File name:

hddregtectecbr.rar

Full analysis: https://app.any.run/tasks/f70eeb2d-561d-4612-b2d6-7b1aeec67e27
Verdict: Malicious activity
Analysis date: March 24, 2025, 01:02:14
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
delphi
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

DFF04004F3DF606B307F49F190A12890

SHA1:

0253E4736F53921581F19CA828BEDF921B18FBFC

SHA256:

212F9E268EAC298460769A6A27546F4894B5A871251FC468859F70D8339FA751

SSDEEP:

98304:vg6zJBvuaM4Pk8XNtVHTiJVfiAaMJtK7hRvOSDrftYNWqiIiiBLUqYROnh6yyg02:b6eKjpxhukbYEo74NJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • HDD Regenerator 1.71.exe (PID: 6268)
      • HDD Regenerator 1.71.exe (PID: 1052)
      • HDD Regenerator.exe (PID: 6964)
      • HDD Regenerator.exe (PID: 5956)
      • HDD Regenerator.exe (PID: 5556)
      • HDD Regenerator.exe (PID: 4152)
      • HDD Regenerator.exe (PID: 6256)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 6488)
      • ShellExperienceHost.exe (PID: 3304)
      • msiexec.exe (PID: 2152)
      • HDD Regenerator.exe (PID: 5956)
      • HDD Regenerator.exe (PID: 5556)
    • Adds/modifies Windows certificates

      • msiexec.exe (PID: 5304)
    • There is functionality for taking screenshot (YARA)

      • HDD Regenerator 1.71.exe (PID: 6268)
    • Executes as Windows Service

      • VSSVC.exe (PID: 3176)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 1388)
    • Creates/Modifies COM task schedule object

      • msiexec.exe (PID: 1388)
      • HDD Regenerator.exe (PID: 5956)
    • Application launched itself

      • HDD Regenerator.exe (PID: 6964)
      • HDD Regenerator.exe (PID: 6256)
      • hddreg.exe (PID: 2140)
    • Detected use of alternative data streams (AltDS)

      • HDD Regenerator.exe (PID: 5956)
      • HDD Regenerator.exe (PID: 5556)
      • hddreg.exe (PID: 1300)
    • Reads the BIOS version

      • HDD Regenerator.exe (PID: 5956)
      • HDD Regenerator.exe (PID: 5556)
      • hddreg.exe (PID: 1300)
    • Start notepad (likely ransomware note)

      • WinRAR.exe (PID: 6488)
    • Reads Internet Explorer settings

      • HDD Regenerator.exe (PID: 5556)
    • Reads Microsoft Outlook installation path

      • HDD Regenerator.exe (PID: 5556)
  • INFO

    • Reads security settings of Internet Explorer

      • BackgroundTransferHost.exe (PID: 5256)
      • BackgroundTransferHost.exe (PID: 1600)
      • BackgroundTransferHost.exe (PID: 208)
      • BackgroundTransferHost.exe (PID: 5756)
      • BackgroundTransferHost.exe (PID: 1852)
      • msiexec.exe (PID: 5304)
      • notepad.exe (PID: 5304)
    • Reads the software policy settings

      • BackgroundTransferHost.exe (PID: 5256)
      • slui.exe (PID: 2136)
      • msiexec.exe (PID: 1388)
      • msiexec.exe (PID: 5304)
      • slui.exe (PID: 4244)
      • HDD Regenerator.exe (PID: 5556)
    • Creates files or folders in the user directory

      • BackgroundTransferHost.exe (PID: 5256)
      • HDD Regenerator 1.71.exe (PID: 6268)
      • msiexec.exe (PID: 5304)
      • HDD Regenerator.exe (PID: 5556)
    • Checks proxy server information

      • BackgroundTransferHost.exe (PID: 5256)
      • msiexec.exe (PID: 5304)
      • slui.exe (PID: 4244)
      • HDD Regenerator.exe (PID: 5956)
      • HDD Regenerator.exe (PID: 5556)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6488)
      • msiexec.exe (PID: 5304)
      • msiexec.exe (PID: 1388)
    • Checks supported languages

      • HDD Regenerator 1.71.exe (PID: 6268)
      • msiexec.exe (PID: 1388)
      • msiexec.exe (PID: 2152)
      • ShellExperienceHost.exe (PID: 3304)
      • HDD Regenerator.exe (PID: 6964)
      • HDD Regenerator.exe (PID: 5956)
      • HDD Regenerator.exe (PID: 6256)
      • HDD Regenerator.exe (PID: 5556)
      • hddreg.exe (PID: 1300)
      • hddreg.exe (PID: 2140)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 6488)
      • msiexec.exe (PID: 5304)
      • msiexec.exe (PID: 1388)
    • Reads the computer name

      • HDD Regenerator 1.71.exe (PID: 6268)
      • msiexec.exe (PID: 2152)
      • msiexec.exe (PID: 1388)
      • ShellExperienceHost.exe (PID: 3304)
      • HDD Regenerator.exe (PID: 5956)
      • HDD Regenerator.exe (PID: 5556)
      • hddreg.exe (PID: 1300)
    • Create files in a temporary directory

      • HDD Regenerator 1.71.exe (PID: 6268)
    • Manages system restore points

      • SrTasks.exe (PID: 4304)
    • Reads the machine GUID from the registry

      • msiexec.exe (PID: 1388)
      • HDD Regenerator.exe (PID: 5556)
    • Process checks computer location settings

      • msiexec.exe (PID: 2152)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 1388)
    • Creates files in the program directory

      • HDD Regenerator.exe (PID: 5956)
      • HDD Regenerator.exe (PID: 5556)
      • hddreg.exe (PID: 1300)
    • Compiled with Borland Delphi (YARA)

      • slui.exe (PID: 4244)
    • Reads Microsoft Office registry keys

      • WinRAR.exe (PID: 6488)
    • Manual execution by a user

      • HDD Regenerator.exe (PID: 6256)
      • HDD Regenerator.exe (PID: 4152)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)

EXIF

ZIP

FileVersion: RAR v5
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
170
Monitored processes
27
Malicious processes
8
Suspicious processes
4

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe backgroundtransferhost.exe no specs backgroundtransferhost.exe backgroundtransferhost.exe no specs backgroundtransferhost.exe no specs backgroundtransferhost.exe no specs hdd regenerator 1.71.exe no specs hdd regenerator 1.71.exe msiexec.exe msiexec.exe msiexec.exe no specs shellexperiencehost.exe no specs vssvc.exe no specs slui.exe srtasks.exe no specs conhost.exe no specs hdd regenerator.exe no specs hdd regenerator.exe no specs notepad.exe no specs hdd regenerator.exe no specs hdd regenerator.exe hdd regenerator.exe hddreg.exe no specs conhost.exe no specs hddreg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
208"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1C:\Windows\System32\BackgroundTransferHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Download/Upload Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\backgroundtransferhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\bcryptprimitives.dll
1052"C:\Users\admin\AppData\Local\Temp\Rar$EXb6488.49076\hddregtectecbr\HDD Regenerator for windows\HDD Regenerator 1.71.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb6488.49076\hddregtectecbr\HDD Regenerator for windows\HDD Regenerator 1.71.exeWinRAR.exe
User:
admin
Company:
Abstradrome
Integrity Level:
MEDIUM
Description:
Setup Launcher Unicode
Exit code:
3221226540
Version:
1.71.0012
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb6488.49076\hddregtectecbr\hdd regenerator for windows\hdd regenerator 1.71.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
1300hddreg 0 49 49 75 124C:\Program Files (x86)\HDD Regenerator\hddreg.exehddreg.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\program files (x86)\hdd regenerator\hddreg.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
1388C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1600"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1C:\Windows\System32\BackgroundTransferHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Download/Upload Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\backgroundtransferhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\bcryptprimitives.dll
1852"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1C:\Windows\System32\BackgroundTransferHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Download/Upload Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\backgroundtransferhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\bcryptprimitives.dll
2136"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2140hddreg 0 49 49 75 124C:\Program Files (x86)\HDD Regenerator\hddreg.exeHDD Regenerator.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\program files (x86)\hdd regenerator\hddreg.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
2152C:\Windows\syswow64\MsiExec.exe -Embedding 82C50FBD25A29F8ADCF1C08A3F200F17 CC:\Windows\SysWOW64\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
3176C:\WINDOWS\system32\vssvc.exeC:\Windows\System32\VSSVC.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
21 184
Read events
20 826
Write events
337
Delete events
21

Modification events

(PID) Process:(1600) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(1600) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1600) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(208) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(208) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(208) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(5256) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(5256) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(5256) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(5756) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Content
Operation:writeName:CachePrefix
Value:
Executable files
18
Suspicious files
45
Text files
10
Unknown types
0

Dropped files

PID
Process
Filename
Type
5256BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\Content\26C212D9399727259664BDFCA073966E_F9F7D6A7ECE73106D2A8C63168CDA10D
MD5:
SHA256:
5256BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\2bef3c6b-ed3f-4855-99a6-af24cfab4733.down_data
MD5:
SHA256:
6268HDD Regenerator 1.71.exeC:\Users\admin\AppData\Local\Temp\_is5545.tmp
MD5:
SHA256:
6268HDD Regenerator 1.71.exeC:\Users\admin\AppData\Local\Temp\{039F881B-E804-40F1-B8FF-8D4EF83F5253}\HDD Regenerator.msi
MD5:
SHA256:
6268HDD Regenerator 1.71.exeC:\Users\admin\AppData\Local\Downloaded Installations\{228F06BD-CBEE-4656-AC2A-CB927745EDED}\HDD Regenerator.msi
MD5:
SHA256:
5256BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\5e0b3f16-e8e5-4329-a7d5-5a224956a9a6.up_meta_securebinary
MD5:596AB94E30F0EEC0C275C6045DA75118
SHA256:B0095B3517ABA9C21B31D67EAA7BB5A8FF47B4F370269BEF81AFB2159B13A363
6268HDD Regenerator 1.71.exeC:\Users\admin\AppData\Local\Temp\{039F881B-E804-40F1-B8FF-8D4EF83F5253}\Setup.INItext
MD5:2554BFC5A3B46AE0F717897C971819B8
SHA256:DA0A899E1375D50755E387976A2E8C3815875FA986EFC83E7AE6477CCEC2EA3E
5256BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\5e0b3f16-e8e5-4329-a7d5-5a224956a9a6.aa3cf0e7-6052-4a30-8384-40791214e36b.down_metabinary
MD5:52F6609F315C1CF2E9B40272BA32ABE9
SHA256:7DF4ACFA08A3C4254B249292D45F0D6F8AE08D83A1681B4371C3F2A1CB72442A
6268HDD Regenerator 1.71.exeC:\Users\admin\AppData\Local\Temp\_is5418.tmpbinary
MD5:8343DE539C5A2741AFF7F91D330B4AB4
SHA256:ABB5FF3385F1A1C3CCC29A6E40A8A2B13158CA77FE41E944434AA71E920067ED
1388msiexec.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
17
TCP/UDP connections
45
DNS requests
30
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4724
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
2.16.168.124:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5256
BackgroundTransferHost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
4244
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4244
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5304
msiexec.exe
GET
200
184.30.131.114:80
http://crl.verisign.com/pca3.crl
unknown
whitelisted
5304
msiexec.exe
GET
200
184.30.131.114:80
http://ocsp.verisign.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ%2FxkCfyHfJr7GQ6M658NRZ4SHo%2FAQUCPVR6Pv%2BPT1kNnxoz1t4qN%2B5xTcCEBEQMhPZ4tSh0avCknEynU0%3D
unknown
whitelisted
5304
msiexec.exe
GET
200
184.30.131.114:80
http://ocsp.verisign.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ%2FxkCfyHfJr7GQ6M658NRZ4SHo%2FAQUCPVR6Pv%2BPT1kNnxoz1t4qN%2B5xTcCEBEQMhPZ4tSh0avCknEynU0%3D
unknown
whitelisted
1388
msiexec.exe
GET
200
184.30.131.114:80
http://ocsp.verisign.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ%2FxkCfyHfJr7GQ6M658NRZ4SHo%2FAQUCPVR6Pv%2BPT1kNnxoz1t4qN%2B5xTcCEBEQMhPZ4tSh0avCknEynU0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.16.168.124:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
40.113.103.199:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
20.190.160.131:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4724
backgroundTaskHost.exe
20.223.35.26:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4724
backgroundTaskHost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 2.16.168.124
  • 2.16.168.114
whitelisted
google.com
  • 142.250.184.238
whitelisted
client.wns.windows.com
  • 40.113.103.199
whitelisted
login.live.com
  • 20.190.160.131
  • 40.126.32.133
  • 40.126.32.68
  • 20.190.160.20
  • 40.126.32.76
  • 20.190.160.67
  • 40.126.32.74
  • 20.190.160.64
whitelisted
ocsp.digicert.com
  • 184.30.131.245
  • 2.23.77.188
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
www.bing.com
  • 2.23.227.215
  • 2.23.227.208
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted

Threats

No threats detected
No debug info