File name:

DiscordImageLogger.exe

Full analysis: https://app.any.run/tasks/acc8bb22-28d6-4fcd-81db-164eca0d1b73
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: June 03, 2025, 15:48:20
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
stealer
arch-doc
nodejs
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

D72714251ABCA41437952FA1C69606E2

SHA1:

3E4F57BF2AFF18F572062049B8F0CC29B43398F2

SHA256:

92BF5C61BCEFA13A20A2A49C3D9ECC59451E665DF15446F55109E94440FD7CF7

SSDEEP:

786432:Ka7nzJd85u5D8wrcD7g2TNN/UHYsH5NZnROWhku:33XR8wrcfTZNMHYcrXhku

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • Application.exe (PID: 4228)
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • DiscordImageLogger.exe (PID: 5972)
    • Starts CMD.EXE for commands execution

      • DiscordImageLogger.exe (PID: 5972)
      • Application.exe (PID: 4228)
    • Get information on the list of running processes

      • DiscordImageLogger.exe (PID: 5972)
      • cmd.exe (PID: 7720)
    • The process creates files with name similar to system file names

      • DiscordImageLogger.exe (PID: 5972)
    • Drops 7-zip archiver for unpacking

      • DiscordImageLogger.exe (PID: 5972)
    • Executable content was dropped or overwritten

      • DiscordImageLogger.exe (PID: 5972)
      • Application.exe (PID: 4228)
    • Reads security settings of Internet Explorer

      • DiscordImageLogger.exe (PID: 5972)
    • Creates a software uninstall entry

      • DiscordImageLogger.exe (PID: 5972)
    • Process drops legitimate windows executable

      • DiscordImageLogger.exe (PID: 5972)
    • Starts application with an unusual extension

      • cmd.exe (PID: 644)
    • Application launched itself

      • Application.exe (PID: 4228)
    • There is functionality for taking screenshot (YARA)

      • DiscordImageLogger.exe (PID: 5972)
  • INFO

    • The sample compiled with english language support

      • DiscordImageLogger.exe (PID: 5972)
    • Checks supported languages

      • DiscordImageLogger.exe (PID: 5972)
      • chcp.com (PID: 5048)
      • Application.exe (PID: 7224)
      • Application.exe (PID: 4228)
      • inj.exe (PID: 7560)
      • Application.exe (PID: 7344)
    • Reads the computer name

      • DiscordImageLogger.exe (PID: 5972)
      • Application.exe (PID: 4228)
      • Application.exe (PID: 7344)
      • Application.exe (PID: 7224)
    • Create files in a temporary directory

      • DiscordImageLogger.exe (PID: 5972)
      • inj.exe (PID: 7560)
      • Application.exe (PID: 4228)
    • Creates files or folders in the user directory

      • DiscordImageLogger.exe (PID: 5972)
      • Application.exe (PID: 4228)
    • Changes the display of characters in the console

      • cmd.exe (PID: 644)
    • Process checks computer location settings

      • Application.exe (PID: 4228)
    • Checks proxy server information

      • Application.exe (PID: 4228)
    • Reads the machine GUID from the registry

      • Application.exe (PID: 4228)
    • Manual execution by a user

      • Application.exe (PID: 4228)
      • mspaint.exe (PID: 7896)
      • notepad.exe (PID: 4172)
      • OpenWith.exe (PID: 4976)
      • OpenWith.exe (PID: 8160)
      • OpenWith.exe (PID: 8072)
    • Reads product name

      • Application.exe (PID: 4228)
    • Reads Environment values

      • Application.exe (PID: 4228)
    • Node.js compiler has been detected

      • Application.exe (PID: 7224)
    • Application launched itself

      • chrome.exe (PID: 8112)
      • msedge.exe (PID: 1244)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 4172)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2018:12:15 22:26:14+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 26624
InitializedDataSize: 473088
UninitializedDataSize: 16384
EntryPoint: 0x338f
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: Unreal Game Inc.
FileDescription: Best tools in 2025!
FileVersion: 1.0.0
LegalCopyright: Copyright © 2025 Unreal Game Inc.
ProductName: Application
ProductVersion: 1.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
195
Monitored processes
63
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start discordimagelogger.exe cmd.exe no specs conhost.exe no specs tasklist.exe no specs find.exe no specs application.exe cmd.exe no specs conhost.exe no specs chcp.com no specs application.exe no specs application.exe no specs inj.exe no specs conhost.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs slui.exe notepad.exe no specs openwith.exe no specs openwith.exe no specs rundll32.exe no specs openwith.exe no specs inj.exe no specs conhost.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe mspaint.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
404C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
644C:\WINDOWS\system32\cmd.exe /d /s /c "chcp"C:\Windows\System32\cmd.exeApplication.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
644"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=2148 --field-trial-handle=1940,i,5352891736258286100,14521987477799753805,262144 --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
780"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=5124 --field-trial-handle=1940,i,5352891736258286100,14521987477799753805,262144 --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
900"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=3532 --field-trial-handle=1940,i,5352891736258286100,14521987477799753805,262144 --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
960"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=2676 --field-trial-handle=2360,i,5705120843206887702,3181370383208118760,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
1244"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
inj.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
1696"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=4836 --field-trial-handle=1940,i,5352891736258286100,14521987477799753805,262144 --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
2124"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=5220 --field-trial-handle=1940,i,5352891736258286100,14521987477799753805,262144 --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
2384"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3704 --field-trial-handle=1940,i,5352891736258286100,14521987477799753805,262144 --variations-seed-version /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
Total events
18 416
Read events
18 380
Write events
35
Delete events
1

Modification events

(PID) Process:(5972) DiscordImageLogger.exeKey:HKEY_CURRENT_USER\SOFTWARE\46d68d67-ad7d-52f1-8822-1f47ace9664b
Operation:writeName:InstallLocation
Value:
C:\Users\admin\AppData\Local\Programs\application
(PID) Process:(5972) DiscordImageLogger.exeKey:HKEY_CURRENT_USER\SOFTWARE\46d68d67-ad7d-52f1-8822-1f47ace9664b
Operation:writeName:KeepShortcuts
Value:
true
(PID) Process:(5972) DiscordImageLogger.exeKey:HKEY_CURRENT_USER\SOFTWARE\46d68d67-ad7d-52f1-8822-1f47ace9664b
Operation:writeName:ShortcutName
Value:
Application
(PID) Process:(5972) DiscordImageLogger.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\46d68d67-ad7d-52f1-8822-1f47ace9664b
Operation:writeName:DisplayName
Value:
Application 1.0.0
(PID) Process:(5972) DiscordImageLogger.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\46d68d67-ad7d-52f1-8822-1f47ace9664b
Operation:writeName:UninstallString
Value:
"C:\Users\admin\AppData\Local\Programs\application\Uninstall Application.exe" /currentuser
(PID) Process:(5972) DiscordImageLogger.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\46d68d67-ad7d-52f1-8822-1f47ace9664b
Operation:writeName:QuietUninstallString
Value:
"C:\Users\admin\AppData\Local\Programs\application\Uninstall Application.exe" /currentuser /S
(PID) Process:(5972) DiscordImageLogger.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\46d68d67-ad7d-52f1-8822-1f47ace9664b
Operation:writeName:DisplayVersion
Value:
1.0.0
(PID) Process:(5972) DiscordImageLogger.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\46d68d67-ad7d-52f1-8822-1f47ace9664b
Operation:writeName:DisplayIcon
Value:
C:\Users\admin\AppData\Local\Programs\application\Application.exe,0
(PID) Process:(5972) DiscordImageLogger.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\46d68d67-ad7d-52f1-8822-1f47ace9664b
Operation:writeName:Publisher
Value:
Unreal Game Inc.
(PID) Process:(5972) DiscordImageLogger.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\46d68d67-ad7d-52f1-8822-1f47ace9664b
Operation:writeName:NoModify
Value:
1
Executable files
27
Suspicious files
181
Text files
83
Unknown types
129

Dropped files

PID
Process
Filename
Type
5972DiscordImageLogger.exeC:\Users\admin\AppData\Local\Temp\nse17C7.tmp\app-64.7z
MD5:
SHA256:
5972DiscordImageLogger.exeC:\Users\admin\AppData\Local\Temp\nse17C7.tmp\7z-out\icudtl.dat
MD5:
SHA256:
5972DiscordImageLogger.exeC:\Users\admin\AppData\Local\Temp\nse17C7.tmp\7z-out\LICENSES.chromium.html
MD5:
SHA256:
5972DiscordImageLogger.exeC:\Users\admin\AppData\Local\Temp\nse17C7.tmp\nsExec.dllexecutable
MD5:EC0504E6B8A11D5AAD43B296BEEB84B2
SHA256:5D9CEB1CE5F35AEA5F9E5A0C0EDEEEC04DFEFE0C77890C80C70E98209B58B962
5972DiscordImageLogger.exeC:\Users\admin\AppData\Local\Temp\nse17C7.tmp\7z-out\locales\en-GB.pakmmw
MD5:9D9121BDC9AF59B5899CE3C5927B55D8
SHA256:F4D45CCC89834376F35D4D83FE5B2D5112B8CC315FCB03228720749AAE31C805
5972DiscordImageLogger.exeC:\Users\admin\AppData\Local\Temp\nse17C7.tmp\SpiderBanner.dllexecutable
MD5:17309E33B596BA3A5693B4D3E85CF8D7
SHA256:996A259E53CA18B89EC36D038C40148957C978C0FD600A268497D4C92F882A93
5972DiscordImageLogger.exeC:\Users\admin\AppData\Local\Temp\nse17C7.tmp\StdUtils.dllexecutable
MD5:C6A6E03F77C313B267498515488C5740
SHA256:B72E9013A6204E9F01076DC38DABBF30870D44DFC66962ADBF73619D4331601E
5972DiscordImageLogger.exeC:\Users\admin\AppData\Local\Temp\nse17C7.tmp\nsis7z.dllexecutable
MD5:80E44CE4895304C6A3A831310FBF8CD0
SHA256:B393F05E8FF919EF071181050E1873C9A776E1A0AE8329AEFFF7007D0CADF592
5972DiscordImageLogger.exeC:\Users\admin\AppData\Local\Temp\nse17C7.tmp\System.dllexecutable
MD5:0D7AD4F45DC6F5AA87F606D0331C6901
SHA256:3EB38AE99653A7DBC724132EE240F6E5C4AF4BFE7C01D31D23FAF373F9F2EACA
5972DiscordImageLogger.exeC:\Users\admin\AppData\Local\Temp\nse17C7.tmp\7z-out\locales\el.pakpgc
MD5:A14D8A4499A8B2F2F5908D93E2065BF7
SHA256:EB46D9860835B69D33B2583D1E52B20238B666B967BF00906424E3C8A161ED64
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
61
DNS requests
69
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
2088
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
2088
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7684
svchost.exe
HEAD
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjhkYWYwZDctOTExOS00MGQ5LTgyNjAtN2FlY2ZjMDg0NmNj/1.0.0.17_llkgjffcdpffmhiakmfcdcblohccpfmo.crx
unknown
whitelisted
7684
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjhkYWYwZDctOTExOS00MGQ5LTgyNjAtN2FlY2ZjMDg0NmNj/1.0.0.17_llkgjffcdpffmhiakmfcdcblohccpfmo.crx
unknown
whitelisted
7684
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjhkYWYwZDctOTExOS00MGQ5LTgyNjAtN2FlY2ZjMDg0NmNj/1.0.0.17_llkgjffcdpffmhiakmfcdcblohccpfmo.crx
unknown
whitelisted
7684
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjhkYWYwZDctOTExOS00MGQ5LTgyNjAtN2FlY2ZjMDg0NmNj/1.0.0.17_llkgjffcdpffmhiakmfcdcblohccpfmo.crx
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4608
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
4164
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
20.190.159.73:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
4228
Application.exe
104.21.48.1:443
beta.maveproj3ct.lol
CLOUDFLARENET
unknown
2088
SIHClient.exe
20.12.23.50:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
login.live.com
  • 20.190.159.73
  • 40.126.31.67
  • 20.190.159.68
  • 20.190.159.131
  • 20.190.159.64
  • 20.190.159.128
  • 40.126.31.131
  • 20.190.159.0
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
client.wns.windows.com
  • 172.211.123.249
  • 172.211.123.250
whitelisted
beta.maveproj3ct.lol
  • 104.21.48.1
  • 104.21.112.1
  • 104.21.64.1
  • 104.21.96.1
  • 104.21.32.1
  • 104.21.16.1
  • 104.21.80.1
unknown
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted
clientservices.googleapis.com
  • 142.250.185.195
whitelisted
accounts.google.com
  • 64.233.166.84
whitelisted

Threats

No threats detected
No debug info