File name:

Venom RAT + HVNC + Stealer + Grabber.exe

Full analysis: https://app.any.run/tasks/539e7901-9bfa-4efa-8bb1-9e514b885c91
Verdict: Malicious activity
Threats:

AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions.

Analysis date: July 25, 2024, 14:11:36
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
asyncrat
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

3B3A304C6FC7A3A1D9390D7CBFF56634

SHA1:

E8BD5244E6362968F5017680DA33F1E90AE63DD7

SHA256:

7331368C01B2A16BDA0F013F376A039E6AEB4CB2DD8B0C2AFC7CA208FB544C58

SSDEEP:

196608:Nja6chUZX81lbFklbYJygrP7aIBhLkNPFCZZwiJl1NLIsPA8fxvuIMzd/95UhS1G:qT+P+Zw6NLIsFfskh1BmXG04N

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Venom RAT + HVNC + Stealer + Grabber.exe (PID: 6656)
    • ASYNCRAT has been detected (YARA)

      • Venom RAT + HVNC + Stealer + Grabber.exe (PID: 6656)
  • SUSPICIOUS

    • Executes application which crashes

      • Venom RAT + HVNC + Stealer + Grabber.exe (PID: 6472)
      • Venom RAT + HVNC + Stealer + Grabber.exe (PID: 6656)
      • Venom RAT + HVNC + Stealer + Grabber.exe (PID: 4188)
  • INFO

    • Checks supported languages

      • Venom RAT + HVNC + Stealer + Grabber.exe (PID: 6656)
      • Venom RAT + HVNC + Stealer + Grabber.exe (PID: 6472)
      • Venom RAT + HVNC + Stealer + Grabber.exe (PID: 4188)
    • Manual execution by a user

      • Venom RAT + HVNC + Stealer + Grabber.exe (PID: 6472)
      • Venom RAT + HVNC + Stealer + Grabber.exe (PID: 4188)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 6428)
      • WerFault.exe (PID: 3556)
      • WerFault.exe (PID: 4036)
    • Reads the software policy settings

      • WerFault.exe (PID: 6428)
      • WerFault.exe (PID: 3556)
      • WerFault.exe (PID: 4036)
    • Checks proxy server information

      • WerFault.exe (PID: 3556)
      • WerFault.exe (PID: 4036)
      • WerFault.exe (PID: 6428)
    • Reads the computer name

      • Venom RAT + HVNC + Stealer + Grabber.exe (PID: 6656)
      • Venom RAT + HVNC + Stealer + Grabber.exe (PID: 6472)
      • Venom RAT + HVNC + Stealer + Grabber.exe (PID: 4188)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (42.9)
.exe | Win32 EXE PECompact compressed (generic) (24.3)
.exe | Win64 Executable (generic) (16.1)
.scr | Windows screen saver (7.6)
.dll | Win32 Dynamic Link Library (generic) (3.8)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2068:12:31 07:38:15+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32
LinkerVersion: 48
CodeSize: 14857728
InitializedDataSize: 10240
UninitializedDataSize: -
EntryPoint: 0xe2d4ae
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 6.0.1.0
ProductVersionNumber: 6.0.1.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: VenomRAT
FileVersion: 6.0.1
InternalName: Venom RAT + HVNC + Stealer + Grabber.exe
LegalCopyright: Copyright © 2023
LegalTrademarks: -
OriginalFileName: Venom RAT + HVNC + Stealer + Grabber.exe
ProductName: -
ProductVersion: 6.0.1
AssemblyVersion: 6.0.1.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
142
Monitored processes
7
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #ASYNCRAT venom rat + hvnc + stealer + grabber.exe werfault.exe slui.exe no specs venom rat + hvnc + stealer + grabber.exe werfault.exe venom rat + hvnc + stealer + grabber.exe werfault.exe

Process information

PID
CMD
Path
Indicators
Parent process
3556C:\WINDOWS\system32\WerFault.exe -u -p 6472 -s 776C:\Windows\System32\WerFault.exe
Venom RAT + HVNC + Stealer + Grabber.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
4036C:\WINDOWS\system32\WerFault.exe -u -p 4188 -s 764C:\Windows\System32\WerFault.exe
Venom RAT + HVNC + Stealer + Grabber.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\umpdc.dll
c:\windows\winsxs\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.3636_none_60b6a03d71f818d5\comctl32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\user32.dll
c:\windows\system32\imm32.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\msctf.dll
c:\windows\system32\policymanager.dll
4188"C:\Users\admin\Desktop\Venom RAT + HVNC + Stealer + Grabber.exe" C:\Users\admin\Desktop\Venom RAT + HVNC + Stealer + Grabber.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
VenomRAT
Exit code:
3762504530
Version:
6.0.1
Modules
Images
c:\windows\system32\shlwapi.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\version.dll
c:\windows\microsoft.net\framework64\v4.0.30319\clr.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6428C:\WINDOWS\system32\WerFault.exe -u -p 6656 -s 792C:\Windows\System32\WerFault.exe
Venom RAT + HVNC + Stealer + Grabber.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
6472"C:\Users\admin\Desktop\Venom RAT + HVNC + Stealer + Grabber.exe" C:\Users\admin\Desktop\Venom RAT + HVNC + Stealer + Grabber.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
VenomRAT
Exit code:
3762504530
Version:
6.0.1
Modules
Images
c:\users\admin\desktop\venom rat + hvnc + stealer + grabber.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6656"C:\Users\admin\Desktop\Venom RAT + HVNC + Stealer + Grabber.exe" C:\Users\admin\Desktop\Venom RAT + HVNC + Stealer + Grabber.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
VenomRAT
Exit code:
3762504530
Version:
6.0.1
Modules
Images
c:\users\admin\desktop\venom rat + hvnc + stealer + grabber.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
6836C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
10 852
Read events
10 848
Write events
4
Delete events
0

Modification events

(PID) Process:(3556) WerFault.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
Operation:writeName:00180010F429971D
Value:
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
(PID) Process:(3556) WerFault.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
Operation:writeName:DeviceTicket
Value:
0100000001000000D08C9DDF0115D1118C7A00C04FC297EB0100000042CB6C300049C042863C8A748EF9A2B200000000020000000000106600000001000020000000F5B44EBFBAD3972F57006BAA796385E7498BD463E28506913492D945FE615CD2000000000E8000000002000020000000EFF4EA7C47242F6D9E56EF28DC5E24C3CC1F4D3811BD75FDF7ED1D81E410CF4F2008000030A0FADC892D1E61C94059CE1ECB1B597A8C6F595E3359F166237E70A4901C7985F552DBA4649553FCEAB50540475EBBD4AF6E350ABFFA6D9591BDE341973C6393839BE6A5D470152929E59661DDD2DD1248A18A7E172545037A7EC0BEA1490D43253DBB15AACAD72E408B33DB9C0CACED7B35ABE8B6B4A44B155ADAA8F832B286EDCC20DF4C28BC30E8D34753F4388350B57B935D8437E1BBA300460DA08B5BB107365EEF47997E393B4DEA03A8F948A12FAD4AE2EFD14D2FFFF2C0A7F48C44A892B0323DE8095D27AC14A45526E3471566274665D2CEF9C1F23E6478F7331BD300185B8021CE7340568F9BCC7CBA3FB3272C3AADB60D31FDFA4BF728F08D037E4594B870D337ACB06B3D7A2E64AB2DFD93EE75DD7A99FA2D9006E92DD0993EDEE5B734BEAB3F3C97CA7C093805A68CB541BD5632397FF65C4C24C93D551A5718496204E1A3D6EB286B00B64E2E2A577D9ECD784B4F69EE55312DF09B9678C5417439FDA9DCC6AD14F04FBEEF325D36B63404D0F38EF26F6296E4B99E1463564BB40323C4E73FA96F7213563BF9CA1E2C02993291AF7847BF5C3450F0CE37E834CBEA2535309366A2D653272504D58BC480C781600AB0AD85C9823495A1896A6F6B846A546F1748C5C1AFA0341C9C11BCEB11CFC9BB030371062B8BB9A4C3FF67F8A533B83300D85BDCCB47C25306808D75A746EAC4CD0AB357E54E11EE72EF0DE7F8CFFE0388FEF2DB05B8EFEE1582FE60BB573498A7C421BF7374D4968F8DE51A8492CD0232DD87BF51DD1826A31FEEB8356F97070253D9B7849A64CF20633BAFDBCF462F64EB102DE5DDF90CD1C47A49EB94A317949F639D1EB3E3B38A6B776E22284BCA11140F3BFB047B6D6C33F8C5F3E10A78ADAA0E3CB0553F3E5B64F757AA8CE0397E28199A89586C34087DFDE6AD17A37962CEC20982CD384AAEE750C00DDB8A36088054DE23918F0819F8398EA6EBE917CF4D689D7CAB296FF350F5249A170C1F364BB57C9A7743C7D4079F85020788DC1BCA7F5B45D3BEA4B0002A6F86499A531968326264437F4542EADAA1CA23729584F797B1B41D64916C05CB8F1712B92B6C9160B3B58B38D1BDAABC04B242702CECB6B07EC7D73639D1C27CA5633A2C49C7CCA7EE84E99F14725B388E4B7A8B1DDA094DE10B13558EE498F333067E61AFF14A8FBFB338EACF04ED1B3A97FE2B0A919AA0AD0823B06ABA283BF4CFC977E4CE8A46FB155E13CC7C2FF39128935D2B044ADB130F8BB01B2E3F1B83FA85CC34369E187300B012DEB7A87370BEBC5B6CC52064E3D5FB9FEDC394F71DAB39B215F1D68644E03F03BB38719B8A2072E75ABACCF60A24A37CB34748052AFA32E0D5D7BB0B4E427CCC723FE86E45E23C8A5A8BF931BB48692896A14C85B36E5E6ADCF58E441789295341F84CBBA48F7EE431B8B6DD23DB21A09D243651FF0A448B18EC7951F60015D67089C558F86404EACAC04FBDAB22052E84E343C51C58610ECD23F3E1540A5A93E69DABDDA6B501AD04F0E00B2657A5C05BA3701E216764A4C127F37C8683116EEFB01FC32AED5175F86D6961AADA08D64CB2659F079D47497F6B76474EE06C764D51792F43FAFDF268E965D511FE8383474FAAAAC94FAF4B6E18B270C2B5F38B8112621007CD9D930A8B1128F02F79444813E7079F27C7B92C52FC02DE7E9103077E3575FE5BDDB057B70C5575033269AB74C8656B26B94D36061D5DE8FF6B20D579E29BEACCA5C5DA80A9BB58A2A6F59CA79B2952D65FE41A781C2AD5F2FC0430C3234F50B6F3D198BE00048C71D7BA2EA324B58C13246A802C8E45EE5E8C0CBD19721ECE11F48F7F96005E5DD4DE31CE08357064576ADA893744D3C733E8FAF5B6C4CD23B6B5B64606762EAD505966492E7C8F5022E6D4D8AE3D75B62C9EB8852905ED86E4CE4E71BB641F49CAF01C6C7A04CE9CDCBCB11A3C00401CEFB4A7BF7C23CA00B68088785D000945597005E0BAD1FC27CB3201C62F9E72967691286A1EA86D38F46DEEBC2806BAB9D25C49491C7278318006F65D671B530F6CAE6CDD88229D2B8CDB3F6C413A40A85772655CF547D704FEB40FEC864FA5ABD157137082EFC0C527C3F127D80631AC38FCE600DACCB46180F0535AC9C9A4914526EBDC55789BB5B432AFE07F97DF5708477E65127F92224B58100D9020602509A16E943BC1955B41D53B9736B4BFABE42F08F085894EB5876D775A2692E336BCE6869FE09C394EF394895BF993901FD75551F7373E380309C90FB7656C48AD7FF2620E7F44BD0D653C93D6873915972E690C4D7F37318C797E8C050A86FA4FF3AAA7466523EA458451DA2630FA56659581B9B70010CCE4260F3EA1274CDB264E4235C4C1567C482F4D0B95E48F9A4555862FC39081CF4A5957243056281C596410E3CC4F895C04DC2FFE47243248016CC5F85E36ADA8A3E2FC055DC1A9C2B03CFBCFE3168916D504065140B630AF9641C873B7461A4C89BBDA584075EFB8A4AFEB8E68F4969EC571240859A4AE044BE48287C2FE1EBB28FB35621FBD0D0D58A750A95004FFF7EEF6C45C4480E49651CAF6BE71A69130352DB00BEE5BFC67D7226C04714967DAFF237D3A4EF16AA7B061C22B04BB943318A96AA1CDFA61B14B12E1E471041A26EF0C6A6EEA0904A4A5E7A75BA3328FBDBBA52FED854AAD7E0BE3204DC0D79714CE96BCB87BF7755731DA41577AC115839D14386BF63D3243AE944B1F6DFD7F7F55DA22FC230E4684C62129AB7DA1955BFA3857AF8A0BA894194BFD21267B05A9FD90B28EF3E6D27A95D91196E82F938C900C8EF88F1FFC8CDD5A10778A9228C8D405F670D62AF2A01947756EB66E1657DE3B4EB8C4B21798F209BF7818F0E638F64BA6A119AE4A9287E1879A8CD61486B223DD2DB8D8C25021D5583DAB76D7CC7478D49FE23996059E593C636064A040000000232DDE34669BB7D54E216A312B63A7DC69CBA5FACFAE065EFBB095DBFC972D8741D4618EFD9EF90BACACC3E9B99078BFC22244EEEA2C198386AB0CA09DFC2814
(PID) Process:(3556) WerFault.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
Operation:writeName:DeviceId
Value:
00180010F429971D
(PID) Process:(3556) WerFault.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
Operation:writeName:ApplicationFlags
Value:
1
Executable files
0
Suspicious files
5
Text files
6
Unknown types
0

Dropped files

PID
Process
Filename
Type
6428WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_Venom RAT + HVNC_ea87d7c01f8e574b49834696c258264836d983e_d3562942_1998033f-07a9-4329-a8b8-6d7e7e3db580\Report.wer
MD5:
SHA256:
6428WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\Venom RAT + HVNC + Stealer + Grabber.exe.6656.dmp
MD5:
SHA256:
3556WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_Venom RAT + HVNC_ea87d7c01f8e574b49834696c258264836d983e_d3562942_7600b0ec-6fb7-4fd7-ac95-3e415e67a063\Report.wer
MD5:
SHA256:
3556WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\Venom RAT + HVNC + Stealer + Grabber.exe.6472.dmp
MD5:
SHA256:
4036WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_Venom RAT + HVNC_ea87d7c01f8e574b49834696c258264836d983e_d3562942_732431b9-8c29-4df4-a0b2-79787b80c5e7\Report.wer
MD5:
SHA256:
4036WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\Venom RAT + HVNC + Stealer + Grabber.exe.4188.dmp
MD5:
SHA256:
4036WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER94D9.tmp.dmpdmp
MD5:B7E0A59A908DF256293E58695E0BEB23
SHA256:63B5DBA3574B0858B24D8578AAFA7AF948C9D8499B345D8588EBAF55BCA6F2C7
6428WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER1C7D.tmp.WERInternalMetadata.xmlxml
MD5:70D38CCE50A41A0AD80117C4E0A04918
SHA256:6714FD16DF2FB072ADFDE64A997A095076C13693DD568971767C0712BD2E1C09
3556WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER5EB7.tmp.WERInternalMetadata.xmlxml
MD5:279E9AAAE3B24DBC5B53A8F1CCBB3B80
SHA256:7B53BCF9132D2C53823DAF2792C1B56F7A22685C99D47B3E8F4F52AC97249275
6428WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\21253908F3CB05D51B1C2DA8B681A785binary
MD5:82C30E45BF5F93A5DB1D5E47F913053B
SHA256:2C6BBFF9207065E8800C4AF0CB2748818ABB3CFFC0D6D518FE17F76A232F8967
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
48
DNS requests
19
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7032
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
5368
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
5272
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1596
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4512
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
6012
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
3380
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2.23.209.162:443
Akamai International B.V.
GB
unknown
4204
svchost.exe
4.209.33.156:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
3952
svchost.exe
239.255.255.250:1900
whitelisted
6428
WerFault.exe
52.182.143.212:443
watson.events.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
4
System
192.168.100.255:137
whitelisted
4512
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
whitelisted
google.com
  • 142.250.186.78
whitelisted
watson.events.data.microsoft.com
  • 52.182.143.212
  • 52.168.117.173
  • 20.42.73.29
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
www.bing.com
  • 104.126.37.186
  • 104.126.37.139
  • 104.126.37.155
  • 104.126.37.160
  • 104.126.37.136
  • 104.126.37.128
  • 104.126.37.130
  • 104.126.37.131
  • 104.126.37.153
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.160.17
  • 40.126.32.138
  • 40.126.32.140
  • 40.126.32.74
  • 40.126.32.76
  • 40.126.32.72
  • 20.190.160.22
  • 20.190.160.14
whitelisted
client.wns.windows.com
  • 40.113.110.67
whitelisted
arc.msn.com
  • 20.199.58.43
whitelisted
go.microsoft.com
  • 23.213.166.81
whitelisted

Threats

No threats detected
No debug info