File name:

525fdd584d9eb2256aba1d88d36ad76a.exe

Full analysis: https://app.any.run/tasks/b2efbc0b-061e-4a48-9386-a5e1f7f4601d
Verdict: Malicious activity
Threats:

RisePro, an information-stealing malware, targets a wide range of sensitive data, including credit cards, passwords, and cryptocurrency wallets. By compromising infected devices, RisePro can steal valuable information and potentially cause significant financial and personal losses for victims.

Analysis date: April 25, 2025, 08:29:23
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto
riseprostealer
autoit
autoit-loader
risepro
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

525FDD584D9EB2256ABA1D88D36AD76A

SHA1:

DC9374F8E849EAAE9BA18082219E98DDD9AB4FD6

SHA256:

8542D40FBB873286565F5092F51FE29AB0EA8E890344B0A6A7AA6BD498DA7F07

SSDEEP:

98304:yOBMYM4GjxxKuBP5bbYpem0odqsqQhMi69z4Id4eNI51/VHmFCi28JdIXqy2s0mu:P0cl5Zb

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • RISEPROSTEALER has been found (auto)

      • 525fdd584d9eb2256aba1d88d36ad76a.exe (PID: 7656)
    • Antivirus name has been found in the command line (generic signature)

      • findstr.exe (PID: 7804)
      • findstr.exe (PID: 7992)
      • findstr.exe (PID: 4988)
      • findstr.exe (PID: 1052)
    • Uses Task Scheduler to autorun other applications

      • Origin.pif (PID: 5280)
    • AutoIt loader has been detected (YARA)

      • Origin.pif (PID: 5280)
    • RISEPRO has been detected (YARA)

      • Origin.pif (PID: 8032)
    • Changes the Windows auto-update feature

      • Origin.pif (PID: 8032)
  • SUSPICIOUS

    • Executing commands from ".cmd" file

      • 525fdd584d9eb2256aba1d88d36ad76a.exe (PID: 7656)
      • 525fdd584d9eb2256aba1d88d36ad76a.exe (PID: 1348)
    • Reads security settings of Internet Explorer

      • 525fdd584d9eb2256aba1d88d36ad76a.exe (PID: 7656)
      • Origin.pif (PID: 7224)
      • 525fdd584d9eb2256aba1d88d36ad76a.exe (PID: 1348)
    • Starts CMD.EXE for commands execution

      • 525fdd584d9eb2256aba1d88d36ad76a.exe (PID: 7656)
      • cmd.exe (PID: 7700)
      • Origin.pif (PID: 7224)
      • 525fdd584d9eb2256aba1d88d36ad76a.exe (PID: 1348)
      • cmd.exe (PID: 780)
    • Get information on the list of running processes

      • cmd.exe (PID: 7700)
      • cmd.exe (PID: 780)
    • Application launched itself

      • cmd.exe (PID: 7700)
      • cmd.exe (PID: 780)
      • Origin.pif (PID: 5280)
    • Drops a file with a rarely used extension (PIF)

      • cmd.exe (PID: 7700)
      • Origin.pif (PID: 5280)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 7700)
      • cmd.exe (PID: 780)
    • Executable content was dropped or overwritten

      • cmd.exe (PID: 7700)
      • Origin.pif (PID: 5280)
    • Suspicious file concatenation

      • cmd.exe (PID: 7312)
      • cmd.exe (PID: 6112)
    • The executable file from the user directory is run by the CMD process

      • Origin.pif (PID: 7224)
      • 525fdd584d9eb2256aba1d88d36ad76a.exe (PID: 1348)
      • Origin.pif (PID: 5280)
    • Starts the AutoIt3 executable file

      • cmd.exe (PID: 7700)
      • cmd.exe (PID: 780)
      • Origin.pif (PID: 5280)
    • Starts application with an unusual extension

      • cmd.exe (PID: 7700)
      • cmd.exe (PID: 780)
      • Origin.pif (PID: 5280)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 7700)
      • cmd.exe (PID: 780)
    • There is functionality for taking screenshot (YARA)

      • Origin.pif (PID: 5280)
      • Origin.pif (PID: 8032)
    • Connects to unusual port

      • Origin.pif (PID: 8032)
  • INFO

    • Create files in a temporary directory

      • 525fdd584d9eb2256aba1d88d36ad76a.exe (PID: 7656)
      • 525fdd584d9eb2256aba1d88d36ad76a.exe (PID: 1348)
    • Checks supported languages

      • 525fdd584d9eb2256aba1d88d36ad76a.exe (PID: 7656)
      • Origin.pif (PID: 7224)
      • 525fdd584d9eb2256aba1d88d36ad76a.exe (PID: 1348)
      • Origin.pif (PID: 5280)
      • Origin.pif (PID: 8032)
    • Process checks computer location settings

      • 525fdd584d9eb2256aba1d88d36ad76a.exe (PID: 7656)
      • Origin.pif (PID: 7224)
      • 525fdd584d9eb2256aba1d88d36ad76a.exe (PID: 1348)
    • Reads the computer name

      • 525fdd584d9eb2256aba1d88d36ad76a.exe (PID: 7656)
      • Origin.pif (PID: 7224)
      • 525fdd584d9eb2256aba1d88d36ad76a.exe (PID: 1348)
      • Origin.pif (PID: 5280)
      • Origin.pif (PID: 8032)
    • Creates a new folder

      • cmd.exe (PID: 8160)
      • cmd.exe (PID: 5728)
    • Reads mouse settings

      • Origin.pif (PID: 7224)
      • Origin.pif (PID: 5280)
    • Creates files or folders in the user directory

      • Origin.pif (PID: 5280)
    • The sample compiled with english language support

      • Origin.pif (PID: 5280)
    • Checks proxy server information

      • slui.exe (PID: 4996)
    • Reads the software policy settings

      • slui.exe (PID: 4996)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

RisePro

(PID) Process(8032) Origin.pif
C2 (1)3.36.173.8:50500
Strings (55)\GHISLER\wcx_ftp.ini
\databases
\Minecraft
frug?0
\launcher_profiles.json
\Messengers
\Skype
UaEt,
\Growtopia\save.dat
C:\program files\steam
\config.json
\accounts.xml
\.minecraft\launcher_msa_credentials.bin
\Local Storage
\TLauncher
\accounts.txt
\FileZilla
\FeatherClient
\.feather\accounts.json
\Element\Local Storage
\save.dat
\LunarClient
\Games
\Signal
VaultCloseVault
\.minecraft\launcher_profiles.json
\Steam
\OpenVPN Connect\profiles
WSASend
\config
\Microsoft\Skype for Desktop\Local Storage
J~|Hw
\.purple
\.lunarclient\settings\games\accounts.txt
\wcx_ftp.ini
\accounts.json
C:\program files (x86)\steam
\Element
\launcher_accounts.json
S,{w_6
\.minecraft\launcher_accounts.json
\ICQ\0001
\OpenVPN Connect
logins
\Battle.net
\Session Storage
\Pidgin
VaultOpenVault
\launcher_msa_credentials.bin
\tlauncher_profiles.json
\ey_tokens.txt
\TotalCommander
\Growtopia
APPDATA
VaultGetItem
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2012:02:24 19:19:54+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 10
CodeSize: 28160
InitializedDataSize: 445952
UninitializedDataSize: 16896
EntryPoint: 0x3883
OSVersion: 5
ImageVersion: 6
SubsystemVersion: 5
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
171
Monitored processes
30
Malicious processes
8
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 525fdd584d9eb2256aba1d88d36ad76a.exe no specs cmd.exe conhost.exe no specs tasklist.exe no specs findstr.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs origin.pif no specs timeout.exe no specs cmd.exe conhost.exe no specs 525fdd584d9eb2256aba1d88d36ad76a.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs origin.pif timeout.exe no specs schtasks.exe no specs conhost.exe no specs #RISEPRO origin.pif slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
780"C:\Windows\System32\cmd.exe" /k copy Emotions Emotions.cmd & Emotions.cmd & exitC:\Windows\SysWOW64\cmd.exe525fdd584d9eb2256aba1d88d36ad76a.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
9009
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1052findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe" C:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1056tasklist C:\Windows\SysWOW64\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
1180timeout 15C:\Windows\SysWOW64\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
timeout - pauses command processing
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\timeout.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
1348C:\Users\admin\AppData\Local\Temp\525fdd584d9eb2256aba1d88d36ad76a.exeC:\Users\admin\AppData\Local\Temp\525fdd584d9eb2256aba1d88d36ad76a.execmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\525fdd584d9eb2256aba1d88d36ad76a.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
1660tasklist C:\Windows\SysWOW64\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
2140"C:\WINDOWS\SysWOW64\cmd.exe" /c C:\Users\admin\AppData\Local\Temp\525fdd584d9eb2256aba1d88d36ad76a.exeC:\Windows\SysWOW64\cmd.exe
Origin.pif
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
4784\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeschtasks.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4892\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4988findstr /I "wrsa.exe opssvc.exe" C:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
4 291
Read events
4 230
Write events
35
Delete events
26

Modification events

(PID) Process:(8032) Origin.pifKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{C8B88496-0CF0-4950-8DC9-51B1E6CCA18F}Machine\Software\Policies\Microsoft\AppHVSI
Operation:writeName:AllowAppHVSI_ProviderSet
Value:
0
(PID) Process:(8032) Origin.pifKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{C8B88496-0CF0-4950-8DC9-51B1E6CCA18F}Machine\Software\Policies\Microsoft\EdgeUpdate
Operation:writeName:UpdateDefault
Value:
0
(PID) Process:(8032) Origin.pifKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{C8B88496-0CF0-4950-8DC9-51B1E6CCA18F}Machine\Software\Policies\Microsoft\Windows\Network Connections
Operation:writeName:NC_DoNotShowLocalOnlyIcon
Value:
1
(PID) Process:(8032) Origin.pifKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{C8B88496-0CF0-4950-8DC9-51B1E6CCA18F}Machine\Software\Policies\Microsoft\Windows\Windows Feeds
Operation:writeName:EnableFeeds
Value:
0
(PID) Process:(8032) Origin.pifKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{C8B88496-0CF0-4950-8DC9-51B1E6CCA18F}Machine\Software\Policies\Microsoft\Windows\WindowsUpdate
Operation:writeName:WUServer
Value:
http://neverupdatewindows10.com
(PID) Process:(8032) Origin.pifKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{C8B88496-0CF0-4950-8DC9-51B1E6CCA18F}Machine\Software\Policies\Microsoft\Windows\WindowsUpdate
Operation:writeName:WUStatusServer
Value:
http://neverupdatewindows10.com
(PID) Process:(8032) Origin.pifKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{C8B88496-0CF0-4950-8DC9-51B1E6CCA18F}Machine\Software\Policies\Microsoft\Windows\WindowsUpdate
Operation:writeName:UpdateServiceUrlAlternate
Value:
http://neverupdatewindows10.com
(PID) Process:(8032) Origin.pifKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{C8B88496-0CF0-4950-8DC9-51B1E6CCA18F}Machine\Software\Policies\Microsoft\Windows\WindowsUpdate
Operation:writeName:**del.FillEmptyContentUrls
Value:
(PID) Process:(8032) Origin.pifKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{C8B88496-0CF0-4950-8DC9-51B1E6CCA18F}Machine\Software\Policies\Microsoft\Windows\WindowsUpdate\AU
Operation:writeName:UseWUServer
Value:
1
(PID) Process:(8032) Origin.pifKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Group Policy Objects\{C8B88496-0CF0-4950-8DC9-51B1E6CCA18F}Machine\Software\Policies\Microsoft\Windows\WindowsUpdate\AU
Operation:writeName:NoAutoUpdate
Value:
0
Executable files
2
Suspicious files
49
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
7656525fdd584d9eb2256aba1d88d36ad76a.exeC:\Users\admin\AppData\Local\Temp\Vendorbinary
MD5:3032F7CAD7D5FDC76480D35C1B96F1D7
SHA256:8787ADE46BC3D7F369535A52AD0DDEEFB014652D8E2B83A531A7498E2770C2E3
7656525fdd584d9eb2256aba1d88d36ad76a.exeC:\Users\admin\AppData\Local\Temp\Quebecbinary
MD5:A8E1EEDC8535B6279C38AFCACF58FD7E
SHA256:DDF7E69C7CEC0A248D18BE08965A74F2F05755541258AEFA3DCA0CEA68186794
7656525fdd584d9eb2256aba1d88d36ad76a.exeC:\Users\admin\AppData\Local\Temp\Violencebinary
MD5:A8592B01E55B70C3C7D82383CBEA914B
SHA256:BA7160B3E08911B714F3AC8A40F2222745E31A187811BB69CEDCDF27AD83007C
7656525fdd584d9eb2256aba1d88d36ad76a.exeC:\Users\admin\AppData\Local\Temp\Severebinary
MD5:496BC58AB55492C6FF50B4B5FB12226D
SHA256:3795AE53D60FD640A16642A2585F12783D84E963DE9C1A605286977511381A5A
7656525fdd584d9eb2256aba1d88d36ad76a.exeC:\Users\admin\AppData\Local\Temp\Radiusbinary
MD5:1D5D54B6E631BFE5326A58FD4F4E51A5
SHA256:1539BC762107D3365CC8B89200F744FE6128180DF90624697C5A01351C66EEDE
7656525fdd584d9eb2256aba1d88d36ad76a.exeC:\Users\admin\AppData\Local\Temp\Haybinary
MD5:A353180038BC0C56585D8B18BCD2D039
SHA256:3BC8119C6931103ABD71E920A57AB160331201005BD379236240C499E6811D1E
7656525fdd584d9eb2256aba1d88d36ad76a.exeC:\Users\admin\AppData\Local\Temp\Portraitsbinary
MD5:A88120E86BA6642F82BA2854752F752B
SHA256:403446E9ADF7A1B92B7B067933DA55A2E16A866BB317C5CF1884A7F2B3D3FEF1
7656525fdd584d9eb2256aba1d88d36ad76a.exeC:\Users\admin\AppData\Local\Temp\Chadbinary
MD5:827E7D95831EA2B7AE99AFB191C98832
SHA256:BDD60D53935978F3ADF4DC5AEFAF8156360F0C680E387A91AF7C4E1FC8AFDD25
7656525fdd584d9eb2256aba1d88d36ad76a.exeC:\Users\admin\AppData\Local\Temp\Conveniencebinary
MD5:B0F0B5535514047C83C7B2FA25324DCC
SHA256:5754A22B9CCA09B0E018139D55BC32FC3206E399D416DB20F7207AA9F5A38425
7656525fdd584d9eb2256aba1d88d36ad76a.exeC:\Users\admin\AppData\Local\Temp\Racebinary
MD5:9EEDB42201838CBA7570A89AD64AD7F2
SHA256:1D0B6945F207DBF0A5F014AB15A124061F4BACF2C7198A52BE22549B24DF7A7E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
40
DNS requests
22
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7944
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7944
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
5496
MoUsoCoreWorker.exe
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.52.120.96:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
23.52.120.96:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.3:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 51.104.136.2
whitelisted
google.com
  • 142.250.185.142
whitelisted
crl.microsoft.com
  • 23.53.40.178
  • 23.53.40.176
whitelisted
www.microsoft.com
  • 23.52.120.96
whitelisted
client.wns.windows.com
  • 172.211.123.248
  • 172.211.123.249
whitelisted
login.live.com
  • 20.190.160.3
  • 20.190.160.66
  • 40.126.32.74
  • 20.190.160.67
  • 40.126.32.138
  • 20.190.160.132
  • 20.190.160.131
  • 20.190.160.64
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
jZFqZYoOtpryMyRHD.jZFqZYoOtpryMyRHD
unknown
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted

Threats

No threats detected
No debug info