File name:

Celestial.exe

Full analysis: https://app.any.run/tasks/d7f15b29-a7bb-4148-9c12-89ed3a092de4
Verdict: Malicious activity
Analysis date: June 19, 2025, 08:33:21
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto-sch
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

2330F3FCFDA60E722ADCDA041817D722

SHA1:

5CB047B150FF9DAC42197AE6595C355E539EB230

SHA256:

71E5095A441FEF82FCD9F2486737DB3A4887BFEE2773C79E780F7EB2EEB510C5

SSDEEP:

49152:1FrKj5GTm1HSMWbBl2sX3cibJrn9JS2+JwDgvJXHnPM3EdLStfe54/Op7Bnz:1FrKdn1ysUh9k2Yq2gqGt2O/iV

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Uses sleep, probably for evasion detection (SCRIPT)

      • wscript.exe (PID: 4412)
  • SUSPICIOUS

    • Reads the date of Windows installation

      • Celestial.exe (PID: 2144)
      • BrowserSavesmonitor.exe (PID: 3092)
    • Executable content was dropped or overwritten

      • Celestial.exe (PID: 2144)
      • BrowserSavesmonitor.exe (PID: 3092)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 4412)
    • Reads security settings of Internet Explorer

      • Celestial.exe (PID: 2144)
      • BrowserSavesmonitor.exe (PID: 3092)
    • Starts CMD.EXE for commands execution

      • wscript.exe (PID: 4412)
    • Executing commands from a ".bat" file

      • wscript.exe (PID: 4412)
    • Executed via WMI

      • schtasks.exe (PID: 4800)
      • schtasks.exe (PID: 4520)
      • schtasks.exe (PID: 1352)
      • schtasks.exe (PID: 4684)
      • schtasks.exe (PID: 5424)
      • schtasks.exe (PID: 5900)
      • schtasks.exe (PID: 3860)
      • schtasks.exe (PID: 3788)
      • schtasks.exe (PID: 4808)
      • schtasks.exe (PID: 2648)
      • schtasks.exe (PID: 5232)
      • schtasks.exe (PID: 7140)
      • schtasks.exe (PID: 6528)
      • schtasks.exe (PID: 5692)
      • schtasks.exe (PID: 6940)
      • schtasks.exe (PID: 760)
      • schtasks.exe (PID: 6620)
      • schtasks.exe (PID: 5504)
      • schtasks.exe (PID: 1132)
      • schtasks.exe (PID: 3620)
      • schtasks.exe (PID: 6612)
      • schtasks.exe (PID: 2232)
      • schtasks.exe (PID: 3672)
      • schtasks.exe (PID: 2128)
      • schtasks.exe (PID: 188)
      • schtasks.exe (PID: 7072)
      • schtasks.exe (PID: 3608)
      • schtasks.exe (PID: 2160)
      • schtasks.exe (PID: 1652)
      • schtasks.exe (PID: 5432)
      • schtasks.exe (PID: 2228)
      • schtasks.exe (PID: 6344)
      • schtasks.exe (PID: 5708)
      • schtasks.exe (PID: 5900)
      • schtasks.exe (PID: 3652)
      • schtasks.exe (PID: 1560)
      • schtasks.exe (PID: 320)
      • schtasks.exe (PID: 2276)
      • schtasks.exe (PID: 4804)
      • schtasks.exe (PID: 4708)
      • schtasks.exe (PID: 6180)
      • schtasks.exe (PID: 7052)
    • The process creates files with name similar to system file names

      • BrowserSavesmonitor.exe (PID: 3092)
    • Likely accesses (executes) a file from the Public directory

      • schtasks.exe (PID: 4804)
      • schtasks.exe (PID: 6180)
      • schtasks.exe (PID: 4708)
      • uhssvc.exe (PID: 4104)
      • uhssvc.exe (PID: 6748)
    • Starts itself from another location

      • BrowserSavesmonitor.exe (PID: 3092)
  • INFO

    • The sample compiled with english language support

      • Celestial.exe (PID: 2144)
      • BrowserSavesmonitor.exe (PID: 3092)
    • Checks supported languages

      • Celestial.exe (PID: 2144)
      • BrowserSavesmonitor.exe (PID: 3092)
      • RuntimeBroker.exe (PID: 6256)
      • SppExtComObj.exe (PID: 2216)
      • RuntimeBroker.exe (PID: 4760)
      • slui.exe (PID: 5896)
      • audiodg.exe (PID: 4824)
      • winlogon.exe (PID: 5532)
      • uhssvc.exe (PID: 4104)
      • dwm.exe (PID: 1472)
      • cmd.exe (PID: 4968)
      • ApplicationFrameHost.exe (PID: 4768)
      • MoUsoCoreWorker.exe (PID: 1096)
      • ApplicationFrameHost.exe (PID: 7140)
      • PLUGScheduler.exe (PID: 2368)
      • uhssvc.exe (PID: 6748)
    • Reads the computer name

      • Celestial.exe (PID: 2144)
      • BrowserSavesmonitor.exe (PID: 3092)
      • RuntimeBroker.exe (PID: 6256)
      • slui.exe (PID: 5896)
      • SppExtComObj.exe (PID: 2216)
      • RuntimeBroker.exe (PID: 4760)
      • audiodg.exe (PID: 4824)
      • winlogon.exe (PID: 5532)
      • uhssvc.exe (PID: 4104)
      • dwm.exe (PID: 1472)
      • cmd.exe (PID: 4968)
      • MoUsoCoreWorker.exe (PID: 1096)
      • ApplicationFrameHost.exe (PID: 7140)
      • PLUGScheduler.exe (PID: 2368)
      • uhssvc.exe (PID: 6748)
      • ApplicationFrameHost.exe (PID: 4768)
    • Drops encrypted VBS script (Microsoft Script Encoder)

      • Celestial.exe (PID: 2144)
    • Process checks computer location settings

      • Celestial.exe (PID: 2144)
      • BrowserSavesmonitor.exe (PID: 3092)
    • Reads Environment values

      • BrowserSavesmonitor.exe (PID: 3092)
      • SppExtComObj.exe (PID: 2216)
      • RuntimeBroker.exe (PID: 6256)
      • RuntimeBroker.exe (PID: 4760)
      • slui.exe (PID: 5896)
      • audiodg.exe (PID: 4824)
      • uhssvc.exe (PID: 4104)
      • winlogon.exe (PID: 5532)
      • dwm.exe (PID: 1472)
      • cmd.exe (PID: 4968)
      • ApplicationFrameHost.exe (PID: 7140)
      • PLUGScheduler.exe (PID: 2368)
      • uhssvc.exe (PID: 6748)
      • MoUsoCoreWorker.exe (PID: 1096)
      • ApplicationFrameHost.exe (PID: 4768)
    • Reads the machine GUID from the registry

      • BrowserSavesmonitor.exe (PID: 3092)
      • SppExtComObj.exe (PID: 2216)
      • RuntimeBroker.exe (PID: 6256)
      • RuntimeBroker.exe (PID: 4760)
      • slui.exe (PID: 5896)
      • audiodg.exe (PID: 4824)
      • uhssvc.exe (PID: 4104)
      • winlogon.exe (PID: 5532)
      • dwm.exe (PID: 1472)
      • cmd.exe (PID: 4968)
      • PLUGScheduler.exe (PID: 2368)
      • ApplicationFrameHost.exe (PID: 7140)
      • uhssvc.exe (PID: 6748)
      • MoUsoCoreWorker.exe (PID: 1096)
      • ApplicationFrameHost.exe (PID: 4768)
    • Failed to create an executable file in Windows directory

      • BrowserSavesmonitor.exe (PID: 3092)
    • Creates files in the program directory

      • BrowserSavesmonitor.exe (PID: 3092)
    • Manual execution by a user

      • SppExtComObj.exe (PID: 2216)
      • RuntimeBroker.exe (PID: 6256)
      • slui.exe (PID: 5896)
      • RuntimeBroker.exe (PID: 4760)
      • winlogon.exe (PID: 5532)
      • audiodg.exe (PID: 4824)
      • dwm.exe (PID: 1472)
      • cmd.exe (PID: 4968)
      • MoUsoCoreWorker.exe (PID: 1096)
      • ApplicationFrameHost.exe (PID: 4768)
      • ApplicationFrameHost.exe (PID: 7140)
      • PLUGScheduler.exe (PID: 2368)
      • uhssvc.exe (PID: 6748)
    • Checks proxy server information

      • slui.exe (PID: 6176)
    • Reads the software policy settings

      • slui.exe (PID: 6176)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2020:12:01 18:00:55+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14
CodeSize: 201216
InitializedDataSize: 168960
UninitializedDataSize: -
EntryPoint: 0x1ec40
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
198
Monitored processes
62
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start celestial.exe wscript.exe no specs cmd.exe no specs conhost.exe no specs browsersavesmonitor.exe schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs runtimebroker.exe no specs schtasks.exe no specs sppextcomobj.exe no specs schtasks.exe no specs slui.exe no specs schtasks.exe no specs runtimebroker.exe no specs schtasks.exe no specs schtasks.exe no specs audiodg.exe no specs winlogon.exe no specs uhssvc.exe no specs dwm.exe no specs cmd.exe no specs applicationframehost.exe no specs plugscheduler.exe no specs mousocoreworker.exe no specs applicationframehost.exe no specs uhssvc.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
188schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\mssvc\RuntimeBroker.exe'" /rl HIGHEST /fC:\Windows\System32\schtasks.exeWmiPrvSE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
320schtasks.exe /create /tn "ApplicationFrameHostA" /sc MINUTE /mo 14 /tr "'C:\Users\admin\Contacts\ApplicationFrameHost.exe'" /rl HIGHEST /fC:\Windows\System32\schtasks.exeWmiPrvSE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
760schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\mssvc\winlogon.exe'" /rl HIGHEST /fC:\Windows\System32\schtasks.exeWmiPrvSE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1096C:\mssvc\MoUsoCoreWorker.exeC:\mssvc\MoUsoCoreWorker.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
5.15.2.0
Modules
Images
c:\mssvc\mousocoreworker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1132schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 13 /tr "'C:\mssvc\cmd.exe'" /fC:\Windows\System32\schtasks.exeWmiPrvSE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1352schtasks.exe /create /tn "sluis" /sc MINUTE /mo 8 /tr "'C:\mssvc\slui.exe'" /rl HIGHEST /fC:\Windows\System32\schtasks.exeWmiPrvSE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1472"C:\Users\Default\Start Menu\dwm.exe"C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\dwm.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
5.15.2.0
Modules
Images
c:\users\default\appdata\roaming\microsoft\windows\start menu\dwm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1560schtasks.exe /create /tn "ApplicationFrameHost" /sc ONLOGON /tr "'C:\Users\admin\Contacts\ApplicationFrameHost.exe'" /rl HIGHEST /fC:\Windows\System32\schtasks.exeWmiPrvSE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1652schtasks.exe /create /tn "MoUsoCoreWorker" /sc ONLOGON /tr "'C:\mssvc\MoUsoCoreWorker.exe'" /rl HIGHEST /fC:\Windows\System32\schtasks.exeWmiPrvSE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2128schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\mssvc\RuntimeBroker.exe'" /fC:\Windows\System32\schtasks.exeWmiPrvSE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
5 644
Read events
5 632
Write events
12
Delete events
0

Modification events

(PID) Process:(2144) Celestial.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\ApplicationAssociationToasts
Operation:writeName:VBEFile_.vbe
Value:
0
(PID) Process:(2144) Celestial.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbe\OpenWithProgids
Operation:writeName:VBEFile
Value:
(PID) Process:(2144) Celestial.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2144) Celestial.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2144) Celestial.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2144) Celestial.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(3092) BrowserSavesmonitor.exeKey:HKEY_CURRENT_USER\SOFTWARE\4eb8f8ea5e02c8f7883d4d69d5b9f8e1f0f355ba
Operation:writeName:37eafd04d4b6110eb4b286941e155b6c2d66269f
Value:
WyJDOlxcbXNzdmNcXEJyb3dzZXJTYXZlc21vbml0b3IuZXhlIiwiQzpcXFVzZXJzXFxEZWZhdWx0XFxTdGFydCBNZW51XFxkd20uZXhlIiwiQzpcXG1zc3ZjXFxzbHVpLmV4ZSIsIkM6XFxtc3N2Y1xcU3BwRXh0Q29tT2JqLmV4ZSIsIkM6XFxtc3N2Y1xcUnVudGltZUJyb2tlci5leGUiLCJDOlxcbXNzdmNcXFJ1bnRpbWVCcm9rZXIuZXhlIiwiQzpcXFVzZXJzXFxEZWZhdWx0XFxEb2N1bWVudHNcXE15IE11c2ljXFxhdWRpb2RnLmV4ZSIsIkM6XFxtc3N2Y1xcd2lubG9nb24uZXhlIiwiQzpcXG1zc3ZjXFxjbWQuZXhlIiwiQzpcXG1zc3ZjXFxSdW50aW1lQnJva2VyLmV4ZSIsIkM6XFxVc2Vyc1xcYWRtaW5cXENvbnRhY3RzXFxBcHBsaWNhdGlvbkZyYW1lSG9zdC5leGUiLCJDOlxcbXNzdmNcXE1vVXNvQ29yZVdvcmtlci5leGUiLCJDOlxcVXNlcnNcXEFsbCBVc2Vyc1xcTWljcm9zb2Z0IE9uZURyaXZlXFxzZXR1cFxcQXBwbGljYXRpb25GcmFtZUhvc3QuZXhlIiwiQzpcXG1zc3ZjXFxQTFVHU2NoZWR1bGVyLmV4ZSIsIkM6XFxVc2Vyc1xcUHVibGljXFxNdXNpY1xcdWhzc3ZjLmV4ZSJd
Executable files
13
Suspicious files
0
Text files
13
Unknown types
1

Dropped files

PID
Process
Filename
Type
2144Celestial.exeC:\mssvc\jGdzPED.vbevbe
MD5:3BF886279C0BC8D728E96A1F01651C9F
SHA256:4EE42829515C91AE603D5C3E42965256274921A0B067AFC5FBB92CFF432F37FA
2144Celestial.exeC:\mssvc\BrowserSavesmonitor.exeexecutable
MD5:9EA232BB688B19BCD3CF66FA10A52635
SHA256:87230F5560F90FD92C5AA82992125F946294B713FDBCE0C509570DA70F31410F
3092BrowserSavesmonitor.exeC:\mssvc\slui.exeexecutable
MD5:9EA232BB688B19BCD3CF66FA10A52635
SHA256:87230F5560F90FD92C5AA82992125F946294B713FDBCE0C509570DA70F31410F
3092BrowserSavesmonitor.exeC:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\6cb0b6c459d5d3text
MD5:BAEB5C6940A4B9E23ABFBFA8E461341B
SHA256:C1FD8A58E6003580A6DE383D8B3B94A3A68D4192184A886CCEEC68BA9C9C3159
3092BrowserSavesmonitor.exeC:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\dwm.exeexecutable
MD5:9EA232BB688B19BCD3CF66FA10A52635
SHA256:87230F5560F90FD92C5AA82992125F946294B713FDBCE0C509570DA70F31410F
3092BrowserSavesmonitor.exeC:\mssvc\a29f4157103644text
MD5:8006B99E1A1382EB7C91823F7B698311
SHA256:E0366F2E2C6538283D0A6C60F2066515CCAA9F0D3EE51B959AFF40C537BCCF0A
3092BrowserSavesmonitor.exeC:\mssvc\SppExtComObj.exeexecutable
MD5:9EA232BB688B19BCD3CF66FA10A52635
SHA256:87230F5560F90FD92C5AA82992125F946294B713FDBCE0C509570DA70F31410F
3092BrowserSavesmonitor.exeC:\mssvc\winlogon.exeexecutable
MD5:9EA232BB688B19BCD3CF66FA10A52635
SHA256:87230F5560F90FD92C5AA82992125F946294B713FDBCE0C509570DA70F31410F
3092BrowserSavesmonitor.exeC:\mssvc\RuntimeBroker.exeexecutable
MD5:9EA232BB688B19BCD3CF66FA10A52635
SHA256:87230F5560F90FD92C5AA82992125F946294B713FDBCE0C509570DA70F31410F
3092BrowserSavesmonitor.exeC:\mssvc\9e8d7a4ca61bd9text
MD5:0E06F72433E857B79D58455F05B9CBA4
SHA256:D48ED2E3792AFABBE0D7E4A54E4D4BBEB9CD4ACA9392BB25727CCB43BC560568
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
25
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
2.18.121.139:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5244
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1268
svchost.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3724
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
3724
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
2940
svchost.exe
GET
200
69.192.161.44:80
http://x1.c.lencr.org/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
5944
MoUsoCoreWorker.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
3964
RUXIMICS.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:138
whitelisted
2336
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
5244
svchost.exe
20.190.159.73:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5244
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1268
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1268
svchost.exe
2.18.121.139:80
crl.microsoft.com
AKAMAI-AS
FR
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 172.217.18.14
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 20.190.159.73
  • 40.126.31.71
  • 40.126.31.0
  • 20.190.159.71
  • 40.126.31.69
  • 20.190.159.4
  • 20.190.159.68
  • 20.190.159.0
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
settings-win.data.microsoft.com
  • 51.124.78.146
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 2.18.121.139
  • 2.18.121.147
whitelisted
www.microsoft.com
  • 23.219.150.101
  • 95.101.149.131
whitelisted
nexusrules.officeapps.live.com
  • 52.111.236.23
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

No threats detected
No debug info