File name:

BowlLicensed.exe

Full analysis: https://app.any.run/tasks/d45e4cdc-c30c-47f9-b538-06cf89baa69f
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: December 21, 2024, 06:06:37
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
autoit
telegram
stealer
autoit-loader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

1B31C291993985499CF544CC549E9028

SHA1:

068D213D11E48F8DDA5D90A96512B8101F29AD9E

SHA256:

F8615202EE1E9CCB7509F98C643B7BD6E01E439C57B78FD547CF96FD27EC5A47

SSDEEP:

49152:O2GaC2Iz6mefOck5zCXbC6GbkLrm00Oc1Po0BWare3ZLSh/JkMZJj3zOvNbb27OS:O2Gab9zjtoyrFcDWarCw/JFj3E9b2SOx

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • BowlLicensed.exe (PID: 6648)
    • AutoIt loader has been detected (YARA)

      • Procedures.com (PID: 5992)
    • Actions looks like stealing of personal data

      • Procedures.com (PID: 5992)
    • Steals credentials from Web Browsers

      • Procedures.com (PID: 5992)
    • Starts CMD.EXE for self-deleting

      • Procedures.com (PID: 5992)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • BowlLicensed.exe (PID: 6648)
      • Procedures.com (PID: 5992)
    • Executing commands from ".cmd" file

      • BowlLicensed.exe (PID: 6648)
    • Application launched itself

      • cmd.exe (PID: 6720)
    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 6720)
      • BowlLicensed.exe (PID: 6648)
      • Procedures.com (PID: 5992)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 6720)
    • Starts application with an unusual extension

      • cmd.exe (PID: 6720)
    • The executable file from the user directory is run by the CMD process

      • Procedures.com (PID: 5992)
    • Starts the AutoIt3 executable file

      • cmd.exe (PID: 6720)
    • Checks Windows Trust Settings

      • Procedures.com (PID: 5992)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • Procedures.com (PID: 5992)
    • Searches for installed software

      • Procedures.com (PID: 5992)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 6460)
  • INFO

    • Reads the computer name

      • BowlLicensed.exe (PID: 6648)
      • Procedures.com (PID: 5992)
      • identity_helper.exe (PID: 2124)
    • Create files in a temporary directory

      • BowlLicensed.exe (PID: 6648)
    • Process checks computer location settings

      • BowlLicensed.exe (PID: 6648)
      • Procedures.com (PID: 5992)
    • Checks supported languages

      • BowlLicensed.exe (PID: 6648)
      • Procedures.com (PID: 5992)
      • identity_helper.exe (PID: 2124)
    • The process uses the downloaded file

      • BowlLicensed.exe (PID: 6648)
      • Procedures.com (PID: 5992)
    • Creates a new folder

      • cmd.exe (PID: 7096)
    • Creates files in the program directory

      • Procedures.com (PID: 5992)
    • Reads mouse settings

      • Procedures.com (PID: 5992)
    • Checks proxy server information

      • Procedures.com (PID: 5992)
    • Reads the software policy settings

      • Procedures.com (PID: 5992)
    • Reads the machine GUID from the registry

      • Procedures.com (PID: 5992)
    • Reads product name

      • Procedures.com (PID: 5992)
    • Application launched itself

      • chrome.exe (PID: 1804)
      • msedge.exe (PID: 6060)
    • Creates files or folders in the user directory

      • Procedures.com (PID: 5992)
    • Reads Environment values

      • Procedures.com (PID: 5992)
      • identity_helper.exe (PID: 2124)
    • Reads CPU info

      • Procedures.com (PID: 5992)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2012:02:24 19:20:04+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 10
CodeSize: 29696
InitializedDataSize: 792064
UninitializedDataSize: 16896
EntryPoint: 0x38af
OSVersion: 5
ImageVersion: 6
SubsystemVersion: 5
Subsystem: Windows GUI
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
173
Monitored processes
42
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start bowllicensed.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs procedures.com choice.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs cmd.exe no specs conhost.exe no specs timeout.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
308"C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.59\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=5940 --field-trial-handle=2448,i,3876882112931138645,2828332254103322223,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.59\identity_helper.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
PWA Identity Proxy Host
Exit code:
3221226029
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\identity_helper.exe
c:\windows\system32\ntdll.dll
1192"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6604 --field-trial-handle=2448,i,3876882112931138645,2828332254103322223,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
1344"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=2764 --field-trial-handle=2448,i,3876882112931138645,2828332254103322223,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
1348"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6244 --field-trial-handle=2448,i,3876882112931138645,2828332254103322223,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
1556"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --extension-process --renderer-sub-type=extension --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4040 --field-trial-handle=2448,i,3876882112931138645,2828332254103322223,262144 --variations-seed-version /prefetch:2C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1804"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"C:\Program Files\Google\Chrome\Application\chrome.exe
Procedures.com
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
2124"C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.59\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=5940 --field-trial-handle=2448,i,3876882112931138645,2828332254103322223,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.59\identity_helper.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
PWA Identity Proxy Host
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\identity_helper.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
2152"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6388 --field-trial-handle=2448,i,3876882112931138645,2828332254103322223,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
2600"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=4196 --field-trial-handle=2448,i,3876882112931138645,2828332254103322223,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
2600"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6132 --field-trial-handle=2448,i,3876882112931138645,2828332254103322223,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
Total events
7 916
Read events
7 893
Write events
23
Delete events
0

Modification events

(PID) Process:(5992) Procedures.comKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(5992) Procedures.comKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(5992) Procedures.comKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(1804) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(1804) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(1804) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(1804) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(1804) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(6060) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(6060) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
Executable files
30
Suspicious files
302
Text files
112
Unknown types
2

Dropped files

PID
Process
Filename
Type
6648BowlLicensed.exeC:\Users\admin\AppData\Local\Temp\Imaginationbinary
MD5:F87E02324242F1CA95FEDBA37CAA7F29
SHA256:6D089A79D61945744FDD931C131068B2E2ACCA8721DF0D26D9D797957D88B0E0
6648BowlLicensed.exeC:\Users\admin\AppData\Local\Temp\Handjobsbinary
MD5:04915E6EFC00606817E44B785E0FC040
SHA256:176CDBDB7708CE1F761AF3EB1F33B66627B52D6C48BE213C6596DBCE68731F3A
6648BowlLicensed.exeC:\Users\admin\AppData\Local\Temp\Flyingbinary
MD5:EBAFAFE47265312CC96968BB58945199
SHA256:9C0CE1E70AF52572D22685F85E9F2D75EB9D4C1CE8E82EA71C4A644B9E0927BA
6648BowlLicensed.exeC:\Users\admin\AppData\Local\Temp\Transparencybinary
MD5:E88A09FD9D9939BB263A692F5C2AC5BF
SHA256:B896CA8A3F7D9EF0D96B8193BFA66EDBAE86BBA71AE05123E50BFE858CD02F66
6648BowlLicensed.exeC:\Users\admin\AppData\Local\Temp\Eaglebinary
MD5:208ACEF2DFC4E230B25B4B4A0673FFE1
SHA256:152D7CCB9A28B79D9C29077330ED61C34BAD168C4B0BACBE16907D90A2046A65
6648BowlLicensed.exeC:\Users\admin\AppData\Local\Temp\Buyersbinary
MD5:03A413E3C0F468A8DAFF75C079A6E00E
SHA256:28EF2EF007A8F2FA7648EDD51C6FBBEEB98725F5D6450900A4735AD228A3903F
6648BowlLicensed.exeC:\Users\admin\AppData\Local\Temp\Divinebinary
MD5:FF2CE214D200D352C7D04800B152BC2E
SHA256:311655E9C9BF8035F60D9E762C3C95D264232BFD96855E793402A5B5F4D5A13A
6648BowlLicensed.exeC:\Users\admin\AppData\Local\Temp\Nightimage
MD5:9C30E32FFCE2AA493EF4238A2BA1FDAF
SHA256:55E244354B1483FC405522D97EDE1C752C6B8F288A17D4FF32CB410C6ED48404
6648BowlLicensed.exeC:\Users\admin\AppData\Local\Temp\Brochurebinary
MD5:6C1AEE29BD7F5710593402D1C6FC2142
SHA256:B869F6B200ABFF5542721F7CCDC87BB01CDBC31102956DCAA7E46C552D5B982E
6648BowlLicensed.exeC:\Users\admin\AppData\Local\Temp\Ronbinary
MD5:3072F9007A0EC1D4F38505C4053581F4
SHA256:0A48E97F5221173353BC56E28BA0BFE5D9037DC71DD0DF6B0647E6B8C7D104BC
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
121
DNS requests
85
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
23.216.77.36:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.19.217.218:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5460
SIHClient.exe
GET
200
2.19.217.218:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5992
Procedures.com
GET
200
95.100.146.41:80
http://e6.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBTUejiAQejpjQc4fOz2ttjyD6VkMQQUDcXM%2FZvuFAWhTDCCpT5eisNYCdICEgRLcqaR3nQOgDt8tUbpDru26Q%3D%3D
unknown
whitelisted
5460
SIHClient.exe
GET
200
2.19.217.218:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6528
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
2892
svchost.exe
GET
200
2.19.217.103:80
http://x1.c.lencr.org/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
23.216.77.36:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
2.19.217.218:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
23.212.110.162:443
www.bing.com
Akamai International B.V.
CZ
whitelisted
5064
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
192.168.100.255:138
whitelisted
184.30.17.189:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted
40.126.32.74:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 23.216.77.36
  • 23.216.77.35
  • 23.216.77.32
unknown
www.microsoft.com
  • 2.19.217.218
whitelisted
google.com
  • 142.250.185.142
whitelisted
www.bing.com
  • 23.212.110.162
  • 23.212.110.169
  • 23.212.110.163
  • 23.212.110.171
  • 23.212.110.152
  • 23.212.110.176
  • 23.212.110.177
  • 23.212.110.154
  • 23.212.110.144
  • 23.212.110.184
  • 23.212.110.208
  • 23.212.110.178
  • 23.212.110.168
  • 23.212.110.187
  • 23.212.110.209
  • 23.212.110.161
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 184.30.17.189
whitelisted
login.live.com
  • 40.126.32.74
  • 40.126.32.138
  • 20.190.160.14
  • 20.190.160.17
  • 40.126.32.72
  • 40.126.32.76
  • 20.190.160.20
  • 40.126.32.134
whitelisted
ZWVyoKcTcBhhzV.ZWVyoKcTcBhhzV
unknown
arc.msn.com
  • 20.199.58.43
whitelisted

Threats

PID
Process
Class
Message
5992
Procedures.com
Misc activity
ET INFO Observed Telegram Domain (t .me in TLS SNI)
1 ETPRO signatures available at the full report
No debug info