File name:

PrimoCache Server Edition 4.3.0 (x64).rar

Full analysis: https://app.any.run/tasks/302afaad-85e1-4ab4-ba27-31bdc64b55b5
Verdict: Malicious activity
Analysis date: March 22, 2025, 11:10:50
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
delphi
inno
installer
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

96610154E1E7BC6F0FDB227A1A88AE35

SHA1:

475FEFBA606709EF1BE6DE85B6D2EB237FB7C414

SHA256:

32FB6851D33D399F47B1C64A909864D48537B1E618FFC643460CE566BFBA6B92

SSDEEP:

98304:qC9IuiSledVil0RGk7O6cB4JfbJe8IZZVGJXktrMAsbGcC6ZvE6V5kGmSNm2/uZq:k11ROhJfOJrq2PZ4Wt

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • PrimoCache_Srv_Setup_4.3.0.exe (PID: 7936)
      • PrimoCache_Srv_Setup_4.3.0.exe (PID: 8052)
      • FancyCcV.exe (PID: 6220)
      • FancyCcV.exe (PID: 6300)
  • SUSPICIOUS

    • Drops a system driver (possible attempt to evade defenses)

      • WinRAR.exe (PID: 4428)
      • PrimoCache_Srv_Setup_4.3.0.tmp (PID: 8076)
      • fcsetup.exe (PID: 1672)
    • Executable content was dropped or overwritten

      • PrimoCache_Srv_Setup_4.3.0.exe (PID: 7936)
      • PrimoCache_Srv_Setup_4.3.0.tmp (PID: 8076)
      • PrimoCache_Srv_Setup_4.3.0.exe (PID: 8052)
      • fcsetup.exe (PID: 1672)
    • Reads security settings of Internet Explorer

      • PrimoCache_Srv_Setup_4.3.0.tmp (PID: 7956)
      • FancyCcV.exe (PID: 6300)
    • Reads the Windows owner or organization settings

      • PrimoCache_Srv_Setup_4.3.0.tmp (PID: 8076)
    • Creates files in the driver directory

      • fcsetup.exe (PID: 1672)
      • PrimoCache_Srv_Setup_4.3.0.tmp (PID: 8076)
    • The process executes via Task Scheduler

      • PLUGScheduler.exe (PID: 4100)
    • Starts SC.EXE for service management

      • PrimoCache_Srv_Setup_4.3.0.tmp (PID: 8076)
    • Windows service management via SC.EXE

      • sc.exe (PID: 4448)
  • INFO

    • The sample compiled with english language support

      • WinRAR.exe (PID: 4428)
      • PrimoCache_Srv_Setup_4.3.0.tmp (PID: 8076)
      • fcsetup.exe (PID: 1672)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 4428)
    • Manual execution by a user

      • PrimoCache_Srv_Setup_4.3.0.exe (PID: 7936)
      • FancyCcV.exe (PID: 6300)
      • FancyCcV.exe (PID: 6220)
    • Create files in a temporary directory

      • PrimoCache_Srv_Setup_4.3.0.exe (PID: 7936)
      • PrimoCache_Srv_Setup_4.3.0.exe (PID: 8052)
      • PrimoCache_Srv_Setup_4.3.0.tmp (PID: 8076)
    • Checks supported languages

      • PrimoCache_Srv_Setup_4.3.0.tmp (PID: 7956)
      • PrimoCache_Srv_Setup_4.3.0.exe (PID: 7936)
      • PrimoCache_Srv_Setup_4.3.0.exe (PID: 8052)
      • PrimoCache_Srv_Setup_4.3.0.tmp (PID: 8076)
      • PLUGScheduler.exe (PID: 4100)
      • fcsetup.exe (PID: 1672)
      • FancyCcV.exe (PID: 6300)
    • Creates files in the program directory

      • PrimoCache_Srv_Setup_4.3.0.tmp (PID: 8076)
      • PLUGScheduler.exe (PID: 4100)
    • Reads the computer name

      • PrimoCache_Srv_Setup_4.3.0.tmp (PID: 7956)
      • PrimoCache_Srv_Setup_4.3.0.tmp (PID: 8076)
      • fcsetup.exe (PID: 1672)
      • PrimoCache_Srv_Setup_4.3.0.exe (PID: 7936)
      • PLUGScheduler.exe (PID: 4100)
      • FancyCcV.exe (PID: 6300)
    • Process checks computer location settings

      • PrimoCache_Srv_Setup_4.3.0.tmp (PID: 7956)
    • Compiled with Borland Delphi (YARA)

      • PrimoCache_Srv_Setup_4.3.0.exe (PID: 7936)
      • PrimoCache_Srv_Setup_4.3.0.tmp (PID: 7956)
    • Detects InnoSetup installer (YARA)

      • PrimoCache_Srv_Setup_4.3.0.exe (PID: 7936)
      • PrimoCache_Srv_Setup_4.3.0.tmp (PID: 7956)
    • Creates a software uninstall entry

      • PrimoCache_Srv_Setup_4.3.0.tmp (PID: 8076)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)

EXIF

ZIP

FileVersion: RAR v5
CompressedSize: 7013643
UncompressedSize: 7298888
OperatingSystem: Win32
ArchivedFileName: PrimoCache Server Edition 4.3.0 (x64)/PrimoCache Server Edition 4.3.0 (x64)/PrimoCache_Srv_Setup_4.3.0.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
293
Monitored processes
15
Malicious processes
5
Suspicious processes
3

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe no specs rundll32.exe no specs primocache_srv_setup_4.3.0.exe primocache_srv_setup_4.3.0.tmp no specs primocache_srv_setup_4.3.0.exe primocache_srv_setup_4.3.0.tmp sc.exe no specs conhost.exe no specs fcsetup.exe conhost.exe no specs plugscheduler.exe no specs fancyccv.exe no specs fancyccv.exe

Process information

PID
CMD
Path
Indicators
Parent process
680\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exefcsetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1300\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exesc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1672"C:\Program Files\PrimoCache\fcsetup.exe" -i "C:\Program Files\PrimoCache\drv\rxfcv.inf" 257C:\Program Files\PrimoCache\fcsetup.exe
PrimoCache_Srv_Setup_4.3.0.tmp
User:
admin
Company:
Romex Software
Integrity Level:
HIGH
Description:
fcsetup
Exit code:
0
Version:
1.3.1.1 built by: WinDDK
Modules
Images
c:\program files\primocache\fcsetup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
4100"C:\Program Files\RUXIM\PLUGscheduler.exe"C:\Program Files\RUXIM\PLUGScheduler.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Update LifeCycle Component Scheduler
Exit code:
0
Version:
10.0.19041.3623 (WinBuild.160101.0800)
Modules
Images
c:\program files\ruxim\plugscheduler.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
4428"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Downloads\PrimoCache Server Edition 4.3.0 (x64).rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
4448"sc" delete PrimoCacheSvcC:\Windows\System32\sc.exePrimoCache_Srv_Setup_4.3.0.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Service Control Manager Configuration Tool
Exit code:
1060
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
6220"C:\Program Files\PrimoCache\FancyCcV.exe" C:\Program Files\PrimoCache\FancyCcV.exeexplorer.exe
User:
admin
Company:
Romex Software
Integrity Level:
MEDIUM
Description:
PrimoCache GUI Program
Exit code:
3221226540
Version:
4.3.0
Modules
Images
c:\program files\primocache\fancyccv.exe
c:\windows\system32\ntdll.dll
6300"C:\Program Files\PrimoCache\FancyCcV.exe" C:\Program Files\PrimoCache\FancyCcV.exe
explorer.exe
User:
admin
Company:
Romex Software
Integrity Level:
HIGH
Description:
PrimoCache GUI Program
Version:
4.3.0
Modules
Images
c:\program files\primocache\fancyccv.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7316C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7348"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
8 214
Read events
8 011
Write events
193
Delete events
10

Modification events

(PID) Process:(4428) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(4428) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(4428) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(4428) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Downloads\PrimoCache Server Edition 4.3.0 (x64).rar
(PID) Process:(4428) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(4428) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(4428) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(4428) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(4428) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:name
Value:
256
(PID) Process:(4428) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:size
Value:
80
Executable files
23
Suspicious files
61
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
4428WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa4428.17373\PrimoCache Server Edition 4.3.0 (x64)\PrimoCache Server Edition 4.3.0 (x64)\readme.txttext
MD5:8E188AF9D329FC2C933A3216990A5610
SHA256:B43538FE7A602E13C82AF920D953292DC2B034DB5E1A655F3DB924B3FF582CB4
4428WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa4428.17373\PrimoCache Server Edition 4.3.0 (x64)\PrimoCache Server Edition 4.3.0 (x64)\reg\CmdColor.exeexecutable
MD5:6E54E2184BE6BD8F45635A527F7EECD3
SHA256:E46BEFB51126A087F69603C92083D1F76DCBF97A598D604B9784DC3AC64FFAF1
4428WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa4428.17373\PrimoCache Server Edition 4.3.0 (x64)\PrimoCache Server Edition 4.3.0 (x64)\reg\drv.bak\win10-11_srv2016-2022\rxfcv.catbinary
MD5:E82FB2AD70788E7FB854413A991AF223
SHA256:4B61323C5A283FFEE4908841657CD3A63D52D467F36EA8D1DD0EFD4B173D9CF2
4428WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa4428.17373\PrimoCache Server Edition 4.3.0 (x64)\PrimoCache Server Edition 4.3.0 (x64)\PrimoCache_Srv_Setup_4.3.0.exeexecutable
MD5:6EEF34FCB55DD0B46686BB4FF4B9AF2A
SHA256:72272AD5A44142416F124E206A689C7D92B7FA1CDC6EFB2E3388343E75D2A0B2
4428WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa4428.17373\PrimoCache Server Edition 4.3.0 (x64)\PrimoCache Server Edition 4.3.0 (x64)\reg\drv7\rxfcv.infbinary
MD5:6A5FC2E7E59C001D425B56D65B02D8DB
SHA256:EF85C3E4894E51D624FD7BB52A41AB5EB3C1F29C1970E209AAF6934B8929D812
4428WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa4428.17373\PrimoCache Server Edition 4.3.0 (x64)\PrimoCache Server Edition 4.3.0 (x64)\reg\drv10\rxfcv.sysexecutable
MD5:ADDD5F744B04737D236CD0BC042EE004
SHA256:C97F9BCAC30E7C2C29D9B49A0FD192B8722FE041536B66B817F31D47449A2227
4428WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa4428.17373\PrimoCache Server Edition 4.3.0 (x64)\PrimoCache Server Edition 4.3.0 (x64)\reg\drv7\rxfcv.catbinary
MD5:14C856C4AE36668F489BF0BC9C8DB821
SHA256:D35E9AA331C220201CFCE039BE364FC22ABD7DA14B27A779D656C84D9F81CDD0
4428WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa4428.17373\PrimoCache Server Edition 4.3.0 (x64)\PrimoCache Server Edition 4.3.0 (x64)\reg\drv.bak\win7-8.1_srv2008-2012\rxfcv.infbinary
MD5:6A5FC2E7E59C001D425B56D65B02D8DB
SHA256:EF85C3E4894E51D624FD7BB52A41AB5EB3C1F29C1970E209AAF6934B8929D812
4428WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa4428.17373\PrimoCache Server Edition 4.3.0 (x64)\PrimoCache Server Edition 4.3.0 (x64)\reg\drv.bak\win10-11_srv2016-2022\rxfcv.infbinary
MD5:6A5FC2E7E59C001D425B56D65B02D8DB
SHA256:EF85C3E4894E51D624FD7BB52A41AB5EB3C1F29C1970E209AAF6934B8929D812
4428WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa4428.17373\PrimoCache Server Edition 4.3.0 (x64)\PrimoCache Server Edition 4.3.0 (x64)\reg\drv7\rxfcv.sysexecutable
MD5:C95E180CB42DAE6251585E8FFA868DF6
SHA256:67E75EC4F543140DA115C0ED6E6E37B36B03BF7461906714E20D37E29A3D7F97
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
57
DNS requests
31
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2852
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1228
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1228
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5328
SearchApp.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6640
backgroundTaskHost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
6544
svchost.exe
20.190.160.64:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
3216
svchost.exe
20.198.162.76:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
SG
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
2112
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2852
backgroundTaskHost.exe
20.223.36.55:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 51.104.136.2
whitelisted
google.com
  • 142.250.186.110
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
login.live.com
  • 20.190.160.64
  • 40.126.32.136
  • 20.190.160.66
  • 20.190.160.3
  • 40.126.32.138
  • 20.190.160.20
  • 40.126.32.74
  • 20.190.160.14
  • 20.190.160.130
  • 40.126.32.76
  • 20.190.160.2
  • 20.190.160.132
  • 40.126.32.68
whitelisted
client.wns.windows.com
  • 20.198.162.76
  • 40.113.103.199
whitelisted
ocsp.digicert.com
  • 184.30.131.245
  • 2.23.77.188
whitelisted
arc.msn.com
  • 20.223.36.55
  • 20.103.156.88
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted

Threats

No threats detected
No debug info