File name:

BakkesModSetup.zip

Full analysis: https://app.any.run/tasks/50acc429-f3de-4064-85a7-636e8788657e
Verdict: Malicious activity
Analysis date: March 29, 2025, 12:08:44
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
inno
installer
delphi
arch-doc
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

C6E0152420E778581A0C6365A2A9B3D6

SHA1:

C148956612DDD7EE5710E2CDD36CE0AA10AA9026

SHA256:

10C80FB4040AAA2FD66C1E46AC2A5D08E8992A60784DF68E5086EB9DEB585F17

SSDEEP:

98304:/tllry4KhrBNlQWwHo5wBBizXeqISj6m+giJxGPidk0Mh8DsmFNTjGdxvaHkDuQk:KthCeew7iagTfakx

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 6184)
    • Changes the autorun value in the registry

      • BakkesMod.exe (PID: 3132)
      • BakkesMod.exe (PID: 1052)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 6184)
      • BakkesModSetup.tmp (PID: 1132)
      • BakkesMod.exe (PID: 3132)
      • BakkesMod.exe (PID: 7084)
    • Executable content was dropped or overwritten

      • BakkesModSetup.exe (PID: 6476)
      • BakkesModSetup.exe (PID: 3100)
      • BakkesModSetup.tmp (PID: 2148)
      • BakkesMod.exe (PID: 3132)
      • BakkesMod.exe (PID: 1052)
    • Reads the Windows owner or organization settings

      • BakkesModSetup.tmp (PID: 2148)
    • Uses TASKKILL.EXE to kill process

      • BakkesModSetup.tmp (PID: 2148)
    • Creates file in the systems drive root

      • BakkesMod.exe (PID: 7084)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6184)
    • Process checks computer location settings

      • BakkesModSetup.tmp (PID: 1132)
    • Checks supported languages

      • BakkesModSetup.exe (PID: 3100)
      • BakkesModSetup.tmp (PID: 1132)
      • BakkesModSetup.tmp (PID: 2148)
      • BakkesMod.exe (PID: 3132)
      • BakkesMod.exe (PID: 7084)
      • BakkesMod.exe (PID: 1052)
      • BakkesModSetup.exe (PID: 6476)
    • Create files in a temporary directory

      • BakkesModSetup.exe (PID: 3100)
      • BakkesModSetup.tmp (PID: 2148)
      • BakkesMod.exe (PID: 3132)
      • BakkesMod.exe (PID: 7084)
      • BakkesMod.exe (PID: 1052)
      • BakkesModSetup.exe (PID: 6476)
    • Reads the computer name

      • BakkesModSetup.tmp (PID: 2148)
      • BakkesMod.exe (PID: 3132)
      • BakkesMod.exe (PID: 1052)
      • BakkesMod.exe (PID: 7084)
      • BakkesModSetup.tmp (PID: 1132)
    • Detects InnoSetup installer (YARA)

      • BakkesModSetup.exe (PID: 6476)
      • BakkesModSetup.tmp (PID: 1132)
      • BakkesModSetup.exe (PID: 3100)
      • BakkesModSetup.tmp (PID: 2148)
    • Compiled with Borland Delphi (YARA)

      • BakkesModSetup.tmp (PID: 1132)
      • BakkesModSetup.exe (PID: 6476)
      • BakkesModSetup.tmp (PID: 2148)
      • BakkesModSetup.exe (PID: 3100)
    • Creates files in the program directory

      • BakkesModSetup.tmp (PID: 2148)
    • Creates a software uninstall entry

      • BakkesModSetup.tmp (PID: 2148)
    • Creates files or folders in the user directory

      • BakkesMod.exe (PID: 3132)
      • BakkesMod.exe (PID: 1052)
    • Reads the software policy settings

      • slui.exe (PID: 1088)
      • slui.exe (PID: 728)
    • Manual execution by a user

      • notepad.exe (PID: 4696)
      • BakkesMod.exe (PID: 7084)
      • BakkesMod.exe (PID: 1052)
      • Taskmgr.exe (PID: 4200)
      • Taskmgr.exe (PID: 5984)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 4696)
    • Checks proxy server information

      • slui.exe (PID: 728)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2023:01:23 23:49:32
ZipCRC: 0x3be94663
ZipCompressedSize: 8168671
ZipUncompressedSize: 8743183
ZipFileName: BakkesModSetup.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
153
Monitored processes
19
Malicious processes
2
Suspicious processes
4

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe bakkesmodsetup.exe bakkesmodsetup.tmp no specs bakkesmodsetup.exe bakkesmodsetup.tmp taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs bakkesmod.exe slui.exe rundll32.exe no specs notepad.exe no specs bakkesmod.exe bakkesmod.exe taskmgr.exe no specs taskmgr.exe

Process information

PID
CMD
Path
Indicators
Parent process
672\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exetaskkill.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
728C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
1052"C:\Program Files\BakkesMod\BakkesMod.exe" C:\Program Files\BakkesMod\BakkesMod.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\program files\bakkesmod\bakkesmod.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1088"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
1116\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exetaskkill.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1132"C:\Users\admin\AppData\Local\Temp\is-QTD3I.tmp\BakkesModSetup.tmp" /SL5="$30264,7803864,941056,C:\Users\admin\AppData\Local\Temp\Rar$EXa6184.44598\BakkesModSetup.exe" C:\Users\admin\AppData\Local\Temp\is-QTD3I.tmp\BakkesModSetup.tmpBakkesModSetup.exe
User:
admin
Company:
BakkesMod
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-qtd3i.tmp\bakkesmodsetup.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\comdlg32.dll
c:\windows\syswow64\msvcrt.dll
2148"C:\Users\admin\AppData\Local\Temp\is-5J1LS.tmp\BakkesModSetup.tmp" /SL5="$80306,7803864,941056,C:\Users\admin\AppData\Local\Temp\Rar$EXa6184.44598\BakkesModSetup.exe" /SPAWNWND=$40270 /NOTIFYWND=$30264 C:\Users\admin\AppData\Local\Temp\is-5J1LS.tmp\BakkesModSetup.tmp
BakkesModSetup.exe
User:
admin
Company:
BakkesMod
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-5j1ls.tmp\bakkesmodsetup.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comdlg32.dll
2384C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
3100"C:\Users\admin\AppData\Local\Temp\Rar$EXa6184.44598\BakkesModSetup.exe" /SPAWNWND=$40270 /NOTIFYWND=$30264 C:\Users\admin\AppData\Local\Temp\Rar$EXa6184.44598\BakkesModSetup.exe
BakkesModSetup.tmp
User:
admin
Company:
BakkesMod
Integrity Level:
HIGH
Description:
BakkesMod Setup
Exit code:
0
Version:
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa6184.44598\bakkesmodsetup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
3132"C:\Program Files\BakkesMod\BakkesMod.exe"C:\Program Files\BakkesMod\BakkesMod.exe
BakkesModSetup.tmp
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\program files\bakkesmod\bakkesmod.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
Total events
8 153
Read events
8 037
Write events
101
Delete events
15

Modification events

(PID) Process:(6184) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6184) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6184) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6184) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\BakkesModSetup.zip
(PID) Process:(6184) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6184) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6184) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6184) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2148) BakkesModSetup.tmpKey:HKEY_CURRENT_USER\SOFTWARE\BakkesMod
Operation:writeName:InstallPath
Value:
C:\Program Files\BakkesMod
(PID) Process:(2148) BakkesModSetup.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{BF029534-4334-4CFC-B771-50B7EE54346F}_is1
Operation:writeName:Inno Setup: Setup Version
Value:
6.2.0
Executable files
53
Suspicious files
37
Text files
481
Unknown types
0

Dropped files

PID
Process
Filename
Type
3100BakkesModSetup.exeC:\Users\admin\AppData\Local\Temp\is-5J1LS.tmp\BakkesModSetup.tmpexecutable
MD5:8F4A51F9A89E8E04FC8A465436B5BBA9
SHA256:6C0C57A9DEA98D5A31DBF99D880DD828D094965397FE453F20FE186C55B33265
6184WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6184.44598\BakkesModSetup.exeexecutable
MD5:B2554EFC048201C086D7BE46F42D00BD
SHA256:D4581C971CA9DA0B40B609ED356A986B33E4E81289EDACD31DC7AB8348A14D20
2148BakkesModSetup.tmpC:\Users\admin\AppData\Local\Temp\is-NQ1LN.tmp\_isetup\_setup64.tmpexecutable
MD5:E4211D6D009757C078A9FAC7FF4F03D4
SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
2148BakkesModSetup.tmpC:\Program Files\BakkesMod\is-ST81B.tmpexecutable
MD5:AEA069292728AE441A5EE55729DD46B6
SHA256:AB8FA587AA83FC0526B29DCA0F342268721460F9EC31CEC2938547F81D583FCA
2148BakkesModSetup.tmpC:\Users\admin\AppData\Local\Temp\is-NQ1LN.tmp\_isetup\_isdecmp.dllexecutable
MD5:C6AE924AD02500284F7E4EFA11FA7CFC
SHA256:31D04C1E4BFDFA34704C142FA98F80C0A3076E4B312D6ADA57C4BE9D9C7DCF26
2148BakkesModSetup.tmpC:\Program Files\BakkesMod\unins000.exeexecutable
MD5:AEA069292728AE441A5EE55729DD46B6
SHA256:AB8FA587AA83FC0526B29DCA0F342268721460F9EC31CEC2938547F81D583FCA
3132BakkesMod.exeC:\Users\admin\AppData\Roaming\bakkesmod\bakkesmod\bakkesmodsdk\bakkesmod-patch.exeexecutable
MD5:70808566413A9E0F96496381AF7B120E
SHA256:34706EF576F97BE93A917D80EC8952521020ADA1B481AAC23525C13C620BFE72
2148BakkesModSetup.tmpC:\ProgramData\Microsoft\Windows\Start Menu\Programs\BakkesMod.lnkbinary
MD5:CE62E2FBB0FD7AF2CC3D831C60903BA6
SHA256:B26184CB1017138C9937B5DA69339809BF0A676F9300431105078FBF7D0B06EE
2148BakkesModSetup.tmpC:\Users\Public\Desktop\BakkesMod.lnkbinary
MD5:14FD1B4E11CF75D8BBDD5E9062762CD1
SHA256:8A9E36CDBE9713F76DA867B6E834F010BD6E8EA65DA522E7F32A84165EF72FBD
2148BakkesModSetup.tmpC:\Program Files\BakkesMod\BakkesMod.exeexecutable
MD5:11EFF18A407E2764C198D7B1E7DADB14
SHA256:7A6B97BF43453C47D905C6F49E3CC6EE8B70F0E289700AA6145F40577CA7B5D4
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
41
DNS requests
34
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
664
SIHClient.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
664
SIHClient.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
756
lsass.exe
GET
200
69.192.161.44:80
http://x1.c.lencr.org/
unknown
whitelisted
756
lsass.exe
GET
200
184.24.77.50:80
http://r10.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRpD%2BQVZ%2B1vf7U0RGQGBm8JZwdxcgQUdKR2KRcYVIUxN75n5gZYwLzFBXICEgQ02IdIIbAc4DlYPDoBfAmajw%3D%3D
unknown
whitelisted
756
lsass.exe
GET
200
172.64.149.23:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEFZnHQTqT5lMbxCBR1nSdZQ%3D
unknown
whitelisted
756
lsass.exe
GET
200
104.18.38.233:80
http://ocsp.usertrust.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBSr83eyJy3njhjVpn5bEpfc6MXawQQUOuEJhtTPGcKWdnRJdtzgNcZjY5oCEQDzZE5rbgBQI34JRr174fUd
unknown
whitelisted
756
lsass.exe
GET
200
172.64.149.23:80
http://ocsp.sectigo.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTPlNxcMEqnlIVyH5VuZ4lawhZX3QQU9oUKOxGG4QR9DqoLLNLuzGR7e64CEQCrZoa1YnvoBZaCEzAShkn1
unknown
whitelisted
756
lsass.exe
GET
200
104.18.38.233:80
http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m%2FWqorSs9UgOHYm8Cd8rIDZssCEH1bUSa0droR23QWC7xTDac%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
664
SIHClient.exe
4.245.163.56:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
664
SIHClient.exe
69.192.161.161:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
664
SIHClient.exe
40.69.42.241:443
fe3cr.delivery.mp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3132
BakkesMod.exe
149.210.150.107:443
updater.bakkesmod.com
Signet B.V.
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
google.com
  • 142.250.185.174
whitelisted
client.wns.windows.com
  • 172.172.255.217
  • 20.198.162.78
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
www.microsoft.com
  • 69.192.161.161
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted
updater.bakkesmod.com
  • 149.210.150.107
whitelisted
x1.c.lencr.org
  • 69.192.161.44
whitelisted
r10.o.lencr.org
  • 184.24.77.50
  • 184.24.77.65
  • 184.24.77.44
whitelisted

Threats

No threats detected
No debug info