File name:

IMPORTANT.exe

Full analysis: https://app.any.run/tasks/4b0edba7-d72c-4af5-8741-6ee7f4bff94c
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: May 17, 2025, 15:12:37
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto-reg
auto-startup
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 19 sections
MD5:

2A3BD4DA1E262782D08BF6BE61EB1102

SHA1:

0D76B50D96DB3AFF8964FC5AD12FF9FB0733C5CC

SHA256:

462178BCFDA5811D9769AC091CB6FC7E8435E63F6CFC2F900E26B8808C8E4F58

SSDEEP:

49152:npdwqe0KtlO4jvWvJK3Pamxu239sG5GsGbvB:nxzG5GsGbvB

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Modifies files in the Chrome extension folder

      • IMPORTANT.exe (PID: 7972)
    • Actions looks like stealing of personal data

      • IMPORTANT.exe (PID: 7884)
      • IMPORTANT.exe (PID: 7972)
    • Changes the autorun value in the registry

      • IMPORTANT.exe (PID: 7972)
      • IMPORTANT.exe (PID: 8052)
      • IMPORTANT.exe (PID: 7884)
      • IMPORTANT.exe (PID: 8160)
    • Create files in the Startup directory

      • IMPORTANT.exe (PID: 7884)
  • SUSPICIOUS

    • Reads the date of Windows installation

      • IMPORTANT.exe (PID: 7764)
    • Executable content was dropped or overwritten

      • IMPORTANT.exe (PID: 7884)
    • Reads security settings of Internet Explorer

      • IMPORTANT.exe (PID: 7764)
    • Application launched itself

      • IMPORTANT.exe (PID: 7764)
      • IMPORTANT.exe (PID: 7012)
      • IMPORTANT.exe (PID: 7576)
  • INFO

    • Reads the computer name

      • IMPORTANT.exe (PID: 7764)
    • Checks supported languages

      • IMPORTANT.exe (PID: 7884)
      • IMPORTANT.exe (PID: 7972)
      • IMPORTANT.exe (PID: 8052)
      • IMPORTANT.exe (PID: 7764)
      • IMPORTANT.exe (PID: 8160)
    • Creates files or folders in the user directory

      • IMPORTANT.exe (PID: 7884)
      • IMPORTANT.exe (PID: 7972)
      • IMPORTANT.exe (PID: 8052)
    • Auto-launch of the file from Startup directory

      • IMPORTANT.exe (PID: 7884)
    • Auto-launch of the file from Registry key

      • IMPORTANT.exe (PID: 7884)
      • IMPORTANT.exe (PID: 8052)
      • IMPORTANT.exe (PID: 7972)
      • IMPORTANT.exe (PID: 8160)
    • Process checks computer location settings

      • IMPORTANT.exe (PID: 7764)
    • Reads the machine GUID from the registry

      • IMPORTANT.exe (PID: 7972)
      • IMPORTANT.exe (PID: 8052)
      • IMPORTANT.exe (PID: 7884)
      • IMPORTANT.exe (PID: 8160)
    • Creates files in the program directory

      • IMPORTANT.exe (PID: 8052)
      • IMPORTANT.exe (PID: 8160)
      • IMPORTANT.exe (PID: 7972)
      • IMPORTANT.exe (PID: 7884)
    • Manual execution by a user

      • IMPORTANT.exe (PID: 7012)
      • OpenWith.exe (PID: 8144)
      • OpenWith.exe (PID: 4428)
      • OpenWith.exe (PID: 6820)
      • OpenWith.exe (PID: 6824)
      • OpenWith.exe (PID: 664)
      • OpenWith.exe (PID: 5172)
      • OpenWith.exe (PID: 8300)
      • OpenWith.exe (PID: 8476)
      • OpenWith.exe (PID: 8484)
      • OpenWith.exe (PID: 5116)
      • OpenWith.exe (PID: 8660)
      • OpenWith.exe (PID: 8392)
      • OpenWith.exe (PID: 8400)
      • OpenWith.exe (PID: 8704)
      • OpenWith.exe (PID: 8588)
      • OpenWith.exe (PID: 8752)
      • OpenWith.exe (PID: 8572)
      • OpenWith.exe (PID: 8580)
      • OpenWith.exe (PID: 8720)
      • OpenWith.exe (PID: 8812)
      • OpenWith.exe (PID: 8820)
      • OpenWith.exe (PID: 8984)
      • OpenWith.exe (PID: 9088)
      • OpenWith.exe (PID: 5720)
      • OpenWith.exe (PID: 9012)
      • OpenWith.exe (PID: 2504)
      • OpenWith.exe (PID: 3676)
      • OpenWith.exe (PID: 8376)
      • OpenWith.exe (PID: 7980)
      • OpenWith.exe (PID: 632)
      • OpenWith.exe (PID: 8596)
      • OpenWith.exe (PID: 8972)
      • OpenWith.exe (PID: 7884)
      • OpenWith.exe (PID: 8328)
      • OpenWith.exe (PID: 9220)
      • OpenWith.exe (PID: 3192)
      • OpenWith.exe (PID: 9240)
      • OpenWith.exe (PID: 10060)
      • OpenWith.exe (PID: 9928)
      • OpenWith.exe (PID: 6592)
      • OpenWith.exe (PID: 10080)
      • OpenWith.exe (PID: 8296)
      • OpenWith.exe (PID: 7920)
      • OpenWith.exe (PID: 9340)
      • OpenWith.exe (PID: 8532)
      • OpenWith.exe (PID: 10880)
      • OpenWith.exe (PID: 10624)
      • OpenWith.exe (PID: 9872)
      • IMPORTANT.exe (PID: 7576)
      • OpenWith.exe (PID: 10896)
      • OpenWith.exe (PID: 10888)
      • OpenWith.exe (PID: 10928)
      • OpenWith.exe (PID: 8100)
      • OpenWith.exe (PID: 10640)
      • OpenWith.exe (PID: 5528)
      • OpenWith.exe (PID: 7204)
      • OpenWith.exe (PID: 6828)
      • OpenWith.exe (PID: 10116)
      • OpenWith.exe (PID: 8688)
      • OpenWith.exe (PID: 10064)
      • OpenWith.exe (PID: 10668)
      • OpenWith.exe (PID: 7180)
      • OpenWith.exe (PID: 5728)
      • OpenWith.exe (PID: 5576)
      • OpenWith.exe (PID: 8540)
      • OpenWith.exe (PID: 5800)
      • OpenWith.exe (PID: 5452)
      • OpenWith.exe (PID: 8888)
      • OpenWith.exe (PID: 8432)
      • OpenWith.exe (PID: 9920)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:05:17 15:09:19+00:00
ImageFileCharacteristics: Executable, No line numbers, Large address aware
PEType: PE32+
LinkerVersion: 2.41
CodeSize: 859136
InitializedDataSize: 1084416
UninitializedDataSize: 3584
EntryPoint: 0x13e0
OSVersion: 4
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
354
Monitored processes
152
Malicious processes
3
Suspicious processes
2

Behavior graph

Click at the process to see the details
start important.exe no specs important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe no specs important.exe no specs important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe slui.exe important.exe important.exe important.exe important.exe openwith.exe no specs openwith.exe no specs openwith.exe no specs important.exe openwith.exe no specs openwith.exe no specs openwith.exe no specs important.exe openwith.exe no specs important.exe openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs important.exe openwith.exe no specs important.exe openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs important.exe openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs important.exe important.exe openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs important.exe important.exe important.exe openwith.exe no specs important.exe openwith.exe no specs openwith.exe no specs openwith.exe no specs important.exe openwith.exe no specs important.exe openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs important.exe important.exe important.exe openwith.exe no specs important.exe openwith.exe no specs openwith.exe no specs openwith.exe no specs important.exe openwith.exe no specs openwith.exe no specs important.exe important.exe important.exe openwith.exe no specs openwith.exe no specs important.exe openwith.exe no specs openwith.exe no specs openwith.exe no specs important.exe important.exe important.exe important.exe important.exe

Process information

PID
CMD
Path
Indicators
Parent process
516"C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMPORTANT.exe" C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMPORTANT.exe
IMPORTANT.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\important.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
632"C:\WINDOWS\System32\OpenWith.exe" C:\Users\admin\Downloads\pressureperhaps.png.enc.enc.enc.enc.enc.enc.encC:\Windows\System32\OpenWith.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
664"C:\WINDOWS\System32\OpenWith.exe" C:\Users\admin\Downloads\hotiii.png.enc.enc.encC:\Windows\System32\OpenWith.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
668"C:\Users\admin\Desktop\IMPORTANT.exe" C:\Users\admin\Desktop\IMPORTANT.exe
IMPORTANT.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\important.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
904"C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMPORTANT.exe" C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMPORTANT.exe
IMPORTANT.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\important.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
920"C:\Users\admin\Desktop\IMPORTANT.exe" C:\Users\admin\Desktop\IMPORTANT.exe
IMPORTANT.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\important.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1116"C:\Users\admin\Desktop\IMPORTANT.exe" C:\Users\admin\Desktop\IMPORTANT.exe
IMPORTANT.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\important.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1244"C:\Users\admin\Desktop\IMPORTANT.exe" C:\Users\admin\Desktop\IMPORTANT.exe
IMPORTANT.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\important.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1324"C:\Users\admin\Desktop\IMPORTANT.exe" C:\Users\admin\Desktop\IMPORTANT.exe
IMPORTANT.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\important.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1812"C:\Users\admin\AppData\Roaming\IMPORTANT.exe" C:\Users\admin\AppData\Roaming\IMPORTANT.exe
IMPORTANT.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\roaming\important.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
374 676
Read events
374 664
Write events
12
Delete events
0

Modification events

(PID) Process:(7884) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(7972) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(8052) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(8160) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(2320) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(7312) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(7340) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(6108) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(7200) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(3240) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
Executable files
29
Suspicious files
4 686
Text files
7
Unknown types
0

Dropped files

PID
Process
Filename
Type
7884IMPORTANT.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMPORTANT.exeexecutable
MD5:2A3BD4DA1E262782D08BF6BE61EB1102
SHA256:462178BCFDA5811D9769AC091CB6FC7E8435E63F6CFC2F900E26B8808C8E4F58
7884IMPORTANT.exeC:\Users\admin\AppData\Local\ElevatedDiagnostics\3243677927\2021090614.000\results.xml.encbinary
MD5:841F169063BECC71F71E022EAD603268
SHA256:E708E849E91B7AFA2A38032604E6A7A0C638AB1ABC554931C7E89E0B5054D7CC
7884IMPORTANT.exeC:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\IECompatData\iecompatdata.xml.encbinary
MD5:536E43034C805B485EAD262EEBF4E6AC
SHA256:5BD79E215CFA7F7662BE89C1BABA07DC47626DF5ED48B2CCE0CD1AB81B860777
7884IMPORTANT.exeC:\ProgramData\Microsoft\ClickToRun\DeploymentConfig.0.xml.encbinary
MD5:A58EB2F000EBDEE460B871812917AFB4
SHA256:B8804FD43182464826F548907F0768253A018125D56557E884A58D59AD151564
7884IMPORTANT.exeC:\Users\admin\AppData\Roaming\IMPORTANT.exeexecutable
MD5:2A3BD4DA1E262782D08BF6BE61EB1102
SHA256:462178BCFDA5811D9769AC091CB6FC7E8435E63F6CFC2F900E26B8808C8E4F58
7884IMPORTANT.exeC:\Users\Default\AppData\Local\Microsoft\Windows\Shell\DefaultLayouts.xml.encbinary
MD5:6C46802371AECF9F0F1D8C22D375F3F8
SHA256:A7642BE31670843CD1567DADD3A7BA22F8B9B3050DE8801DC8FF348F22056CBD
7884IMPORTANT.exeC:\Users\Public\Desktop\Adobe Acrobat.lnk.encbinary
MD5:C4429AC73A23F2EFD414F5E0460A4DEB
SHA256:FC127528B7052DBBB7BAED78ECD9BDA0B94B2D64AAC245FEC8B6F6890B08D2CF
7884IMPORTANT.exeC:\Users\Public\Desktop\CCleaner.lnk.encbinary
MD5:312C4D3731CD3BD114E0B83BE25A0CFD
SHA256:945340CFEC88E703E5C088BC4FD0EB633A45F52518A150323D26CC7B24B1E23E
7884IMPORTANT.exeC:\Users\Public\Desktop\Firefox.lnk.encbinary
MD5:716FD56060CACC7133C692528EFCB630
SHA256:D5D1B5CE93126101F57BB024851D24F90F40AA4E7C8C428CFF4042117E800764
7884IMPORTANT.exeC:\ProgramData\Microsoft\ClickToRun\MachineData\Catalog\Packages\{9AC08E99-230B-47E8-9721-4577B7F124EA}\{1A8308C7-90D1-4200-B16E-646F163A08E8}\DeploymentConfiguration.xml.encbinary
MD5:109196238E8904A1287C81693AF4C069
SHA256:5867421954C587A67FE4065A2F5605F4FD5800C1E48F50B7558579ECCD1B3AC8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
44
DNS requests
14
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2984
SIHClient.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
2984
SIHClient.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2984
SIHClient.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
2984
SIHClient.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2984
SIHClient.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
2984
SIHClient.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
2984
SIHClient.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
whitelisted
2984
SIHClient.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
2984
SIHClient.exe
52.149.20.212:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2984
SIHClient.exe
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2984
SIHClient.exe
69.192.161.161:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
7404
slui.exe
20.83.72.98:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2984
SIHClient.exe
20.3.187.198:443
fe3cr.delivery.mp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.104.136.2
whitelisted
google.com
  • 142.250.185.78
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
crl.microsoft.com
  • 23.216.77.28
  • 23.216.77.36
  • 23.216.77.19
  • 23.216.77.42
  • 23.216.77.8
  • 23.216.77.20
  • 23.216.77.30
whitelisted
www.microsoft.com
  • 69.192.161.161
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted
nexusrules.officeapps.live.com
  • 52.111.236.23
whitelisted
login.live.com
  • 20.190.160.14
  • 20.190.160.128
  • 20.190.160.67
  • 40.126.32.140
  • 20.190.160.3
  • 40.126.32.68
  • 40.126.32.138
  • 20.190.160.65
whitelisted

Threats

No threats detected
No debug info