File name:

bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9

Full analysis: https://app.any.run/tasks/e843e1b4-0274-45e8-a2e9-020fc7fbf62b
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: December 13, 2024, 22:18:10
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
ransomware
sodinokibi
revil
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed, 4 sections
MD5:

61C19E7CE627DA9B5004371F867A47D3

SHA1:

4F3B4329871EC269043068A98E9CC929F603268D

SHA256:

BF7114F025FFF7DBC6B7AFF8E4EDB0DD8A7B53C3766429A3C5F10142609968F9

SSDEEP:

6144:PQRE7qWNcvOrKgMdv1LWucWFc83Y6uoZzFyKAuGnlOOkl8tuGogZ98dzc:Pc8c2rKXLtcWFcqY6uoZzFyfONlwP2c

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Sodinokibi keys are found

      • bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe (PID: 6224)
    • SODINOKIBI has been detected (YARA)

      • bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe (PID: 5604)
      • bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe (PID: 6224)
    • RANSOMWARE has been detected

      • bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe (PID: 6224)
    • Actions looks like stealing of personal data

      • bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe (PID: 6224)
    • Sodinokibi ransom note is found

      • bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe (PID: 6224)
    • Renames files like ransomware

      • bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe (PID: 6224)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe (PID: 5604)
      • bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe (PID: 6224)
    • Application launched itself

      • bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe (PID: 5604)
    • Executes application which crashes

      • bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe (PID: 5604)
    • Starts CMD.EXE for commands execution

      • bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe (PID: 6224)
    • Likely accesses (executes) a file from the Public directory

      • notepad.exe (PID: 7032)
  • INFO

    • Checks supported languages

      • bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe (PID: 5604)
      • bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe (PID: 6224)
    • Process checks computer location settings

      • bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe (PID: 5604)
      • bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe (PID: 6224)
    • Reads the computer name

      • bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe (PID: 5604)
      • bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe (PID: 6224)
    • Reads the software policy settings

      • WerFault.exe (PID: 6432)
      • bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe (PID: 6224)
    • Checks proxy server information

      • WerFault.exe (PID: 6432)
    • The process uses the downloaded file

      • bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe (PID: 6224)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 6432)
    • Drops encrypted VBS script (Microsoft Script Encoder)

      • bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe (PID: 6224)
    • Creates files in the program directory

      • bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe (PID: 6224)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 7132)
      • OpenWith.exe (PID: 6968)
      • notepad.exe (PID: 7032)
    • Manual execution by a user

      • notepad.exe (PID: 7032)
    • Reads Microsoft Office registry keys

      • OpenWith.exe (PID: 6968)
    • Reads the machine GUID from the registry

      • bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe (PID: 6224)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (30.9)
.exe | Win64 Executable (generic) (27.3)
.exe | UPX compressed Win32 Executable (26.8)
.dll | Win32 Dynamic Link Library (generic) (6.5)
.exe | Win32 Executable (generic) (4.4)

EXIF

EXE

Subsystem: Windows GUI
SubsystemVersion: 5.1
ImageVersion: -
OSVersion: 5.1
EntryPoint: 0x5ed0
UninitializedDataSize: 294912
InitializedDataSize: 28672
CodeSize: 233472
LinkerVersion: 12
PEType: PE32
ImageFileCharacteristics: No relocs, Executable, 32-bit, No debug
TimeStamp: 2018:11:15 14:43:36+00:00
MachineType: Intel 386 or later, and compatibles
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
142
Monitored processes
9
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start svchost.exe #SODINOKIBI bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe THREAT bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe werfault.exe cmd.exe no specs conhost.exe no specs openwith.exe no specs notepad.exe no specs notepad.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
5604"C:\Users\admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe" C:\Users\admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225501
Modules
Images
c:\users\admin\appdata\local\temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6224"C:\Users\admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe" C:\Users\admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe
bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6432C:\WINDOWS\SysWOW64\WerFault.exe -u -p 5604 -s 648C:\Windows\SysWOW64\WerFault.exe
bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
6700"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailuresC:\Windows\SysWOW64\cmd.exebf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
6708\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6968C:\WINDOWS\system32\OpenWith.exe -EmbeddingC:\Windows\System32\OpenWith.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7132"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\weightoh.png.8756lgC:\Windows\System32\notepad.exeOpenWith.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
7032"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\8756lg-readme.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
Total events
12 203
Read events
12 196
Write events
7
Delete events
0

Modification events

(PID) Process:(6224) bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\recfg
Operation:writeName:sub_key
Value:
D60DFF40440F390ED2DDF04B674C2FBBF07D35FA4B2EF7FC981CA8377A2BF44D
(PID) Process:(6224) bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\recfg
Operation:writeName:pk_key
Value:
6650BE13C4E3BF1D0F6EED95EEE16672824758825B64F30A42CFB3F41E5C7771
(PID) Process:(6224) bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\recfg
Operation:writeName:sk_key
Value:
78D6ADF2DF12C75206ECB5FB06E9D20369759659BD85A083815D009D7AB0F270E25D64FACED298448A163E201A2E6B94CA19D5C9D708089C7A47FE0A3B3B6B5353E6DC7C36A86845F875B9887709A5BCB10C2792AC606AB5
(PID) Process:(6224) bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\recfg
Operation:writeName:0_key
Value:
862940035CF5E56D73A41591A68F8FE4F4403DBE1F2D12BB582A6146503C177ED866272437B720E624B4BA520D90FE90A2AEADD19A0B247F9A015A6AC39B6B8DB3D7462DBE8964995DD417AE7B83F8C0882ED4B5A9CF27DB
(PID) Process:(6224) bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\recfg
Operation:writeName:rnd_ext
Value:
.8756lg
(PID) Process:(6224) bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\recfg
Operation:writeName:stat
Value:
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
(PID) Process:(6224) bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
Executable files
0
Suspicious files
232
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
6432WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_bf7114f025fff7db_3c56c677f382e5e410b3731366d7468b48bf0_7567e223_841e80f1-52b9-4887-b0cf-b6143c855471\Report.wer
MD5:
SHA256:
6432WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\21253908F3CB05D51B1C2DA8B681A785binary
MD5:F6F53CD09A41E968C363419B279D3112
SHA256:6D2BB01CC7A9BADE2113B219CAC1BDA86B2733196B7E1BD0C807CE1E396B1892
6224bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exeC:\bootTel.dat.8756lgbinary
MD5:B9943374B70611AACF740A96B75124D1
SHA256:E8E3A976403A4323ED6AE3C50AAFDBF4019E731F304F4756911A319604A321A2
6432WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FEbinary
MD5:ACC104536A527683382D6F0062312A09
SHA256:6A54D3619452CFA656C87BC37EB11000C16141870B1AADD5462FCEBD5CAFB293
6224bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exeC:\Users\8756lg-readme.txtbinary
MD5:E004BD48D896B00A28297A1F7F5DA201
SHA256:656A3CE2469A3D833ED50DD50BBBF966D6EB50ECDF2300BA08645BAECB76A191
6224bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exeC:\8756lg-readme.txtbinary
MD5:E004BD48D896B00A28297A1F7F5DA201
SHA256:656A3CE2469A3D833ED50DD50BBBF966D6EB50ECDF2300BA08645BAECB76A191
6224bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exeC:\BOOTNXTbinary
MD5:0EA28A7582B225658BC0F314E3E18623
SHA256:C5C02FAFCCEDDB41520D2C3540DEDF8CF22A44945518E4E187C5BABFCD6D79DC
6224bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exeC:\BOOTNXT.8756lgbinary
MD5:0EA28A7582B225658BC0F314E3E18623
SHA256:C5C02FAFCCEDDB41520D2C3540DEDF8CF22A44945518E4E187C5BABFCD6D79DC
6432WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9.exe.5604.dmpbinary
MD5:42B43223929AF629EE1FADDD93E3EB1A
SHA256:F1C28B9FA2898C4A715C0A905A386A67C88088457D18738C9CDA1EA7BB318E4B
6432WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER5A2A.tmp.WERInternalMetadata.xmlxml
MD5:396AC1FF85D703DA76E4422B3DD31148
SHA256:C697C6F5366311B374047C769D3BC4D2C664B07F50664692C9013312FAEB6039
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
129
DNS requests
160
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6432
WerFault.exe
GET
200
23.32.238.153:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6432
WerFault.exe
GET
200
23.215.121.133:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4556
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
GET
200
23.215.121.133:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.32.238.153:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6260
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4556
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1572
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1752
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.32.238.153:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.215.121.133:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
2.19.80.8:443
www.bing.com
Akamai International B.V.
DE
whitelisted
1176
svchost.exe
20.190.160.20:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.124.78.146
  • 20.73.194.208
whitelisted
google.com
  • 142.250.74.206
whitelisted
crl.microsoft.com
  • 23.32.238.153
  • 23.32.238.155
  • 23.32.238.97
  • 23.32.238.107
  • 2.19.198.43
  • 23.32.238.115
whitelisted
www.microsoft.com
  • 23.215.121.133
  • 88.221.169.152
whitelisted
www.bing.com
  • 2.19.80.8
  • 2.19.80.99
  • 2.19.80.104
  • 2.19.80.81
  • 2.19.80.123
  • 2.19.80.88
  • 2.19.80.82
  • 2.19.80.91
  • 2.19.80.17
whitelisted
login.live.com
  • 20.190.160.20
  • 40.126.32.140
  • 40.126.32.68
  • 40.126.32.72
  • 40.126.32.138
  • 40.126.32.136
  • 20.190.160.14
  • 20.190.160.17
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 23.218.210.69
whitelisted
watson.events.data.microsoft.com
  • 104.208.16.94
whitelisted
detectportal.firefox.com
  • 34.107.221.82
whitelisted

Threats

No threats detected
No debug info