File name:

趣学Python算法100例 中文PDF高清版_37110405807.exe

Full analysis: https://app.any.run/tasks/eb5e579e-d2ce-4388-86e8-2fdec4c9649a
Verdict: Malicious activity
Analysis date: September 13, 2024, 21:28:03
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

65C6C55FF7A297CB8038ED701D6CDEF1

SHA1:

70BC9FABBC72224D3AD5AD54211E2E6865AEFC9C

SHA256:

8F1D957803F3501D26F385DF4F2F92408B9BD1CBF825AC7BCE3584A495253486

SSDEEP:

98304:2TOYcpeE6kT/hh5UhamPSzGOljFbY/qAt8Z06Sgn6W9BO+xmLaGDaQHmm/z:moehkKhhaz/lBbY/qAtifSZOt8aeb

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • 趣学Python算法100例 中文PDF高清版_37110405807.exe (PID: 4876)
    • Searches for installed software

      • 趣学Python算法100例 中文PDF高清版_37110405807.exe (PID: 4876)
    • Adds/modifies Windows certificates

      • 趣学Python算法100例 中文PDF高清版_37110405807.exe (PID: 4876)
    • Checks Windows Trust Settings

      • 趣学Python算法100例 中文PDF高清版_37110405807.exe (PID: 4876)
  • INFO

    • Checks supported languages

      • 趣学Python算法100例 中文PDF高清版_37110405807.exe (PID: 4876)
    • Creates files or folders in the user directory

      • 趣学Python算法100例 中文PDF高清版_37110405807.exe (PID: 4876)
    • Reads the machine GUID from the registry

      • 趣学Python算法100例 中文PDF高清版_37110405807.exe (PID: 4876)
    • Creates files in the program directory

      • 趣学Python算法100例 中文PDF高清版_37110405807.exe (PID: 4876)
    • Reads the computer name

      • 趣学Python算法100例 中文PDF高清版_37110405807.exe (PID: 4876)
    • Checks proxy server information

      • 趣学Python算法100例 中文PDF高清版_37110405807.exe (PID: 4876)
    • Create files in a temporary directory

      • 趣学Python算法100例 中文PDF高清版_37110405807.exe (PID: 4876)
    • Reads the software policy settings

      • 趣学Python算法100例 中文PDF高清版_37110405807.exe (PID: 4876)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (35.8)
.exe | Win64 Executable (generic) (31.7)
.scr | Windows screen saver (15)
.dll | Win32 Dynamic Link Library (generic) (7.5)
.exe | Win32 Executable (generic) (5.1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:11:24 05:24:43+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.16
CodeSize: 649728
InitializedDataSize: 1029120
UninitializedDataSize: -
EntryPoint: 0x98d55a
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 6.1022.1135.1123
ProductVersionNumber: 6.1022.1135.1123
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileDescription: 安装程序
FileVersion: 6.1022.1135.1123
InternalName: inst.exe
LegalCopyright: Copyright (C) 2011-2022
OriginalFileName: inst.exe
ProductName: 安装程序
ProductVersion: 6.1022.1135.1123
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
122
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 趣学python算法100例 中文pdf高清版_37110405807.exe 趣学python算法100例 中文pdf高清版_37110405807.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4876"C:\Users\admin\AppData\Local\Temp\趣学Python算法100例 中文PDF高清版_37110405807.exe" C:\Users\admin\AppData\Local\Temp\趣学Python算法100例 中文PDF高清版_37110405807.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
安装程序
Version:
6.1022.1135.1123
Modules
Images
c:\users\admin\appdata\local\temp\趣学python算法100例 中文pdf高清版_37110405807.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
7116"C:\Users\admin\AppData\Local\Temp\趣学Python算法100例 中文PDF高清版_37110405807.exe" C:\Users\admin\AppData\Local\Temp\趣学Python算法100例 中文PDF高清版_37110405807.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
安装程序
Exit code:
3221226540
Version:
6.1022.1135.1123
Modules
Images
c:\users\admin\appdata\local\temp\趣学python算法100例 中文pdf高清版_37110405807.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
Total events
5 765
Read events
5 755
Write events
8
Delete events
2

Modification events

(PID) Process:(4876) 趣学Python算法100例 中文PDF高清版_37110405807.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates
Operation:delete valueName:3679CA35668772304D30A5FB873B0FA77BB70D54
Value:
(PID) Process:(4876) 趣学Python算法100例 中文PDF高清版_37110405807.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3679CA35668772304D30A5FB873B0FA77BB70D54
Operation:writeName:Blob
Value:
0400000001000000100000008EADB501AA4D81E48C1DD1E1140095191D0000000100000010000000439B4D52906DF7A01771D729528723B37F0000000100000016000000301406082B0601050507030306082B06010505070301090000000100000034000000303206082B0601050507030206082B0601050507030306082B0601050507030406082B0601050507030106082B060105050703080B000000010000006000000056006500720069005300690067006E00200055006E006900760065007200730061006C00200052006F006F0074002000430065007200740069006600690063006100740069006F006E00200041007500740068006F00720069007400790000000F000000010000002000000017FE16F394EC70A5BB0C6784CAB40B1E61025AE9D50ECAA0531D6B4D997BBC590300000001000000140000003679CA35668772304D30A5FB873B0FA77BB70D54190000000100000010000000AD6D6FF31B24013151F279E26A8C332453000000010000004200000030403021060B6086480186F8450107170630123010060A2B0601040182373C0101030200C0301B060567810C010330123010060A2B0601040182373C0101030200C06200000001000000200000002399561127A57125DE8CEFEA610DDF2FA078B5C8067F4E828290BFB860E84B3C140000000100000014000000B677FA6948479F5312D5C2EA07327607D19707197E000000010000000800000000C0032F2DF8D6012000000001000000BD040000308204B9308203A1A0030201020210401AC46421B31321030EBBE4121AC51D300D06092A864886F70D01010B05003081BD310B300906035504061302555331173015060355040A130E566572695369676E2C20496E632E311F301D060355040B1316566572695369676E205472757374204E6574776F726B313A3038060355040B1331286329203230303820566572695369676E2C20496E632E202D20466F7220617574686F72697A656420757365206F6E6C79313830360603550403132F566572695369676E20556E6976657273616C20526F6F742043657274696669636174696F6E20417574686F72697479301E170D3038303430323030303030305A170D3337313230313233353935395A3081BD310B300906035504061302555331173015060355040A130E566572695369676E2C20496E632E311F301D060355040B1316566572695369676E205472757374204E6574776F726B313A3038060355040B1331286329203230303820566572695369676E2C20496E632E202D20466F7220617574686F72697A656420757365206F6E6C79313830360603550403132F566572695369676E20556E6976657273616C20526F6F742043657274696669636174696F6E20417574686F7269747930820122300D06092A864886F70D01010105000382010F003082010A0282010100C761375EB10134DB62D7159BFF585A8C2323D6608E91D79098837AE65819388CC5F6E56485B4A271FBEDBDB9DACD4D00B4C82D73A5C76971951F393CB244079CE80EFA4D4AC421DF29618F32226182C5871F6E8C7C5F16205144D1704F57EAE31CE3CC79EE58D80EC2B34593C02CE79A172B7B00377A413378E133E2F3101A7F872CBEF6F5F742E2E5BF8762895F004BDFC5DDE4754432413A1E716E69CB0B754608D1CAD22B95D0CFFBB9406B648C574DFC13117984ED5E54F6349F0801F3102506174ADAF11D7A666B986066A4D9EFD22E82F1F0EF09EA44C9156AE2036E33D3AC9F5500C7F6086A94B95FDCE033F18460F95B2711B4FC16F2BB566A80258D0203010001A381B23081AF300F0603551D130101FF040530030101FF300E0603551D0F0101FF040403020106306D06082B0601050507010C0461305FA15DA05B3059305730551609696D6167652F6769663021301F300706052B0E03021A04148FE5D31A86AC8D8E6BC3CF806AD448182C7B192E30251623687474703A2F2F6C6F676F2E766572697369676E2E636F6D2F76736C6F676F2E676966301D0603551D0E04160414B677FA6948479F5312D5C2EA07327607D1970719300D06092A864886F70D01010B050003820101004AF8F8B003E62C677BE4947763CC6E4CF97D0E0DDCC8B935B9704F63FA24FA6C838C479D3B63F39AF976329591B177BCAC9ABEB1E43121C68195565A0EB1C2D4B1A659ACF163CBB84C1D59904AEF9016281F5AAE10FB8150380C6CCCF13DC3F563E3B3E321C92439E9FD156646F41B11D04D73A37D46F93DEDA85F62D4F13FF8E074572B189D81B4C428DA9497A570EBAC1DBE0711F0D5DBDDE58CF0D532B083E657E28FBFBEA1AABF3D1DB5D438EAD7B05C3A4F6A3F8FC0666C63AAE9D9A416F481D195140E7DCD9534D9D28F7073817B9C7EBD9861D845879890C5EB8630C635BFF0FFC35588834BEF05920671F2B89893B7ECCD8261F138E64F97982A5A8D
(PID) Process:(4876) 趣学Python算法100例 中文PDF高清版_37110405807.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\3679CA35668772304D30A5FB873B0FA77BB70D54
Operation:writeName:Blob
Value:
5C0000000100000004000000000800007E000000010000000800000000C0032F2DF8D601140000000100000014000000B677FA6948479F5312D5C2EA07327607D19707196200000001000000200000002399561127A57125DE8CEFEA610DDF2FA078B5C8067F4E828290BFB860E84B3C53000000010000004200000030403021060B6086480186F8450107170630123010060A2B0601040182373C0101030200C0301B060567810C010330123010060A2B0601040182373C0101030200C0190000000100000010000000AD6D6FF31B24013151F279E26A8C33240300000001000000140000003679CA35668772304D30A5FB873B0FA77BB70D540F000000010000002000000017FE16F394EC70A5BB0C6784CAB40B1E61025AE9D50ECAA0531D6B4D997BBC590B000000010000006000000056006500720069005300690067006E00200055006E006900760065007200730061006C00200052006F006F0074002000430065007200740069006600690063006100740069006F006E00200041007500740068006F0072006900740079000000090000000100000034000000303206082B0601050507030206082B0601050507030306082B0601050507030406082B0601050507030106082B060105050703087F0000000100000016000000301406082B0601050507030306082B060105050703011D0000000100000010000000439B4D52906DF7A01771D729528723B30400000001000000100000008EADB501AA4D81E48C1DD1E1140095192000000001000000BD040000308204B9308203A1A0030201020210401AC46421B31321030EBBE4121AC51D300D06092A864886F70D01010B05003081BD310B300906035504061302555331173015060355040A130E566572695369676E2C20496E632E311F301D060355040B1316566572695369676E205472757374204E6574776F726B313A3038060355040B1331286329203230303820566572695369676E2C20496E632E202D20466F7220617574686F72697A656420757365206F6E6C79313830360603550403132F566572695369676E20556E6976657273616C20526F6F742043657274696669636174696F6E20417574686F72697479301E170D3038303430323030303030305A170D3337313230313233353935395A3081BD310B300906035504061302555331173015060355040A130E566572695369676E2C20496E632E311F301D060355040B1316566572695369676E205472757374204E6574776F726B313A3038060355040B1331286329203230303820566572695369676E2C20496E632E202D20466F7220617574686F72697A656420757365206F6E6C79313830360603550403132F566572695369676E20556E6976657273616C20526F6F742043657274696669636174696F6E20417574686F7269747930820122300D06092A864886F70D01010105000382010F003082010A0282010100C761375EB10134DB62D7159BFF585A8C2323D6608E91D79098837AE65819388CC5F6E56485B4A271FBEDBDB9DACD4D00B4C82D73A5C76971951F393CB244079CE80EFA4D4AC421DF29618F32226182C5871F6E8C7C5F16205144D1704F57EAE31CE3CC79EE58D80EC2B34593C02CE79A172B7B00377A413378E133E2F3101A7F872CBEF6F5F742E2E5BF8762895F004BDFC5DDE4754432413A1E716E69CB0B754608D1CAD22B95D0CFFBB9406B648C574DFC13117984ED5E54F6349F0801F3102506174ADAF11D7A666B986066A4D9EFD22E82F1F0EF09EA44C9156AE2036E33D3AC9F5500C7F6086A94B95FDCE033F18460F95B2711B4FC16F2BB566A80258D0203010001A381B23081AF300F0603551D130101FF040530030101FF300E0603551D0F0101FF040403020106306D06082B0601050507010C0461305FA15DA05B3059305730551609696D6167652F6769663021301F300706052B0E03021A04148FE5D31A86AC8D8E6BC3CF806AD448182C7B192E30251623687474703A2F2F6C6F676F2E766572697369676E2E636F6D2F76736C6F676F2E676966301D0603551D0E04160414B677FA6948479F5312D5C2EA07327607D1970719300D06092A864886F70D01010B050003820101004AF8F8B003E62C677BE4947763CC6E4CF97D0E0DDCC8B935B9704F63FA24FA6C838C479D3B63F39AF976329591B177BCAC9ABEB1E43121C68195565A0EB1C2D4B1A659ACF163CBB84C1D59904AEF9016281F5AAE10FB8150380C6CCCF13DC3F563E3B3E321C92439E9FD156646F41B11D04D73A37D46F93DEDA85F62D4F13FF8E074572B189D81B4C428DA9497A570EBAC1DBE0711F0D5DBDDE58CF0D532B083E657E28FBFBEA1AABF3D1DB5D438EAD7B05C3A4F6A3F8FC0666C63AAE9D9A416F481D195140E7DCD9534D9D28F7073817B9C7EBD9861D845879890C5EB8630C635BFF0FFC35588834BEF05920671F2B89893B7ECCD8261F138E64F97982A5A8D
(PID) Process:(4876) 趣学Python算法100例 中文PDF高清版_37110405807.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\CommonDown
Operation:writeName:guid
Value:
{2A57FFF0-5460-4af3-B819-EC50D1B41562}
(PID) Process:(4876) 趣学Python算法100例 中文PDF高清版_37110405807.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(4876) 趣学Python算法100例 中文PDF高清版_37110405807.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(4876) 趣学Python算法100例 中文PDF高清版_37110405807.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(4876) 趣学Python算法100例 中文PDF高清版_37110405807.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ComMaster
Operation:writeName:mid
Value:
80342cb959da2233832ae840f019ccba8b56b331eb673be97c52113eab1cd1bc
(PID) Process:(4876) 趣学Python算法100例 中文PDF高清版_37110405807.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\ComMaster
Operation:writeName:m2
Value:
fe9694f777e256d0cc4755a6dd1f6ad7651f60d32bec
Executable files
0
Suspicious files
7
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
4876趣学Python算法100例 中文PDF高清版_37110405807.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\14561BF7422BB6F70A9CB14F5AA8A7DA_42A89BACAFEBDA5BA7ACA698B685B848der
MD5:2A97B9C1F435CED48AC465AD9D0F43FB
SHA256:E912806D5DAD06D3A700E57F0BD726F4B353B19AD07D6E2621FA091D95496A20
4876趣学Python算法100例 中文PDF高清版_37110405807.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_23FFFDCAABB8E63694AD1202ED02BF57binary
MD5:95481DA2B53912915527028C92E12042
SHA256:5F50FE443513531ED1610AAEC9FFF7DCDBBF3F3277308686BCE803EE20552E2A
4876趣学Python算法100例 中文PDF高清版_37110405807.exeC:\Program Files (x86)\Ludashi\{769CD81E-950C-43e4-9499-278E1B0189B7}.tfbinary
MD5:D64BFA8FBADC1CDC8D8EC996A5E9FB71
SHA256:945CA9C53D99DC5A913E83A5E45C5E5D4CD091D38BBE2A89EEB154C18592522A
4876趣学Python算法100例 中文PDF高清版_37110405807.exeC:\Users\admin\AppData\Local\Temp\{0B7698AC-91E5-4496-849C-23350FEE0EFA}.tfbinary
MD5:675B316D08403DDD11F9FB9220CED94A
SHA256:91A493959021ECF448CAA90A84F36BA49ED8DEE0F3C7BB9DB564D336F64C8F0D
4876趣学Python算法100例 中文PDF高清版_37110405807.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\14561BF7422BB6F70A9CB14F5AA8A7DA_42A89BACAFEBDA5BA7ACA698B685B848binary
MD5:3746C6D866A1AFE1CB22DD4960524B2C
SHA256:92EDCD3E4E4684B89BFDE0847801E445E083E3224F6021AC6DA5AF2B24758B05
4876趣学Python算法100例 中文PDF高清版_37110405807.exeC:\Program Files (x86)\Ludashi\{9BC38F00-0433-4ef4-AAA1-45CC9DF658D5}.tfbinary
MD5:112C6C14EE122702C62C358E498281C2
SHA256:452A56F37656DD9FEB51B3F06D2A02CA107508B4683B6F6F15EAE875BD780D4F
4876趣学Python算法100例 中文PDF高清版_37110405807.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_23FFFDCAABB8E63694AD1202ED02BF57binary
MD5:BB2D39BA0A901B6133947AE7C212D0E1
SHA256:E8B4464F87E902054AD19770E956E982116F1D0868DA37624FDE495E21054E69
4876趣学Python算法100例 中文PDF高清版_37110405807.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\get3[1].htmtext
MD5:231706540652C5D6D343D1BB5BAB046B
SHA256:9E52726780C0B6A1F571AEF45368DC016809AB64A47427C467E68C6D5C1DC05E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
29
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2120
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4876
趣学Python算法100例 中文PDF高清版_37110405807.exe
GET
200
139.224.193.172:80
http://s.ludashi.com/url2?pid=buysite_1120&type=xzq&action=ldsdownstart&appver=6.1022.1135.1123&modver=6.1022.1135.1123&mid=80342cb959da2233832ae840f019ccba&ex_ary[siteid]=1120&ex_ary[softid]=878806&ex_ary[os]=10.0.19045&ex_ary[sr]=0&ex_ary[bit]=1&ex_ary[tagid]=
unknown
whitelisted
4876
趣学Python算法100例 中文PDF高清版_37110405807.exe
GET
200
139.224.193.172:80
http://s.ludashi.com/url2?pid=buysite_1120&type=xzq&action=run&appver=6.1022.1135.1123&modver=6.1022.1135.1123&mid=80342cb959da2233832ae840f019ccba&ex_ary[siteid]=1120&ex_ary[softid]=878806&ex_ary[os]=10.0.19045&ex_ary[sr]=0&ex_ary[bit]=1&ex_ary[tagid]=
unknown
whitelisted
4876
趣学Python算法100例 中文PDF高清版_37110405807.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAoFmyX1Sz2HlMxmMUd1OKM%3D
unknown
whitelisted
4876
趣学Python算法100例 中文PDF高清版_37110405807.exe
POST
200
114.116.20.137:80
http://softmgr.ludashi.com/downloader/soft/reportNew
unknown
unknown
4876
趣学Python算法100例 中文PDF高清版_37110405807.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQlOydjtpho0%2Bholo77zGjGxETUEQQU8JyF%2FaKffY%2FJaLvV1IlNHb7TkP8CEA7t2z9YiVEKqNV8oV82zTU%3D
unknown
whitelisted
4876
趣学Python算法100例 中文PDF高清版_37110405807.exe
GET
200
114.115.218.83:80
http://api.ludashi.com/inst/get3
unknown
unknown
1712
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5544
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5544
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6276
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
448
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2120
MoUsoCoreWorker.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
3260
svchost.exe
40.115.3.253:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4876
趣学Python算法100例 中文PDF高清版_37110405807.exe
114.115.218.83:80
api.ludashi.com
China Unicom Beijing Province Network
CN
whitelisted
4876
趣学Python算法100例 中文PDF高清版_37110405807.exe
114.116.20.137:80
softmgr.ludashi.com
China Unicom Beijing Province Network
CN
whitelisted
4876
趣学Python算法100例 中文PDF高清版_37110405807.exe
139.224.193.172:80
s.ludashi.com
Hangzhou Alibaba Advertising Co.,Ltd.
CN
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted
google.com
  • 172.217.16.206
whitelisted
client.wns.windows.com
  • 40.115.3.253
whitelisted
api.ludashi.com
  • 114.115.218.83
whitelisted
softmgr.ludashi.com
  • 114.116.20.137
whitelisted
s.ludashi.com
  • 139.224.193.172
whitelisted
cdn-file-ssl-pc.ludashi.com
  • 180.163.147.215
  • 180.163.147.220
  • 180.163.147.218
  • 180.163.147.217
  • 180.163.147.219
  • 180.163.147.214
  • 180.163.147.216
  • 180.163.147.221
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 40.126.31.71
  • 20.190.159.73
  • 20.190.159.4
  • 20.190.159.2
  • 40.126.31.73
  • 20.190.159.68
  • 20.190.159.71
  • 20.190.159.75
whitelisted

Threats

No threats detected
No debug info