| File name: | Setup_WinThruster_2021.exe |
| Full analysis: | https://app.any.run/tasks/dd17ed70-0214-44d9-b841-eb8173b15a9f |
| Verdict: | Malicious activity |
| Analysis date: | September 25, 2021, 03:08:53 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | D07CCEA4F401887FF1106C08C42E8110 |
| SHA1: | 79510087EE93E64CBBCB930EF6E61E620D619539 |
| SHA256: | A6936625E74D09E2118A9B0A475BF9391495F047F046F7B63CFC319ADEBBC25F |
| SSDEEP: | 98304:DEU2EBrTRE1MVZeEEsAD6bm2DH0zjIQ1cMYo8C4EsgB:AsHRoMVENfgVMR8ztQ |
| .exe | | | Inno Setup installer (51.8) |
|---|---|---|
| .exe | | | InstallShield setup (20.3) |
| .exe | | | Win32 EXE PECompact compressed (generic) (19.6) |
| .dll | | | Win32 Dynamic Link Library (generic) (3.1) |
| .exe | | | Win32 Executable (generic) (2.1) |
| ProductVersion: | 7.2.0.0 |
|---|---|
| ProductName: | WinThruster |
| OriginalFileName: | |
| LegalCopyright: | Solvusoft |
| FileVersion: | 7.2.0.0 |
| FileDescription: | WinThruster |
| CompanyName: | Solvusoft |
| Comments: | This installation was built with Inno Setup. |
| CharacterSet: | Unicode |
| LanguageCode: | Neutral |
| FileSubtype: | - |
| ObjectFileType: | Executable application |
| FileOS: | Win32 |
| FileFlags: | (none) |
| FileFlagsMask: | 0x003f |
| ProductVersionNumber: | 7.2.0.0 |
| FileVersionNumber: | 7.2.0.0 |
| Subsystem: | Windows GUI |
| SubsystemVersion: | 6 |
| ImageVersion: | 6 |
| OSVersion: | 6 |
| EntryPoint: | 0xb5eec |
| UninitializedDataSize: | - |
| InitializedDataSize: | 38400 |
| CodeSize: | 741376 |
| LinkerVersion: | 2.25 |
| PEType: | PE32 |
| TimeStamp: | 2020:05:21 07:56:23+02:00 |
| MachineType: | Intel 386 or later, and compatibles |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 21-May-2020 05:56:23 |
| Detected languages: |
|
| Comments: | This installation was built with Inno Setup. |
| CompanyName: | Solvusoft |
| FileDescription: | WinThruster |
| FileVersion: | 7.2.0.0 |
| LegalCopyright: | Solvusoft |
| OriginalFileName: | - |
| ProductName: | WinThruster |
| ProductVersion: | 7.2.0.0 |
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0050 |
| Pages in file: | 0x0002 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x000F |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x001A |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x00000100 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 10 |
| Time date stamp: | 21-May-2020 05:56:23 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00001000 | 0x000B3604 | 0x000B3800 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.35433 |
.itext | 0x000B5000 | 0x00001684 | 0x00001800 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 5.9709 |
.data | 0x000B7000 | 0x000037A4 | 0x00003800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.04216 |
.bss | 0x000BB000 | 0x00006DA0 | 0x00000000 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
.idata | 0x000C2000 | 0x00000F36 | 0x00001000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.8987 |
.didata | 0x000C3000 | 0x000001A4 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 2.75636 |
.edata | 0x000C4000 | 0x0000009A | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 1.87222 |
.tls | 0x000C5000 | 0x00000018 | 0x00000000 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
.rdata | 0x000C6000 | 0x0000005D | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 1.38389 |
.rsrc | 0x000C7000 | 0x00004800 | 0x00004800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.42505 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
1 | 5.18295 | 1830 | UNKNOWN | English - United States | RT_MANIFEST |
2 | 3.47151 | 1384 | UNKNOWN | Dutch - Netherlands | RT_ICON |
3 | 3.91708 | 744 | UNKNOWN | Dutch - Netherlands | RT_ICON |
4 | 3.91366 | 2216 | UNKNOWN | Dutch - Netherlands | RT_ICON |
4086 | 3.16547 | 864 | UNKNOWN | UNKNOWN | RT_STRING |
4087 | 3.40938 | 608 | UNKNOWN | UNKNOWN | RT_STRING |
4088 | 3.31153 | 1116 | UNKNOWN | UNKNOWN | RT_STRING |
4089 | 3.33977 | 1036 | UNKNOWN | UNKNOWN | RT_STRING |
4090 | 3.36723 | 724 | UNKNOWN | UNKNOWN | RT_STRING |
4091 | 3.33978 | 184 | UNKNOWN | UNKNOWN | RT_STRING |
advapi32.dll |
comctl32.dll |
kernel32.dll |
kernel32.dll (delay-loaded) |
netapi32.dll |
oleaut32.dll |
user32.dll |
version.dll |
Title | Ordinal | Address |
|---|---|---|
dbkFCallWrapperAddr | 1 | 0x000BE63C |
__dbk_fcall_wrapper | 2 | 0x0000D0A0 |
TMethodImplementationIntercept | 3 | 0x00054058 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 240 | "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\retailarchives.rtf" | C:\Program Files\Microsoft Office\Office14\WINWORD.EXE | — | Explorer.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Word Exit code: 0 Version: 14.0.6024.1000 Modules
| |||||||||||||||
| 240 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1048,10165042612298773380,2796649154448090753,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 86.0.4240.198 Modules
| |||||||||||||||
| 276 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1048,10165042612298773380,2796649154448090753,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 86.0.4240.198 Modules
| |||||||||||||||
| 324 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1048,10165042612298773380,2796649154448090753,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Exit code: 0 Version: 86.0.4240.198 Modules
| |||||||||||||||
| 420 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1048,10165042612298773380,2796649154448090753,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=66 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4532 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 86.0.4240.198 Modules
| |||||||||||||||
| 488 | "C:\Program Files\WinThruster\WTNotifications.exe" | C:\Program Files\WinThruster\WTNotifications.exe | Setup_WinThruster_2021.tmp | ||||||||||||
User: admin Company: Solvusoft Integrity Level: HIGH Description: WinThruster automatic scan and notifications Exit code: 0 Version: 7.2.0.0 Modules
| |||||||||||||||
| 512 | "C:\Users\admin\AppData\Local\Temp\is-7LFTU.tmp\Setup_WinThruster_2021.tmp" /SL5="$20138,5031305,780800,C:\Users\admin\AppData\Local\Temp\Setup_WinThruster_2021.exe" | C:\Users\admin\AppData\Local\Temp\is-7LFTU.tmp\Setup_WinThruster_2021.tmp | — | Setup_WinThruster_2021.exe | |||||||||||
User: admin Company: Solvusoft Integrity Level: MEDIUM Description: Setup/Uninstall Exit code: 0 Version: 51.1052.0.0 Modules
| |||||||||||||||
| 544 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1028,12459003317585271575,3155612108344469171,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 86.0.4240.198 Modules
| |||||||||||||||
| 708 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1028,12459003317585271575,3155612108344469171,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 86.0.4240.198 Modules
| |||||||||||||||
| 760 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1048,10165042612298773380,2796649154448090753,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3544 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 86.0.4240.198 Modules
| |||||||||||||||
| (PID) Process: | (2960) Setup_WinThruster_2021.tmp | Key: | HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000 |
| Operation: | write | Name: | Owner |
Value: 900B000045ECC8B8BAB1D701 | |||
| (PID) Process: | (2960) Setup_WinThruster_2021.tmp | Key: | HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000 |
| Operation: | write | Name: | SessionHash |
Value: EB77589D6D33D8466B51950607035498EBF627A0C372D99544ACF91832390244 | |||
| (PID) Process: | (2960) Setup_WinThruster_2021.tmp | Key: | HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000 |
| Operation: | write | Name: | Sequence |
Value: 1 | |||
| (PID) Process: | (2960) Setup_WinThruster_2021.tmp | Key: | HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000 |
| Operation: | write | Name: | RegFiles0000 |
Value: C:\Program Files\WinThruster\WinThruster.exe | |||
| (PID) Process: | (2960) Setup_WinThruster_2021.tmp | Key: | HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000 |
| Operation: | write | Name: | RegFilesHash |
Value: 6D3A1952A65E4620ED98CB3D5FCAB52BA95D963C61DBA4B3FDA63F244FFE3796 | |||
| (PID) Process: | (2960) Setup_WinThruster_2021.tmp | Key: | HKEY_CURRENT_USER\Software\WinThruster |
| Operation: | write | Name: | Language |
Value: 1 | |||
| (PID) Process: | (2960) Setup_WinThruster_2021.tmp | Key: | HKEY_CURRENT_USER\Software\WinThruster |
| Operation: | write | Name: | InstallerName |
Value: C:\Users\admin\AppData\Local\Temp\Setup_WinThruster_2021.exe | |||
| (PID) Process: | (2960) Setup_WinThruster_2021.tmp | Key: | HKEY_CURRENT_USER\Software\WinThruster |
| Operation: | write | Name: | BuildID |
Value: WINTHRUSTER | |||
| (PID) Process: | (2960) Setup_WinThruster_2021.tmp | Key: | HKEY_CURRENT_USER\Software\WinThruster |
| Operation: | write | Name: | UpgradeID |
Value: BZDV_WINTHRUSTER | |||
| (PID) Process: | (2960) Setup_WinThruster_2021.tmp | Key: | HKEY_CURRENT_USER\Software\WinThruster |
| Operation: | write | Name: | Cv |
Value: Jan2021 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2960 | Setup_WinThruster_2021.tmp | C:\Program Files\WinThruster\WinThruster.exe | executable | |
MD5:— | SHA256:— | |||
| 2960 | Setup_WinThruster_2021.tmp | C:\Program Files\WinThruster\is-8GGB7.tmp | executable | |
MD5:— | SHA256:— | |||
| 2960 | Setup_WinThruster_2021.tmp | C:\Program Files\WinThruster\is-DRBM2.tmp | executable | |
MD5:— | SHA256:— | |||
| 2960 | Setup_WinThruster_2021.tmp | C:\Program Files\WinThruster\sqlite3.dll | executable | |
MD5:— | SHA256:— | |||
| 2960 | Setup_WinThruster_2021.tmp | C:\Program Files\WinThruster\is-KS9QC.tmp | text | |
MD5:— | SHA256:— | |||
| 2960 | Setup_WinThruster_2021.tmp | C:\Program Files\WinThruster\unins000.exe | executable | |
MD5:— | SHA256:— | |||
| 2960 | Setup_WinThruster_2021.tmp | C:\Program Files\WinThruster\is-PQ4JE.tmp | text | |
MD5:— | SHA256:— | |||
| 2960 | Setup_WinThruster_2021.tmp | C:\Program Files\WinThruster\English.ini | text | |
MD5:— | SHA256:— | |||
| 2960 | Setup_WinThruster_2021.tmp | C:\Program Files\WinThruster\WTNotifications.exe | executable | |
MD5:— | SHA256:— | |||
| 2960 | Setup_WinThruster_2021.tmp | C:\Program Files\WinThruster\is-P8A48.tmp | executable | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3544 | iexplore.exe | GET | 200 | 142.250.186.131:80 | http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFNZazTHGPUBUGY%3D | US | der | 724 b | whitelisted |
3544 | iexplore.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEAKXB1YM1Knrv%2BJy8eCW2II%3D | US | der | 471 b | whitelisted |
3544 | iexplore.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbY2QTVWENG9oovp1QifsQ%3D | US | der | 471 b | whitelisted |
3544 | iexplore.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAxq6XzO1ZmDhpCgCp6lMhQ%3D | US | der | 471 b | whitelisted |
3544 | iexplore.exe | GET | 200 | 142.250.186.131:80 | http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEBpGpe6uocJhCgAAAAD87%2BQ%3D | US | der | 471 b | whitelisted |
3544 | iexplore.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2BnRyLFPYjID1ie%2Bx%2BdSjo%3D | US | der | 1.47 Kb | whitelisted |
3544 | iexplore.exe | GET | 200 | 142.250.186.131:80 | http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQCmkxBVY%2F9DQwoAAAAA%2FPiA | US | der | 472 b | whitelisted |
3544 | iexplore.exe | GET | 200 | 142.250.186.131:80 | http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D | US | der | 1.41 Kb | whitelisted |
3544 | iexplore.exe | GET | 200 | 52.222.206.67:80 | http://ocsp.rootg2.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBSIfaREXmfqfJR3TkMYnD7O5MhzEgQUnF8A36oB1zArOIiiuG1KnPIRkYMCEwZ%2FlEoqJ83z%2BsKuKwH5CO65xMY%3D | US | der | 1.51 Kb | whitelisted |
3544 | iexplore.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTuqL92L3tjkN67RNFF%2FEdvT6NEzAQUwBKyKHRoRmfpcCV0GgBFWwZ9XEQCEAeqcbjrVkNsdRcGhAqQnYI%3D | US | der | 471 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3544 | iexplore.exe | 104.111.233.108:443 | www.solvusoft.com | Akamai International B.V. | NL | suspicious |
3544 | iexplore.exe | 93.184.221.240:80 | ctldl.windowsupdate.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
3544 | iexplore.exe | 142.251.36.168:443 | www.googletagmanager.com | Google Inc. | US | unknown |
3544 | iexplore.exe | 142.250.186.131:80 | ocsp.pki.goog | Google Inc. | US | whitelisted |
3544 | iexplore.exe | 13.32.23.215:80 | o.ss2.us | Amazon.com, Inc. | US | malicious |
3544 | iexplore.exe | 104.212.67.92:443 | www.clarity.ms | Microsoft Corporation | US | unknown |
3544 | iexplore.exe | 52.222.206.67:80 | ocsp.rootg2.amazontrust.com | Amazon.com, Inc. | US | whitelisted |
3544 | iexplore.exe | 142.250.185.206:443 | www.googlecommerce.com | Google Inc. | US | whitelisted |
3544 | iexplore.exe | 13.32.23.206:80 | ocsp.rootca1.amazontrust.com | Amazon.com, Inc. | US | whitelisted |
3544 | iexplore.exe | 13.225.78.10:443 | cdn.ywxi.net | — | US | suspicious |
Domain | IP | Reputation |
|---|---|---|
subscriptions.avqtools.com |
| suspicious |
stats.avqtools.com |
| suspicious |
www.solvusoft.com |
| whitelisted |
ctldl.windowsupdate.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
apis.google.com |
| whitelisted |
cdn.ywxi.net |
| shared |
www.googletagmanager.com |
| whitelisted |
www.clarity.ms |
| whitelisted |
ocsp.pki.goog |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
3544 | iexplore.exe | Potentially Bad Traffic | ET INFO TLS Handshake Failure |
3544 | iexplore.exe | Potentially Bad Traffic | ET INFO TLS Handshake Failure |
2384 | chrome.exe | Generic Protocol Command Decode | SURICATA HTTP unable to match response to request |