URL:

https://java-for-minecraft.com/en/

Full analysis: https://app.any.run/tasks/d2d0cc63-1e08-4a1a-a82c-bf183cfda316
Verdict: Malicious activity
Analysis date: January 04, 2024, 09:33:57
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MD5:

3E4A97208BA3FCF0C382AF4E250385EA

SHA1:

93D7A7BFF7AE94D3BCDB82A778935191D3C4FCCB

SHA256:

CF4A46AC0D49800B4B0051E3D828345523ABC4D5D24F7C85BDE5AC661D171036

SSDEEP:

3:N8gSX4TKFn:2T4GFn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Creates a writable file in the system directory

      • installer.exe (PID: 5428)
  • SUSPICIOUS

    • Checks for Java to be installed

      • jre-8u51-windows-x64.exe (PID: 908)
      • jre-8u51-windows-x64.exe (PID: 1260)
      • installer.exe (PID: 5428)
      • javaws.exe (PID: 6696)
      • jp2launcher.exe (PID: 2652)
      • javaws.exe (PID: 6668)
      • jp2launcher.exe (PID: 1124)
      • javaw.exe (PID: 480)
    • Checks Windows Trust Settings

      • jre-8u51-windows-x64.exe (PID: 908)
      • msiexec.exe (PID: 6836)
    • Reads security settings of Internet Explorer

      • jre-8u51-windows-x64.exe (PID: 908)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 6836)
    • Reads Mozilla Firefox installation path

      • installer.exe (PID: 5428)
    • Starts CMD.EXE for commands execution

      • msiexec.exe (PID: 6908)
  • INFO

    • Application launched itself

      • msedge.exe (PID: 4036)
    • Checks supported languages

      • identity_helper.exe (PID: 6780)
      • jre-8u51-windows-x64.exe (PID: 908)
      • jre-8u51-windows-x64.exe (PID: 1260)
      • msiexec.exe (PID: 6836)
      • installer.exe (PID: 5428)
      • bspatch.exe (PID: 6944)
      • unpack200.exe (PID: 6980)
      • unpack200.exe (PID: 3920)
      • unpack200.exe (PID: 6824)
      • unpack200.exe (PID: 6696)
      • unpack200.exe (PID: 6488)
      • unpack200.exe (PID: 6944)
      • javaw.exe (PID: 6812)
      • unpack200.exe (PID: 784)
      • javaws.exe (PID: 6696)
      • javaw.exe (PID: 6588)
      • unpack200.exe (PID: 756)
      • javaws.exe (PID: 6668)
      • jp2launcher.exe (PID: 1124)
      • msiexec.exe (PID: 6908)
      • jp2launcher.exe (PID: 2652)
      • javaw.exe (PID: 480)
      • javaw.exe (PID: 6776)
    • Reads the computer name

      • identity_helper.exe (PID: 6780)
      • jre-8u51-windows-x64.exe (PID: 908)
      • jre-8u51-windows-x64.exe (PID: 1260)
      • msiexec.exe (PID: 6836)
      • installer.exe (PID: 5428)
      • jp2launcher.exe (PID: 2652)
      • jp2launcher.exe (PID: 1124)
      • msiexec.exe (PID: 6908)
      • javaw.exe (PID: 480)
      • javaw.exe (PID: 6776)
    • Drops the executable file immediately after the start

      • msedge.exe (PID: 4036)
      • installer.exe (PID: 5428)
      • msiexec.exe (PID: 6836)
      • msedge.exe (PID: 1540)
      • msedge.exe (PID: 480)
    • The process uses the downloaded file

      • msedge.exe (PID: 6892)
      • msedge.exe (PID: 4036)
    • Create files in a temporary directory

      • jre-8u51-windows-x64.exe (PID: 908)
      • javaw.exe (PID: 6812)
      • installer.exe (PID: 5428)
      • javaw.exe (PID: 6588)
      • jp2launcher.exe (PID: 2652)
      • jp2launcher.exe (PID: 1124)
      • javaw.exe (PID: 6776)
      • javaw.exe (PID: 480)
    • Creates files or folders in the user directory

      • jre-8u51-windows-x64.exe (PID: 908)
    • Checks proxy server information

      • jre-8u51-windows-x64.exe (PID: 908)
      • jp2launcher.exe (PID: 2652)
      • jp2launcher.exe (PID: 1124)
    • Reads the machine GUID from the registry

      • jre-8u51-windows-x64.exe (PID: 908)
      • msiexec.exe (PID: 6836)
    • Reads the software policy settings

      • jre-8u51-windows-x64.exe (PID: 908)
      • msiexec.exe (PID: 6836)
    • The process drops C-runtime libraries

      • installer.exe (PID: 5428)
    • Reads CPU info

      • msiexec.exe (PID: 6836)
    • Creates files in the program directory

      • installer.exe (PID: 5428)
      • bspatch.exe (PID: 6944)
      • unpack200.exe (PID: 3920)
      • unpack200.exe (PID: 6980)
      • unpack200.exe (PID: 6824)
      • unpack200.exe (PID: 6696)
      • unpack200.exe (PID: 6488)
      • unpack200.exe (PID: 6944)
      • unpack200.exe (PID: 756)
      • unpack200.exe (PID: 784)
      • javaw.exe (PID: 6812)
    • Process drops legitimate windows executable

      • installer.exe (PID: 5428)
      • msiexec.exe (PID: 6836)
    • Reads the time zone

      • javaw.exe (PID: 6588)
      • jp2launcher.exe (PID: 2652)
      • jp2launcher.exe (PID: 1124)
      • javaw.exe (PID: 6776)
      • javaw.exe (PID: 480)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
200
Monitored processes
76
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
start msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs jre-8u51-windows-x64.exe no specs jre-8u51-windows-x64.exe jre-8u51-windows-x64.exe no specs jre-8u51-windows-x64.exe msiexec.exe no specs installer.exe no specs bspatch.exe no specs conhost.exe no specs unpack200.exe no specs conhost.exe no specs unpack200.exe no specs conhost.exe no specs unpack200.exe no specs conhost.exe no specs unpack200.exe no specs conhost.exe no specs unpack200.exe no specs conhost.exe no specs unpack200.exe no specs conhost.exe no specs unpack200.exe no specs conhost.exe no specs unpack200.exe no specs conhost.exe no specs javaw.exe no specs javaws.exe no specs javaw.exe no specs jp2launcher.exe no specs javaws.exe no specs jp2launcher.exe no specs msiexec.exe no specs cmd.exe no specs conhost.exe no specs javaw.exe no specs javaw.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs filecoauth.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
432"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=7308 --field-trial-handle=2064,i,16693501488532564157,11981906526147537830,131072 /prefetch:2C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
111.0.1661.62
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\111.0.1661.62\msedge_elf.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cryptbase.dll
480 -cp "C:\Program Files\Java\jre1.8.0_51\bin\..\lib\deploy.jar" com.sun.deploy.panel.ControlPanel -getUserWebJavaStatusC:\Program Files\Java\jre1.8.0_51\bin\javaw.exejre-8u51-windows-x64.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
1
Version:
8.0.51.16
Modules
Images
c:\program files\java\jre1.8.0_51\bin\javaw.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
480"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6136 --field-trial-handle=2064,i,16693501488532564157,11981906526147537830,131072 /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
111.0.1661.62
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\111.0.1661.62\msedge_elf.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cryptbase.dll
756"C:\Program Files\Java\jre1.8.0_51\bin\unpack200.exe" -r "C:\Program Files\Java\jre1.8.0_51\lib\ext\localedata.pack" "C:\Program Files\Java\jre1.8.0_51\lib\ext\localedata.jar"C:\Program Files\Java\jre1.8.0_51\bin\unpack200.exeinstaller.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
HIGH
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.51.16
Modules
Images
c:\program files\java\jre1.8.0_51\bin\unpack200.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\java\jre1.8.0_51\bin\msvcr100.dll
784"C:\Program Files\Java\jre1.8.0_51\bin\unpack200.exe" -r "C:\Program Files\Java\jre1.8.0_51\lib\ext\jfxrt.pack" "C:\Program Files\Java\jre1.8.0_51\lib\ext\jfxrt.jar"C:\Program Files\Java\jre1.8.0_51\bin\unpack200.exeinstaller.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
HIGH
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.51.16
Modules
Images
c:\program files\java\jre1.8.0_51\bin\unpack200.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\java\jre1.8.0_51\bin\msvcr100.dll
908"C:\Users\admin\Downloads\jre-8u51-windows-x64.exe" C:\Users\admin\Downloads\jre-8u51-windows-x64.exe
msedge.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
HIGH
Description:
Java Platform SE binary
Exit code:
0
Version:
8.0.510.16
Modules
Images
c:\users\admin\downloads\jre-8u51-windows-x64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ole32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\combase.dll
c:\windows\system32\gdi32.dll
1068"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=111.0.5563.149 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=111.0.1661.62 --initial-client-data=0x100,0x104,0x108,0xdc,0x114,0x7ffbbc59b5f8,0x7ffbbc59b608,0x7ffbbc59b618C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
111.0.1661.62
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\111.0.1661.62\msedge_elf.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cryptbase.dll
1100"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --first-renderer-process --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3396 --field-trial-handle=2064,i,16693501488532564157,11981906526147537830,131072 /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
111.0.1661.62
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\111.0.1661.62\msedge_elf.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cryptbase.dll
1124"C:\Program Files\Java\jre1.8.0_51\bin\jp2launcher.exe" -secure -javaws -jre "C:\Program Files\Java\jre1.8.0_51" -vma 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 -ma LXdhaXQALWZpeAAtc2hvcnRjdXQALXNpbGVudAAtbm90V2ViSmF2YQ==C:\Program Files\Java\jre1.8.0_51\bin\jp2launcher.exejavaws.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
HIGH
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
11.51.2.16
Modules
Images
c:\program files\java\jre1.8.0_51\bin\jp2launcher.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\program files\java\jre1.8.0_51\bin\msvcr100.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
1260"C:\Users\admin\Downloads\jre-8u51-windows-x64.exe" C:\Users\admin\Downloads\jre-8u51-windows-x64.exe
msedge.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
HIGH
Description:
Java Platform SE binary
Exit code:
4294967295
Version:
8.0.510.16
Modules
Images
c:\users\admin\downloads\jre-8u51-windows-x64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ole32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\combase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
Total events
23 363
Read events
17 039
Write events
82
Delete events
6 242

Modification events

(PID) Process:(4036) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(4036) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(4036) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(4036) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(4036) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
Operation:writeName:dr
Value:
1
(PID) Process:(4036) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(4036) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge
Operation:writeName:UsageStatsInSample
Value:
1
(PID) Process:(4036) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
74A98451B7602F00
(PID) Process:(4036) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
Operation:writeName:usagestats
Value:
0
(PID) Process:(4036) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
Operation:writeName:urlstats
Value:
0
Executable files
123
Suspicious files
337
Text files
182
Unknown types
0

Dropped files

PID
Process
Filename
Type
4036msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RFf2c85.TMP
MD5:
SHA256:
4036msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
4036msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RFf2c75.TMP
MD5:
SHA256:
4036msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
4036msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\LOG.old~RFf2ce3.TMP
MD5:
SHA256:
4036msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\LOG.old
MD5:
SHA256:
4036msedge.exeC:\USERS\ADMIN\APPDATA\LOCAL\MICROSOFT\EDGE\USER DATA\CRASHPAD\SETTINGS.DATbinary
MD5:E2757D5A5254E45CDCE4888662B214A8
SHA256:8306EF3DCAE74D697DF4367324A026CAA9EAC9B36D7FBE49E9C381446DE0CE75
4036msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Local State~RFf2c37.TMPbinary
MD5:DF75AE8CBAE008C19531D12A895A32A9
SHA256:3D93E0AE1670DC35077C55FEACC46B133A6015AFC74F6AEA072B7DD9D7039531
4036msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Last Versiontext
MD5:D6DB6EA02FE506F2DA98F1C137243587
SHA256:126173A7D7D0F54A9FCE5465180BC49DB023E723A41BB55A0F9497BE76FBAA28
4036msedge.exeC:\USERS\ADMIN\APPDATA\LOCAL\MICROSOFT\EDGE\USER DATA\VARIATIONSbinary
MD5:6E1AF7D7074A6124EFDB62180565A385
SHA256:70811DE44C337675FCFFDA381E8AB2FB66544B07FFCAE651804B75EF71C11748
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
74
TCP/UDP connections
90
DNS requests
86
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5976
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
binary
471 b
unknown
6924
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
binary
418 b
unknown
6924
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
binary
409 b
unknown
1092
svchost.exe
POST
302
184.30.17.189:80
http://go.microsoft.com/fwlink/?LinkID=252669&clcid=0x409
unknown
unknown
1092
svchost.exe
POST
302
184.30.17.189:80
http://go.microsoft.com/fwlink/?LinkID=252669&clcid=0x409
unknown
unknown
4036
msedge.exe
GET
200
152.199.19.74:80
http://s2.symcb.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS56bKHAoUD%2BOyl%2B0LhPg9JxyQm4gQUf9Nlp8Ld7LvwMAnzQzn6Aq8zMTMCED141%2Fl2SWCyYX308B7Khio%3D
unknown
binary
5 b
unknown
4036
msedge.exe
GET
200
152.199.19.74:80
http://s2.symcb.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS56bKHAoUD%2BOyl%2B0LhPg9JxyQm4gQUf9Nlp8Ld7LvwMAnzQzn6Aq8zMTMCED141%2Fl2SWCyYX308B7Khio%3D
unknown
binary
5 b
unknown
4036
msedge.exe
GET
200
152.199.19.74:80
http://sv.symcd.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQe6LNDJdqx%2BJOp7hVgTeaGFJ%2FCQgQUljtT8Hkzl699g%2B8uK8zKt4YecmYCEBLwJ34PIzs5%2BUGbBujN41I%3D
unknown
binary
1.47 Kb
unknown
908
jre-8u51-windows-x64.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbY2QTVWENG9oovp1QifsQ%3D
unknown
binary
471 b
unknown
4036
msedge.exe
GET
200
192.229.221.95:80
http://s1.symcb.com/pca3-g5.crl
unknown
binary
834 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4036
msedge.exe
239.255.255.250:1900
whitelisted
3720
svchost.exe
239.255.255.250:1900
whitelisted
4012
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4012
msedge.exe
104.21.71.37:443
java-for-minecraft.com
CLOUDFLARENET
unknown
4012
msedge.exe
20.103.180.120:443
nav-edge.smartscreen.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
4012
msedge.exe
20.105.95.163:443
data-edge.smartscreen.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4012
msedge.exe
142.250.186.136:443
www.googletagmanager.com
GOOGLE
US
unknown
4012
msedge.exe
216.239.32.36:443
region1.google-analytics.com
GOOGLE
US
unknown
4012
msedge.exe
104.126.37.137:443
www.bing.com
Akamai International B.V.
DE
unknown
5976
svchost.exe
40.126.32.138:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
java-for-minecraft.com
  • 104.21.71.37
  • 172.67.143.19
unknown
config.edge.skype.com
  • 13.107.42.16
whitelisted
nav-edge.smartscreen.microsoft.com
  • 20.103.180.120
whitelisted
data-edge.smartscreen.microsoft.com
  • 20.105.95.163
whitelisted
www.googletagmanager.com
  • 142.250.186.136
whitelisted
region1.google-analytics.com
  • 216.239.32.36
  • 216.239.34.36
whitelisted
www.bing.com
  • 104.126.37.137
  • 104.126.37.144
  • 104.126.37.131
  • 104.126.37.139
  • 104.126.37.186
  • 104.126.37.130
  • 104.126.37.184
  • 104.126.37.185
  • 104.126.37.123
  • 104.126.37.155
  • 104.126.37.153
  • 104.126.37.152
  • 104.126.37.145
  • 104.126.37.171
  • 104.126.37.128
  • 104.126.37.168
  • 104.126.37.161
  • 104.126.37.162
  • 104.126.37.160
whitelisted
login.live.com
  • 40.126.32.138
  • 20.190.160.14
  • 20.190.160.17
  • 40.126.32.74
  • 40.126.32.133
  • 40.126.32.140
  • 40.126.32.68
  • 40.126.32.134
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
javadl.sun.com
  • 23.212.218.110
unknown

Threats

No threats detected
No debug info