File name:

ZipThis.exe

Full analysis: https://app.any.run/tasks/4a756656-2553-460d-80d2-f415ed7d04b0
Verdict: Malicious activity
Analysis date: January 08, 2025, 12:26:48
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows, 2 sections
MD5:

B00E6B651799ADE8DA83DE8DEF7C11B3

SHA1:

6C8017F07FE67A051825E31E1C9C4639C1C092B9

SHA256:

91F329CC468BFE5740E3A35D659F03C85F80D404ED0551C608E1EE50C3212B1F

SSDEEP:

98304:4w4Duw4xT2ZyydrN7phb9dFqtq1lpI2zkymGeIPyPn7bWLRIhc35MaiGqF25ekAS:m

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes powershell execution policy (RemoteSigned)

      • ZipThis.exe (PID: 6948)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • ZipThis.exe (PID: 4952)
      • ZipThis.exe (PID: 6948)
      • ZipThisApp.exe (PID: 6284)
    • Reads the date of Windows installation

      • ZipThis.exe (PID: 4952)
      • ZipThis.exe (PID: 6948)
    • Application launched itself

      • ZipThis.exe (PID: 4952)
    • The process executes Powershell scripts

      • ZipThis.exe (PID: 6948)
    • Starts POWERSHELL.EXE for commands execution

      • ZipThis.exe (PID: 6948)
    • The process drops C-runtime libraries

      • ZipThis.exe (PID: 6948)
    • Process drops legitimate windows executable

      • ZipThis.exe (PID: 6948)
    • Searches for installed software

      • ZipThis.exe (PID: 6948)
    • Gets path to any of the special folders (POWERSHELL)

      • powershell.exe (PID: 7072)
    • Executable content was dropped or overwritten

      • ZipThis.exe (PID: 6948)
    • Creates a software uninstall entry

      • ZipThis.exe (PID: 6948)
  • INFO

    • Reads the machine GUID from the registry

      • ZipThis.exe (PID: 4952)
      • ZipThis.exe (PID: 6948)
      • ZipThisApp.exe (PID: 6284)
    • Reads the computer name

      • ZipThis.exe (PID: 4952)
      • ZipThis.exe (PID: 6948)
      • ZipThisApp.exe (PID: 6284)
    • Process checks computer location settings

      • ZipThis.exe (PID: 4952)
      • ZipThis.exe (PID: 6948)
    • Checks supported languages

      • ZipThis.exe (PID: 6948)
      • ZipThisApp.exe (PID: 6284)
      • ZipThis.exe (PID: 4952)
    • Checks proxy server information

      • ZipThis.exe (PID: 6948)
      • ZipThisApp.exe (PID: 6284)
    • Disables trace logs

      • ZipThis.exe (PID: 6948)
      • ZipThisApp.exe (PID: 6284)
    • Reads Environment values

      • ZipThis.exe (PID: 6948)
      • ZipThisApp.exe (PID: 6284)
    • Reads the software policy settings

      • ZipThis.exe (PID: 6948)
      • ZipThisApp.exe (PID: 6284)
      • ZipThis.exe (PID: 4952)
    • The process uses the downloaded file

      • powershell.exe (PID: 7072)
      • ZipThis.exe (PID: 6948)
      • powershell_ise.exe (PID: 4976)
      • ZipThis.exe (PID: 4952)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 7072)
    • The sample compiled with english language support

      • ZipThis.exe (PID: 6948)
    • Creates files in the program directory

      • ZipThis.exe (PID: 6948)
    • Application launched itself

      • chrome.exe (PID: 4128)
    • Create files in a temporary directory

      • ZipThisApp.exe (PID: 6284)
      • powershell_ise.exe (PID: 4976)
    • Manual execution by a user

      • powershell_ise.exe (PID: 4976)
    • Creates files or folders in the user directory

      • powershell_ise.exe (PID: 4976)
    • Reads security settings of Internet Explorer

      • powershell_ise.exe (PID: 4976)
    • Checks current location (POWERSHELL)

      • powershell_ise.exe (PID: 4976)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2064:01:19 15:32:14+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 48
CodeSize: 2749440
InitializedDataSize: 120320
UninitializedDataSize: -
EntryPoint: 0x0000
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 10.1.24.110
ProductVersionNumber: 10.1.24.110
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: ZipThis
FileVersion: 10.1.24.110
InternalName: ZipThis.exe
LegalCopyright: Copyright © 2015-2023 Lightner Tok All rights reserved
LegalTrademarks: -
OriginalFileName: ZipThis.exe
ProductName: ZipThis
ProductVersion: 10.1.24.110
AssemblyVersion: 10.1.24.110
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
148
Monitored processes
18
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start zipthis.exe zipthis.exe powershell.exe no specs conhost.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs zipthisapp.exe chrome.exe no specs rundll32.exe no specs powershell_ise.exe

Process information

PID
CMD
Path
Indicators
Parent process
1512"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=122.0.6261.70 --initial-client-data=0x214,0x218,0x21c,0x1f0,0x220,0x7ff8215adc40,0x7ff8215adc4c,0x7ff8215adc58C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
3992"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3280 --field-trial-handle=1880,i,13544093640856564800,1620150543019640036,262144 --variations-seed-version /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
4128"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.zipthisapp.com/success?u=f16c5d72-42d8-4c02-9bc9-6e2f522269c1C:\Program Files\Google\Chrome\Application\chrome.exe
ZipThis.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
4512"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3700 --field-trial-handle=1880,i,13544093640856564800,1620150543019640036,262144 --variations-seed-version /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
4592"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=2224 --field-trial-handle=1880,i,13544093640856564800,1620150543019640036,262144 --variations-seed-version /prefetch:3C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
4876"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=5288 --field-trial-handle=1880,i,13544093640856564800,1620150543019640036,262144 --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
4952"C:\Users\admin\AppData\Local\Temp\ZipThis.exe" C:\Users\admin\AppData\Local\Temp\ZipThis.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
ZipThis
Exit code:
0
Version:
10.1.24.110
Modules
Images
c:\users\admin\appdata\local\temp\zipthis.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
4976"C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe" "C:\Program Files\ZipThis\update_task.ps1"C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell ISE
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell_ise.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
5008"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1868 --field-trial-handle=1880,i,13544093640856564800,1620150543019640036,262144 --variations-seed-version /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
5256"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=2300 --field-trial-handle=1880,i,13544093640856564800,1620150543019640036,262144 --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
Total events
26 314
Read events
26 188
Write events
121
Delete events
5

Modification events

(PID) Process:(4952) ZipThis.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ZipThis_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4952) ZipThis.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ZipThis_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(4952) ZipThis.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ZipThis_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(4952) ZipThis.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ZipThis_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(4952) ZipThis.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ZipThis_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(4952) ZipThis.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ZipThis_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(4952) ZipThis.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ZipThis_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(4952) ZipThis.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ZipThis_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4952) ZipThis.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ZipThis_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(4952) ZipThis.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\ZipThis_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
17
Suspicious files
72
Text files
48
Unknown types
13

Dropped files

PID
Process
Filename
Type
6948ZipThis.exeC:\Program Files\ZipThis\update_task.ps1text
MD5:2E5B6F2E387430EF627CF666FBBE0D12
SHA256:94BBDE99705BF63A3110D592967BE352DC087D4B36AF71B2F0CC7579507CD520
7072powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:884819991AC8C8ADE668A10161C0DB0C
SHA256:5B1E103407C46278AFEA49AA905503C4FF20624C0C0B0A430CD4DD18F889922C
7072powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_mfk24w4p.ddn.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6948ZipThis.exeC:\Program Files\ZipThis\msvcp140.dllexecutable
MD5:C3D497B0AFEF4BD7E09C7559E1C75B05
SHA256:1E57A6DF9E3742E31A1C6D9BFF81EBEEAE8A7DE3B45A26E5079D5E1CCE54CD98
6948ZipThis.exeC:\Program Files\ZipThis\msvcp140_atomic_wait.dllexecutable
MD5:6722344B74084D0AF629283060716BAE
SHA256:C9FD25862B1B8B2977BF188A4E0C4460DADE43C31710283C2B42DBD3B15B4317
6948ZipThis.exeC:\Program Files\ZipThis\msvcp140_2.dllexecutable
MD5:AA0148E20D34C10E01A4A9E1BAB1D058
SHA256:583AD842BCF2F77AF57D07B8F00ECA77BB2DF763DF96BB9C50F7E52031B54E42
6948ZipThis.exeC:\Program Files\ZipThis\zipthisUserId.txttext
MD5:3F7B9D80E43524AE2B653A2D431B9151
SHA256:CC8BF91ADCCC3CCA3A7216E47AA9D3C99671E98CA80A26683700703B271C84A7
6948ZipThis.exeC:\Program Files\ZipThis\msvcp140_codecvt_ids.dllexecutable
MD5:165308EE66D0B8F11CA20F3BCD410EA9
SHA256:08DF3AB1B59D1F7D63F0811838E4FCCC107087FCBC469D94975C0E44477058E7
6948ZipThis.exeC:\Program Files\ZipThis\Updater.exeexecutable
MD5:9E422FC4D80CBE24A897B5A662ABC231
SHA256:2ECBF92A5F8DC19A1482649B496C2FE35E25093CE4306C3DAA58D8D10BDD9CFB
6948ZipThis.exeC:\Program Files\ZipThis\Updates.zipcompressed
MD5:7D7BA0D8F434806AF1BF8D5BC4A7A24D
SHA256:89EC24BA9EF706931C92B09D204552966D90F9456C8D95FB40B431349FB80BCB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
79
DNS requests
84
Threats
14

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4536
svchost.exe
GET
200
95.101.142.8:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
95.101.142.8:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4536
svchost.exe
GET
200
95.101.172.129:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
95.101.172.129:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6940
SIHClient.exe
GET
200
95.101.172.129:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6168
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
6940
SIHClient.exe
GET
200
95.101.172.129:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
4976
powershell_ise.exe
GET
200
104.84.152.74:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
unknown
4712
MoUsoCoreWorker.exe
95.101.142.8:80
crl.microsoft.com
Akamai International B.V.
SE
whitelisted
4536
svchost.exe
95.101.142.8:80
crl.microsoft.com
Akamai International B.V.
SE
whitelisted
4536
svchost.exe
95.101.172.129:80
www.microsoft.com
AKAMAI-AS
SE
whitelisted
4712
MoUsoCoreWorker.exe
95.101.172.129:80
www.microsoft.com
AKAMAI-AS
SE
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
2.18.29.123:443
www.bing.com
Akamai International B.V.
PL
whitelisted
4952
ZipThis.exe
45.33.84.9:443
apb.thisilient.com
Linode, LLC
US
unknown
1176
svchost.exe
20.190.159.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 95.101.142.8
  • 104.84.152.74
whitelisted
google.com
  • 142.250.186.142
whitelisted
www.microsoft.com
  • 95.101.172.129
whitelisted
www.bing.com
  • 2.18.29.123
  • 2.18.29.128
  • 2.18.29.242
  • 2.18.29.122
  • 2.18.29.120
  • 2.18.29.235
  • 2.18.29.107
  • 2.18.29.240
  • 2.18.29.121
  • 2.18.29.130
  • 2.18.29.131
whitelisted
apb.thisilient.com
  • 45.33.84.9
unknown
login.live.com
  • 20.190.159.71
  • 20.190.159.0
  • 40.126.31.69
  • 20.190.159.75
  • 40.126.31.73
  • 20.190.159.68
  • 20.190.159.73
  • 40.126.31.67
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 96.6.17.155
whitelisted
clientservices.googleapis.com
  • 142.250.185.67
whitelisted

Threats

PID
Process
Class
Message
4592
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] BootstrapCDN (stackpath .bootstrapcdn .com)
4592
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code .jquery .com)
4592
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare content delivery network (cdnjs .cloudflare .com)
4592
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code .jquery .com)
4592
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] BootstrapCDN (stackpath .bootstrapcdn .com)
4592
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare content delivery network (cdnjs .cloudflare .com)
4592
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] Requests to a free CDN for open source projects (jsdelivr .net)
4592
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] Requests to a free CDN for open source projects (jsdelivr .net)
4592
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code .jquery .com)
4592
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] Requests to a free CDN for open source projects (jsdelivr .net)
No debug info