File name:

webrat.exe

Full analysis: https://app.any.run/tasks/0d89395a-fc67-4a14-a925-9f7a7add1f9b
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: April 27, 2025, 00:00:26
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
stealer
ms-smartcard
salatstealer
upx
golang
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, 3 sections
MD5:

FD2E81D218245B06D8AF441D559B5F52

SHA1:

C1725257285C11757DF28BB084C4E25A79A67413

SHA256:

7A18AE231B2530D378D19C26BBFC51C427D382838145DBAD4495BA5AD3B473F4

SSDEEP:

98304:yVOh8pBA0GV4K4ksbP6Dcmx1AilXmKRH80kOK0NHX4Pb04X4sJ34b59t+n67VDs6:Y8XGFf

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • lsass.exe (PID: 5680)
    • Steals credentials from Web Browsers

      • lsass.exe (PID: 5680)
    • SALATSTEALER has been detected (YARA)

      • lsass.exe (PID: 7672)
      • lsass.exe (PID: 5680)
    • Starts Visual C# compiler

      • powershell.exe (PID: 6572)
      • powershell.exe (PID: 4620)
      • powershell.exe (PID: 5392)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • webrat.exe (PID: 4164)
    • Application launched itself

      • webrat.exe (PID: 4164)
      • lsass.exe (PID: 5680)
    • The process creates files with name similar to system file names

      • webrat.exe (PID: 5404)
      • lsass.exe (PID: 5680)
    • Executable content was dropped or overwritten

      • webrat.exe (PID: 5404)
      • lsass.exe (PID: 5680)
      • csc.exe (PID: 1388)
      • csc.exe (PID: 1040)
    • Starts itself from another location

      • webrat.exe (PID: 5404)
      • lsass.exe (PID: 5680)
    • Connects to unusual port

      • lsass.exe (PID: 5680)
      • lsass.exe (PID: 4352)
    • There is functionality for taking screenshot (YARA)

      • lsass.exe (PID: 7672)
      • lsass.exe (PID: 5680)
    • Multiple wallet extension IDs have been found

      • lsass.exe (PID: 7672)
      • lsass.exe (PID: 5680)
    • Starts POWERSHELL.EXE for commands execution

      • lsass.exe (PID: 5680)
    • Uses .NET C# to load dll

      • powershell.exe (PID: 6572)
      • powershell.exe (PID: 4620)
      • powershell.exe (PID: 5392)
    • CSC.EXE is used to compile C# code

      • csc.exe (PID: 1388)
      • csc.exe (PID: 1040)
      • csc.exe (PID: 6660)
    • The process executes via Task Scheduler

      • PLUGScheduler.exe (PID: 4332)
      • sihost.exe (PID: 4344)
      • lsass.exe (PID: 4352)
  • INFO

    • Reads the computer name

      • webrat.exe (PID: 4164)
      • lsass.exe (PID: 5680)
      • lsass.exe (PID: 3192)
      • elevation_service.exe (PID: 7280)
      • lsass.exe (PID: 7228)
    • Reads the machine GUID from the registry

      • webrat.exe (PID: 4164)
      • lsass.exe (PID: 5680)
      • lsass.exe (PID: 7228)
      • lsass.exe (PID: 3192)
      • lsass.exe (PID: 7672)
    • Checks supported languages

      • webrat.exe (PID: 4164)
      • lsass.exe (PID: 5680)
      • elevation_service.exe (PID: 7280)
      • lsass.exe (PID: 7228)
      • lsass.exe (PID: 3192)
      • lsass.exe (PID: 7672)
    • Creates files or folders in the user directory

      • webrat.exe (PID: 5404)
    • Process checks computer location settings

      • webrat.exe (PID: 4164)
    • Create files in a temporary directory

      • lsass.exe (PID: 5680)
    • Creates files in the program directory

      • lsass.exe (PID: 5680)
    • Executes as Windows Service

      • elevation_service.exe (PID: 7280)
    • UPX packer has been detected

      • lsass.exe (PID: 5680)
      • lsass.exe (PID: 7672)
    • Reads the software policy settings

      • slui.exe (PID: 960)
      • slui.exe (PID: 7616)
      • lsass.exe (PID: 5680)
    • Detects GO elliptic curve encryption (YARA)

      • lsass.exe (PID: 7672)
      • lsass.exe (PID: 5680)
    • Application based on Golang

      • lsass.exe (PID: 7672)
      • lsass.exe (PID: 5680)
    • Checks proxy server information

      • slui.exe (PID: 7616)
    • Checks current location (POWERSHELL)

      • powershell.exe (PID: 7840)
      • powershell.exe (PID: 5964)
      • powershell.exe (PID: 5400)
      • powershell.exe (PID: 8124)
      • powershell.exe (PID: 7268)
      • powershell.exe (PID: 5384)
      • powershell.exe (PID: 8052)
    • Drops encrypted JS script (Microsoft Script Encoder)

      • lsass.exe (PID: 5680)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (64.2)
.dll | Win32 Dynamic Link Library (generic) (15.6)
.exe | Win32 Executable (generic) (10.6)
.exe | Generic Win/DOS Executable (4.7)
.exe | DOS Executable Generic (4.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 0000:00:00 00:00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 3
CodeSize: 3276800
InitializedDataSize: 4096
UninitializedDataSize: 8765440
EntryPoint: 0xb7c240
OSVersion: 6.1
ImageVersion: 1
SubsystemVersion: 6.1
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
339
Monitored processes
57
Malicious processes
4
Suspicious processes
2

Behavior graph

Click at the process to see the details
start webrat.exe no specs webrat.exe sppextcomobj.exe no specs slui.exe #SALATSTEALER lsass.exe lsass.exe no specs lsass.exe no specs elevation_service.exe no specs slui.exe #SALATSTEALER lsass.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs pnputil.exe no specs pnputil.exe no specs pnputil.exe no specs pnputil.exe no specs pnputil.exe no specs pnputil.exe no specs powershell.exe no specs conhost.exe no specs pnputil.exe no specs powershell.exe no specs conhost.exe no specs pnputil.exe no specs pnputil.exe no specs powershell.exe no specs conhost.exe no specs pnputil.exe no specs pnputil.exe no specs pnputil.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs csc.exe csc.exe csc.exe no specs cvtres.exe no specs cvtres.exe no specs powershell.exe no specs plugscheduler.exe no specs sihost.exe no specs lsass.exe

Process information

PID
CMD
Path
Indicators
Parent process
208"C:\windows\sysnative\pnputil.exe" /remove-device HID\VID_0627&PID_0001\6&6973F69&0&0000C:\Windows\System32\pnputil.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft PnP Utility - Tool to add, delete, export, and enumerate driver packages.
Exit code:
3758096907
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\pnputil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
616"C:\windows\sysnative\pnputil.exe" /remove-device HID\VID_0627&PID_0001\6&6973F69&0&0000C:\Windows\System32\pnputil.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft PnP Utility - Tool to add, delete, export, and enumerate driver packages.
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\pnputil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
684C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESFDE1.tmp" "c:\Users\admin\AppData\Local\Temp\gh5hjphb\CSCCE1E7F05DEA84650BC5D236B88DDFAF1.TMP"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
14.32.31326.0
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\cvtres.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
872"C:\windows\sysnative\pnputil.exe" /remove-device HID\VID_0627&PID_0001\6&6973F69&0&0000C:\Windows\System32\pnputil.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft PnP Utility - Tool to add, delete, export, and enumerate driver packages.
Exit code:
3758096907
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\pnputil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
960"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msxml6.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\ondemandconnroutehelper.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
c:\windows\system32\dhcpcsvc6.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\webio.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\winnsi.dll
1040"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\gh5hjphb\gh5hjphb.cmdline"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\csc.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
1096\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1128\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1388"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\0x3eubly\0x3eubly.cmdline"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\csc.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
2100C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESFDE0.tmp" "c:\Users\admin\AppData\Local\Temp\0x3eubly\CSCE4A76DEADCD446F69BC27E4B3AD66318.TMP"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
14.32.31326.0
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\cvtres.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
Total events
85 418
Read events
85 417
Write events
1
Delete events
0

Modification events

(PID) Process:(616) pnputil.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\Setup\SetupapiLogStatus
Operation:writeName:setupapi.dev.log
Value:
4096
Executable files
7
Suspicious files
49
Text files
46
Unknown types
0

Dropped files

PID
Process
Filename
Type
7840powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_krkjbbnp.f5f.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
8052powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_coq2agd4.rhf.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
7840powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_4m1yc3gy.xfm.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
8124powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_nx21jbyw.vgm.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
5384powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_rlki2wjb.tmr.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
5680lsass.exeC:\Program Files (x86)\Microsoft\Edge\Application\lsass.exeexecutable
MD5:FD2E81D218245B06D8AF441D559B5F52
SHA256:7A18AE231B2530D378D19C26BBFC51C427D382838145DBAD4495BA5AD3B473F4
5384powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_sldketws.lqc.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
7268powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_5zu3cwhe.03c.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
7840powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactivebinary
MD5:25EA8ACB2A5BCBE866D97C043F591164
SHA256:F42ACC8DDD2CD9144A969EF1AAD7C79F9513097758510DF4318EE8CA835F9F01
5400powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_ky51bh3s.ucc.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
83
DNS requests
37
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7408
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7408
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5676
SearchApp.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
5676
SearchApp.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
whitelisted
5676
SearchApp.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6400
backgroundTaskHost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D
unknown
whitelisted
6400
backgroundTaskHost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
2112
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1.1.1.1:443
whitelisted
172.67.191.102:443
unknown
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 2.16.241.19
  • 2.16.241.12
whitelisted
google.com
  • 142.250.185.238
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 23.52.120.96
whitelisted
client.wns.windows.com
  • 172.211.123.248
  • 172.211.123.250
whitelisted
go.microsoft.com
  • 95.100.186.9
whitelisted
login.live.com
  • 20.190.159.0
  • 20.190.159.2
  • 40.126.31.67
  • 40.126.31.0
  • 20.190.159.4
  • 20.190.159.68
  • 40.126.31.71
  • 20.190.159.128
whitelisted
ocsp.digicert.com
  • 2.23.77.188
  • 184.30.131.245
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted

Threats

No threats detected
No debug info