File name:

OfficeScrubber_13.zip

Full analysis: https://app.any.run/tasks/e723b2b6-2919-4542-9cda-02b4ef481ee9
Verdict: Malicious activity
Analysis date: November 06, 2024, 07:25:30
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
arch-scr
arch-doc
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

EBC91F408FCC82C30172082E253B6008

SHA1:

9856FADEFB06E853D0138D20F804890D7A166B4C

SHA256:

88597450CD5331EF6096EA01CAA7151ABE698148A74B1D660AB089D50F8F216A

SSDEEP:

6144:lFzXT2byGbI9oSusHCu6WkFAgPoWNfXneg81+F3IIr9rcG1pU:l9XqeGbI9oS3O5NfXnegs+1r9AG7U

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 6608)
    • Execute application with conhost.exe as parent process

      • powershell.exe (PID: 3004)
    • Starts NET.EXE for service management

      • net.exe (PID: 4956)
      • net.exe (PID: 6276)
      • net.exe (PID: 5168)
      • net.exe (PID: 2972)
      • cmd.exe (PID: 1584)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 1768)
      • cscript.exe (PID: 7116)
      • cmd.exe (PID: 1884)
      • powershell.exe (PID: 3004)
      • cmd.exe (PID: 1584)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 1768)
      • cmd.exe (PID: 1884)
      • cmd.exe (PID: 1584)
    • Application launched itself

      • cmd.exe (PID: 1768)
      • cmd.exe (PID: 1884)
      • cmd.exe (PID: 1584)
    • Uses WMIC.EXE to obtain computer system information

      • cmd.exe (PID: 2280)
      • cmd.exe (PID: 6864)
      • cmd.exe (PID: 6904)
    • The process bypasses the loading of PowerShell profile settings

      • cmd.exe (PID: 1768)
      • cmd.exe (PID: 1884)
      • conhost.exe (PID: 4816)
      • cmd.exe (PID: 1584)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 1768)
      • cmd.exe (PID: 1884)
      • conhost.exe (PID: 4816)
      • cmd.exe (PID: 1584)
    • Executes script without checking the security policy

      • powershell.exe (PID: 7124)
      • powershell.exe (PID: 3004)
      • powershell.exe (PID: 2076)
      • powershell.exe (PID: 6604)
    • Uses RUNDLL32.EXE to load library

      • cscript.exe (PID: 7116)
    • Executing commands from ".cmd" file

      • cscript.exe (PID: 7116)
      • powershell.exe (PID: 3004)
    • Hides command output

      • cmd.exe (PID: 1804)
      • cmd.exe (PID: 5356)
      • cmd.exe (PID: 6952)
      • cmd.exe (PID: 616)
      • cmd.exe (PID: 7080)
      • cmd.exe (PID: 528)
      • cmd.exe (PID: 6904)
      • cmd.exe (PID: 6756)
      • cmd.exe (PID: 4680)
      • cmd.exe (PID: 5532)
      • cmd.exe (PID: 4464)
      • cmd.exe (PID: 6916)
      • cmd.exe (PID: 1084)
      • cmd.exe (PID: 2464)
      • cmd.exe (PID: 7112)
      • cmd.exe (PID: 6612)
    • Starts SC.EXE for service management

      • cmd.exe (PID: 1584)
    • Uses WMIC.EXE to obtain Windows Installer data

      • cmd.exe (PID: 4464)
      • cmd.exe (PID: 6916)
      • cmd.exe (PID: 1084)
      • cmd.exe (PID: 1584)
      • cmd.exe (PID: 7112)
      • cmd.exe (PID: 2464)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 1584)
    • Get information on the list of running processes

      • cmd.exe (PID: 1584)
    • Executable content was dropped or overwritten

      • OfficeClickToRun.exe (PID: 6540)
    • The process drops C-runtime libraries

      • OfficeClickToRun.exe (PID: 6540)
    • Process drops legitimate windows executable

      • OfficeClickToRun.exe (PID: 6540)
  • INFO

    • Manual execution by a user

      • WinRAR.exe (PID: 4448)
      • cmd.exe (PID: 1768)
    • Checks operating system version

      • cmd.exe (PID: 1768)
      • cmd.exe (PID: 1884)
      • cmd.exe (PID: 1584)
    • Executes as Windows Service

      • OfficeClickToRun.exe (PID: 6540)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2024:03:09 15:10:32
ZipCRC: 0xe61f5477
ZipCompressedSize: 1186
ZipUncompressedSize: 3671
ZipFileName: ReadMe.txt
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
316
Monitored processes
183
Malicious processes
7
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs winrar.exe no specs rundll32.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs find.exe no specs wmic.exe no specs powershell.exe no specs find.exe no specs reg.exe no specs cscript.exe no specs rundll32.exe no specs cmd.exe conhost.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs find.exe no specs wmic.exe no specs powershell.exe no specs find.exe no specs reg.exe no specs reg.exe no specs find.exe no specs reg.exe no specs find.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs find.exe no specs wmic.exe no specs powershell.exe no specs find.exe no specs reg.exe no specs reg.exe no specs find.exe no specs reg.exe no specs find.exe no specs sc.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs find.exe no specs reg.exe no specs findstr.exe no specs reg.exe no specs findstr.exe no specs choice.exe no specs choice.exe no specs choice.exe no specs choice.exe no specs choice.exe no specs choice.exe no specs choice.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs cmd.exe no specs wmic.exe no specs cmd.exe no specs wmic.exe no specs cmd.exe no specs wmic.exe no specs wmic.exe no specs cmd.exe no specs wmic.exe no specs cmd.exe no specs wmic.exe no specs reg.exe no specs reg.exe no specs net.exe no specs net1.exe no specs net.exe no specs net1.exe no specs tasklist.exe no specs find.exe no specs tasklist.exe no specs find.exe no specs tasklist.exe no specs find.exe no specs tasklist.exe no specs find.exe no specs tasklist.exe no specs find.exe no specs tasklist.exe no specs find.exe no specs tasklist.exe no specs find.exe no specs tasklist.exe no specs find.exe no specs tasklist.exe no specs find.exe no specs tasklist.exe no specs find.exe no specs tasklist.exe no specs find.exe no specs tasklist.exe no specs find.exe no specs tasklist.exe no specs find.exe no specs tasklist.exe no specs find.exe no specs tasklist.exe no specs find.exe no specs tasklist.exe no specs find.exe no specs tasklist.exe no specs find.exe no specs tasklist.exe no specs find.exe no specs tasklist.exe no specs find.exe no specs tasklist.exe no specs find.exe no specs tasklist.exe no specs find.exe no specs tasklist.exe no specs find.exe no specs tasklist.exe no specs find.exe no specs tasklist.exe no specs find.exe no specs tasklist.exe no specs find.exe no specs tasklist.exe no specs find.exe no specs tasklist.exe no specs find.exe no specs tasklist.exe no specs find.exe no specs tasklist.exe no specs find.exe no specs tasklist.exe no specs find.exe no specs tasklist.exe no specs find.exe no specs net.exe no specs net1.exe no specs net.exe no specs net1.exe no specs officeclicktorun.exe officeclicktorun.exe

Process information

PID
CMD
Path
Indicators
Parent process
528find /i "Full" C:\Windows\System32\find.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (grep) Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\find.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\fsutilext.dll
528C:\WINDOWS\system32\cmd.exe /c "reg.exe query HKLM\SOFTWARE\Microsoft\Office\16.0\Common\InstallRoot /v Path" 2>nulC:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
616C:\WINDOWS\system32\cmd.exe /c "reg.exe query HKLM\SOFTWARE\Wow6432Node\Microsoft\Office\12.0\Common\InstallRoot /v Path" 2>nulC:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
696C:\WINDOWS\system32\cmd.exe /S /D /c" ver"C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
696reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\msoxmled.exe" C:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ws2_32.dll
696reg.exe delete "HKU\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\0ff1ce15-a989-479d-af46-f275c6370663" /fC:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ws2_32.dll
696find /i "outlook.exe" C:\Windows\System32\find.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (grep) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\find.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\fsutilext.dll
700find /i "graph.exe" C:\Windows\System32\find.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (grep) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\find.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\fsutilext.dll
780tasklist /FI "IMAGENAME eq integrator.exe" C:\Windows\System32\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
1084C:\WINDOWS\system32\cmd.exe /c "wmic path SoftwareLicensingProduct where (Name LIKE 'Office 19%' AND PartialProductKey is not NULL) get ID /VALUE" 2>nulC:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
Total events
27 189
Read events
26 958
Write events
125
Delete events
106

Modification events

(PID) Process:(6608) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(6608) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\OfficeScrubber_13.zip
(PID) Process:(6608) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6608) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6608) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6608) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(4448) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(4448) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(4448) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(4448) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
35
Suspicious files
1 421
Text files
482
Unknown types
0

Dropped files

PID
Process
Filename
Type
4448WinRAR.exeC:\Users\admin\Desktop\OfficeScrubber_13\bin\OffScrub07.vbstext
MD5:6B9011588E15B67509869001E4C18153
SHA256:4F1E42CE509FD0108A2BF261C5BC6E04B749DC7431CEF083572623946DBE697B
7124powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:4AA88E356A877D73E3AB230A416DE1CD
SHA256:758E26847315F2270FC88C0424727C8B272F1F52AB0A6B248B2F57383A6640A2
4448WinRAR.exeC:\Users\admin\Desktop\OfficeScrubber_13\bin\OffScrub03.vbstext
MD5:A5CFF547C4E09DD864DB341FBB845C78
SHA256:2EF8CBC690CCF4829D42FB008CDAF7A67A5C12C462F229C278AF757558537C1E
4448WinRAR.exeC:\Users\admin\Desktop\OfficeScrubber_13\bin\OffScrub_O16msi.vbstext
MD5:5BB0D64A99276CEA45BD3E9013024636
SHA256:A72BB334CFFF2DC236BE4160B495D8F45849D9AD061A17A2396BC6158AC8B0EF
4448WinRAR.exeC:\Users\admin\Desktop\OfficeScrubber_13\OfficeScrubber.cmdtext
MD5:6AE1212442F65EA313A6ABF369A48FDC
SHA256:4CB7D0B0A893DCE45BAC12B9DE767343A1C2CB3E7DC5FCEDC62A802246EA29DC
6540OfficeClickToRun.exeC:\ProgramData\Microsoft\ClickToRun\ProductReleases\A8610DA8-C847-43EC-BFE5-F042E8786B96\x-none.16\stream.x64.x-none.man.dat
MD5:
SHA256:
4448WinRAR.exeC:\Users\admin\Desktop\OfficeScrubber_13\bin\CleanOffice.txttext
MD5:E26AF0413350BFB88FDB0D5CBDED8596
SHA256:C0FF3E0B9CB14687E9EF6DA7890941F753F6541EDE627A3D14F3D43A20B1163C
4448WinRAR.exeC:\Users\admin\Desktop\OfficeScrubber_13\bin\OffScrub_O15msi.vbstext
MD5:023EC3443C4B2497C03895521AA8F7A1
SHA256:30704D9F3ABFD25A9C3318BF5638BFCFDA40446AC0103FF3BB01A28079F70B9B
4448WinRAR.exeC:\Users\admin\Desktop\OfficeScrubber_13\bin\OffScrub10.vbstext
MD5:2D12C6C8328D2CF44F8CA3A4EB32AE78
SHA256:C7319ACD86E6489D44D1723FA9F71F6E76899474D2473B5AB153C01E6C542BE9
4448WinRAR.exeC:\Users\admin\Desktop\OfficeScrubber_13\bin\OffScrubC2R.vbstext
MD5:DD026195EBF162DAB0C24B25E01B96F1
SHA256:CD94604F7636085641273CAD146266DFC997724B4FAABE1BE42C21310C040DEC
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
35
DNS requests
23
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5488
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
7028
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7040
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7040
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
3860
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6944
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
5640
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5488
MoUsoCoreWorker.exe
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
5488
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4360
SearchApp.exe
2.23.209.157:443
www.bing.com
Akamai International B.V.
GB
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4020
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 2.16.164.49
  • 2.16.164.9
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 184.30.21.171
whitelisted
www.bing.com
  • 2.23.209.157
  • 2.23.209.154
  • 2.23.209.163
  • 2.23.209.166
  • 2.23.209.162
  • 2.23.209.156
  • 2.23.209.164
  • 2.23.209.158
  • 2.23.209.160
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
google.com
  • 142.250.185.142
whitelisted
login.live.com
  • 20.190.160.20
  • 40.126.32.72
  • 40.126.32.68
  • 40.126.32.133
  • 20.190.160.22
  • 20.190.160.17
  • 40.126.32.140
  • 40.126.32.134
whitelisted
th.bing.com
  • 2.23.209.169
  • 2.23.209.164
  • 2.23.209.167
  • 2.23.209.162
  • 2.23.209.163
  • 2.23.209.159
  • 2.23.209.160
  • 2.23.209.166
  • 2.23.209.168
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted

Threats

No threats detected
No debug info