File name:

webrat.exe

Full analysis: https://app.any.run/tasks/0d89395a-fc67-4a14-a925-9f7a7add1f9b
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: April 27, 2025, 00:00:26
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
stealer
ms-smartcard
salatstealer
upx
golang
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, 3 sections
MD5:

FD2E81D218245B06D8AF441D559B5F52

SHA1:

C1725257285C11757DF28BB084C4E25A79A67413

SHA256:

7A18AE231B2530D378D19C26BBFC51C427D382838145DBAD4495BA5AD3B473F4

SSDEEP:

98304:yVOh8pBA0GV4K4ksbP6Dcmx1AilXmKRH80kOK0NHX4Pb04X4sJ34b59t+n67VDs6:Y8XGFf

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • lsass.exe (PID: 5680)
    • Steals credentials from Web Browsers

      • lsass.exe (PID: 5680)
    • SALATSTEALER has been detected (YARA)

      • lsass.exe (PID: 5680)
      • lsass.exe (PID: 7672)
    • Starts Visual C# compiler

      • powershell.exe (PID: 6572)
      • powershell.exe (PID: 4620)
      • powershell.exe (PID: 5392)
  • SUSPICIOUS

    • Starts itself from another location

      • webrat.exe (PID: 5404)
      • lsass.exe (PID: 5680)
    • The process creates files with name similar to system file names

      • webrat.exe (PID: 5404)
      • lsass.exe (PID: 5680)
    • Application launched itself

      • webrat.exe (PID: 4164)
      • lsass.exe (PID: 5680)
    • Reads security settings of Internet Explorer

      • webrat.exe (PID: 4164)
    • Executable content was dropped or overwritten

      • webrat.exe (PID: 5404)
      • lsass.exe (PID: 5680)
      • csc.exe (PID: 1040)
      • csc.exe (PID: 1388)
    • There is functionality for taking screenshot (YARA)

      • lsass.exe (PID: 5680)
      • lsass.exe (PID: 7672)
    • Multiple wallet extension IDs have been found

      • lsass.exe (PID: 5680)
      • lsass.exe (PID: 7672)
    • Connects to unusual port

      • lsass.exe (PID: 5680)
      • lsass.exe (PID: 4352)
    • Starts POWERSHELL.EXE for commands execution

      • lsass.exe (PID: 5680)
    • Uses .NET C# to load dll

      • powershell.exe (PID: 6572)
      • powershell.exe (PID: 5392)
      • powershell.exe (PID: 4620)
    • CSC.EXE is used to compile C# code

      • csc.exe (PID: 1388)
      • csc.exe (PID: 1040)
      • csc.exe (PID: 6660)
    • The process executes via Task Scheduler

      • PLUGScheduler.exe (PID: 4332)
      • lsass.exe (PID: 4352)
      • sihost.exe (PID: 4344)
  • INFO

    • Reads the computer name

      • webrat.exe (PID: 4164)
      • lsass.exe (PID: 5680)
      • lsass.exe (PID: 7228)
      • elevation_service.exe (PID: 7280)
      • lsass.exe (PID: 3192)
    • Reads the machine GUID from the registry

      • webrat.exe (PID: 4164)
      • lsass.exe (PID: 5680)
      • lsass.exe (PID: 3192)
      • lsass.exe (PID: 7228)
      • lsass.exe (PID: 7672)
    • Process checks computer location settings

      • webrat.exe (PID: 4164)
    • Checks supported languages

      • webrat.exe (PID: 4164)
      • lsass.exe (PID: 5680)
      • lsass.exe (PID: 3192)
      • lsass.exe (PID: 7228)
      • elevation_service.exe (PID: 7280)
      • lsass.exe (PID: 7672)
    • Creates files or folders in the user directory

      • webrat.exe (PID: 5404)
    • Creates files in the program directory

      • lsass.exe (PID: 5680)
    • Create files in a temporary directory

      • lsass.exe (PID: 5680)
    • Executes as Windows Service

      • elevation_service.exe (PID: 7280)
    • Detects GO elliptic curve encryption (YARA)

      • lsass.exe (PID: 5680)
      • lsass.exe (PID: 7672)
    • UPX packer has been detected

      • lsass.exe (PID: 5680)
      • lsass.exe (PID: 7672)
    • Reads the software policy settings

      • slui.exe (PID: 960)
      • lsass.exe (PID: 5680)
      • slui.exe (PID: 7616)
    • Application based on Golang

      • lsass.exe (PID: 5680)
      • lsass.exe (PID: 7672)
    • Checks proxy server information

      • slui.exe (PID: 7616)
    • Checks current location (POWERSHELL)

      • powershell.exe (PID: 5964)
      • powershell.exe (PID: 8052)
      • powershell.exe (PID: 7840)
      • powershell.exe (PID: 5384)
      • powershell.exe (PID: 8124)
      • powershell.exe (PID: 7268)
      • powershell.exe (PID: 5400)
    • Drops encrypted JS script (Microsoft Script Encoder)

      • lsass.exe (PID: 5680)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (64.2)
.dll | Win32 Dynamic Link Library (generic) (15.6)
.exe | Win32 Executable (generic) (10.6)
.exe | Generic Win/DOS Executable (4.7)
.exe | DOS Executable Generic (4.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 0000:00:00 00:00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 3
CodeSize: 3276800
InitializedDataSize: 4096
UninitializedDataSize: 8765440
EntryPoint: 0xb7c240
OSVersion: 6.1
ImageVersion: 1
SubsystemVersion: 6.1
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
339
Monitored processes
57
Malicious processes
4
Suspicious processes
2

Behavior graph

Click at the process to see the details
start webrat.exe no specs webrat.exe sppextcomobj.exe no specs slui.exe #SALATSTEALER lsass.exe lsass.exe no specs lsass.exe no specs elevation_service.exe no specs slui.exe #SALATSTEALER lsass.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs pnputil.exe no specs pnputil.exe no specs pnputil.exe no specs pnputil.exe no specs pnputil.exe no specs pnputil.exe no specs powershell.exe no specs conhost.exe no specs pnputil.exe no specs powershell.exe no specs conhost.exe no specs pnputil.exe no specs pnputil.exe no specs powershell.exe no specs conhost.exe no specs pnputil.exe no specs pnputil.exe no specs pnputil.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs csc.exe csc.exe csc.exe no specs cvtres.exe no specs cvtres.exe no specs powershell.exe no specs plugscheduler.exe no specs sihost.exe no specs lsass.exe

Process information

PID
CMD
Path
Indicators
Parent process
208"C:\windows\sysnative\pnputil.exe" /remove-device HID\VID_0627&PID_0001\6&6973F69&0&0000C:\Windows\System32\pnputil.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft PnP Utility - Tool to add, delete, export, and enumerate driver packages.
Exit code:
3758096907
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\pnputil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
616"C:\windows\sysnative\pnputil.exe" /remove-device HID\VID_0627&PID_0001\6&6973F69&0&0000C:\Windows\System32\pnputil.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft PnP Utility - Tool to add, delete, export, and enumerate driver packages.
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\pnputil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
684C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESFDE1.tmp" "c:\Users\admin\AppData\Local\Temp\gh5hjphb\CSCCE1E7F05DEA84650BC5D236B88DDFAF1.TMP"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
14.32.31326.0
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\cvtres.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
872"C:\windows\sysnative\pnputil.exe" /remove-device HID\VID_0627&PID_0001\6&6973F69&0&0000C:\Windows\System32\pnputil.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft PnP Utility - Tool to add, delete, export, and enumerate driver packages.
Exit code:
3758096907
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\pnputil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
960"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msxml6.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\ondemandconnroutehelper.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
c:\windows\system32\dhcpcsvc6.dll
c:\windows\system32\dhcpcsvc.dll
c:\windows\system32\webio.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\winnsi.dll
1040"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\gh5hjphb\gh5hjphb.cmdline"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\csc.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
1096\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1128\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1388"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\0x3eubly\0x3eubly.cmdline"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\csc.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
2100C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESFDE0.tmp" "c:\Users\admin\AppData\Local\Temp\0x3eubly\CSCE4A76DEADCD446F69BC27E4B3AD66318.TMP"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
14.32.31326.0
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\cvtres.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
Total events
85 418
Read events
85 417
Write events
1
Delete events
0

Modification events

(PID) Process:(616) pnputil.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\Setup\SetupapiLogStatus
Operation:writeName:setupapi.dev.log
Value:
4096
Executable files
7
Suspicious files
49
Text files
46
Unknown types
0

Dropped files

PID
Process
Filename
Type
5680lsass.exeC:\Program Files\Google\Chrome\Application\lsass.exeexecutable
MD5:FD2E81D218245B06D8AF441D559B5F52
SHA256:7A18AE231B2530D378D19C26BBFC51C427D382838145DBAD4495BA5AD3B473F4
5404webrat.exeC:\Program Files (x86)\WindowsPowerShell\sihost.exeexecutable
MD5:FD2E81D218245B06D8AF441D559B5F52
SHA256:7A18AE231B2530D378D19C26BBFC51C427D382838145DBAD4495BA5AD3B473F4
7268powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_px0p02yo.rmy.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
5964powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_vg0xmryi.n5p.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
8052powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_qzbcjiuh.irp.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
8052powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_coq2agd4.rhf.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
5384powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_rlki2wjb.tmr.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
5680lsass.exeC:\Program Files (x86)\Microsoft\Edge\Application\lsass.exeexecutable
MD5:FD2E81D218245B06D8AF441D559B5F52
SHA256:7A18AE231B2530D378D19C26BBFC51C427D382838145DBAD4495BA5AD3B473F4
7840powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_4m1yc3gy.xfm.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
8124powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_fm1khuts.ang.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
83
DNS requests
37
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7408
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7408
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5676
SearchApp.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
5676
SearchApp.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
whitelisted
5676
SearchApp.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6252
backgroundTaskHost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D
unknown
whitelisted
6400
backgroundTaskHost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
2112
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1.1.1.1:443
whitelisted
172.67.191.102:443
unknown
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 2.16.241.19
  • 2.16.241.12
whitelisted
google.com
  • 142.250.185.238
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 23.52.120.96
whitelisted
client.wns.windows.com
  • 172.211.123.248
  • 172.211.123.250
whitelisted
go.microsoft.com
  • 95.100.186.9
whitelisted
login.live.com
  • 20.190.159.0
  • 20.190.159.2
  • 40.126.31.67
  • 40.126.31.0
  • 20.190.159.4
  • 20.190.159.68
  • 40.126.31.71
  • 20.190.159.128
whitelisted
ocsp.digicert.com
  • 2.23.77.188
  • 184.30.131.245
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted

Threats

No threats detected
No debug info