File name:

1015b0b5cfddfbc4baea6910d9c56c3c.exe

Full analysis: https://app.any.run/tasks/d98222b6-8ebe-4bc6-8d51-0a59fa2db9ab
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: December 14, 2024, 02:06:08
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
socks5systemz
loader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections
MD5:

1015B0B5CFDDFBC4BAEA6910D9C56C3C

SHA1:

9FE1CAE9D38A53A1217556C60FFD3C02D8235D66

SHA256:

F08F680F17AAF9505A8D53648545CE684AF9B39A90A8DC9D2E872693E1D59B45

SSDEEP:

98304:UvKS4mrF/tkmDhxKJNjxXRAVJ/fR+ZVcc56VcMstwn0fiqFKZ4e+gM3MFVcIU1s+:tdwB3tHTumkAXb5uuS

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • SOCKS5SYSTEMZ has been detected (YARA)

      • crtgame.exe (PID: 6588)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • 1015b0b5cfddfbc4baea6910d9c56c3c.tmp (PID: 448)
      • lessmsi-gui.exe (PID: 3060)
    • Executable content was dropped or overwritten

      • 1015b0b5cfddfbc4baea6910d9c56c3c.exe (PID: 6372)
      • 1015b0b5cfddfbc4baea6910d9c56c3c.exe (PID: 3952)
      • 1015b0b5cfddfbc4baea6910d9c56c3c.tmp (PID: 6396)
      • crtgame.exe (PID: 6496)
    • Reads the Windows owner or organization settings

      • 1015b0b5cfddfbc4baea6910d9c56c3c.tmp (PID: 6396)
    • Process drops SQLite DLL files

      • 1015b0b5cfddfbc4baea6910d9c56c3c.tmp (PID: 6396)
    • Process drops legitimate windows executable

      • 1015b0b5cfddfbc4baea6910d9c56c3c.tmp (PID: 6396)
    • Lists all scheduled tasks

      • schtasks.exe (PID: 6488)
    • Drops 7-zip archiver for unpacking

      • 1015b0b5cfddfbc4baea6910d9c56c3c.tmp (PID: 6396)
  • INFO

    • Checks supported languages

      • 1015b0b5cfddfbc4baea6910d9c56c3c.exe (PID: 3952)
      • 1015b0b5cfddfbc4baea6910d9c56c3c.tmp (PID: 6396)
      • 1015b0b5cfddfbc4baea6910d9c56c3c.tmp (PID: 448)
      • 1015b0b5cfddfbc4baea6910d9c56c3c.exe (PID: 6372)
      • AddWindowsExplorerShortcut.exe (PID: 7120)
      • crtgame.exe (PID: 6588)
      • crtgame.exe (PID: 6496)
      • lessmsi-gui.exe (PID: 3060)
    • Process checks computer location settings

      • 1015b0b5cfddfbc4baea6910d9c56c3c.tmp (PID: 448)
    • Create files in a temporary directory

      • 1015b0b5cfddfbc4baea6910d9c56c3c.exe (PID: 3952)
      • 1015b0b5cfddfbc4baea6910d9c56c3c.exe (PID: 6372)
      • 1015b0b5cfddfbc4baea6910d9c56c3c.tmp (PID: 6396)
    • Reads the computer name

      • 1015b0b5cfddfbc4baea6910d9c56c3c.tmp (PID: 448)
      • 1015b0b5cfddfbc4baea6910d9c56c3c.tmp (PID: 6396)
      • AddWindowsExplorerShortcut.exe (PID: 7120)
      • crtgame.exe (PID: 6496)
      • lessmsi-gui.exe (PID: 3060)
    • The sample compiled with english language support

      • 1015b0b5cfddfbc4baea6910d9c56c3c.tmp (PID: 6396)
      • crtgame.exe (PID: 6496)
    • Manual execution by a user

      • OpenWith.exe (PID: 4328)
      • AddWindowsExplorerShortcut.exe (PID: 7072)
      • AddWindowsExplorerShortcut.exe (PID: 7120)
      • OpenWith.exe (PID: 2928)
      • lessmsi-gui.exe (PID: 3060)
    • Creates files in the program directory

      • crtgame.exe (PID: 6496)
      • 1015b0b5cfddfbc4baea6910d9c56c3c.tmp (PID: 6396)
      • crtgame.exe (PID: 6588)
    • Creates a software uninstall entry

      • 1015b0b5cfddfbc4baea6910d9c56c3c.tmp (PID: 6396)
    • Reads Microsoft Office registry keys

      • OpenWith.exe (PID: 4328)
      • OpenWith.exe (PID: 2928)
    • Reads the machine GUID from the registry

      • lessmsi-gui.exe (PID: 3060)
    • The process uses the downloaded file

      • lessmsi-gui.exe (PID: 3060)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (77.7)
.exe | Win32 Executable Delphi generic (10)
.dll | Win32 Dynamic Link Library (generic) (4.6)
.exe | Win32 Executable (generic) (3.1)
.exe | Win16/32 Executable Delphi generic (1.4)

EXIF

EXE

ProductVersion: 1.2.1.0
ProductName: CRTGame
LegalCopyright:
FileVersion:
FileDescription: CRTGame Setup
CompanyName:
Comments: This installation was built with Inno Setup.
CharacterSet: Unicode
LanguageCode: Neutral
FileSubtype: -
ObjectFileType: Executable application
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x003f
ProductVersionNumber: 0.0.0.0
FileVersionNumber: 0.0.0.0
Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: 6
OSVersion: 1
EntryPoint: 0x9c40
UninitializedDataSize: -
InitializedDataSize: 17920
CodeSize: 37888
LinkerVersion: 2.25
PEType: PE32
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
TimeStamp: 2023:12:11 00:57:03+00:00
MachineType: Intel 386 or later, and compatibles
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
146
Monitored processes
17
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 1015b0b5cfddfbc4baea6910d9c56c3c.exe 1015b0b5cfddfbc4baea6910d9c56c3c.tmp no specs 1015b0b5cfddfbc4baea6910d9c56c3c.exe 1015b0b5cfddfbc4baea6910d9c56c3c.tmp schtasks.exe no specs crtgame.exe conhost.exe no specs net.exe no specs #SOCKS5SYSTEMZ crtgame.exe no specs conhost.exe no specs net1.exe no specs addwindowsexplorershortcut.exe no specs addwindowsexplorershortcut.exe conhost.exe no specs openwith.exe no specs openwith.exe no specs lessmsi-gui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3952"C:\Users\admin\AppData\Local\Temp\1015b0b5cfddfbc4baea6910d9c56c3c.exe" C:\Users\admin\AppData\Local\Temp\1015b0b5cfddfbc4baea6910d9c56c3c.exe
explorer.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
CRTGame Setup
Version:
Modules
Images
c:\users\admin\appdata\local\temp\1015b0b5cfddfbc4baea6910d9c56c3c.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
448"C:\Users\admin\AppData\Local\Temp\is-Q70IR.tmp\1015b0b5cfddfbc4baea6910d9c56c3c.tmp" /SL5="$702EA,6991381,54272,C:\Users\admin\AppData\Local\Temp\1015b0b5cfddfbc4baea6910d9c56c3c.exe" C:\Users\admin\AppData\Local\Temp\is-Q70IR.tmp\1015b0b5cfddfbc4baea6910d9c56c3c.tmp1015b0b5cfddfbc4baea6910d9c56c3c.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Version:
51.52.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-q70ir.tmp\1015b0b5cfddfbc4baea6910d9c56c3c.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6372"C:\Users\admin\AppData\Local\Temp\1015b0b5cfddfbc4baea6910d9c56c3c.exe" /SPAWNWND=$502B2 /NOTIFYWND=$702EA C:\Users\admin\AppData\Local\Temp\1015b0b5cfddfbc4baea6910d9c56c3c.exe
1015b0b5cfddfbc4baea6910d9c56c3c.tmp
User:
admin
Company:
Integrity Level:
HIGH
Description:
CRTGame Setup
Version:
Modules
Images
c:\users\admin\appdata\local\temp\1015b0b5cfddfbc4baea6910d9c56c3c.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6396"C:\Users\admin\AppData\Local\Temp\is-O1MAF.tmp\1015b0b5cfddfbc4baea6910d9c56c3c.tmp" /SL5="$902CA,6991381,54272,C:\Users\admin\AppData\Local\Temp\1015b0b5cfddfbc4baea6910d9c56c3c.exe" /SPAWNWND=$502B2 /NOTIFYWND=$702EA C:\Users\admin\AppData\Local\Temp\is-O1MAF.tmp\1015b0b5cfddfbc4baea6910d9c56c3c.tmp
1015b0b5cfddfbc4baea6910d9c56c3c.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Version:
51.52.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-o1maf.tmp\1015b0b5cfddfbc4baea6910d9c56c3c.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6488"C:\WINDOWS\system32\schtasks.exe" /QueryC:\Windows\SysWOW64\schtasks.exe1015b0b5cfddfbc4baea6910d9c56c3c.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
6496"C:\Program Files (x86)\CRTGame\crtgame.exe" -iC:\Program Files (x86)\CRTGame\crtgame.exe
1015b0b5cfddfbc4baea6910d9c56c3c.tmp
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\program files (x86)\crtgame\crtgame.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6508\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeschtasks.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6580"C:\WINDOWS\system32\net.exe" helpmsg 10C:\Windows\SysWOW64\net.exe1015b0b5cfddfbc4baea6910d9c56c3c.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Net Command
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\net.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
6588"C:\Program Files (x86)\CRTGame\crtgame.exe" -sC:\Program Files (x86)\CRTGame\crtgame.exe
1015b0b5cfddfbc4baea6910d9c56c3c.tmp
User:
admin
Integrity Level:
HIGH
Version:
1.0.0.0
Modules
Images
c:\program files (x86)\crtgame\crtgame.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6608\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
1 981
Read events
1 962
Write events
19
Delete events
0

Modification events

(PID) Process:(6396) 1015b0b5cfddfbc4baea6910d9c56c3c.tmpKey:HKEY_CURRENT_USER\SOFTWARE\CRTGame\CRTG12102
Operation:writeName:InstallPath_Win32
Value:
C:\Program Files (x86)\CRTGame
(PID) Process:(6396) 1015b0b5cfddfbc4baea6910d9c56c3c.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\CRTGame_is1
Operation:writeName:Inno Setup: Setup Version
Value:
5.4.0 (a)
(PID) Process:(6396) 1015b0b5cfddfbc4baea6910d9c56c3c.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\CRTGame_is1
Operation:writeName:Inno Setup: App Path
Value:
C:\Program Files (x86)\CRTGame
(PID) Process:(6396) 1015b0b5cfddfbc4baea6910d9c56c3c.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\CRTGame_is1
Operation:writeName:InstallLocation
Value:
C:\Program Files (x86)\CRTGame\
(PID) Process:(6396) 1015b0b5cfddfbc4baea6910d9c56c3c.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\CRTGame_is1
Operation:writeName:Inno Setup: Icon Group
Value:
CRTGame
(PID) Process:(6396) 1015b0b5cfddfbc4baea6910d9c56c3c.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\CRTGame_is1
Operation:writeName:Inno Setup: User
Value:
admin
(PID) Process:(6396) 1015b0b5cfddfbc4baea6910d9c56c3c.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\CRTGame_is1
Operation:writeName:Inno Setup: Language
Value:
english
(PID) Process:(6396) 1015b0b5cfddfbc4baea6910d9c56c3c.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\CRTGame_is1
Operation:writeName:DisplayName
Value:
CRTGame 1.2.1.0
(PID) Process:(6396) 1015b0b5cfddfbc4baea6910d9c56c3c.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\CRTGame_is1
Operation:writeName:UninstallString
Value:
"C:\Program Files (x86)\CRTGame\uninstall\unins000.exe"
(PID) Process:(6396) 1015b0b5cfddfbc4baea6910d9c56c3c.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\CRTGame_is1
Operation:writeName:QuietUninstallString
Value:
"C:\Program Files (x86)\CRTGame\uninstall\unins000.exe" /SILENT
Executable files
112
Suspicious files
4
Text files
14
Unknown types
1

Dropped files

PID
Process
Filename
Type
63961015b0b5cfddfbc4baea6910d9c56c3c.tmpC:\Program Files (x86)\CRTGame\stuff\is-0I471.tmptext
MD5:992C00BEAB194CE392117BB419F53051
SHA256:9E35C8E29CA055CE344E4C206E7B8FF1736158D0B47BF7B3DBC362F7EC7E722C
63961015b0b5cfddfbc4baea6910d9c56c3c.tmpC:\Program Files (x86)\CRTGame\bin\x86\is-22M8G.tmpexecutable
MD5:BDB65DCE335AC29ECCBC2CA7A7AD36B7
SHA256:7EC9EE07BFD67150D1BC26158000436B63CA8DBB2623095C049E06091FA374C3
63961015b0b5cfddfbc4baea6910d9c56c3c.tmpC:\Users\admin\AppData\Local\Temp\is-4KADL.tmp\_isetup\_shfoldr.dllexecutable
MD5:92DC6EF532FBB4A5C3201469A5B5EB63
SHA256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
63961015b0b5cfddfbc4baea6910d9c56c3c.tmpC:\Program Files (x86)\CRTGame\bin\x86\tak_deco_lib.dllexecutable
MD5:BDB65DCE335AC29ECCBC2CA7A7AD36B7
SHA256:7EC9EE07BFD67150D1BC26158000436B63CA8DBB2623095C049E06091FA374C3
63961015b0b5cfddfbc4baea6910d9c56c3c.tmpC:\Program Files (x86)\CRTGame\stuff\is-SHBJD.tmptext
MD5:992C00BEAB194CE392117BB419F53051
SHA256:9E35C8E29CA055CE344E4C206E7B8FF1736158D0B47BF7B3DBC362F7EC7E722C
63961015b0b5cfddfbc4baea6910d9c56c3c.tmpC:\Program Files (x86)\CRTGame\stuff\tagsreplace.txttext
MD5:992C00BEAB194CE392117BB419F53051
SHA256:9E35C8E29CA055CE344E4C206E7B8FF1736158D0B47BF7B3DBC362F7EC7E722C
63721015b0b5cfddfbc4baea6910d9c56c3c.exeC:\Users\admin\AppData\Local\Temp\is-O1MAF.tmp\1015b0b5cfddfbc4baea6910d9c56c3c.tmpexecutable
MD5:F448D7F4B76E5C9C3A4EAFF16A8B9B73
SHA256:7233B85EB0F8B3AA5CAE3811D727AA8742FEC4D1091C120A0FE15006F424CC49
63961015b0b5cfddfbc4baea6910d9c56c3c.tmpC:\Users\admin\AppData\Local\Temp\is-4KADL.tmp\_isetup\_iscrypt.dllexecutable
MD5:A69559718AB506675E907FE49DEB71E9
SHA256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
63961015b0b5cfddfbc4baea6910d9c56c3c.tmpC:\Users\admin\AppData\Local\Temp\is-4KADL.tmp\_isetup\_setup64.tmpexecutable
MD5:4FF75F505FDDCC6A9AE62216446205D9
SHA256:A4C86FC4836AC728D7BD96E7915090FD59521A9E74F1D06EF8E5A47C8695FD81
63961015b0b5cfddfbc4baea6910d9c56c3c.tmpC:\Users\admin\AppData\Local\Temp\is-4KADL.tmp\_isetup\_isdecmp.dllexecutable
MD5:3ADAA386B671C2DF3BAE5B39DC093008
SHA256:71CD2F5BC6E13B8349A7C98697C6D2E3FCDEEA92699CEDD591875BEA869FAE38
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
32
DNS requests
19
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6168
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
6800
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6800
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
2548
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4712
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
5064
SearchApp.exe
2.23.209.149:443
www.bing.com
Akamai International B.V.
GB
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4
System
192.168.100.255:138
whitelisted
1176
svchost.exe
20.190.159.4:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 4.231.128.59
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 2.16.164.49
  • 2.16.164.106
whitelisted
google.com
  • 142.250.185.174
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 184.30.21.171
whitelisted
www.bing.com
  • 2.23.209.149
  • 2.23.209.182
  • 2.23.209.133
  • 2.23.209.140
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.159.4
  • 40.126.31.71
  • 20.190.159.0
  • 20.190.159.73
  • 20.190.159.2
  • 20.190.159.71
  • 40.126.31.67
  • 40.126.31.73
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
arc.msn.com
  • 20.223.36.55
whitelisted
fd.api.iris.microsoft.com
  • 20.223.36.55
whitelisted

Threats

No threats detected
No debug info