download:

/ctw.txt

Full analysis: https://app.any.run/tasks/f805d084-ced5-465e-9f9e-93c00d1bbfe8
Verdict: Malicious activity
Analysis date: February 07, 2026, 01:01:58
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
possible-phishing
delphi
Indicators:
MIME: text/plain
File info: Sendmail frozen configuration - version 5113377c297e3105033f4232435e236d3a5e521f3f001c1160225715256408572674376403270300743c5a3c24460c4104132f0733263915172616162264245
MD5:

4E78146183C23AF55B830C775AD30B04

SHA1:

6F79EF672F6FF10CD6A488757857664F32D79154

SHA256:

9830F24D2A2D1BDC54C8640CA29030B6A8519086A09ACB0BFD536F39B0831835

SSDEEP:

24:rIqvp8gcSZ+WqBSQjPEUOE65DGQN8FYjd1Wz9OHzLwjNAMwaqHimHK2CcHK2Z:rb+gcSZ0BSKOE/QOqPWzawjNAMwaIisL

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • PowerShell executes remote file download (POWERSHELL)

      • powershell.exe (PID: 8144)
    • Executing a file with an untrusted certificate

      • OrbitColle.exe (PID: 4756)
  • SUSPICIOUS

    • Bypass execution policy to execute commands

      • powershell.exe (PID: 8144)
    • Starts a new process with hidden mode (POWERSHELL)

      • powershell.exe (PID: 8144)
    • Uses base64 encoding (POWERSHELL)

      • powershell.exe (PID: 8144)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 8976)
    • Starts itself from another location

      • BetaA.exe (PID: 6424)
    • Executable content was dropped or overwritten

      • BetaA.exe (PID: 5604)
      • BetaA.exe (PID: 6424)
  • INFO

    • Drops script file

      • powershell.exe (PID: 8144)
    • Gets a random number, or selects objects randomly from a collection (POWERSHELL)

      • powershell.exe (PID: 8144)
    • Checks proxy server information

      • powershell.exe (PID: 8144)
    • Gets data length (POWERSHELL)

      • powershell.exe (PID: 8144)
    • Disables trace logs

      • powershell.exe (PID: 8144)
    • Converts byte array into ASCII string (POWERSHELL)

      • powershell.exe (PID: 8144)
    • Reads the computer name

      • msiexec.exe (PID: 8976)
      • BetaA.exe (PID: 6424)
      • BetaA.exe (PID: 5604)
      • OrbitColle.exe (PID: 4756)
    • Checks supported languages

      • msiexec.exe (PID: 8976)
      • BetaA.exe (PID: 6424)
      • BetaA.exe (PID: 5604)
      • OrbitColle.exe (PID: 4756)
    • Creates files or folders in the user directory

      • msiexec.exe (PID: 8976)
      • BetaA.exe (PID: 5604)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 8976)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 8976)
    • Creates files in the program directory

      • BetaA.exe (PID: 6424)
    • Compiled with Borland Delphi (YARA)

      • BetaA.exe (PID: 6424)
      • BetaA.exe (PID: 5604)
    • The sample compiled with english language support

      • BetaA.exe (PID: 5604)
    • Create files in a temporary directory

      • BetaA.exe (PID: 5604)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
157
Monitored processes
9
Malicious processes
1
Suspicious processes
3

Behavior graph

Click at the process to see the details
start powershell.exe conhost.exe no specs msiexec.exe no specs msiexec.exe betaa.exe betaa.exe orbitcolle.exe no specs conhost.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
936\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeOrbitColle.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1872"C:\WINDOWS\system32\msiexec.exe" /i "C:\Users\admin\AppData\Local\Temp\s10519590.msi" /qn /norestart C:\Windows\System32\msiexec.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
3560C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4136\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4756C:\Users\admin\AppData\Local\Temp\OrbitColle.exeC:\Users\admin\AppData\Local\Temp\OrbitColle.exeBetaA.exe
User:
admin
Company:
Advanced Micro Devices, Inc
Integrity Level:
MEDIUM
Description:
AMDVBFLASH Tool
Version:
3.31.0.0
Modules
Images
c:\windows\syswow64\wmp.dll
c:\users\admin\appdata\local\temp\orbitcolle.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
5604C:\ProgramData\dev_shield_service_amd64\BetaA.exeC:\ProgramData\dev_shield_service_amd64\BetaA.exe
BetaA.exe
User:
admin
Company:
Safer-Networking Ltd.
Integrity Level:
MEDIUM
Description:
Dummy
Version:
2.9.82.152
Modules
Images
c:\programdata\dev_shield_service_amd64\betaa.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6424"C:\Users\admin\AppData\Local\Pilot\BetaA.exe"C:\Users\admin\AppData\Local\Pilot\BetaA.exe
msiexec.exe
User:
admin
Company:
Safer-Networking Ltd.
Integrity Level:
MEDIUM
Description:
Dummy
Exit code:
0
Version:
2.9.82.152
Modules
Images
c:\users\admin\appdata\local\pilot\betaa.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
8144"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass C:\Users\admin\AppData\Local\Temp\ctw.txt.ps1C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
8976C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
Total events
7 052
Read events
6 965
Write events
78
Delete events
9

Modification events

(PID) Process:(8976) msiexec.exeKey:HKEY_USERS\S-1-5-21-1693682860-607145093-2874071422-1001\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Owner
Value:
10230000852BA961CD97DC01
(PID) Process:(8976) msiexec.exeKey:HKEY_USERS\S-1-5-21-1693682860-607145093-2874071422-1001\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:SessionHash
Value:
0B1BE9D47B51DB5080153EB8260294CB00DFB874E60FEB71ED175916C12DB06E
(PID) Process:(8976) msiexec.exeKey:HKEY_USERS\S-1-5-21-1693682860-607145093-2874071422-1001\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Sequence
Value:
1
(PID) Process:(8976) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
Operation:writeName:C:\Config.Msi\
Value:
(PID) Process:(8976) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
Operation:writeName:C:\Config.Msi\1e5b2f.rbs
Value:
31233955
(PID) Process:(8976) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
Operation:writeName:C:\Config.Msi\1e5b2f.rbsLow
Value:
(PID) Process:(8976) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
Operation:writeName:C:\Users\admin\AppData\Roaming\Microsoft\Installer\
Value:
(PID) Process:(8976) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-1693682860-607145093-2874071422-1001\Components\720EF29897A54E459B8F3FBB148A9731
Operation:writeName:A013804C8DF3E9E4DAD46CF1A55574C3
Value:
C:\Users\admin\AppData\Local\Pilot\BetaA.exe
(PID) Process:(8976) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-1693682860-607145093-2874071422-1001\Components\5F9D006AE98102058A747A727A0723AC
Operation:writeName:A013804C8DF3E9E4DAD46CF1A55574C3
Value:
C:\Users\admin\AppData\Local\Pilot\Kriebgick.dll
(PID) Process:(8976) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-1693682860-607145093-2874071422-1001\Components\7E2C85FCAA5E61353BF5B1E04C191823
Operation:writeName:A013804C8DF3E9E4DAD46CF1A55574C3
Value:
C:\Users\admin\AppData\Local\Pilot\rtl150.bpl
Executable files
6
Suspicious files
23
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
8144powershell.exeC:\Users\admin\AppData\Local\Temp\s10519590.msi
MD5:
SHA256:
8976msiexec.exeC:\Windows\Installer\1e5b2d.msi
MD5:
SHA256:
8976msiexec.exeC:\Users\admin\AppData\Local\Pilot\Kriebgick.dll
MD5:
SHA256:
8976msiexec.exeC:\Windows\Installer\1e5b30.msi
MD5:
SHA256:
8144powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\QG85F72MPZMFDH5HNZLG.tempbinary
MD5:B251691BFE447AC84CFA43FAC821006D
SHA256:492C43209589D78F46C69075213D17A1D67FC7AE6BB59140793D50F1B73FEAE6
8976msiexec.exeC:\Windows\Installer\inprogressinstallinfo.ipibinary
MD5:23CA216EC22E72847F76910C103C7EBA
SHA256:669352AD96F4F10D0EB75CB13FA6FCA5D40214284368DFA022F85274ADAD25C2
8976msiexec.exeC:\Windows\Temp\~DFAB37BE4E7FA49B09.TMPbinary
MD5:BF619EAC0CDF3F68D496EA9344137E8B
SHA256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
8144powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msbinary
MD5:B251691BFE447AC84CFA43FAC821006D
SHA256:492C43209589D78F46C69075213D17A1D67FC7AE6BB59140793D50F1B73FEAE6
8144powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF1e4c97.TMPbinary
MD5:00A03B286E6E0EBFF8D9C492365D5EC2
SHA256:4DBFC417D053BA6867308671F1C61F4DCAFC61F058D4044DB532DA6D3BDE3615
8976msiexec.exeC:\Users\admin\AppData\Local\Pilot\BetaA.exeexecutable
MD5:B5E1733E3459BD731BDC1BB761FFC69D
SHA256:23E4FAFD7232A5CD25ADE863150D1F9DD89F3FD44B72D39BEA304A027C414EE2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
18
TCP/UDP connections
25
DNS requests
18
Threats
6

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6768
MoUsoCoreWorker.exe
GET
304
4.231.128.59:443
https://settings-win.data.microsoft.com/settings/v3.0/OneSettings/Client?OSVersionFull=10.0.19045.4046.amd64fre.vb_release.191206-1406&LocalDeviceID=s%3ABAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&FlightRing=Retail&AttrDataVer=186&OSUILocale=en-US&OSSkuId=48&App=WOSC&AppVer=&IsFlightingEnabled=0&TelemetryLevel=1&DeviceFamily=Windows.Desktop
unknown
whitelisted
6320
svchost.exe
GET
304
4.231.128.59:443
https://settings-win.data.microsoft.com/settings/v3.0/WSD/UpdateHealthTools?os=Windows&osVer=10.0.19041.1.amd64fre.vb_release.191206-&sku=48&deviceClass=Windows.Desktop&locale=en-US&deviceId=s:BAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&sampleId=s:95271487&appVer=10.0.19041.3626&FlightRing=Retail&TelemetryLevel=1&HidOverGattReg=C%3A%5CWINDOWS%5CSystem32%5CDriverStore%5CFileRepository%5Chidbthle.inf_amd64_9610b4821fdf82a5%5CMicrosoft.Bluetooth.Profiles.HidOverGatt.dll&AppVer=&ProcessorIdentifier=AMD64%20Family%2023%20Model%201%20Stepping%202&OEMModel=DELL&UpdateOfferedDays=4294967295&ProcessorManufacturer=AuthenticAMD&InstallDate=1661339444&OEMModelBaseBoard=&BranchReadinessLevel=CB&OEMSubModel=J5CR&IsCloudDomainJoined=0&DeferFeatureUpdatePeriodInDays=30&IsDeviceRetailDemo=0&FlightingBranchName=&OSUILocale=en-US&DeviceFamily=Windows.Desktop&WuClientVer=10.0.19041.3996&UninstallActive=1&IsFlightingEnabled=0&OSSkuId=48&ProcessorClockSpeed=3094&TotalPhysicalRAM=6144&SecureBootCapable=0&App=SedimentPack&ProcessorCores=6&CurrentBranch=vb_release&InstallLanguage=en-US&DeferQualityUpdatePeriodInDays=0&OEMName_Uncleaned=DELL&TPMVersion=0&PrimaryDiskTotalCapacity=262144&InstallationType=Client&AttrDataVer=186&ProcessorModel=AMD%20Ryzen%205%203500%206-Core%20Processor&IsEdgeWithChromiumInstalled=1&OSVersion=10.0.19045.4046&IsMDMEnrolled=0&ActivationChannel=Retail&FirmwareVersion=A.40&TrendInstalledKey=1&OSArchitecture=AMD64&DefaultUserRegion=244&UpdateManagementGroup=2
unknown
whitelisted
4540
SIHClient.exe
GET
304
74.179.77.204:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
whitelisted
4540
SIHClient.exe
GET
200
20.242.39.171:443
https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping
unknown
whitelisted
4540
SIHClient.exe
GET
200
74.179.77.204:443
https://slscr.update.microsoft.com/sls/ping
unknown
whitelisted
4540
SIHClient.exe
GET
304
74.179.77.204:443
https://slscr.update.microsoft.com/SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
whitelisted
GET
200
162.159.142.9:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAjTxtAB8my1oj8MfWpz%2F7Y%3D
unknown
whitelisted
8144
powershell.exe
GET
200
104.18.54.45:443
https://pub-50a54badab6f4f408cd8e6c0a3dbfa4f.r2.dev/2CSFEHR.msi
unknown
binary
128 Kb
unknown
6320
svchost.exe
GET
200
2.16.168.124:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
356
svchost.exe
GET
200
162.159.142.9:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
Not routed
whitelisted
6320
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
8628
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6768
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
95.101.27.82:443
www.bing.com
AKAMAI-ASN1
NL
whitelisted
162.159.142.9:80
ocsp.digicert.com
CLOUDFLARENET
US
whitelisted
204.79.197.203:80
oneocsp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
3412
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:138
Not routed
whitelisted
8144
powershell.exe
104.18.54.45:443
pub-50a54badab6f4f408cd8e6c0a3dbfa4f.r2.dev
CLOUDFLARENET
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.124.78.146
whitelisted
google.com
  • 142.251.127.113
  • 142.251.127.138
  • 142.251.127.100
  • 142.251.127.102
  • 142.251.127.101
  • 142.251.127.139
whitelisted
self.events.data.microsoft.com
  • 20.52.64.201
whitelisted
www.bing.com
  • 95.101.27.82
  • 95.101.27.69
whitelisted
ocsp.digicert.com
  • 162.159.142.9
  • 172.66.2.5
whitelisted
oneocsp.microsoft.com
  • 204.79.197.203
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
pub-50a54badab6f4f408cd8e6c0a3dbfa4f.r2.dev
  • 104.18.54.45
  • 104.18.50.34
unknown
login.live.com
  • 40.126.32.72
  • 20.190.160.22
  • 40.126.32.133
  • 20.190.160.5
  • 20.190.160.4
  • 20.190.160.3
  • 20.190.160.64
  • 20.190.160.20
whitelisted
crl.microsoft.com
  • 2.16.168.124
  • 2.16.168.114
whitelisted

Threats

PID
Process
Class
Message
2292
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] CloudFlare Public R2.dev Bucket
8144
powershell.exe
Misc activity
ET INFO Observed Cloudflare R2 Public Bucket (r2 .dev) Domain in TLS SNI
2292
svchost.exe
Misc activity
ET INFO Observed DNS Query to Cloudflare R2 Public Bucket (r2 .dev) Domain
2292
svchost.exe
Possible Social Engineering Attempted
SUSPICIOUS [ANY.RUN] Abuse Public R2.dev Bucket
8144
powershell.exe
Misc activity
SUSPICIOUS [ANY.RUN] Abuse Public R2.dev Bucket (HTTP)
6768
MoUsoCoreWorker.exe
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
No debug info