File name:

ZipItNow.exe

Full analysis: https://app.any.run/tasks/05ac4808-fdf4-4c67-903b-d869f19b49dc
Verdict: Malicious activity
Analysis date: March 11, 2025, 11:51:49
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
advancedinstaller
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

534CD01067C81867723338B17697EE32

SHA1:

A4E5A835909C7289A3372D58D80DC539309D6736

SHA256:

956713B1BCA39DC306F5402815F1258CFE4279C85C42758C0E107E5F8EE5576A

SSDEEP:

98304:Pca4SZwWwKEFHV76nqhmBuxZZdXlZIHm8Q7XNHmuwj4g6PreNWjDgmiHRdghTOid:LRHmVKCe00FAzea

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • ZipItNow.exe (PID: 6800)
    • ADVANCEDINSTALLER mutex has been found

      • ZipItNow.exe (PID: 6800)
    • Executable content was dropped or overwritten

      • ZipItNow.exe (PID: 6800)
      • rundll32.exe (PID: 7892)
      • rundll32.exe (PID: 8132)
      • rundll32.exe (PID: 4424)
    • Process drops legitimate windows executable

      • ZipItNow.exe (PID: 6800)
      • msiexec.exe (PID: 7788)
    • Detects AdvancedInstaller (YARA)

      • ZipItNow.exe (PID: 6800)
    • There is functionality for taking screenshot (YARA)

      • ZipItNow.exe (PID: 6800)
    • The process drops C-runtime libraries

      • msiexec.exe (PID: 7788)
    • Drops 7-zip archiver for unpacking

      • msiexec.exe (PID: 7788)
  • INFO

    • The sample compiled with english language support

      • ZipItNow.exe (PID: 6800)
      • msiexec.exe (PID: 3896)
      • msiexec.exe (PID: 7788)
    • Reads the computer name

      • ZipItNow.exe (PID: 6800)
      • msiexec.exe (PID: 3896)
      • msiexec.exe (PID: 7392)
    • Reads Environment values

      • ZipItNow.exe (PID: 6800)
      • msiexec.exe (PID: 7788)
    • Reads the machine GUID from the registry

      • ZipItNow.exe (PID: 6800)
      • msiexec.exe (PID: 3896)
    • Checks supported languages

      • ZipItNow.exe (PID: 6800)
      • msiexec.exe (PID: 3896)
      • msiexec.exe (PID: 7392)
      • msiexec.exe (PID: 7788)
    • Reads the software policy settings

      • ZipItNow.exe (PID: 6800)
      • msiexec.exe (PID: 7432)
      • msiexec.exe (PID: 3896)
    • Creates files or folders in the user directory

      • ZipItNow.exe (PID: 6800)
      • msiexec.exe (PID: 3896)
      • msiexec.exe (PID: 7788)
    • Create files in a temporary directory

      • ZipItNow.exe (PID: 6800)
      • rundll32.exe (PID: 7892)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 3896)
      • msiexec.exe (PID: 7788)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:02:22 16:30:02+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 14.28
CodeSize: 1537024
InitializedDataSize: 625152
UninitializedDataSize: -
EntryPoint: 0x122ad7
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.4.0.0
ProductVersionNumber: 1.4.0.0
FileFlagsMask: 0x003f
FileFlags: Debug
FileOS: Win32
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Zip It Now
FileDescription: Zip It Now Installer
FileVersion: 1.4.0.0
InternalName: ZipItNow
LegalCopyright: Copyright (C) 2025 Zip It Now
OriginalFileName: ZipItNow.exe
ProductName: Zip It Now
ProductVersion: 1.4.0.0
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
150
Monitored processes
15
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start zipitnow.exe msiexec.exe msiexec.exe no specs msiexec.exe no specs sppextcomobj.exe no specs slui.exe no specs msiexec.exe rundll32.exe rundll32.exe backgroundtransferhost.exe no specs backgroundtransferhost.exe backgroundtransferhost.exe no specs rundll32.exe backgroundtransferhost.exe no specs backgroundtransferhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
680"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1C:\Windows\System32\BackgroundTransferHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Download/Upload Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\backgroundtransferhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\bcryptprimitives.dll
1096"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1C:\Windows\System32\BackgroundTransferHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Download/Upload Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\backgroundtransferhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\bcryptprimitives.dll
3896C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
4424rundll32.exe "C:\WINDOWS\Installer\MSIF5E8.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_1111546 1937 RequestSender!RequestSender.CustomActions.FinishC:\Windows\SysWOW64\rundll32.exe
msiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
6724"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1C:\Windows\System32\BackgroundTransferHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Download/Upload Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\backgroundtransferhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\bcryptprimitives.dll
6800"C:\Users\admin\AppData\Local\Temp\ZipItNow.exe" C:\Users\admin\AppData\Local\Temp\ZipItNow.exe
explorer.exe
User:
admin
Company:
Zip It Now
Integrity Level:
MEDIUM
Description:
Zip It Now Installer
Exit code:
0
Version:
1.4.0.0
Modules
Images
c:\users\admin\appdata\local\temp\zipitnow.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
7392C:\Windows\syswow64\MsiExec.exe -Embedding 2ADE15D6B2E85B30CDB443FA39F44C89 CC:\Windows\SysWOW64\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
7432"C:\WINDOWS\system32\msiexec.exe" /i "C:\Users\admin\AppData\Roaming\Zip It Now\Zip It Now 1.4.0.0\install\7645A40\ZipItNow.msi" AI_SETUPEXEPATH=C:\Users\admin\AppData\Local\Temp\ZipItNow.exe SETUPEXEDIR=C:\Users\admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1741692819 " AI_EUIMSI=""C:\Windows\SysWOW64\msiexec.exeZipItNow.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
7488C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7520"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
18 006
Read events
17 790
Write events
207
Delete events
9

Modification events

(PID) Process:(3896) msiexec.exeKey:HKEY_USERS\S-1-5-21-1693682860-607145093-2874071422-1001\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Owner
Value:
380F0000058FD4FD7B92DB01
(PID) Process:(3896) msiexec.exeKey:HKEY_USERS\S-1-5-21-1693682860-607145093-2874071422-1001\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:SessionHash
Value:
7AA3378ACB74ADA1FAB0DC8451976E7B41D974B57676A5844A7C808729C64898
(PID) Process:(3896) msiexec.exeKey:HKEY_USERS\S-1-5-21-1693682860-607145093-2874071422-1001\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Sequence
Value:
1
(PID) Process:(3896) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
Operation:writeName:C:\Config.Msi\
Value:
(PID) Process:(3896) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
Operation:writeName:C:\Config.Msi\10d277.rbs
Value:
31167100
(PID) Process:(3896) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
Operation:writeName:C:\Config.Msi\10d277.rbsLow
Value:
38448400
(PID) Process:(3896) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
Operation:writeName:C:\Users\admin\AppData\Roaming\Microsoft\Installer\
Value:
(PID) Process:(3896) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-1693682860-607145093-2874071422-1001\Components\C838C4529A8903C499B4533DE8B85105
Operation:writeName:C7F3685A3781B0045AB8281D7946A504
Value:
C:\Users\admin\AppData\Roaming\Zip It Now\
(PID) Process:(3896) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-1693682860-607145093-2874071422-1001\Components\1497886C4D4BF8E47A73542460456D90
Operation:writeName:C7F3685A3781B0045AB8281D7946A504
Value:
21:\Software\Microsoft\Windows\CurrentVersion\Uninstall\Zip It Now 1.4.0.0\DisplayName
(PID) Process:(3896) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-1693682860-607145093-2874071422-1001\Components\E298DEB7803B2BE40A7ED48E1A8A57B5
Operation:writeName:C7F3685A3781B0045AB8281D7946A504
Value:
21:\Software\Caphyon\Advanced Installer\LZMA\{A5863F7C-1873-400B-A58B-82D197645A40}\1.4.0.0\AI_ExePath
Executable files
59
Suspicious files
63
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
6800ZipItNow.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554Ebinary
MD5:C4D7BEE4755BB3E563092F7EDF2A210B
SHA256:A62C9B85997012888AB42145A919CAEF45578F6C60ECD1AB2F83AF065B60EDF7
6800ZipItNow.exeC:\Users\admin\AppData\Roaming\Zip It Now\Zip It Now 1.4.0.0\install\7645A40\ZipItNow.msiexecutable
MD5:54F36F1B9118B35E2DBB2E0EB0C377AB
SHA256:39DA510263E23E8B172F460F8946F0934EEFF7C1BB8AEB2F92E4439FD6EEA1B8
6800ZipItNow.exeC:\Users\admin\AppData\Local\Temp\shiCEDB.tmpexecutable
MD5:84A34BF3486F7B9B7035DB78D78BDD1E
SHA256:F85911C910B660E528D2CF291BAA40A92D09961996D6D84E7A53A7095C7CD96E
6800ZipItNow.exeC:\Users\admin\AppData\Local\Temp\MSICF3A.tmpexecutable
MD5:72B1C6699DDC2BAAB105D32761285DF2
SHA256:BF7F6F7E527AB8617766BB7A21C21B2895B5275C0E808756C2AADCD66EFF8A97
3896msiexec.exeC:\Windows\Installer\MSID46A.tmpexecutable
MD5:72B1C6699DDC2BAAB105D32761285DF2
SHA256:BF7F6F7E527AB8617766BB7A21C21B2895B5275C0E808756C2AADCD66EFF8A97
3896msiexec.exeC:\Windows\Installer\MSID459.tmpexecutable
MD5:9D0601206BFE26161F88CAF174A0771A
SHA256:31CCD231835BADDF98CF07C68FD6FA38722632965AA243CC39367FBF47B13E97
3896msiexec.exeC:\Windows\Installer\MSID537.tmpexecutable
MD5:72B1C6699DDC2BAAB105D32761285DF2
SHA256:BF7F6F7E527AB8617766BB7A21C21B2895B5275C0E808756C2AADCD66EFF8A97
7892rundll32.exeC:\Users\admin\AppData\Local\Temp\SFXCA94F5689F2D4E15FACF1CBE2D986D7BEE\WixToolset.Dtf.WindowsInstaller.dllexecutable
MD5:EF8D5785AC8669F5FD54E22F52770E6B
SHA256:A614884EA627DA1925131EBF41E8AE202CAEAC0FE543B86384F5EB2BFAF1AA75
3896msiexec.exeC:\Windows\Installer\MSID4F7.tmpexecutable
MD5:72B1C6699DDC2BAAB105D32761285DF2
SHA256:BF7F6F7E527AB8617766BB7A21C21B2895B5275C0E808756C2AADCD66EFF8A97
7892rundll32.exeC:\Users\admin\AppData\Local\Temp\SFXCA94F5689F2D4E15FACF1CBE2D986D7BEE\Microsoft.Win32.TaskScheduler.dllexecutable
MD5:0616EA42B68A8F5F2F01BCD985BDCBC7
SHA256:EA27C65491119EEE5C8E87CE3D470783580DB8FC5BD141C496768D7D0CCE779A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
28
DNS requests
18
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6800
ZipItNow.exe
GET
200
151.101.130.133:80
http://ocsp.globalsign.com/codesigningrootr45/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQVFZP5vqhCrtRN5SWf40Rn6NM1IAQUHwC%2FRoAK%2FHg5t6W0Q9lWULvOljsCEHe9DgW3WQu2HUdhUx4%2Fde0%3D
unknown
whitelisted
6800
ZipItNow.exe
GET
200
151.101.130.133:80
http://ocsp.globalsign.com/gsgccr45evcodesignca2020/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBQaCbVYh07WONuW4e63Ydlu4AlbDAQUJZ3Q%2FFkJhmPF7POxEztXHAOSNhECDCNyvWBNckvLyQc7SA%3D%3D
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7788
msiexec.exe
GET
200
69.192.161.44:80
http://x1.c.lencr.org/
unknown
whitelisted
7788
msiexec.exe
GET
200
184.24.77.62:80
http://r11.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBQaUrm0WeTDM5ghfoZtS72KO9ZnzgQUCLkRO6XQhRi06g%2BgrZ%2BGHo78OCcCEgTFXuOwUjBj3v85FzsLIHwa3g%3D%3D
unknown
whitelisted
7316
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
5720
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5720
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
8036
BackgroundTransferHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6800
ZipItNow.exe
151.101.130.133:80
ocsp.globalsign.com
FASTLY
US
whitelisted
3216
svchost.exe
40.115.3.253:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
20.190.159.0:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
7892
rundll32.exe
169.150.247.37:443
zip-it-now-software.com
GB
unknown
7788
msiexec.exe
169.150.247.35:443
zipitnow1.com
GB
unknown
7788
msiexec.exe
69.192.161.44:80
x1.c.lencr.org
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.110
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
ocsp.globalsign.com
  • 151.101.130.133
  • 151.101.2.133
  • 151.101.194.133
  • 151.101.66.133
whitelisted
client.wns.windows.com
  • 40.115.3.253
whitelisted
login.live.com
  • 20.190.159.0
  • 40.126.31.1
  • 20.190.159.23
  • 40.126.31.129
  • 40.126.31.128
  • 40.126.31.2
  • 20.190.159.4
  • 40.126.31.73
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
zip-it-now-software.com
  • 169.150.247.37
unknown
zipitnow1.com
  • 169.150.247.35
unknown
x1.c.lencr.org
  • 69.192.161.44
whitelisted
r11.o.lencr.org
  • 184.24.77.62
  • 184.24.77.57
  • 184.24.77.75
  • 184.24.77.46
  • 184.24.77.80
  • 184.24.77.47
  • 184.24.77.52
  • 184.24.77.54
  • 184.24.77.45
whitelisted

Threats

No threats detected
No debug info