File name:

STORMNET-MCSTORM-Client-main.zip

Full analysis: https://app.any.run/tasks/3cb67439-f509-4052-8b75-7944e7614a9d
Verdict: Malicious activity
Analysis date: December 07, 2024, 11:56:02
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
arch-scr
arch-doc
qrcode
arch-html
crypto-regex
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract, compression method=store
MD5:

02BA3395352F77293C9573B43092A046

SHA1:

38D59C8DAF26DA89C1A751C7F0B650CA421D0EE0

SHA256:

F75D58BF8DC036849AD1DD9523877C883E6CD2EF621ABB848E10FB904DDFDF94

SSDEEP:

49152:5L41NAL2lezVpJgBVZLCIvln2cuXb4AYTOvppzonx3l+HtwxSnCB1KMzKFB1KMzK:5+NxeDQpE9Xb4kpl4l+HyqCnKMzKFnK7

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 1228)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 6964)
    • Executes script using NodeJS

      • node.exe (PID: 6880)
      • node.exe (PID: 7072)
      • node.exe (PID: 1920)
    • Application launched itself

      • cmd.exe (PID: 6964)
    • Found regular expressions for crypto-addresses (YARA)

      • node.exe (PID: 7072)
    • Executable content was dropped or overwritten

      • node.exe (PID: 7072)
    • Connects to unusual port

      • node.exe (PID: 1920)
    • The executable file from the user directory is run by the CMD process

      • node.exe (PID: 6880)
  • INFO

    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 6760)
      • Taskmgr.exe (PID: 5572)
      • notepad.exe (PID: 6736)
    • Manual execution by a user

      • Taskmgr.exe (PID: 5572)
      • cmd.exe (PID: 6964)
      • Taskmgr.exe (PID: 4244)
      • notepad.exe (PID: 6760)
      • notepad.exe (PID: 6736)
    • Checks supported languages

      • curl.exe (PID: 7076)
      • mode.com (PID: 7032)
      • node.exe (PID: 6880)
      • node.exe (PID: 7072)
      • node.exe (PID: 1920)
      • tar.exe (PID: 3420)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 1228)
    • Execution of CURL command

      • cmd.exe (PID: 6964)
    • Reads the computer name

      • node.exe (PID: 7072)
      • node.exe (PID: 6880)
      • node.exe (PID: 1920)
      • curl.exe (PID: 7076)
    • Reads product name

      • node.exe (PID: 6880)
      • node.exe (PID: 7072)
      • node.exe (PID: 1920)
    • Reads Environment values

      • node.exe (PID: 6880)
      • node.exe (PID: 7072)
      • node.exe (PID: 1920)
    • Drops encrypted JS script (Microsoft Script Encoder)

      • node.exe (PID: 6880)
      • node.exe (PID: 7072)
    • Reads CPU info

      • node.exe (PID: 6880)
      • node.exe (PID: 7072)
    • Drops encrypted VBS script (Microsoft Script Encoder)

      • node.exe (PID: 6880)
      • node.exe (PID: 7072)
    • Creates files or folders in the user directory

      • node.exe (PID: 6880)
      • node.exe (PID: 7072)
    • Starts MODE.COM to configure console settings

      • mode.com (PID: 7032)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (36.3)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2023:04:29 13:25:32
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: STORMNET-MCSTORM-Client-main/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
146
Monitored processes
16
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe no specs rundll32.exe no specs cmd.exe no specs conhost.exe no specs mode.com no specs where.exe no specs curl.exe tar.exe no specs taskmgr.exe no specs taskmgr.exe notepad.exe no specs notepad.exe no specs cmd.exe no specs node.exe no specs node.exe node.exe

Process information

PID
CMD
Path
Indicators
Parent process
1228"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Downloads\STORMNET-MCSTORM-Client-main.zipC:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
1920"node-v18.16.0-win-x64/node" --no-deprecation --no-warnings index.jsC:\Users\admin\Downloads\STORMNET-MCSTORM-Client-main\STORMNET-MCSTORM-Client-main\node-v18.16.0-win-x64\node.exe
cmd.exe
User:
admin
Company:
Node.js
Integrity Level:
MEDIUM
Description:
Node.js JavaScript Runtime
Version:
18.16.0
Modules
Images
c:\users\admin\downloads\stormnet-mcstorm-client-main\stormnet-mcstorm-client-main\node-v18.16.0-win-x64\node.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\psapi.dll
c:\windows\system32\advapi32.dll
3420tar -xvf nodejs.zipC:\Windows\System32\tar.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
bsdtar archive tool
Exit code:
0
Version:
3.5.2 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\tar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\archiveint.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
4244"C:\WINDOWS\system32\taskmgr.exe" /0C:\Windows\System32\Taskmgr.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Manager
Exit code:
3221226540
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
5572"C:\WINDOWS\system32\taskmgr.exe" /0C:\Windows\System32\Taskmgr.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Manager
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
6736"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Downloads\STORMNET-MCSTORM-Client-main\STORMNET-MCSTORM-Client-main\links.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
6760"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Downloads\STORMNET-MCSTORM-Client-main\STORMNET-MCSTORM-Client-main\links.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
6828C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
6880"C:\Users\admin\Downloads\STORMNET-MCSTORM-Client-main\STORMNET-MCSTORM-Client-main\node-v18.16.0-win-x64\\node.exe" "C:\Users\admin\Downloads\STORMNET-MCSTORM-Client-main\STORMNET-MCSTORM-Client-main\node-v18.16.0-win-x64\\node_modules\npm\bin\npm-cli.js" prefix -gC:\Users\admin\Downloads\STORMNET-MCSTORM-Client-main\STORMNET-MCSTORM-Client-main\node-v18.16.0-win-x64\node.execmd.exe
User:
admin
Company:
Node.js
Integrity Level:
MEDIUM
Description:
Node.js JavaScript Runtime
Exit code:
0
Version:
18.16.0
Modules
Images
c:\users\admin\downloads\stormnet-mcstorm-client-main\stormnet-mcstorm-client-main\node-v18.16.0-win-x64\node.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
c:\windows\system32\psapi.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\advapi32.dll
6888C:\WINDOWS\system32\cmd.exe /c CALL "C:\Users\admin\Downloads\STORMNET-MCSTORM-Client-main\STORMNET-MCSTORM-Client-main\node-v18.16.0-win-x64\\node.exe" "C:\Users\admin\Downloads\STORMNET-MCSTORM-Client-main\STORMNET-MCSTORM-Client-main\node-v18.16.0-win-x64\\node_modules\npm\bin\npm-cli.js" prefix -gC:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
Total events
5 857
Read events
5 830
Write events
13
Delete events
14

Modification events

(PID) Process:(1228) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(1228) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(1228) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(1228) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Downloads\STORMNET-MCSTORM-Client-main.zip
(PID) Process:(1228) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1228) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1228) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1228) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1228) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:15
Value:
(PID) Process:(1228) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:14
Value:
Executable files
16
Suspicious files
1 793
Text files
1 049
Unknown types
6

Dropped files

PID
Process
Filename
Type
1228WinRAR.exeC:\Users\admin\Downloads\STORMNET-MCSTORM-Client-main\STORMNET-MCSTORM-Client-main\image\STORMNET-mcstorm.pngimage
MD5:0D46C0110DAC25A661D344A1E9FF6979
SHA256:898E9D6B058C1374A913128C3334A7CF9348757FB5C6AA7F0A9F278A4E6CDCE7
1228WinRAR.exeC:\Users\admin\Downloads\STORMNET-MCSTORM-Client-main\STORMNET-MCSTORM-Client-main\README.mdtext
MD5:05273554B70692DAA6EE5113849308E8
SHA256:AD897CBC509CE88EE28BE5ADC299DEBF7D2A5700A5CA48DAA7F431E27F3AD41E
1228WinRAR.exeC:\Users\admin\Downloads\STORMNET-MCSTORM-Client-main\STORMNET-MCSTORM-Client-main\image\cloudflare-flexible.pngimage
MD5:F2BBF6D56EEAA5B3EEAD7218C4A88592
SHA256:E78E2BB3E8092C572834E406E544B0B90712FBFA9378A7BBB1D82BCD94BF0F6B
1228WinRAR.exeC:\Users\admin\Downloads\STORMNET-MCSTORM-Client-main\STORMNET-MCSTORM-Client-main\.gitignoretext
MD5:062F69DE006B1CEEA4030EBCCDE94318
SHA256:E621783247596BD9EA493953CA3CF7644D69BFE5CBFFF25DD9B921C049F49D07
1228WinRAR.exeC:\Users\admin\Downloads\STORMNET-MCSTORM-Client-main\STORMNET-MCSTORM-Client-main\help.txttext
MD5:4F0DB8159D2433187A73ED40834FB355
SHA256:44A69C59FC4B03605E1012D76551853EE35EA569CA96ED0E155A0418CE5F2A65
1228WinRAR.exeC:\Users\admin\Downloads\STORMNET-MCSTORM-Client-main\STORMNET-MCSTORM-Client-main\logos\dyno-vs-knight.aftxttext
MD5:B957B283BBC211445B6873F16E2AD341
SHA256:4AB873FDA68DDFDC595C7DC3C263FCD30E0EE43C68157EA0A6C1B56AF74FAA6A
1228WinRAR.exeC:\Users\admin\Downloads\STORMNET-MCSTORM-Client-main\STORMNET-MCSTORM-Client-main\image\stresser-cloudflare.pngimage
MD5:C285CA8FF9C49870E733FAA967F95813
SHA256:0FD669CDE12604DCD1AEB3CFA0D152162CF33352BC5E62828BAA350E8A197C0D
1228WinRAR.exeC:\Users\admin\Downloads\STORMNET-MCSTORM-Client-main\STORMNET-MCSTORM-Client-main\links.txttext
MD5:B1809144D8E3725B729F248A9538300C
SHA256:BD92386DFBF17AB405703B5D6264D21AEFAE29A92C96B129D2B566F63B1C7B87
1228WinRAR.exeC:\Users\admin\Downloads\STORMNET-MCSTORM-Client-main\STORMNET-MCSTORM-Client-main\logos\drowning.aftxttext
MD5:B1C4CCA3533042DC6F2B04505352A108
SHA256:24ECA8D70987CC26EE61DE44AF5862EB5D1103C7553D9265FDA2B3F8F4B23B92
1228WinRAR.exeC:\Users\admin\Downloads\STORMNET-MCSTORM-Client-main\STORMNET-MCSTORM-Client-main\logos\cowsay.hwtxttext
MD5:6F2704800652B06AC25745202D679249
SHA256:90EE5EC7648DAEE6B63E346F1D660DEF875EE7976701E83B770C34A32469C892
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
57
DNS requests
25
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
2.16.164.106:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
760
lsass.exe
GET
200
104.18.38.233:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEDlyRDr5IrdR19NsEN0xNZU%3D
unknown
whitelisted
760
lsass.exe
GET
200
104.18.38.233:80
http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m%2FWqorSs9UgOHYm8Cd8rIDZssCEH1bUSa0droR23QWC7xTDac%3D
unknown
whitelisted
6284
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
760
lsass.exe
GET
200
172.64.149.23:80
http://ocsp.sectigo.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRDC9IOTxN6GmyRjyTl2n4yTUczyAQUjYxexFStiuF36Zv5mwXhuAGNYeECEHtre38rtwB7v4VMLyrxkVE%3D
unknown
whitelisted
1616
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1616
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2992
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.16.164.106:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
2.23.209.133:443
www.bing.com
Akamai International B.V.
GB
whitelisted
1176
svchost.exe
40.126.32.72:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
  • 40.127.240.158
whitelisted
google.com
  • 142.250.181.238
whitelisted
crl.microsoft.com
  • 2.16.164.106
  • 2.16.164.18
  • 2.16.164.97
  • 2.16.164.9
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted
www.bing.com
  • 2.23.209.133
  • 2.23.209.149
  • 2.23.209.187
  • 2.23.209.189
  • 2.23.209.177
  • 2.23.209.140
  • 2.23.209.130
  • 2.23.209.182
  • 2.23.209.179
whitelisted
login.live.com
  • 40.126.32.72
  • 20.190.160.14
  • 40.126.32.136
  • 20.190.160.22
  • 40.126.32.76
  • 40.126.32.68
  • 40.126.32.74
  • 40.126.32.138
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 23.32.186.57
whitelisted
nodejs.org
  • 104.20.22.46
  • 104.20.23.46
whitelisted
ocsp.comodoca.com
  • 104.18.38.233
  • 172.64.149.23
whitelisted

Threats

No threats detected
No debug info