File name:

curse-client_joLKV-1.exe

Full analysis: https://app.any.run/tasks/4e8ed245-7641-477f-9c2a-96fddf4acc67
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: April 26, 2025, 22:01:26
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
delphi
inno
installer
bundleinstaller
adware
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 10 sections
MD5:

2C1C93A93645D3DEB11692760A713DF4

SHA1:

9178AC91EB42073926397CAE1E6109B95A4AC35F

SHA256:

A2AAC45B6AE5A09BFA9E4ECDD90C5CAA42ACBE53588160FA6AA3F357EC6035BF

SSDEEP:

49152:07HeQqhlQ6NY3fwzbU7dG9F84iw4EnX91iRBoi8Xq3vI5VDq3mOvfS0RbhR9u29T:I+QqZ8fwz4Y9FBeEnX3iRBJ8k2RqWUPB

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • curse-client_joLKV-1.exe (PID: 920)
      • curse-client_joLKV-1.exe (PID: 6028)
    • Bundleinstaller mutex has been found

      • file_joLKV-1.tmp (PID: 2852)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • curse-client_joLKV-1.exe (PID: 920)
      • curse-client_joLKV-1.exe (PID: 6028)
      • curse-client_joLKV-1.tmp (PID: 5408)
      • file_joLKV-1.exe (PID: 4408)
      • file_joLKV-1.tmp (PID: 2852)
    • Reads security settings of Internet Explorer

      • curse-client_joLKV-1.tmp (PID: 960)
      • file_joLKV-1.tmp (PID: 2852)
    • Reads the Windows owner or organization settings

      • curse-client_joLKV-1.tmp (PID: 5408)
      • file_joLKV-1.tmp (PID: 2852)
  • INFO

    • Checks supported languages

      • curse-client_joLKV-1.exe (PID: 920)
      • curse-client_joLKV-1.tmp (PID: 960)
      • curse-client_joLKV-1.exe (PID: 6028)
      • curse-client_joLKV-1.tmp (PID: 5408)
      • file_joLKV-1.exe (PID: 4408)
      • file_joLKV-1.tmp (PID: 2852)
      • identity_helper.exe (PID: 8168)
      • identity_helper.exe (PID: 8120)
    • Create files in a temporary directory

      • curse-client_joLKV-1.exe (PID: 920)
      • curse-client_joLKV-1.exe (PID: 6028)
      • curse-client_joLKV-1.tmp (PID: 5408)
      • file_joLKV-1.exe (PID: 4408)
      • file_joLKV-1.tmp (PID: 2852)
    • Reads the computer name

      • curse-client_joLKV-1.tmp (PID: 960)
      • curse-client_joLKV-1.tmp (PID: 5408)
      • file_joLKV-1.tmp (PID: 2852)
      • identity_helper.exe (PID: 8120)
      • identity_helper.exe (PID: 8168)
    • Process checks computer location settings

      • curse-client_joLKV-1.tmp (PID: 960)
    • Detects InnoSetup installer (YARA)

      • curse-client_joLKV-1.exe (PID: 920)
      • curse-client_joLKV-1.tmp (PID: 960)
    • Compiled with Borland Delphi (YARA)

      • curse-client_joLKV-1.exe (PID: 920)
      • curse-client_joLKV-1.tmp (PID: 960)
    • Checks proxy server information

      • curse-client_joLKV-1.tmp (PID: 5408)
      • file_joLKV-1.tmp (PID: 2852)
    • Reads the software policy settings

      • curse-client_joLKV-1.tmp (PID: 5408)
      • file_joLKV-1.tmp (PID: 2852)
      • slui.exe (PID: 1324)
    • Reads the machine GUID from the registry

      • file_joLKV-1.tmp (PID: 2852)
    • The sample compiled with english language support

      • file_joLKV-1.tmp (PID: 2852)
    • Application launched itself

      • msedge.exe (PID: 2344)
      • msedge.exe (PID: 3956)
      • msedge.exe (PID: 4200)
    • Reads Environment values

      • identity_helper.exe (PID: 8168)
      • identity_helper.exe (PID: 8120)
    • Manual execution by a user

      • msedge.exe (PID: 4200)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (53.5)
.exe | InstallShield setup (21)
.exe | Win32 EXE PECompact compressed (generic) (20.2)
.exe | Win32 Executable (generic) (2.1)
.exe | Win16/32 Executable Delphi generic (1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:06:03 08:09:11+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 741376
InitializedDataSize: 89088
UninitializedDataSize: -
EntryPoint: 0xb5eec
OSVersion: 6.1
ImageVersion: 6
SubsystemVersion: 6.1
Subsystem: Windows GUI
FileVersionNumber: 4.78.2.0
ProductVersionNumber: 4.78.2.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription: Setup
FileVersion: 4.78.2
LegalCopyright:
OriginalFileName:
ProductName: Setup
ProductVersion: 4.78.2
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
183
Monitored processes
53
Malicious processes
4
Suspicious processes
2

Behavior graph

Click at the process to see the details
start curse-client_jolkv-1.exe curse-client_jolkv-1.tmp no specs curse-client_jolkv-1.exe curse-client_jolkv-1.tmp sppextcomobj.exe no specs slui.exe file_jolkv-1.exe #BUNDLEINSTALLER file_jolkv-1.tmp msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
616"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2260 --field-trial-handle=2312,i,10019338100896733370,7816551616872904347,262144 --variations-seed-version /prefetch:2C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
920"C:\Users\admin\AppData\Local\Temp\curse-client_joLKV-1.exe" C:\Users\admin\AppData\Local\Temp\curse-client_joLKV-1.exe
explorer.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Setup
Exit code:
0
Version:
4.78.2
Modules
Images
c:\users\admin\appdata\local\temp\curse-client_jolkv-1.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
960"C:\Users\admin\AppData\Local\Temp\is-H8DLU.tmp\curse-client_joLKV-1.tmp" /SL5="$A02AE,831488,831488,C:\Users\admin\AppData\Local\Temp\curse-client_joLKV-1.exe" C:\Users\admin\AppData\Local\Temp\is-H8DLU.tmp\curse-client_joLKV-1.tmpcurse-client_joLKV-1.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-h8dlu.tmp\curse-client_jolkv-1.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comdlg32.dll
1324"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2084"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5196 --field-trial-handle=2348,i,16328470765801550994,11306849056395995511,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2344"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-windowC:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2384C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
2852"C:\Users\admin\AppData\Local\Temp\is-57F3D.tmp\file_joLKV-1.tmp" /SL5="$30234,1572592,831488,C:\Users\admin\AppData\Local\Temp\is-UL74G.tmp\file_joLKV-1.exe" /LANG=en /NA=Rh85hR64C:\Users\admin\AppData\Local\Temp\is-57F3D.tmp\file_joLKV-1.tmp
file_joLKV-1.exe
User:
admin
Company:
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-57f3d.tmp\file_jolkv-1.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comdlg32.dll
3884"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3816 --field-trial-handle=2484,i,7951952170390780412,12333447831207501026,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3956"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://dl.jalecdn.com/DE/curse-client.dmgC:\Program Files (x86)\Microsoft\Edge\Application\msedge.exefile_joLKV-1.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Exit code:
1
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
Total events
9 598
Read events
9 560
Write events
34
Delete events
4

Modification events

(PID) Process:(2852) file_joLKV-1.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Operation:writeName:Owner
Value:
240B0000029992CCF6B6DB01
(PID) Process:(2852) file_joLKV-1.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Operation:writeName:SessionHash
Value:
32CF19CA9E8C7D06B2BFB753B085E519282C23947CD1448F0EA32C95BCCB884E
(PID) Process:(2852) file_joLKV-1.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Operation:writeName:Sequence
Value:
1
(PID) Process:(2852) file_joLKV-1.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
(PID) Process:(2852) file_joLKV-1.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2852) file_joLKV-1.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Operation:delete valueName:Sequence
Value:

(PID) Process:(2852) file_joLKV-1.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Operation:delete valueName:SessionHash
Value:
켲쨙貞ٽ뾲厷薰᧥Ⱘ鐣텼轄ꌎ锬쮼予
(PID) Process:(2852) file_joLKV-1.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Operation:delete valueName:Owner
Value:
(PID) Process:(2852) file_joLKV-1.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Operation:delete keyName:(default)
Value:
(PID) Process:(3956) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
Executable files
19
Suspicious files
247
Text files
72
Unknown types
0

Dropped files

PID
Process
Filename
Type
6028curse-client_joLKV-1.exeC:\Users\admin\AppData\Local\Temp\is-IU4MU.tmp\curse-client_joLKV-1.tmpexecutable
MD5:0C229CD26910820581B5809C62FE5619
SHA256:ABFA49A915D2E0A82561CA440365E6A2D59F228533B56A8F78ADDF000A1081B3
2852file_joLKV-1.tmpC:\Users\admin\AppData\Local\Temp\is-RIBQT.tmp\is-LU9K8.tmpbinary
MD5:DA4AD160EDE5AE90A792F9D5FD5A6D03
SHA256:031F0C564AC045708C4E0E2A5D9B9C16C73CF4BB938A6D5FE587FE8C5B1BB060
5408curse-client_joLKV-1.tmpC:\Users\admin\AppData\Local\Temp\is-UL74G.tmp\_isetup\_setup64.tmpexecutable
MD5:E4211D6D009757C078A9FAC7FF4F03D4
SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
4408file_joLKV-1.exeC:\Users\admin\AppData\Local\Temp\is-57F3D.tmp\file_joLKV-1.tmpexecutable
MD5:8CF2935FF1AB8729D059BDA47761E0A7
SHA256:21D9CA1FC088AFFAD73821C5983847779B5E97C4926068746715DE256CF360E9
2852file_joLKV-1.tmpC:\Users\admin\AppData\Local\Temp\is-RIBQT.tmp\Helper.dllexecutable
MD5:4EB0347E66FA465F602E52C03E5C0B4B
SHA256:C73E53CBB7B98FEAFE27CC7DE8FDAD51DF438E2235E91891461C5123888F73CC
5408curse-client_joLKV-1.tmpC:\Users\admin\AppData\Local\Temp\is-UL74G.tmp\file_joLKV-1.exeexecutable
MD5:DF85661C015A03E71A9313B2F72D1EFA
SHA256:D2F397B0F81E098F0DB0A293F47032D354EE9CEAFCECD5AC474E5DDA1B05C14E
2852file_joLKV-1.tmpC:\Users\admin\AppData\Local\Temp\is-RIBQT.tmp\_isetup\_setup64.tmpexecutable
MD5:E4211D6D009757C078A9FAC7FF4F03D4
SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
2852file_joLKV-1.tmpC:\Users\admin\AppData\Local\Temp\is-RIBQT.tmp\mainlogo.pngbinary
MD5:DA4AD160EDE5AE90A792F9D5FD5A6D03
SHA256:031F0C564AC045708C4E0E2A5D9B9C16C73CF4BB938A6D5FE587FE8C5B1BB060
2852file_joLKV-1.tmpC:\Users\admin\AppData\Local\Temp\is-RIBQT.tmp\WebAdvisor.pngimage
MD5:4CFFF8DC30D353CD3D215FD3A5DBAC24
SHA256:0C430E56D69435D8AB31CBB5916A73A47D11EF65B37D289EE7D11130ADF25856
2852file_joLKV-1.tmpC:\Users\admin\AppData\Local\Temp\is-RIBQT.tmp\is-39KI6.tmpimage
MD5:4CFFF8DC30D353CD3D215FD3A5DBAC24
SHA256:0C430E56D69435D8AB31CBB5916A73A47D11EF65B37D289EE7D11130ADF25856
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
43
DNS requests
46
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3332
SIHClient.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
3332
SIHClient.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.31.69:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5408
curse-client_joLKV-1.tmp
52.222.232.61:443
d3fzprifddppqn.cloudfront.net
AMAZON-02
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 2.16.241.19
  • 2.16.241.12
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 2.23.181.156
whitelisted
google.com
  • 142.250.184.238
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 40.126.31.69
  • 20.190.159.2
  • 20.190.159.75
  • 20.190.159.0
  • 40.126.31.130
  • 40.126.31.128
  • 40.126.31.71
  • 20.190.159.129
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
d3fzprifddppqn.cloudfront.net
  • 52.222.232.61
  • 52.222.232.199
  • 52.222.232.42
  • 52.222.232.109
whitelisted
de1k8xcm09f8m.cloudfront.net
  • 3.160.156.96
  • 3.160.156.117
  • 3.160.156.109
  • 3.160.156.104
whitelisted
cdn.download.it
  • 104.22.56.224
  • 104.22.57.224
  • 172.67.26.92
whitelisted

Threats

No threats detected
No debug info