File name:

cb7b2073f4b7a81d1e0879dc71338a2088004597310d1f9bd381648e20cae23e

Full analysis: https://app.any.run/tasks/4ae330bd-ebf3-480c-ba55-b77cdf9d5b86
Verdict: Malicious activity
Threats:

Orcus is a modular Remote Access Trojan with some unusual functions. This RAT enables attackers to create plugins using a custom development library and offers a robust core feature set that makes it one of the most dangerous malicious programs in its class.

Analysis date: December 14, 2024, 01:06:10
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
rat
orcus
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections
MD5:

75785429EC057CF563DEC468D1048A18

SHA1:

495BBF43C88514D4BC60D0CB6DEAFD4465AEA4ED

SHA256:

CB7B2073F4B7A81D1E0879DC71338A2088004597310D1F9BD381648E20CAE23E

SSDEEP:

98304:mfwOd+hhh3H6aSIJaxkGEWemniR1z2ScRcDkO9z+XtBclOZj1kTvRvHZ41u0nrER:f2Qn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Orcus is detected

      • JJSploit_8.10.7_x64-setup_bundle.exe (PID: 5568)
      • JJSploit_8.10.7_x64-setup_bundle.exe (PID: 3000)
      • $77RegAsm.exe (PID: 4876)
      • CasPol.exe (PID: 4640)
      • $77RegAsm.exe (PID: 2380)
      • $77RegAsm.exe (PID: 3032)
      • CasPol.exe (PID: 5576)
      • $77RegAsm.exe (PID: 6096)
      • InstallUtil.exe (PID: 2076)
      • $77RegAsm.exe (PID: 5316)
      • InstallUtil.exe (PID: 4320)
      • $77RegAsm.exe (PID: 4668)
      • $77RegAsm.exe (PID: 5536)
    • ORCUS has been detected (YARA)

      • CasPol.exe (PID: 5576)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • cb7b2073f4b7a81d1e0879dc71338a2088004597310d1f9bd381648e20cae23e.exe (PID: 3612)
      • JJSploit_8.10.7_x64-setup_bundle.exe (PID: 5568)
      • JJSploit_8.10.7_x64-setup_bundle.exe (PID: 3000)
      • CasPol.exe (PID: 4640)
      • CasPol.exe (PID: 5576)
    • Process drops legitimate windows executable

      • cb7b2073f4b7a81d1e0879dc71338a2088004597310d1f9bd381648e20cae23e.exe (PID: 3612)
      • JJSploit_8.10.7_x64-setup_bundle.exe (PID: 3000)
    • Starts a Microsoft application from unusual location

      • JJSploit_8.10.7_x64-setup_bundle.exe (PID: 5568)
      • JJSploit_8.10.7_x64-setup_bundle.exe (PID: 3000)
    • Executable content was dropped or overwritten

      • cb7b2073f4b7a81d1e0879dc71338a2088004597310d1f9bd381648e20cae23e.exe (PID: 3612)
      • JJSploit_8.10.7_x64-setup_bundle.exe (PID: 3000)
    • Application launched itself

      • JJSploit_8.10.7_x64-setup_bundle.exe (PID: 5568)
    • The process creates files with name similar to system file names

      • JJSploit_8.10.7_x64-setup_bundle.exe (PID: 3000)
    • Starts itself from another location

      • JJSploit_8.10.7_x64-setup_bundle.exe (PID: 3000)
    • The process executes via Task Scheduler

      • $77RegAsm.exe (PID: 2380)
      • $77RegAsm.exe (PID: 6096)
      • $77RegAsm.exe (PID: 3032)
      • $77RegAsm.exe (PID: 5316)
      • $77RegAsm.exe (PID: 4668)
      • $77RegAsm.exe (PID: 5536)
    • Connects to unusual port

      • CasPol.exe (PID: 5576)
  • INFO

    • Checks supported languages

      • cb7b2073f4b7a81d1e0879dc71338a2088004597310d1f9bd381648e20cae23e.exe (PID: 3612)
      • JJSploit_8.10.7_x64-setup.exe (PID: 3840)
      • JJSploit_8.10.7_x64-setup_bundle.exe (PID: 5568)
      • JJSploit_8.10.7_x64-setup_bundle.exe (PID: 3000)
      • $77RegAsm.exe (PID: 4876)
      • $77RegAsm.exe (PID: 2380)
      • CasPol.exe (PID: 4640)
      • InstallUtil.exe (PID: 2076)
      • CasPol.exe (PID: 5576)
      • $77RegAsm.exe (PID: 3032)
      • $77RegAsm.exe (PID: 6096)
      • $77RegAsm.exe (PID: 5316)
      • InstallUtil.exe (PID: 4320)
      • $77RegAsm.exe (PID: 4668)
      • $77RegAsm.exe (PID: 5536)
    • Reads the machine GUID from the registry

      • JJSploit_8.10.7_x64-setup_bundle.exe (PID: 5568)
      • JJSploit_8.10.7_x64-setup_bundle.exe (PID: 3000)
      • $77RegAsm.exe (PID: 2380)
      • $77RegAsm.exe (PID: 4876)
      • CasPol.exe (PID: 4640)
      • CasPol.exe (PID: 5576)
      • $77RegAsm.exe (PID: 6096)
      • $77RegAsm.exe (PID: 3032)
      • InstallUtil.exe (PID: 2076)
      • $77RegAsm.exe (PID: 5316)
      • InstallUtil.exe (PID: 4320)
      • $77RegAsm.exe (PID: 4668)
      • $77RegAsm.exe (PID: 5536)
    • Process checks computer location settings

      • cb7b2073f4b7a81d1e0879dc71338a2088004597310d1f9bd381648e20cae23e.exe (PID: 3612)
      • JJSploit_8.10.7_x64-setup_bundle.exe (PID: 5568)
      • JJSploit_8.10.7_x64-setup_bundle.exe (PID: 3000)
    • Reads the computer name

      • cb7b2073f4b7a81d1e0879dc71338a2088004597310d1f9bd381648e20cae23e.exe (PID: 3612)
      • JJSploit_8.10.7_x64-setup_bundle.exe (PID: 5568)
      • JJSploit_8.10.7_x64-setup_bundle.exe (PID: 3000)
      • $77RegAsm.exe (PID: 4876)
      • CasPol.exe (PID: 4640)
      • $77RegAsm.exe (PID: 2380)
      • $77RegAsm.exe (PID: 6096)
      • CasPol.exe (PID: 5576)
      • $77RegAsm.exe (PID: 3032)
      • InstallUtil.exe (PID: 2076)
      • $77RegAsm.exe (PID: 5316)
      • InstallUtil.exe (PID: 4320)
      • $77RegAsm.exe (PID: 4668)
      • $77RegAsm.exe (PID: 5536)
    • Create files in a temporary directory

      • cb7b2073f4b7a81d1e0879dc71338a2088004597310d1f9bd381648e20cae23e.exe (PID: 3612)
    • The process uses the downloaded file

      • cb7b2073f4b7a81d1e0879dc71338a2088004597310d1f9bd381648e20cae23e.exe (PID: 3612)
      • JJSploit_8.10.7_x64-setup_bundle.exe (PID: 5568)
      • JJSploit_8.10.7_x64-setup_bundle.exe (PID: 3000)
      • CasPol.exe (PID: 4640)
      • CasPol.exe (PID: 5576)
    • Creates files in the program directory

      • JJSploit_8.10.7_x64-setup_bundle.exe (PID: 3000)
    • Reads the software policy settings

      • CasPol.exe (PID: 5576)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Orcus

(PID) Process(5576) CasPol.exe
C2 (3)38135.client.sudorat.top:38135
185.37.62.158:38135
31.44.184.52:38135
Keys
AES9c50022dd3337baebd4331d3985699b51b5ddf6826d37ac4261856ef368c8359
Salt
Options
AutostartBuilderProperty
AutostartMethodDisable
TaskSchedulerTaskNamesudik
TaskHighestPrivilegestrue
AutoStealtrue
Injecttrue
RegistryHiddenStarttrue
RegistryKeyNameSudik
TryAllAutostartMethodsOnFailtrue
ChangeAssemblyInformationBuilderProperty
ChangeAssemblyInformationfalse
AssemblyTitlenull
AssemblyDescriptionnull
AssemblyCompanyNamenull
AssemblyProductNamenull
AssemblyCopyrightnull
AssemblyTrademarksnull
AssemblyProductVersion1.0.0.0
AssemblyFileVersion1.0.0.0
ChangeCreationDateBuilderProperty
IsEnabledfalse
NewCreationDate2016-11-05T21:17:40
ChangeIconBuilderProperty
ChangeIconfalse
IconPathnull
ClientTagBuilderProperty
ClientTagMamont
DataFolderBuilderProperty
PathC:\ProgramData\
DefaultPrivilegesBuilderProperty
RequireAdministratorRightstrue
DisableInstallationPromptBuilderProperty
IsDisabledtrue
FrameworkVersionBuilderProperty
FrameworkVersionNET35
HideFileBuilderProperty
HideFiletrue
InstallationLocationBuilderProperty
PathC:\ProgramData\$77RegAsm.exe
InstallBuilderProperty
Installtrue
KeyloggerBuilderProperty
IsEnabledfalse
MutexBuilderProperty
Mutexsudo_hukjod904skbxj09l4njrec7guj3gu0r
ProxyBuilderProperty
ProxyOptionNone
ProxyAddressnull
ProxyPort1080
ProxyType2
ReconnectDelayProperty
Delay10000
RequireAdministratorPrivilegesInstallerBuilderProperty
RequireAdministratorPrivilegestrue
RespawnTaskBuilderProperty
IsEnabledtrue
TaskNameRegAsm
ServiceBuilderProperty
Installfalse
SetRunProgramAsAdminFlagBuilderProperty
SetFlagtrue
WatchdogBuilderProperty
IsEnabledfalse
Nameaga.exe
WatchdogLocationAppData
PreventFileDeletionfalse
Plugins (0)
No Malware configuration.

TRiD

.exe | InstallShield setup (53.2)
.exe | Win32 Executable Delphi generic (17.5)
.scr | Windows screen saver (16.1)
.exe | Win32 Executable (generic) (5.5)
.exe | Win16/32 Executable Delphi generic (2.5)

EXIF

EXE

Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: -
OSVersion: 4
EntryPoint: 0x20cc
UninitializedDataSize: -
InitializedDataSize: 3127296
CodeSize: 5120
LinkerVersion: 2.25
PEType: PE32
ImageFileCharacteristics: Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
TimeStamp: 1992:06:19 22:22:17+00:00
MachineType: Intel 386 or later, and compatibles
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
142
Monitored processes
22
Malicious processes
14
Suspicious processes
0

Behavior graph

Click at the process to see the details
start cb7b2073f4b7a81d1e0879dc71338a2088004597310d1f9bd381648e20cae23e.exe jjsploit_8.10.7_x64-setup.exe no specs jjsploit_8.10.7_x64-setup.exe #ORCUS jjsploit_8.10.7_x64-setup_bundle.exe no specs #ORCUS jjsploit_8.10.7_x64-setup_bundle.exe #ORCUS $77regasm.exe no specs #ORCUS $77regasm.exe no specs caspol.exe no specs #ORCUS caspol.exe no specs #ORCUS $77regasm.exe no specs caspol.exe no specs caspol.exe no specs #ORCUS caspol.exe #ORCUS $77regasm.exe no specs installutil.exe no specs installutil.exe no specs #ORCUS installutil.exe no specs #ORCUS $77regasm.exe no specs #ORCUS installutil.exe no specs svchost.exe #ORCUS $77regasm.exe no specs #ORCUS $77regasm.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3612"C:\Users\admin\Desktop\cb7b2073f4b7a81d1e0879dc71338a2088004597310d1f9bd381648e20cae23e.exe" C:\Users\admin\Desktop\cb7b2073f4b7a81d1e0879dc71338a2088004597310d1f9bd381648e20cae23e.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\cb7b2073f4b7a81d1e0879dc71338a2088004597310d1f9bd381648e20cae23e.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shell32.dll
4384"C:\Users\admin\AppData\Local\Temp\JJSploit_8.10.7_x64-setup.exe" C:\Users\admin\AppData\Local\Temp\JJSploit_8.10.7_x64-setup.execb7b2073f4b7a81d1e0879dc71338a2088004597310d1f9bd381648e20cae23e.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\jjsploit_8.10.7_x64-setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
3840"C:\Users\admin\AppData\Local\Temp\JJSploit_8.10.7_x64-setup.exe" C:\Users\admin\AppData\Local\Temp\JJSploit_8.10.7_x64-setup.exe
cb7b2073f4b7a81d1e0879dc71338a2088004597310d1f9bd381648e20cae23e.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\jjsploit_8.10.7_x64-setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
5568"C:\Users\admin\AppData\Local\Temp\JJSploit_8.10.7_x64-setup_bundle.exe" C:\Users\admin\AppData\Local\Temp\JJSploit_8.10.7_x64-setup_bundle.exe
cb7b2073f4b7a81d1e0879dc71338a2088004597310d1f9bd381648e20cae23e.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
IP Configuration Utility
Exit code:
0
Version:
10.0.19041.320
Modules
Images
c:\users\admin\appdata\local\temp\jjsploit_8.10.7_x64-setup_bundle.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
3000"C:\Users\admin\AppData\Local\Temp\JJSploit_8.10.7_x64-setup_bundle.exe" /waitC:\Users\admin\AppData\Local\Temp\JJSploit_8.10.7_x64-setup_bundle.exe
JJSploit_8.10.7_x64-setup_bundle.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
IP Configuration Utility
Exit code:
0
Version:
10.0.19041.320
Modules
Images
c:\users\admin\appdata\local\temp\jjsploit_8.10.7_x64-setup_bundle.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
4876"C:\ProgramData\$77RegAsm.exe" C:\ProgramData\$77RegAsm.exe
JJSploit_8.10.7_x64-setup_bundle.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
IP Configuration Utility
Exit code:
0
Version:
10.0.19041.320
Modules
Images
c:\programdata\$77regasm.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
2380"C:\ProgramData\$77RegAsm.exe"C:\ProgramData\$77RegAsm.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
IP Configuration Utility
Exit code:
0
Version:
10.0.19041.320
Modules
Images
c:\programdata\$77regasm.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
4984"C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe$77RegAsm.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft .NET Framework CAS Policy Manager
Exit code:
4294967295
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\caspol.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
4640"C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
$77RegAsm.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft .NET Framework CAS Policy Manager
Exit code:
0
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\caspol.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
6096"C:\ProgramData\$77RegAsm.exe"C:\ProgramData\$77RegAsm.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
IP Configuration Utility
Exit code:
0
Version:
10.0.19041.320
Modules
Images
c:\programdata\$77regasm.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
Total events
6 615
Read events
6 611
Write events
4
Delete events
0

Modification events

(PID) Process:(3612) cb7b2073f4b7a81d1e0879dc71338a2088004597310d1f9bd381648e20cae23e.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
(PID) Process:(5568) JJSploit_8.10.7_x64-setup_bundle.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
(PID) Process:(3000) JJSploit_8.10.7_x64-setup_bundle.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
Executable files
3
Suspicious files
0
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
3000JJSploit_8.10.7_x64-setup_bundle.exeC:\ProgramData\$77RegAsm.exeexecutable
MD5:A5C760E458503463ED3902BDBF605E4E
SHA256:790C0D272971A137154F73BB6CB829AC88A9FA9DCEAEE1E656392DC8BC1E0C32
3612cb7b2073f4b7a81d1e0879dc71338a2088004597310d1f9bd381648e20cae23e.exeC:\Users\admin\AppData\Local\Temp\JJSploit_8.10.7_x64-setup_bundle.exeexecutable
MD5:A5C760E458503463ED3902BDBF605E4E
SHA256:790C0D272971A137154F73BB6CB829AC88A9FA9DCEAEE1E656392DC8BC1E0C32
3000JJSploit_8.10.7_x64-setup_bundle.exeC:\ProgramData\$77RegAsm.exe.configxml
MD5:A2B76CEA3A59FA9AF5EA21FF68139C98
SHA256:F99EF5BF79A7C43701877F0BB0B890591885BB0A3D605762647CC8FFBF10C839
3612cb7b2073f4b7a81d1e0879dc71338a2088004597310d1f9bd381648e20cae23e.exeC:\Users\admin\AppData\Local\Temp\JJSploit_8.10.7_x64-setup.exeexecutable
MD5:26ABB9E459E5976F658CE80D6433F1B1
SHA256:60CC77B5D4210CEF0A9032908B179142F212155426FDAE48055C5F72811F7A12
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
21
DNS requests
7
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3584
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3584
svchost.exe
GET
200
2.20.245.137:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.20.245.137:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5200
RUXIMICS.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5200
RUXIMICS.exe
GET
200
2.20.245.137:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3584
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
192.168.100.255:138
whitelisted
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5200
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4712
MoUsoCoreWorker.exe
2.20.245.137:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
3584
svchost.exe
2.20.245.137:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
5200
RUXIMICS.exe
2.20.245.137:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
3584
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 51.104.136.2
whitelisted
google.com
  • 142.250.186.174
whitelisted
crl.microsoft.com
  • 2.20.245.137
  • 2.20.245.138
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
38135.client.sudorat.top
  • 185.37.62.158
unknown
self.events.data.microsoft.com
  • 20.42.65.89
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET DNS Query to a *.top domain - Likely Hostile
No debug info