File name:

00acf5d0db7ef50140dae7a3482d9db80704ec98670bd1607e76c99382a4888c

Full analysis: https://app.any.run/tasks/01724db3-21f0-419f-9b27-6f82ea6e1cbf
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: January 25, 2025, 16:15:15
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
auto
stealer
rustystealer
rust
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (console) x86-64, for MS Windows, 5 sections
MD5:

73744280FB8E7DB578C9303B7620FB16

SHA1:

082258D125F9FB3EA080DA1B1FA86BF0A0302CD8

SHA256:

00ACF5D0DB7EF50140DAE7A3482D9DB80704EC98670BD1607E76C99382A4888C

SSDEEP:

98304:RKL1TllrgWqFDhg44Y/f3EhOqlk3znVHM3OU4YBY:dR

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • RUSTYSTEALER has been found (auto)

      • 00acf5d0db7ef50140dae7a3482d9db80704ec98670bd1607e76c99382a4888c.exe (PID: 6344)
      • 00acf5d0db7ef50140dae7a3482d9db80704ec98670bd1607e76c99382a4888c.exe (PID: 6808)
    • Changes powershell execution policy (Bypass)

      • 00acf5d0db7ef50140dae7a3482d9db80704ec98670bd1607e76c99382a4888c.exe (PID: 6808)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 7076)
    • Changes settings for real-time protection

      • powershell.exe (PID: 7044)
  • SUSPICIOUS

    • Starts NET.EXE to display or manage information about active sessions

      • 00acf5d0db7ef50140dae7a3482d9db80704ec98670bd1607e76c99382a4888c.exe (PID: 6344)
      • net.exe (PID: 6424)
      • 00acf5d0db7ef50140dae7a3482d9db80704ec98670bd1607e76c99382a4888c.exe (PID: 6808)
      • net.exe (PID: 6904)
    • Get information on the list of running processes

      • 00acf5d0db7ef50140dae7a3482d9db80704ec98670bd1607e76c99382a4888c.exe (PID: 6808)
    • Script disables Windows Defender's real-time protection

      • 00acf5d0db7ef50140dae7a3482d9db80704ec98670bd1607e76c99382a4888c.exe (PID: 6808)
    • Starts POWERSHELL.EXE for commands execution

      • 00acf5d0db7ef50140dae7a3482d9db80704ec98670bd1607e76c99382a4888c.exe (PID: 6344)
      • 00acf5d0db7ef50140dae7a3482d9db80704ec98670bd1607e76c99382a4888c.exe (PID: 6808)
    • Uses WEVTUTIL.EXE to change log configuration

      • powershell.exe (PID: 7052)
      • powershell.exe (PID: 7060)
    • Starts process via Powershell

      • powershell.exe (PID: 6472)
    • Executable content was dropped or overwritten

      • 00acf5d0db7ef50140dae7a3482d9db80704ec98670bd1607e76c99382a4888c.exe (PID: 6808)
    • Creates file in the systems drive root

      • 00acf5d0db7ef50140dae7a3482d9db80704ec98670bd1607e76c99382a4888c.exe (PID: 6808)
  • INFO

    • Checks supported languages

      • 00acf5d0db7ef50140dae7a3482d9db80704ec98670bd1607e76c99382a4888c.exe (PID: 6344)
      • 00acf5d0db7ef50140dae7a3482d9db80704ec98670bd1607e76c99382a4888c.exe (PID: 6808)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 7044)
    • Checks proxy server information

      • 00acf5d0db7ef50140dae7a3482d9db80704ec98670bd1607e76c99382a4888c.exe (PID: 6808)
    • Create files in a temporary directory

      • 00acf5d0db7ef50140dae7a3482d9db80704ec98670bd1607e76c99382a4888c.exe (PID: 6808)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 7044)
    • The executable file from the user directory is run by the Powershell process

      • 00acf5d0db7ef50140dae7a3482d9db80704ec98670bd1607e76c99382a4888c.exe (PID: 6808)
    • Reads the computer name

      • 00acf5d0db7ef50140dae7a3482d9db80704ec98670bd1607e76c99382a4888c.exe (PID: 6808)
    • Manual execution by a user

      • mspaint.exe (PID: 6964)
    • Reads the software policy settings

      • 00acf5d0db7ef50140dae7a3482d9db80704ec98670bd1607e76c99382a4888c.exe (PID: 6808)
    • Application based on Rust

      • 00acf5d0db7ef50140dae7a3482d9db80704ec98670bd1607e76c99382a4888c.exe (PID: 6808)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:01:06 20:27:05+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.42
CodeSize: 3656704
InitializedDataSize: 1826816
UninitializedDataSize: -
EntryPoint: 0x36bc0c
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
147
Monitored processes
17
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start 00acf5d0db7ef50140dae7a3482d9db80704ec98670bd1607e76c99382a4888c.exe no specs conhost.exe no specs net.exe no specs net1.exe no specs powershell.exe no specs #RUSTYSTEALER 00acf5d0db7ef50140dae7a3482d9db80704ec98670bd1607e76c99382a4888c.exe conhost.exe no specs net.exe no specs net1.exe no specs tasklist.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs powershell.exe no specs wevtutil.exe no specs wevtutil.exe no specs mspaint.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4764"C:\WINDOWS\system32\wevtutil.exe" sl Application /e:falseC:\Windows\System32\wevtutil.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Eventing Command Line Utility
Exit code:
87
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\wevtutil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\combase.dll
c:\windows\system32\sechost.dll
5604"C:\WINDOWS\system32\wevtutil.exe" sl Security /e:falseC:\Windows\System32\wevtutil.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Eventing Command Line Utility
Exit code:
87
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\wevtutil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\combase.dll
c:\windows\system32\sechost.dll
6344"C:\Users\admin\AppData\Local\Temp\00acf5d0db7ef50140dae7a3482d9db80704ec98670bd1607e76c99382a4888c.exe" C:\Users\admin\AppData\Local\Temp\00acf5d0db7ef50140dae7a3482d9db80704ec98670bd1607e76c99382a4888c.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\00acf5d0db7ef50140dae7a3482d9db80704ec98670bd1607e76c99382a4888c.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
6352\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exe00acf5d0db7ef50140dae7a3482d9db80704ec98670bd1607e76c99382a4888c.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6424"net" sessionC:\Windows\System32\net.exe00acf5d0db7ef50140dae7a3482d9db80704ec98670bd1607e76c99382a4888c.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\net.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6444C:\WINDOWS\system32\net1 sessionC:\Windows\System32\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\net1.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\netutils.dll
c:\windows\system32\samcli.dll
6472"powershell" -Command "Start-Process -FilePath \"C:\Users\admin\AppData\Local\Temp\00acf5d0db7ef50140dae7a3482d9db80704ec98670bd1607e76c99382a4888c.exe\" -Verb RunAs"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe00acf5d0db7ef50140dae7a3482d9db80704ec98670bd1607e76c99382a4888c.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
6808"C:\Users\admin\AppData\Local\Temp\00acf5d0db7ef50140dae7a3482d9db80704ec98670bd1607e76c99382a4888c.exe" C:\Users\admin\AppData\Local\Temp\00acf5d0db7ef50140dae7a3482d9db80704ec98670bd1607e76c99382a4888c.exe
powershell.exe
User:
admin
Integrity Level:
HIGH
Exit code:
3221225786
Modules
Images
c:\users\admin\appdata\local\temp\00acf5d0db7ef50140dae7a3482d9db80704ec98670bd1607e76c99382a4888c.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
6816\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exe00acf5d0db7ef50140dae7a3482d9db80704ec98670bd1607e76c99382a4888c.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6904"net" sessionC:\Windows\System32\net.exe00acf5d0db7ef50140dae7a3482d9db80704ec98670bd1607e76c99382a4888c.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Net Command
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\net.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\wkscli.dll
Total events
22 689
Read events
22 660
Write events
28
Delete events
1

Modification events

(PID) Process:(6964) mspaint.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\View
Operation:writeName:WindowPlacement
Value:
2C00000000000000010000000000000000000000FFFFFFFFFFFFFFFF7F000000470000007F04000087020000
(PID) Process:(6964) mspaint.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\View
Operation:writeName:ShowThumbnail
Value:
0
(PID) Process:(6964) mspaint.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\View
Operation:writeName:BMPWidth
Value:
0
(PID) Process:(6964) mspaint.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\View
Operation:writeName:BMPHeight
Value:
0
(PID) Process:(6964) mspaint.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\View
Operation:writeName:ThumbXPos
Value:
0
(PID) Process:(6964) mspaint.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\View
Operation:writeName:ThumbYPos
Value:
0
(PID) Process:(6964) mspaint.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\View
Operation:writeName:ThumbWidth
Value:
0
(PID) Process:(6964) mspaint.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\View
Operation:writeName:ThumbHeight
Value:
0
(PID) Process:(6964) mspaint.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\View
Operation:writeName:UnitSetting
Value:
0
(PID) Process:(6964) mspaint.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Applets\Paint\View
Operation:writeName:ShowRulers
Value:
0
Executable files
1
Suspicious files
10
Text files
12
Unknown types
0

Dropped files

PID
Process
Filename
Type
7044powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_me205klb.1qk.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6472powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:E2A448FB3FE154CF405D1DD1F2772072
SHA256:BCAF61967051FFB080D6CC5562B2CD015F6C25766E79C2FCF865D6EA8990F7E4
6472powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_moqsjorp.ia2.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
7052powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_yszcfwh0.cng.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
7076powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_micqenwp.3xk.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
7076powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_ba5mrxff.tc3.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
7060powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_n0gpz5yf.l20.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
680800acf5d0db7ef50140dae7a3482d9db80704ec98670bd1607e76c99382a4888c.exeC:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1000\desktop.ini.funksecbinary
MD5:051F886ED75978946E53D1D58862347A
SHA256:3A62FD8509B96AC31FCAE0254F9F8028ECBD0CD44064B66C69FE90392CD07957
6472powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_i30vjqxi.tnz.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
7052powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_wxhyeu22.pa4.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
33
DNS requests
19
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
2624
SIHClient.exe
GET
200
23.37.237.227:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6152
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
2624
SIHClient.exe
GET
200
23.37.237.227:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
2.23.227.215:443
www.bing.com
Ooredoo Q.S.C.
QA
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
1176
svchost.exe
40.126.31.67:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1076
svchost.exe
184.28.89.167:443
go.microsoft.com
AKAMAI-AS
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.104.136.2
  • 40.127.240.158
whitelisted
www.bing.com
  • 2.23.227.215
  • 2.23.227.208
whitelisted
crl.microsoft.com
  • 2.16.241.12
  • 2.16.241.19
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 23.37.237.227
whitelisted
google.com
  • 142.250.184.206
whitelisted
login.live.com
  • 40.126.31.67
  • 20.190.159.68
  • 40.126.31.71
  • 20.190.159.0
  • 20.190.159.4
  • 40.126.31.73
  • 20.190.159.75
  • 20.190.159.71
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
i.imgur.com
  • 199.232.196.193
  • 199.232.192.193
shared
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted

Threats

PID
Process
Class
Message
2192
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Image Sharing Service (imgur.com)
No debug info