File name:

IMPORTANT.exe

Full analysis: https://app.any.run/tasks/4b0edba7-d72c-4af5-8741-6ee7f4bff94c
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: May 17, 2025, 15:12:37
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto-reg
auto-startup
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 19 sections
MD5:

2A3BD4DA1E262782D08BF6BE61EB1102

SHA1:

0D76B50D96DB3AFF8964FC5AD12FF9FB0733C5CC

SHA256:

462178BCFDA5811D9769AC091CB6FC7E8435E63F6CFC2F900E26B8808C8E4F58

SSDEEP:

49152:npdwqe0KtlO4jvWvJK3Pamxu239sG5GsGbvB:nxzG5GsGbvB

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • IMPORTANT.exe (PID: 7884)
    • Changes the autorun value in the registry

      • IMPORTANT.exe (PID: 7884)
      • IMPORTANT.exe (PID: 8052)
      • IMPORTANT.exe (PID: 7972)
      • IMPORTANT.exe (PID: 8160)
    • Actions looks like stealing of personal data

      • IMPORTANT.exe (PID: 7884)
      • IMPORTANT.exe (PID: 7972)
    • Modifies files in the Chrome extension folder

      • IMPORTANT.exe (PID: 7972)
  • SUSPICIOUS

    • Reads the date of Windows installation

      • IMPORTANT.exe (PID: 7764)
    • Reads security settings of Internet Explorer

      • IMPORTANT.exe (PID: 7764)
    • Executable content was dropped or overwritten

      • IMPORTANT.exe (PID: 7884)
    • Application launched itself

      • IMPORTANT.exe (PID: 7764)
      • IMPORTANT.exe (PID: 7012)
      • IMPORTANT.exe (PID: 7576)
  • INFO

    • Creates files or folders in the user directory

      • IMPORTANT.exe (PID: 7884)
      • IMPORTANT.exe (PID: 7972)
      • IMPORTANT.exe (PID: 8052)
    • Checks supported languages

      • IMPORTANT.exe (PID: 7884)
      • IMPORTANT.exe (PID: 7764)
      • IMPORTANT.exe (PID: 8052)
      • IMPORTANT.exe (PID: 8160)
      • IMPORTANT.exe (PID: 7972)
    • Auto-launch of the file from Registry key

      • IMPORTANT.exe (PID: 7884)
      • IMPORTANT.exe (PID: 8052)
      • IMPORTANT.exe (PID: 7972)
      • IMPORTANT.exe (PID: 8160)
    • Reads the computer name

      • IMPORTANT.exe (PID: 7764)
    • Auto-launch of the file from Startup directory

      • IMPORTANT.exe (PID: 7884)
    • Reads the machine GUID from the registry

      • IMPORTANT.exe (PID: 7884)
      • IMPORTANT.exe (PID: 7972)
      • IMPORTANT.exe (PID: 8052)
      • IMPORTANT.exe (PID: 8160)
    • Creates files in the program directory

      • IMPORTANT.exe (PID: 7884)
      • IMPORTANT.exe (PID: 7972)
      • IMPORTANT.exe (PID: 8160)
      • IMPORTANT.exe (PID: 8052)
    • Process checks computer location settings

      • IMPORTANT.exe (PID: 7764)
    • Manual execution by a user

      • OpenWith.exe (PID: 4428)
      • OpenWith.exe (PID: 8144)
      • OpenWith.exe (PID: 6820)
      • OpenWith.exe (PID: 664)
      • IMPORTANT.exe (PID: 7012)
      • IMPORTANT.exe (PID: 7576)
      • OpenWith.exe (PID: 8400)
      • OpenWith.exe (PID: 8580)
      • OpenWith.exe (PID: 8484)
      • OpenWith.exe (PID: 8572)
      • OpenWith.exe (PID: 8752)
      • OpenWith.exe (PID: 8588)
      • OpenWith.exe (PID: 8704)
      • OpenWith.exe (PID: 8720)
      • OpenWith.exe (PID: 8812)
      • OpenWith.exe (PID: 6824)
      • OpenWith.exe (PID: 5116)
      • OpenWith.exe (PID: 5172)
      • OpenWith.exe (PID: 8300)
      • OpenWith.exe (PID: 8392)
      • OpenWith.exe (PID: 8476)
      • OpenWith.exe (PID: 8660)
      • OpenWith.exe (PID: 2504)
      • OpenWith.exe (PID: 5720)
      • OpenWith.exe (PID: 3676)
      • OpenWith.exe (PID: 8432)
      • OpenWith.exe (PID: 8596)
      • OpenWith.exe (PID: 632)
      • OpenWith.exe (PID: 7884)
      • OpenWith.exe (PID: 8972)
      • OpenWith.exe (PID: 8328)
      • OpenWith.exe (PID: 8820)
      • OpenWith.exe (PID: 8888)
      • OpenWith.exe (PID: 8984)
      • OpenWith.exe (PID: 9012)
      • OpenWith.exe (PID: 9088)
      • OpenWith.exe (PID: 8376)
      • OpenWith.exe (PID: 7980)
      • OpenWith.exe (PID: 9928)
      • OpenWith.exe (PID: 9872)
      • OpenWith.exe (PID: 10080)
      • OpenWith.exe (PID: 8296)
      • OpenWith.exe (PID: 9340)
      • OpenWith.exe (PID: 7920)
      • OpenWith.exe (PID: 10624)
      • OpenWith.exe (PID: 8532)
      • OpenWith.exe (PID: 10880)
      • OpenWith.exe (PID: 3192)
      • OpenWith.exe (PID: 9220)
      • OpenWith.exe (PID: 9240)
      • OpenWith.exe (PID: 9920)
      • OpenWith.exe (PID: 10060)
      • OpenWith.exe (PID: 6592)
      • OpenWith.exe (PID: 7204)
      • OpenWith.exe (PID: 6828)
      • OpenWith.exe (PID: 10116)
      • OpenWith.exe (PID: 10888)
      • OpenWith.exe (PID: 10896)
      • OpenWith.exe (PID: 10928)
      • OpenWith.exe (PID: 8100)
      • OpenWith.exe (PID: 5528)
      • OpenWith.exe (PID: 10640)
      • OpenWith.exe (PID: 10064)
      • OpenWith.exe (PID: 8688)
      • OpenWith.exe (PID: 7180)
      • OpenWith.exe (PID: 10668)
      • OpenWith.exe (PID: 5728)
      • OpenWith.exe (PID: 5576)
      • OpenWith.exe (PID: 5800)
      • OpenWith.exe (PID: 5452)
      • OpenWith.exe (PID: 8540)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:05:17 15:09:19+00:00
ImageFileCharacteristics: Executable, No line numbers, Large address aware
PEType: PE32+
LinkerVersion: 2.41
CodeSize: 859136
InitializedDataSize: 1084416
UninitializedDataSize: 3584
EntryPoint: 0x13e0
OSVersion: 4
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
354
Monitored processes
152
Malicious processes
3
Suspicious processes
2

Behavior graph

Click at the process to see the details
start important.exe no specs important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe no specs important.exe no specs important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe slui.exe important.exe important.exe important.exe important.exe openwith.exe no specs openwith.exe no specs openwith.exe no specs important.exe openwith.exe no specs openwith.exe no specs openwith.exe no specs important.exe openwith.exe no specs important.exe openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs important.exe openwith.exe no specs important.exe openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs important.exe openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs important.exe important.exe openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs important.exe important.exe important.exe openwith.exe no specs important.exe openwith.exe no specs openwith.exe no specs openwith.exe no specs important.exe openwith.exe no specs important.exe openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs important.exe important.exe important.exe openwith.exe no specs important.exe openwith.exe no specs openwith.exe no specs openwith.exe no specs important.exe openwith.exe no specs openwith.exe no specs important.exe important.exe important.exe openwith.exe no specs openwith.exe no specs important.exe openwith.exe no specs openwith.exe no specs openwith.exe no specs important.exe important.exe important.exe important.exe important.exe

Process information

PID
CMD
Path
Indicators
Parent process
516"C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMPORTANT.exe" C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMPORTANT.exe
IMPORTANT.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\important.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
632"C:\WINDOWS\System32\OpenWith.exe" C:\Users\admin\Downloads\pressureperhaps.png.enc.enc.enc.enc.enc.enc.encC:\Windows\System32\OpenWith.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
664"C:\WINDOWS\System32\OpenWith.exe" C:\Users\admin\Downloads\hotiii.png.enc.enc.encC:\Windows\System32\OpenWith.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
668"C:\Users\admin\Desktop\IMPORTANT.exe" C:\Users\admin\Desktop\IMPORTANT.exe
IMPORTANT.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\important.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
904"C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMPORTANT.exe" C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMPORTANT.exe
IMPORTANT.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\important.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
920"C:\Users\admin\Desktop\IMPORTANT.exe" C:\Users\admin\Desktop\IMPORTANT.exe
IMPORTANT.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\important.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1116"C:\Users\admin\Desktop\IMPORTANT.exe" C:\Users\admin\Desktop\IMPORTANT.exe
IMPORTANT.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\important.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1244"C:\Users\admin\Desktop\IMPORTANT.exe" C:\Users\admin\Desktop\IMPORTANT.exe
IMPORTANT.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\important.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1324"C:\Users\admin\Desktop\IMPORTANT.exe" C:\Users\admin\Desktop\IMPORTANT.exe
IMPORTANT.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\important.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1812"C:\Users\admin\AppData\Roaming\IMPORTANT.exe" C:\Users\admin\AppData\Roaming\IMPORTANT.exe
IMPORTANT.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\roaming\important.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
374 676
Read events
374 664
Write events
12
Delete events
0

Modification events

(PID) Process:(7884) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(7972) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(8052) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(8160) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(2320) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(7312) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(7340) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(6108) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(7200) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(3240) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
Executable files
29
Suspicious files
4 686
Text files
7
Unknown types
0

Dropped files

PID
Process
Filename
Type
7884IMPORTANT.exeC:\Users\admin\AppData\Roaming\IMPORTANT.exeexecutable
MD5:2A3BD4DA1E262782D08BF6BE61EB1102
SHA256:462178BCFDA5811D9769AC091CB6FC7E8435E63F6CFC2F900E26B8808C8E4F58
7884IMPORTANT.exeC:\Users\Public\Desktop\Adobe Acrobat.lnk.encbinary
MD5:C4429AC73A23F2EFD414F5E0460A4DEB
SHA256:FC127528B7052DBBB7BAED78ECD9BDA0B94B2D64AAC245FEC8B6F6890B08D2CF
7884IMPORTANT.exeC:\ProgramData\Microsoft\ClickToRun\DeploymentConfig.1.xml.encbinary
MD5:CF066748FEFF7B2FA45646FD453F1431
SHA256:08952432DB4E0B7233EEE4472B10CECFE6E50F684AEB450945AACCA87E870E25
7884IMPORTANT.exeC:\ProgramData\Microsoft\ClickToRun\DeploymentConfig.2.xml.encbinary
MD5:923377A72BDC6692143B04B36DBEFB31
SHA256:B3C02D6390151A08EC4E2227D45FD678F7284F800E72EBEBF9B1FDAC57BAF24D
7884IMPORTANT.exeC:\Users\Public\Desktop\Microsoft Edge.lnk.encbinary
MD5:C61940FAF0F2B4FB2F0E82C4323E1750
SHA256:2BFFCE31BE695715D33A02C056402C3A1DAC14D27E3C0995B1B9D8B1BA6F20CD
7884IMPORTANT.exeC:\Users\Default\AppData\Local\Microsoft\Windows\Shell\DefaultLayouts.xml.encbinary
MD5:6C46802371AECF9F0F1D8C22D375F3F8
SHA256:A7642BE31670843CD1567DADD3A7BA22F8B9B3050DE8801DC8FF348F22056CBD
7884IMPORTANT.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMPORTANT.exeexecutable
MD5:2A3BD4DA1E262782D08BF6BE61EB1102
SHA256:462178BCFDA5811D9769AC091CB6FC7E8435E63F6CFC2F900E26B8808C8E4F58
7884IMPORTANT.exeC:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\IECompatData\iecompatdata.xml.encbinary
MD5:536E43034C805B485EAD262EEBF4E6AC
SHA256:5BD79E215CFA7F7662BE89C1BABA07DC47626DF5ED48B2CCE0CD1AB81B860777
7884IMPORTANT.exeC:\ProgramData\Microsoft\ClickToRun\MachineData\Catalog\Packages\{9AC08E99-230B-47E8-9721-4577B7F124EA}\{1A8308C7-90D1-4200-B16E-646F163A08E8}\DeploymentConfiguration.xml.encbinary
MD5:109196238E8904A1287C81693AF4C069
SHA256:5867421954C587A67FE4065A2F5605F4FD5800C1E48F50B7558579ECCD1B3AC8
7884IMPORTANT.exeC:\Users\Public\Desktop\Skype.lnk.encbinary
MD5:9EB77E6BA31513B4CAB986E51201E393
SHA256:692214AD6413062E0F2A0ED8195723887582B14E1A795B9387BF5BFD817D1AF7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
44
DNS requests
14
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2984
SIHClient.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
2984
SIHClient.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2984
SIHClient.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
whitelisted
2984
SIHClient.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
2984
SIHClient.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2984
SIHClient.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
2984
SIHClient.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
2984
SIHClient.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
2984
SIHClient.exe
52.149.20.212:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2984
SIHClient.exe
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2984
SIHClient.exe
69.192.161.161:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
7404
slui.exe
20.83.72.98:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2984
SIHClient.exe
20.3.187.198:443
fe3cr.delivery.mp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.104.136.2
whitelisted
google.com
  • 142.250.185.78
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
crl.microsoft.com
  • 23.216.77.28
  • 23.216.77.36
  • 23.216.77.19
  • 23.216.77.42
  • 23.216.77.8
  • 23.216.77.20
  • 23.216.77.30
whitelisted
www.microsoft.com
  • 69.192.161.161
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted
nexusrules.officeapps.live.com
  • 52.111.236.23
whitelisted
login.live.com
  • 20.190.160.14
  • 20.190.160.128
  • 20.190.160.67
  • 40.126.32.140
  • 20.190.160.3
  • 40.126.32.68
  • 40.126.32.138
  • 20.190.160.65
whitelisted

Threats

No threats detected
No debug info