372)
    • QUASAR has been detected (YARA)

      • Server.exe (PID: 6280)
    • Uses sleep, probably for evasion detection (SCRIPT)

      • wscript.exe (PID: 5372)
    • Changes the autorun value in the registry

      • Server.exe (PID: 6280)
  • SUSPICIOUS

    • The process checks if it is being run in the virtual environment

      • WinRAR.exe (PID: 1104)
    • Reads security settings of Internet Explorer

      • NjRat ACS Version 2.0.exe (PID: 1480)
      • Server.exe (PID: 6280)
    • Executable content was dropped or overwritten

      • NjRat ACS Version 2.0.exe (PID: 1480)
    • Uses NETSH.EXE to add a firewall rule or allowed programs

      • Server.exe (PID: 6280)
    • Loads DLL from Mozilla Firefox

      • Server.exe (PID: 6280)
    • Reads the date of Windows installation

      • Server.exe (PID: 6280)
    • Writes binary data to a Stream object (SCRIPT)

      • wscript.exe (PID: 5372)
    • The process executes VB scripts

      • Server.exe (PID: 6280)
    • Sets XML DOM element text (SCRIPT)

      • wscript.exe (PID: 5372)
    • Creates a Stream, which may work with files, input/output devices, pipes, or TCP/IP sockets (SCRIPT)

      • wscript.exe (PID: 5372)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 5372)
    • Accesses computer name via WMI (SCRIPT)

      • wscript.exe (PID: 5372)
    • Gets the drive type (SCRIPT)

      • wscript.exe (PID: 5372)
    • Gets full path of the running script (SCRIPT)

      • wscript.exe (PID: 5372)
    • Accesses current user name via WMI (SCRIPT)

      • wscript.exe (PID: 5372)
    • Gets disk free space (SCRIPT)

      • wscript.exe (PID: 5372)
    • Checks whether the drive is ready (SCRIPT)

      • wscript.exe (PID: 5372)
    • Gets a collection of all available drive names (SCRIPT)

      • wscript.exe (PID: 5372)
    • Reads data from a binary Stream object (SCRIPT)

      • wscript.exe (PID: 5372)
    • Creates FileSystem object to access computer's file system (SCRIPT)

      • wscript.exe (PID: 5372)
    • Changes charset (SCRIPT)

      • wscript.exe (PID: 5372)
    • Accesses WMI object, sets custom ImpersonationLevel (SCRIPT)

      • wscript.exe (PID: 5372)
    • Accesses WMI object caption (SCRIPT)

      • wscript.exe (PID: 5372)
    • Accesses operating system name via WMI (SCRIPT)

      • wscript.exe (PID: 5372)
    • Accesses antivirus product name via WMI (SCRIPT)

      • wscript.exe (PID: 5372)
    • Adds, changes, or deletes HTTP request header (SCRIPT)

      • wscript.exe (PID: 5372)
    • Found regular expressions for crypto-addresses (YARA)

      • Server.exe (PID: 6280)
    • Accesses WMI object display name (SCRIPT)

      • wscript.exe (PID: 5372)
    • Connects to unusual port

      • wscript.exe (PID: 5372)
  • INFO

    • Manual execution by a user

      • NjRat ACS Version 2.0.exe (PID: 1480)
      • WinRAR.exe (PID: 4060)
      • Server.exe (PID: 6280)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 4060)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 4060)
      • Server.exe (PID: 6280)
    • Reads the software policy settings

      • slui.exe (PID: 1568)
      • slui.exe (PID: 3316)
    • Checks supported languages

      • NjRat ACS Version 2.0.exe (PID: 1480)
      • Server.exe (PID: 6280)
    • Reads the computer name

      • NjRat ACS Version 2.0.exe (PID: 1480)
      • Server.exe (PID: 6280)
    • Reads the machine GUID from the registry

      • NjRat ACS Version 2.0.exe (PID: 1480)
      • Server.exe (PID: 6280)
    • Reads Microsoft Office registry keys

      • Server.exe (PID: 6280)
    • Create files in a temporary directory

      • Server.exe (PID: 6280)
    • Process checks computer location settings

      • Server.exe (PID: 6280)
    • Checks proxy server information

      • slui.exe (PID: 3316)
      • wscript.exe (PID: 5372)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
146
Monitored processes
12
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs sppextcomobj.exe no specs slui.exe winrar.exe slui.exe rundll32.exe no specs njrat acs version 2.0.exe #NJRAT server.exe netsh.exe no specs conhost.exe no specs wscript.exe svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
1104"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\123.7zC:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
1480"C:\Users\admin\Desktop\NjRat ACS Version 2.0\NjRat ACS Version 2.0.exe" C:\Users\admin\Desktop\NjRat ACS Version 2.0\NjRat ACS Version 2.0.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Version:
0.0.0.7
Modules
Images
c:\users\admin\desktop\njrat acs version 2.0\njrat acs version 2.0.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1568"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2256C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2648netsh firewall add allowedprogram "C:\Users\admin\Desktop\NjRat ACS Version 2.0\Server.exe" "Server.exe" ENABLEC:\Windows\System32\netsh.exeServer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Network Command Shell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\netsh.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
3316C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4060"C:\Program Files\WinRAR\WinRAR.exe" x -iext -ow -ver -- "C:\Users\admin\Desktop\NjRat ACS Version 2.0.rar" "C:\Users\admin\Desktop\NjRat ACS Version 2.0\"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
5372"C:\WINDOWS\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\tmp587A.tmp.vbs" C:\Windows\System32\wscript.exe
Server.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
5520\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exenetsh.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6056C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
Total events
9 795
Read events
9 544
Write events
249
Delete events
2

Modification events

(PID) Process:(1104) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(1104) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\123.7z
(PID) Process:(1104) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1104) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1104) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1104) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(4060) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(4060) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(4060) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(4060) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
10
Suspicious files
1
Text files
8
Unknown types
0

Dropped files

PID
Process
Filename
Type
4060WinRAR.exeC:\Users\admin\Desktop\NjRat ACS Version 2.0\NjRat ACS Version 2.0.exe
MD5:
SHA256:
4060WinRAR.exeC:\Users\admin\Desktop\NjRat ACS Version 2.0\About.txttext
MD5:CF989E74DE69CDD541A46153120E0B27
SHA256:E8C76C8314A9D61C5B68100E368790653FA9F7B69DE28205F863C93763FCDC14
4060WinRAR.exeC:\Users\admin\Desktop\NjRat ACS Version 2.0\WinMM.Net.dllexecutable
MD5:D4B80052C7B4093E10CE1F40CE74F707
SHA256:59E2AC1B79840274BDFCEF412A10058654E42F4285D732D1487E65E60FFBFB46
1480NjRat ACS Version 2.0.exeC:\Users\admin\Desktop\NjRat ACS Version 2.0\Server.exeexecutable
MD5:458CB92305D0FBC4362E463CA7469344
SHA256:A676F9355DDA0BA34631DD4D2D272711E44CF74849A9B199E7C86A8BD9C5BB88
4060WinRAR.exeC:\Users\admin\Desktop\NjRat ACS Version 2.0\Plugin\cam.dllexecutable
MD5:A73EDB60B80A2DFA86735D821BEA7B19
SHA256:7A4977B024D048B71BCC8F1CC65FB06E4353821323F852DC6740B79B9AB75C98
4060WinRAR.exeC:\Users\admin\Desktop\NjRat ACS Version 2.0\Plugin\Newtonsoft.Json.xmlxml
MD5:34B860D5A1519F09FDF89711F248FA73
SHA256:6ACE20C7098F933F70B564030EEE83EAADBE54CF6C1F4DDBED8B088BC043E7D8
4060WinRAR.exeC:\Users\admin\Desktop\NjRat ACS Version 2.0\Plugin\sc2.dllexecutable
MD5:19967E886EDCD2F22F8D4A58C8EA3773
SHA256:3E5141C75B7746C0EB2B332082A165DEACB943CEF26BD84668E6B79B47BDFD93
5372wscript.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tmp587A.tmp.vbstext
MD5:E5C1DDA5EA4A32F330A5C18582E151F9
SHA256:3C6ED7BEC65ED875A7C4DF525B1BB9F4C7DD63727816C02BA41D0571FE48AAD2
4060WinRAR.exeC:\Users\admin\Desktop\NjRat ACS Version 2.0\NjRat 0.7D.xmlxml
MD5:3052DD5371D8F937A9A581F9ADDFCB5D
SHA256:F645EC4E1ED9369BD046FEECB152B15B70862A863EAC91811F61941C815B06E0
4060WinRAR.exeC:\Users\admin\Desktop\NjRat ACS Version 2.0\dnlib.dllexecutable
MD5:BE0B4BA52E3D40488F1C9EE0A05073D5
SHA256:DA0C29145C2088E3311B7A8D51D27B0DE2DEBBCF3E86D0C8FB01319A5B8FEAC3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
43
DNS requests
23
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6208
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7128
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6928
SIHClient.exe
GET
200
23.32.185.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2252
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6928
SIHClient.exe
GET
200
23.32.185.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2120
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
7128
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4760
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
7128
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
7128
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3260
svchost.exe
40.115.3.253:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6208
svchost.exe
20.190.159.75:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6208
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.212.142
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.104.136.2
  • 4.231.128.59
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 23.32.185.131
whitelisted
client.wns.windows.com
  • 40.115.3.253
  • 40.113.103.199
whitelisted
login.live.com
  • 20.190.159.75
  • 20.190.159.68
  • 20.190.159.73
  • 40.126.31.71
  • 20.190.159.23
  • 20.190.159.64
  • 40.126.31.69
  • 20.190.159.0
  • 20.190.159.71
  • 40.126.31.73
  • 40.126.31.67
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
slscr.update.microsoft.com
  • 20.114.59.183
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
  • 20.83.72.98
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted

Threats

PID
Process
Class
Message
2256
svchost.exe
Misc activity
ET INFO DYNAMIC_DNS Query to *.duckdns. Domain
2256
svchost.exe
Potentially Bad Traffic
ET INFO DYNAMIC_DNS Query to a *.duckdns .org Domain
No debug info