File name:

OP53532 Harumi new order.scr

Full analysis: https://app.any.run/tasks/9b135335-c084-4d3a-9333-c413f78f2452
Verdict: Malicious activity
Threats:

First identified in March 2021, PureCrypter is a .NET-based loader that employs obfuscation techniques, such as SmartAssembly, to evade detection. It has been used to distribute malware families including AgentTesla, RedLine Stealer, and SnakeKeylogger. The malware is typically delivered through phishing campaigns and malicious downloads, often masquerading as legitimate files with extensions like .mp4 or .pdf. PureCrypter utilizes encryption and compression to conceal its payloads and can inject malicious code into legitimate processes to maintain persistence on the infected system.

Analysis date: January 08, 2025, 01:38:26
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
purecrypter
netreactor
amsi-bypass
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

CA2CB33B0542CDBA0673C3F0A81A2F7F

SHA1:

066C0FC9236C6EB5AD69A3F8F095A793A9D5789A

SHA256:

F3FF932BD931EE266567CD0422A067FD38281164C534026B57D740658AA056C3

SSDEEP:

1536:fVNVW2hI6JgXRL320VVNVWbBBk6CzVxEVFC:fVNVHJCR72qVNVYBBk6CzVxEVFC

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • PURECRYPTER has been detected (YARA)

      • OP53532 Harumi new order.scr.exe (PID: 4668)
    • Create files in the Startup directory

      • OP53532 Harumi new order.scr.exe (PID: 4668)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • OP53532 Harumi new order.scr.exe (PID: 4668)
    • Process uses IPCONFIG to discard the IP address configuration

      • cmd.exe (PID: 6576)
    • Starts CMD.EXE for commands execution

      • OP53532 Harumi new order.scr.exe (PID: 4668)
    • Process uses IPCONFIG to renew DHCP configuration

      • cmd.exe (PID: 7088)
    • Possibly patching Antimalware Scan Interface function (YARA)

      • OP53532 Harumi new order.scr.exe (PID: 4668)
    • Executes application which crashes

      • InstallUtil.exe (PID: 7064)
    • Executable content was dropped or overwritten

      • OP53532 Harumi new order.scr.exe (PID: 4668)
  • INFO

    • Disables trace logs

      • OP53532 Harumi new order.scr.exe (PID: 4668)
    • Reads the machine GUID from the registry

      • OP53532 Harumi new order.scr.exe (PID: 4668)
    • Process checks computer location settings

      • OP53532 Harumi new order.scr.exe (PID: 4668)
    • Creates files or folders in the user directory

      • OP53532 Harumi new order.scr.exe (PID: 4668)
      • WerFault.exe (PID: 628)
    • Checks proxy server information

      • OP53532 Harumi new order.scr.exe (PID: 4668)
      • WerFault.exe (PID: 628)
    • .NET Reactor protector has been detected

      • OP53532 Harumi new order.scr.exe (PID: 4668)
    • Checks supported languages

      • OP53532 Harumi new order.scr.exe (PID: 4668)
    • Reads the computer name

      • OP53532 Harumi new order.scr.exe (PID: 4668)
    • Reads the software policy settings

      • WerFault.exe (PID: 628)
    • Manual execution by a user

      • InstallUtil.exe (PID: 7064)
    • The process uses the downloaded file

      • OP53532 Harumi new order.scr.exe (PID: 4668)
    • Create files in a temporary directory

      • WerFault.exe (PID: 628)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (82.9)
.dll | Win32 Dynamic Link Library (generic) (7.4)
.exe | Win32 Executable (generic) (5.1)
.exe | Generic Win/DOS Executable (2.2)
.exe | DOS Executable Generic (2.2)

EXIF

EXE

AssemblyVersion: 1.0.0.0
ProductVersion: 1.0.0.0
ProductName: Rbmoqggf
OriginalFileName: Rbmoqggf.exe
LegalTrademarks: -
LegalCopyright: Copyright © 2017
InternalName: Rbmoqggf.exe
FileVersion: 1.0.0.0
FileDescription: Rbmoqggf
CompanyName: -
Comments: -
CharacterSet: Unicode
LanguageCode: Neutral
FileSubtype: -
ObjectFileType: Executable application
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x003f
ProductVersionNumber: 1.0.0.0
FileVersionNumber: 1.0.0.0
Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: -
OSVersion: 4
EntryPoint: 0x2f9e
UninitializedDataSize: -
InitializedDataSize: 217600
CodeSize: 4096
LinkerVersion: 8
PEType: PE32
ImageFileCharacteristics: Executable, 32-bit
TimeStamp: 2025:01:07 23:02:49+00:00
MachineType: Intel 386 or later, and compatibles
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
136
Monitored processes
10
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #PURECRYPTER op53532 harumi new order.scr.exe svchost.exe cmd.exe no specs conhost.exe no specs ipconfig.exe no specs installutil.exe cmd.exe no specs conhost.exe no specs ipconfig.exe no specs werfault.exe

Process information

PID
CMD
Path
Indicators
Parent process
4668"C:\Users\admin\AppData\Local\Temp\OP53532 Harumi new order.scr.exe" C:\Users\admin\AppData\Local\Temp\OP53532 Harumi new order.scr.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Rbmoqggf
Exit code:
4294967295
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\op53532 harumi new order.scr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
6576"C:\Windows\System32\cmd.exe" /c ipconfig /releaseC:\Windows\SysWOW64\cmd.exeOP53532 Harumi new order.scr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
6584\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6632ipconfig /releaseC:\Windows\SysWOW64\ipconfig.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
IP Configuration Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\ipconfig.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
7064"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
.NET Framework installation utility
Exit code:
3221225477
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\installutil.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
7088"C:\Windows\System32\cmd.exe" /c ipconfig /renewC:\Windows\SysWOW64\cmd.exeOP53532 Harumi new order.scr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
7096\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1328ipconfig /renewC:\Windows\SysWOW64\ipconfig.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
IP Configuration Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\ipconfig.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
628C:\WINDOWS\SysWOW64\WerFault.exe -u -p 7064 -s 12C:\Windows\SysWOW64\WerFault.exe
InstallUtil.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
Total events
4 574
Read events
4 560
Write events
14
Delete events
0

Modification events

(PID) Process:(4668) OP53532 Harumi new order.scr.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OP53532 Harumi new order_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4668) OP53532 Harumi new order.scr.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OP53532 Harumi new order_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(4668) OP53532 Harumi new order.scr.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OP53532 Harumi new order_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(4668) OP53532 Harumi new order.scr.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OP53532 Harumi new order_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(4668) OP53532 Harumi new order.scr.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OP53532 Harumi new order_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(4668) OP53532 Harumi new order.scr.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OP53532 Harumi new order_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(4668) OP53532 Harumi new order.scr.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OP53532 Harumi new order_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(4668) OP53532 Harumi new order.scr.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OP53532 Harumi new order_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4668) OP53532 Harumi new order.scr.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OP53532 Harumi new order_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(4668) OP53532 Harumi new order.scr.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\OP53532 Harumi new order_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
1
Suspicious files
4
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
628WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_bad_module_info_dcd3242e9fa4189184df4216daa4e4c7cdf1959_85207d7d_4cf03da6-16de-483f-8510-317c264b06ae\Report.wer
MD5:
SHA256:
4668OP53532 Harumi new order.scr.exeC:\Users\admin\AppData\Roaming\pdf.exeexecutable
MD5:CA2CB33B0542CDBA0673C3F0A81A2F7F
SHA256:F3FF932BD931EE266567CD0422A067FD38281164C534026B57D740658AA056C3
628WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FEbinary
MD5:08E99EB45D45E354406CD84AD028E581
SHA256:E8338C14130EFDAD3A8BD2CF52271292978C63A1B506A036168A1664DA5D9124
628WerFault.exeC:\Users\admin\AppData\Local\Temp\WER9724.tmp.WERDataCollectionStatus.txttext
MD5:23465F1F5F7FFB8BFA08B088FA9F4B45
SHA256:877C853E4E8354ED89FE92BF427D4FD38E869511692AAF8B9D402B77A5EA0883
628WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\37C951188967C8EB88D99893D9D191FEder
MD5:FA84E4BCC92AA5DB735AB50711040CDE
SHA256:6D7205E794FDE4219A62D9692ECDDF612663A5CF20399E79BE87B851FCA4CA33
628WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\21253908F3CB05D51B1C2DA8B681A785der
MD5:F6F53CD09A41E968C363419B279D3112
SHA256:6D2BB01CC7A9BADE2113B219CAC1BDA86B2733196B7E1BD0C807CE1E396B1892
628WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERA6E4.tmp.WERInternalMetadata.xmlxml
MD5:FCB2D9BB2A47168C2EAA07F8DD7CF862
SHA256:98EEC526F731639A64A4AF3B88B585D4F834773DED8F86FBF8AAD2389298AA67
628WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERA714.tmp.xmlxml
MD5:408806173606A74FEA86519E3F0AE28D
SHA256:500A83ABE50B2099C9ACE586825998312F6DE22E2D90C0EFAF8B2AFF2456CFDA
628WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\21253908F3CB05D51B1C2DA8B681A785binary
MD5:26682B8CAEC3B6D0731D7CBF41D35232
SHA256:8A2EF1CA4839D515493D225379144E9B6EDFB5B852D14D7679D60669657B1B49
4668OP53532 Harumi new order.scr.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\pdf.vbstext
MD5:2D383DEEF8B1F01DCCFFF30D1BA60B3B
SHA256:941AA62018213392AB38D6405F3EC156EF61B68BA1D3C826DEDC611420AD5BE9
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
35
DNS requests
22
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
628
WerFault.exe
GET
200
2.20.157.251:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
628
WerFault.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
5320
SIHClient.exe
GET
200
2.20.157.251:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.16.164.72:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.230.103:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5320
SIHClient.exe
GET
200
2.20.157.251:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4668
OP53532 Harumi new order.scr.exe
GET
200
173.252.167.60:80
http://hlag.cc/panel/uploads/Otecu.pdf
unknown
2100
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5340
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
2.16.164.72:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
184.30.230.103:80
www.microsoft.com
AKAMAI-AS
US
unknown
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
2.23.227.208:443
www.bing.com
Ooredoo Q.S.C.
QA
unknown
4668
OP53532 Harumi new order.scr.exe
173.252.167.60:80
hlag.cc
SRS-6-Z-7381
US
unknown
1176
svchost.exe
40.126.32.133:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.124.78.146
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 2.16.164.72
  • 2.16.164.49
  • 23.216.77.28
  • 23.216.77.6
whitelisted
www.microsoft.com
  • 184.30.230.103
  • 2.20.157.251
whitelisted
google.com
  • 142.250.185.174
whitelisted
www.bing.com
  • 2.23.227.208
  • 2.23.227.215
whitelisted
hlag.cc
  • 173.252.167.60
unknown
login.live.com
  • 40.126.32.133
  • 40.126.32.138
  • 40.126.32.134
  • 20.190.160.20
  • 20.190.160.22
  • 40.126.32.68
  • 40.126.32.72
  • 40.126.32.74
unknown
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 23.56.254.14
whitelisted
watson.events.data.microsoft.com
  • 20.189.173.21
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET DNS Query for .cc TLD
No debug info