URL:

c6gj-static.net

Full analysis: https://app.any.run/tasks/44101fb4-a97a-4f41-a48f-d2d3b9b9ef07
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: March 25, 2025, 04:43:20
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
autorun-download
evasion
loader
Indicators:
MD5:

DC33DE140A1D1E8A47D0696FA7D92C9A

SHA1:

FA39F1BC2878AFD567D600217EB4938C66785954

SHA256:

EF28AD8608D50B3E8BD330CCAD3CBABE685E4584853FD883F888C7BC22690122

SSDEEP:

3:ECjipo:EC2po

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • Hola-Setup-x64-1.233.367.exe (PID: 5072)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • Hola-Setup-C-HP.exe (PID: 8108)
      • net_updater64.exe (PID: 6800)
      • Hola-Setup-C-HP.exe (PID: 7968)
      • ShellExperienceHost.exe (PID: 8104)
      • net_updater64.exe (PID: 8768)
    • Application launched itself

      • Hola-Setup-C-HP.exe (PID: 7968)
      • Hola-Setup-C-HP.exe (PID: 8108)
      • hola_svc.exe (PID: 8948)
      • hola_cr.exe (PID: 3156)
    • Executable content was dropped or overwritten

      • Hola-Setup-x64-1.233.367.exe (PID: 5072)
      • Hola-Setup-C-HP.exe (PID: 7968)
      • net_updater64.exe (PID: 6800)
      • net_updater64.exe (PID: 8296)
      • net_updater64.exe (PID: 8768)
      • net_updater64.exe (PID: 9008)
      • 7zr.exe (PID: 8344)
      • Hola-Setup-x64-1.233.367.exe (PID: 8644)
      • net_updater64.exe (PID: 9276)
    • Drops 7-zip archiver for unpacking

      • Hola-Setup-x64-1.233.367.exe (PID: 5072)
    • Creates a software uninstall entry

      • Hola-Setup-x64-1.233.367.exe (PID: 5072)
    • Drops a system driver (possible attempt to evade defenses)

      • Hola-Setup-x64-1.233.367.exe (PID: 5072)
    • The process drops C-runtime libraries

      • net_updater64.exe (PID: 6800)
    • Process drops legitimate windows executable

      • net_updater64.exe (PID: 6800)
    • Detected use of alternative data streams (AltDS)

      • net_updater64.exe (PID: 8296)
      • net_updater64.exe (PID: 8768)
      • net_updater64.exe (PID: 9008)
      • net_updater64.exe (PID: 9276)
    • Executes as Windows Service

      • net_updater64.exe (PID: 8296)
      • WmiApSrv.exe (PID: 8612)
      • hola_svc.exe (PID: 8948)
    • Checks for external IP

      • net_updater64.exe (PID: 8296)
    • The process checks if it is being run in the virtual environment

      • net_updater64.exe (PID: 8296)
      • hola_cr.exe (PID: 3156)
    • Creates file in the systems drive root

      • hola_svc.exe (PID: 8948)
    • Connects to unusual port

      • hola_svc.exe (PID: 8948)
    • Process requests binary or script from the Internet

      • hola.exe (PID: 7860)
    • Windows service management via SC.EXE

      • sc.exe (PID: 8428)
      • sc.exe (PID: 8200)
      • sc.exe (PID: 5776)
      • sc.exe (PID: 8408)
      • sc.exe (PID: 2644)
      • sc.exe (PID: 7316)
      • sc.exe (PID: 8964)
      • sc.exe (PID: 4300)
      • sc.exe (PID: 2084)
      • sc.exe (PID: 8524)
      • sc.exe (PID: 3884)
      • sc.exe (PID: 1004)
      • sc.exe (PID: 7576)
      • sc.exe (PID: 7952)
      • sc.exe (PID: 5112)
      • sc.exe (PID: 6004)
      • sc.exe (PID: 9084)
      • sc.exe (PID: 3364)
      • sc.exe (PID: 9224)
      • sc.exe (PID: 9232)
      • sc.exe (PID: 9252)
      • sc.exe (PID: 9264)
      • sc.exe (PID: 9280)
      • sc.exe (PID: 9392)
      • sc.exe (PID: 9424)
      • sc.exe (PID: 9288)
      • sc.exe (PID: 9300)
      • sc.exe (PID: 9320)
      • sc.exe (PID: 9328)
      • sc.exe (PID: 9336)
      • sc.exe (PID: 9376)
      • sc.exe (PID: 9416)
      • sc.exe (PID: 9580)
      • sc.exe (PID: 9572)
      • sc.exe (PID: 9600)
      • sc.exe (PID: 9608)
      • sc.exe (PID: 9620)
      • sc.exe (PID: 9628)
      • sc.exe (PID: 9544)
      • sc.exe (PID: 9552)
      • sc.exe (PID: 9664)
      • sc.exe (PID: 9692)
      • sc.exe (PID: 9640)
      • sc.exe (PID: 9648)
      • sc.exe (PID: 9656)
      • sc.exe (PID: 9672)
      • sc.exe (PID: 9708)
      • sc.exe (PID: 9980)
      • sc.exe (PID: 9736)
      • sc.exe (PID: 9784)
      • sc.exe (PID: 9844)
      • sc.exe (PID: 9860)
      • sc.exe (PID: 9968)
      • sc.exe (PID: 11008)
      • sc.exe (PID: 9308)
      • sc.exe (PID: 9360)
      • sc.exe (PID: 9456)
      • sc.exe (PID: 9464)
      • sc.exe (PID: 9508)
      • sc.exe (PID: 9496)
      • sc.exe (PID: 9472)
      • sc.exe (PID: 9448)
      • sc.exe (PID: 9528)
      • sc.exe (PID: 9432)
    • Starts SC.EXE for service management

      • hola_svc.exe (PID: 8948)
  • INFO

    • Reads security settings of Internet Explorer

      • BackgroundTransferHost.exe (PID: 7736)
      • BackgroundTransferHost.exe (PID: 6668)
      • BackgroundTransferHost.exe (PID: 7752)
      • BackgroundTransferHost.exe (PID: 536)
      • BackgroundTransferHost.exe (PID: 7684)
      • explorer.exe (PID: 4164)
      • CredentialUIBroker.exe (PID: 1660)
    • Reads Environment values

      • identity_helper.exe (PID: 6988)
      • net_updater64.exe (PID: 6800)
      • net_updater64.exe (PID: 8296)
      • net_updater64.exe (PID: 8768)
      • net_updater64.exe (PID: 9008)
      • net_updater64.exe (PID: 9276)
    • Checks supported languages

      • identity_helper.exe (PID: 6988)
      • Hola-Setup-C-HP.exe (PID: 8108)
      • Hola-Setup-C-HP.exe (PID: 2384)
      • Hola-Setup-C-HP.exe (PID: 7968)
      • Hola-Setup-x64-1.233.367.exe (PID: 5072)
      • net_updater64.exe (PID: 6800)
      • test_wpf.exe (PID: 1276)
      • ShellExperienceHost.exe (PID: 8104)
      • net_updater64.exe (PID: 8296)
      • test_wpf.exe (PID: 8372)
      • idle_report.exe (PID: 8508)
      • net_updater64.exe (PID: 8768)
      • test_wpf.exe (PID: 8840)
      • hola_svc.exe (PID: 8948)
      • net_updater64.exe (PID: 9008)
      • test_wpf.exe (PID: 8028)
      • hola_svc.exe (PID: 9144)
      • Hola-Setup-x64-1.233.367.exe (PID: 8644)
      • 7zr.exe (PID: 8344)
      • Hola-Setup-x64-1.233.367.exe (PID: 9180)
      • hola.exe (PID: 7860)
      • hola_cr.exe (PID: 4988)
      • hola_cr.exe (PID: 3156)
      • hola_cr.exe (PID: 5592)
      • hola_cr.exe (PID: 8736)
      • hola_cr.exe (PID: 5416)
      • hola_cr.exe (PID: 6112)
      • hola_cr.exe (PID: 8252)
      • hola_cr.exe (PID: 5936)
      • hola_cr.exe (PID: 6004)
      • hola_cr.exe (PID: 5232)
      • hola_svc.exe (PID: 9148)
      • hola_cr.exe (PID: 1132)
      • hola_cr.exe (PID: 8560)
      • hola_cr.exe (PID: 7828)
      • hola_cr.exe (PID: 1072)
      • hola_cr.exe (PID: 8600)
      • hola_cr.exe (PID: 5680)
      • hola_cr.exe (PID: 7964)
      • hola_cr.exe (PID: 5556)
      • hola_cr.exe (PID: 5776)
      • test_wpf.exe (PID: 10308)
      • net_updater64.exe (PID: 9276)
      • hola_cr.exe (PID: 10592)
      • hola_cr.exe (PID: 10684)
      • idle_report.exe (PID: 1180)
      • hola_cr.exe (PID: 9344)
      • hola_cr.exe (PID: 10044)
      • hola_cr.exe (PID: 10792)
      • hola_cr.exe (PID: 10732)
      • hola_cr.exe (PID: 11048)
      • hola_cr.exe (PID: 10772)
      • hola_cr.exe (PID: 11128)
      • hola_cr.exe (PID: 9852)
      • hola_cr.exe (PID: 10352)
      • hola_cr.exe (PID: 10724)
      • hola_cr.exe (PID: 10760)
      • hola_cr.exe (PID: 8636)
      • hola_cr.exe (PID: 9252)
      • hola_cr.exe (PID: 11208)
      • hola_cr.exe (PID: 9516)
      • hola_svc.exe (PID: 9980)
      • hola_cr.exe (PID: 5500)
      • idle_report.exe (PID: 5024)
      • hola_cr.exe (PID: 10868)
    • Reads the computer name

      • identity_helper.exe (PID: 6988)
      • Hola-Setup-C-HP.exe (PID: 8108)
      • Hola-Setup-C-HP.exe (PID: 2384)
      • Hola-Setup-C-HP.exe (PID: 7968)
      • Hola-Setup-x64-1.233.367.exe (PID: 5072)
      • net_updater64.exe (PID: 6800)
      • test_wpf.exe (PID: 1276)
      • ShellExperienceHost.exe (PID: 8104)
      • net_updater64.exe (PID: 8296)
      • test_wpf.exe (PID: 8372)
      • idle_report.exe (PID: 8508)
      • net_updater64.exe (PID: 8768)
      • test_wpf.exe (PID: 8840)
      • hola_svc.exe (PID: 8948)
      • net_updater64.exe (PID: 9008)
      • test_wpf.exe (PID: 8028)
      • Hola-Setup-x64-1.233.367.exe (PID: 8644)
      • 7zr.exe (PID: 8344)
      • Hola-Setup-x64-1.233.367.exe (PID: 9180)
      • hola.exe (PID: 7860)
      • hola_cr.exe (PID: 3156)
      • hola_cr.exe (PID: 4988)
      • hola_cr.exe (PID: 8736)
      • hola_cr.exe (PID: 6112)
      • hola_cr.exe (PID: 5776)
      • net_updater64.exe (PID: 9276)
      • test_wpf.exe (PID: 10308)
      • idle_report.exe (PID: 1180)
      • idle_report.exe (PID: 5024)
    • Checks proxy server information

      • BackgroundTransferHost.exe (PID: 6668)
      • Hola-Setup-C-HP.exe (PID: 8108)
      • Hola-Setup-C-HP.exe (PID: 2384)
      • Hola-Setup-C-HP.exe (PID: 7968)
      • net_updater64.exe (PID: 6800)
      • slui.exe (PID: 2980)
      • hola_cr.exe (PID: 3156)
    • Creates files or folders in the user directory

      • BackgroundTransferHost.exe (PID: 6668)
      • net_updater64.exe (PID: 6800)
      • hola_cr.exe (PID: 3156)
      • hola_cr.exe (PID: 8736)
      • hola_cr.exe (PID: 5592)
    • Reads the software policy settings

      • BackgroundTransferHost.exe (PID: 6668)
      • Hola-Setup-C-HP.exe (PID: 8108)
      • Hola-Setup-C-HP.exe (PID: 2384)
      • slui.exe (PID: 4988)
      • Hola-Setup-C-HP.exe (PID: 7968)
      • Hola-Setup-x64-1.233.367.exe (PID: 5072)
      • net_updater64.exe (PID: 6800)
      • net_updater64.exe (PID: 8296)
      • net_updater64.exe (PID: 8768)
      • net_updater64.exe (PID: 9008)
      • Hola-Setup-x64-1.233.367.exe (PID: 8644)
      • Hola-Setup-x64-1.233.367.exe (PID: 9180)
      • slui.exe (PID: 2980)
      • hola.exe (PID: 7860)
      • net_updater64.exe (PID: 9276)
    • Create files in a temporary directory

      • Hola-Setup-C-HP.exe (PID: 8108)
      • Hola-Setup-x64-1.233.367.exe (PID: 5072)
      • Hola-Setup-C-HP.exe (PID: 7968)
      • Hola-Setup-x64-1.233.367.exe (PID: 8644)
      • Hola-Setup-x64-1.233.367.exe (PID: 9180)
      • hola_cr.exe (PID: 3156)
    • Executable content was dropped or overwritten

      • msedge.exe (PID: 7416)
      • msedge.exe (PID: 900)
      • msedge.exe (PID: 10196)
    • Autorun file from Downloads

      • msedge.exe (PID: 2980)
      • msedge.exe (PID: 900)
    • Reads the machine GUID from the registry

      • Hola-Setup-C-HP.exe (PID: 8108)
      • Hola-Setup-C-HP.exe (PID: 7968)
      • Hola-Setup-C-HP.exe (PID: 2384)
      • test_wpf.exe (PID: 1276)
      • net_updater64.exe (PID: 6800)
      • net_updater64.exe (PID: 8296)
      • test_wpf.exe (PID: 8372)
      • idle_report.exe (PID: 8508)
      • net_updater64.exe (PID: 8768)
      • test_wpf.exe (PID: 8840)
      • hola_svc.exe (PID: 8948)
      • test_wpf.exe (PID: 8028)
      • net_updater64.exe (PID: 9008)
      • hola_cr.exe (PID: 3156)
      • net_updater64.exe (PID: 9276)
      • test_wpf.exe (PID: 10308)
      • idle_report.exe (PID: 1180)
      • idle_report.exe (PID: 5024)
    • Disables trace logs

      • Hola-Setup-C-HP.exe (PID: 8108)
      • Hola-Setup-C-HP.exe (PID: 2384)
      • Hola-Setup-C-HP.exe (PID: 7968)
      • net_updater64.exe (PID: 8296)
      • rasdial.exe (PID: 9072)
      • hola_svc.exe (PID: 8948)
      • rasdial.exe (PID: 8588)
      • rasdial.exe (PID: 5324)
      • rasdial.exe (PID: 5980)
      • rasdial.exe (PID: 9160)
      • rasdial.exe (PID: 8396)
      • rasdial.exe (PID: 1760)
      • rasdial.exe (PID: 9084)
      • rasdial.exe (PID: 6272)
      • rasdial.exe (PID: 7152)
      • rasdial.exe (PID: 6048)
      • rasdial.exe (PID: 9084)
      • rasdial.exe (PID: 2084)
      • rasdial.exe (PID: 10928)
      • rasdial.exe (PID: 9800)
      • rasdial.exe (PID: 10128)
      • rasdial.exe (PID: 10416)
      • rasdial.exe (PID: 9920)
      • rasdial.exe (PID: 10892)
      • rasdial.exe (PID: 9240)
      • rasdial.exe (PID: 10428)
      • rasdial.exe (PID: 9596)
      • rasdial.exe (PID: 9304)
      • rasdial.exe (PID: 10860)
      • rasdial.exe (PID: 10768)
      • rasdial.exe (PID: 11096)
      • rasdial.exe (PID: 9300)
      • rasdial.exe (PID: 9436)
      • rasdial.exe (PID: 9608)
      • rasdial.exe (PID: 10740)
      • rasdial.exe (PID: 10284)
      • rasdial.exe (PID: 8384)
      • rasdial.exe (PID: 9488)
      • rasdial.exe (PID: 10156)
      • rasdial.exe (PID: 10408)
      • rasdial.exe (PID: 7988)
      • rasdial.exe (PID: 9808)
      • rasdial.exe (PID: 1388)
      • rasdial.exe (PID: 8224)
      • rasdial.exe (PID: 9328)
      • rasdial.exe (PID: 9524)
      • rasdial.exe (PID: 11052)
      • rasdial.exe (PID: 9520)
      • rasdial.exe (PID: 6988)
      • rasdial.exe (PID: 10072)
      • rasdial.exe (PID: 9936)
      • rasdial.exe (PID: 10948)
      • rasdial.exe (PID: 9396)
      • rasdial.exe (PID: 5576)
      • rasdial.exe (PID: 10432)
      • rasdial.exe (PID: 9296)
      • rasdial.exe (PID: 9288)
      • rasdial.exe (PID: 10840)
      • rasdial.exe (PID: 8896)
      • rasdial.exe (PID: 9628)
      • rasdial.exe (PID: 10608)
      • rasdial.exe (PID: 11152)
      • rasdial.exe (PID: 10584)
      • rasdial.exe (PID: 8208)
      • rasdial.exe (PID: 6272)
      • rasdial.exe (PID: 6576)
      • rasdial.exe (PID: 6980)
      • rasdial.exe (PID: 9684)
      • rasdial.exe (PID: 8572)
      • rasdial.exe (PID: 9864)
      • rasdial.exe (PID: 10672)
      • rasdial.exe (PID: 9620)
      • rasdial.exe (PID: 9680)
      • rasdial.exe (PID: 11168)
      • rasdial.exe (PID: 10976)
      • rasdial.exe (PID: 10612)
      • rasdial.exe (PID: 9372)
      • rasdial.exe (PID: 10984)
      • rasdial.exe (PID: 5360)
      • rasdial.exe (PID: 872)
      • rasdial.exe (PID: 9304)
      • rasdial.exe (PID: 10540)
      • rasdial.exe (PID: 10180)
      • rasdial.exe (PID: 9664)
      • rasdial.exe (PID: 8360)
      • rasdial.exe (PID: 9432)
      • rasdial.exe (PID: 8512)
      • rasdial.exe (PID: 10096)
      • rasdial.exe (PID: 10740)
      • rasdial.exe (PID: 8864)
      • rasdial.exe (PID: 10556)
      • rasdial.exe (PID: 9768)
      • rasdial.exe (PID: 8556)
      • rasdial.exe (PID: 8224)
      • rasdial.exe (PID: 9884)
      • rasdial.exe (PID: 11248)
      • rasdial.exe (PID: 9272)
      • rasdial.exe (PID: 7756)
      • rasdial.exe (PID: 6712)
      • rasdial.exe (PID: 9944)
      • rasdial.exe (PID: 8912)
      • rasdial.exe (PID: 9264)
      • rasdial.exe (PID: 10160)
      • rasdial.exe (PID: 10116)
      • rasdial.exe (PID: 5576)
      • rasdial.exe (PID: 9268)
      • rasdial.exe (PID: 8312)
    • Process checks computer location settings

      • Hola-Setup-C-HP.exe (PID: 8108)
      • Hola-Setup-C-HP.exe (PID: 7968)
      • net_updater64.exe (PID: 6800)
      • net_updater64.exe (PID: 8296)
      • net_updater64.exe (PID: 8768)
      • net_updater64.exe (PID: 9008)
      • hola_cr.exe (PID: 3156)
      • hola_cr.exe (PID: 6004)
      • hola_cr.exe (PID: 5232)
      • hola_cr.exe (PID: 7964)
      • hola_cr.exe (PID: 8560)
      • hola_cr.exe (PID: 1132)
      • hola_cr.exe (PID: 1072)
      • hola_cr.exe (PID: 8600)
      • hola_cr.exe (PID: 7828)
      • hola_cr.exe (PID: 5680)
      • hola_cr.exe (PID: 5556)
      • net_updater64.exe (PID: 9276)
      • hola_cr.exe (PID: 10592)
      • hola_cr.exe (PID: 10732)
      • hola_cr.exe (PID: 10792)
      • hola_cr.exe (PID: 10044)
      • hola_cr.exe (PID: 10352)
      • hola_cr.exe (PID: 11048)
      • hola_cr.exe (PID: 9852)
      • hola_cr.exe (PID: 10772)
      • hola_cr.exe (PID: 9252)
      • hola_cr.exe (PID: 10724)
      • hola_cr.exe (PID: 10760)
      • hola_cr.exe (PID: 9516)
    • Application launched itself

      • msedge.exe (PID: 900)
    • The sample compiled with english language support

      • Hola-Setup-x64-1.233.367.exe (PID: 5072)
      • Hola-Setup-C-HP.exe (PID: 7968)
      • net_updater64.exe (PID: 6800)
      • Hola-Setup-x64-1.233.367.exe (PID: 8644)
      • 7zr.exe (PID: 8344)
      • msedge.exe (PID: 10196)
    • Creates files in the program directory

      • Hola-Setup-x64-1.233.367.exe (PID: 5072)
      • net_updater64.exe (PID: 6800)
      • net_updater64.exe (PID: 8296)
      • net_updater64.exe (PID: 8768)
      • hola_svc.exe (PID: 8948)
      • net_updater64.exe (PID: 9008)
      • 7zr.exe (PID: 8344)
      • Hola-Setup-x64-1.233.367.exe (PID: 8644)
      • Hola-Setup-x64-1.233.367.exe (PID: 9180)
      • hola.exe (PID: 7860)
      • net_updater64.exe (PID: 9276)
    • Manual execution by a user

      • msedge.exe (PID: 5796)
    • Reads the time zone

      • net_updater64.exe (PID: 8296)
    • Reads CPU info

      • net_updater64.exe (PID: 8296)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
630
Monitored processes
478
Malicious processes
11
Suspicious processes
2

Behavior graph

Click at the process to see the details
start msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs sppextcomobj.exe no specs slui.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs backgroundtransferhost.exe no specs backgroundtransferhost.exe backgroundtransferhost.exe no specs backgroundtransferhost.exe no specs backgroundtransferhost.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs hola-setup-c-hp.exe msedge.exe no specs msedge.exe no specs hola-setup-c-hp.exe hola-setup-c-hp.exe slui.exe hola-setup-x64-1.233.367.exe net_updater64.exe conhost.exe no specs test_wpf.exe no specs shellexperiencehost.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs net_updater64.exe test_wpf.exe no specs idle_report.exe no specs conhost.exe no specs wmiapsrv.exe no specs msedge.exe no specs net_updater64.exe conhost.exe no specs test_wpf.exe no specs hola_svc.exe net_updater64.exe conhost.exe no specs rasdial.exe no specs conhost.exe no specs hola_svc.exe no specs test_wpf.exe no specs msedge.exe no specs hola-setup-x64-1.233.367.exe 7zr.exe conhost.exe no specs msedge.exe no specs msedge.exe no specs hola-setup-x64-1.233.367.exe explorer.exe no specs explorer.exe no specs hola.exe msedge.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe no specs hola_cr.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe no specs hola_cr.exe hola_cr.exe no specs hola_cr.exe no specs hola_cr.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe no specs msedge.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe no specs hola_cr.exe no specs hola_cr.exe no specs hola_cr.exe no specs hola_cr.exe no specs hola_cr.exe no specs hola_cr.exe no specs rasdial.exe no specs conhost.exe no specs hola_svc.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe no specs hola_cr.exe no specs hola_cr.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs msedge.exe no specs rasdial.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs net_updater64.exe conhost.exe no specs sc.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs test_wpf.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs msedge.exe rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe no specs idle_report.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe no specs rasdial.exe no specs conhost.exe no specs msedge.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs msedge.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs msedge.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe no specs hola_cr.exe no specs hola_cr.exe no specs hola_cr.exe no specs hola_cr.exe no specs hola_cr.exe no specs hola_cr.exe no specs hola_cr.exe no specs hola_cr.exe no specs hola_cr.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe no specs hola_cr.exe no specs hola_cr.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs msedge.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs hola_svc.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs credentialuibroker.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs msedge.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs msedge.exe no specs rasdial.exe no specs conhost.exe no specs idle_report.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs msedge.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
232\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exerasdial.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
240"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=42 --mojo-platform-channel-handle=7748 --field-trial-handle=2292,i,13219907060671415697,14896040809594367052,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
456"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5724 --field-trial-handle=2292,i,13219907060671415697,14896040809594367052,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
536"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1C:\Windows\System32\BackgroundTransferHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Download/Upload Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\backgroundtransferhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\bcryptprimitives.dll
536"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=32 --mojo-platform-channel-handle=6420 --field-trial-handle=2292,i,13219907060671415697,14896040809594367052,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
780"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=6944 --field-trial-handle=2292,i,13219907060671415697,14896040809594367052,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
872rasdialC:\Windows\System32\rasdial.exehola_svc.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Remote Access Command Line Dial UI
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rasdial.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\rasapi32.dll
900"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "c6gj-static.net"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1004sc query luminati_net_updater_win_hola_h2o_noconsent_nopeer_hola_orgC:\Windows\System32\sc.exehola_svc.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Service Control Manager Configuration Tool
Exit code:
1060
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
1072"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=renderer --user-data-dir="C:\\Users\\admin\\AppData\\Roaming\\Hola\\chromium_profile" --no-pre-read-main-dll --no-subproc-heap-profiling --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=24 --metrics-shmem-handle=4776,i,10205034118708043953,6214947517720755306,2097152 --field-trial-handle=5016,i,7829351260892768208,9576416601472934325,262144 --variations-seed-version --mojo-platform-channel-handle=5012 /prefetch:1C:\Program Files\Hola\app\chromium\hola_cr.exehola_cr.exe
User:
admin
Company:
Hola VPN Ltd.
Integrity Level:
LOW
Description:
Hola
Exit code:
0
Version:
128.0.6613.86
Modules
Images
c:\program files\hola\app\chromium\hola_cr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\program files\hola\app\chromium\128.0.6613.86\hola_elf.dll
c:\windows\syswow64\version.dll
Total events
77 991
Read events
77 776
Write events
211
Delete events
4

Modification events

(PID) Process:(900) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(900) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(900) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(900) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(900) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
87C701A5B98F2F00
(PID) Process:(900) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
682F0EA5B98F2F00
(PID) Process:(900) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\262916
Operation:writeName:WindowTabManagerFileMappingId
Value:
{62617071-7B18-4B84-9690-3AEF34621289}
(PID) Process:(900) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\262916
Operation:writeName:WindowTabManagerFileMappingId
Value:
{2AD60BA8-C0DE-41D8-A122-63EA04305FF5}
(PID) Process:(900) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\262916
Operation:writeName:WindowTabManagerFileMappingId
Value:
{1A3475D2-E309-48E5-B446-1409829DE71C}
(PID) Process:(900) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\262916
Operation:writeName:WindowTabManagerFileMappingId
Value:
{418F525E-00B3-4F45-A868-B367DDC673F3}
Executable files
85
Suspicious files
882
Text files
149
Unknown types
2

Dropped files

PID
Process
Filename
Type
900msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old~RF10b5b5.TMP
MD5:
SHA256:
900msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF10b5b5.TMP
MD5:
SHA256:
900msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
900msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old~RF10b5b5.TMP
MD5:
SHA256:
900msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
900msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
900msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old~RF10b5b5.TMP
MD5:
SHA256:
900msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
900msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF10b5e4.TMP
MD5:
SHA256:
900msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
120
TCP/UDP connections
482
DNS requests
388
Threats
108

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
2104
svchost.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
5496
MoUsoCoreWorker.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
unknown
8064
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
unknown
7692
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
unknown
8020
svchost.exe
HEAD
200
84.201.210.23:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/0c269ced-c74b-4e70-9b58-6e7999b292c0?P1=1743005673&P2=404&P3=2&P4=CQzlomuvexYu%2bTdzxGPMFbLLW0V0HMKiNWzw6zuHQRejNSgVr0s%2f%2flMmMYiB4J1kGkdB9B2Aumo0w64zZWaX5w%3d%3d
unknown
unknown
8064
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
unknown
8020
svchost.exe
GET
206
84.201.210.23:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/0c269ced-c74b-4e70-9b58-6e7999b292c0?P1=1743005673&P2=404&P3=2&P4=CQzlomuvexYu%2bTdzxGPMFbLLW0V0HMKiNWzw6zuHQRejNSgVr0s%2f%2flMmMYiB4J1kGkdB9B2Aumo0w64zZWaX5w%3d%3d
unknown
unknown
8020
svchost.exe
GET
206
84.201.210.23:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/0c269ced-c74b-4e70-9b58-6e7999b292c0?P1=1743005673&P2=404&P3=2&P4=CQzlomuvexYu%2bTdzxGPMFbLLW0V0HMKiNWzw6zuHQRejNSgVr0s%2f%2flMmMYiB4J1kGkdB9B2Aumo0w64zZWaX5w%3d%3d
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
unknown
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
unknown
5496
MoUsoCoreWorker.exe
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
unknown
2104
svchost.exe
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
unknown
4
System
192.168.100.255:138
unknown
5496
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
900
msedge.exe
239.255.255.250:1900
unknown
7416
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
7416
msedge.exe
216.58.212.163:443
fonts.gstatic.com
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.110
unknown
settings-win.data.microsoft.com
  • 51.104.136.2
  • 20.73.194.208
unknown
crl.microsoft.com
  • 23.53.40.178
  • 23.53.40.176
unknown
config.edge.skype.com
  • 13.107.42.16
unknown
edge.microsoft.com
  • 204.79.197.239
  • 13.107.21.239
  • 150.171.28.11
  • 150.171.27.11
unknown
edge-mobile-static.azureedge.net
  • 13.107.246.45
unknown
c6gj-static.net
  • 107.22.193.119
  • 54.225.121.9
unknown
business.bing.com
  • 13.107.6.158
unknown
bzib.nelreports.net
  • 23.48.23.26
  • 23.48.23.51
unknown
cdn4.c6gj-static.net
  • 169.150.247.38
  • 169.150.247.39
unknown

Threats

PID
Process
Class
Message
7416
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare content delivery network (cdnjs .cloudflare .com)
7416
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare content delivery network (cdnjs .cloudflare .com)
7416
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare content delivery network (cdnjs .cloudflare .com)
7416
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare content delivery network (cdnjs .cloudflare .com)
2196
svchost.exe
Misc activity
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
8296
net_updater64.exe
Misc activity
ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI
7416
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Azure Front Door domain observed in TLS SNI ( .azurefd .net)
8736
hola_cr.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
8736
hola_cr.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
8736
hola_cr.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
No debug info