File name:

ScrapeBox v2.0.0.84 Cracked.rar

Full analysis: https://app.any.run/tasks/2f8edfa6-c2a2-49d9-b72b-5b2ec66fa727
Verdict: Malicious activity
Threats:

Orcus is a modular Remote Access Trojan with some unusual functions. This RAT enables attackers to create plugins using a custom development library and offers a robust core feature set that makes it one of the most dangerous malicious programs in its class.

Analysis date: July 08, 2024, 06:31:39
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
orcus
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

05D40D1DBB5BEEBEB27883EFDE5A88D4

SHA1:

F163921FD0E5064F01E1822C0EA3AEB0C2463610

SHA256:

9D2400E7A1F7C452916960EC8B04E1C8C7EAEFAA7B3B046113F234153AF35A62

SSDEEP:

12288:FKoyiyHSDe28q5jUp+TRCoP3dRpulSYkbWmvJjY3m+4Pv7kDwkUYj:YG8SDmsUpCxE0YkJ+mz4uYj

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 3424)
      • csc.exe (PID: 2944)
      • csc.exe (PID: 3584)
      • ScrapeBox v2.0.0.84.exe (PID: 2420)
    • Starts Visual C# compiler

      • ScrapeBox v2.0.0.84.exe (PID: 2300)
      • ScrapeBox v2.0.0.84.exe (PID: 2420)
    • Orcus is detected

      • ScrapeBox v2.0.0.84.exe (PID: 2300)
      • ScrapeBox v2.0.0.84.exe (PID: 2420)
      • Orcus.exe (PID: 3852)
    • ORCUS has been detected (YARA)

      • Orcus.exe (PID: 3852)
  • SUSPICIOUS

    • Uses .NET C# to load dll

      • ScrapeBox v2.0.0.84.exe (PID: 2300)
      • ScrapeBox v2.0.0.84.exe (PID: 2420)
    • Executable content was dropped or overwritten

      • csc.exe (PID: 2944)
      • csc.exe (PID: 3584)
      • ScrapeBox v2.0.0.84.exe (PID: 2420)
    • Reads the Internet Settings

      • ScrapeBox v2.0.0.84.exe (PID: 2300)
      • ScrapeBox v2.0.0.84.exe (PID: 2420)
    • Application launched itself

      • ScrapeBox v2.0.0.84.exe (PID: 2300)
    • Reads security settings of Internet Explorer

      • ScrapeBox v2.0.0.84.exe (PID: 2300)
      • ScrapeBox v2.0.0.84.exe (PID: 2420)
    • Starts itself from another location

      • ScrapeBox v2.0.0.84.exe (PID: 2420)
    • There is functionality for taking screenshot (YARA)

      • Orcus.exe (PID: 3852)
  • INFO

    • Checks supported languages

      • ScrapeBox v2.0.0.84.exe (PID: 2300)
      • csc.exe (PID: 2944)
      • cvtres.exe (PID: 2348)
      • ScrapeBox v2.0.0.84.exe (PID: 2420)
      • csc.exe (PID: 3584)
      • cvtres.exe (PID: 3364)
      • Orcus.exe (PID: 3852)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3424)
    • Reads the machine GUID from the registry

      • ScrapeBox v2.0.0.84.exe (PID: 2300)
      • csc.exe (PID: 2944)
      • cvtres.exe (PID: 2348)
      • ScrapeBox v2.0.0.84.exe (PID: 2420)
      • csc.exe (PID: 3584)
      • cvtres.exe (PID: 3364)
      • Orcus.exe (PID: 3852)
    • Manual execution by a user

      • ScrapeBox v2.0.0.84.exe (PID: 2300)
    • Create files in a temporary directory

      • ScrapeBox v2.0.0.84.exe (PID: 2300)
      • csc.exe (PID: 2944)
      • cvtres.exe (PID: 2348)
      • csc.exe (PID: 3584)
      • ScrapeBox v2.0.0.84.exe (PID: 2420)
      • cvtres.exe (PID: 3364)
    • Creates files or folders in the user directory

      • ScrapeBox v2.0.0.84.exe (PID: 2300)
    • Reads the computer name

      • ScrapeBox v2.0.0.84.exe (PID: 2300)
      • ScrapeBox v2.0.0.84.exe (PID: 2420)
      • Orcus.exe (PID: 3852)
    • Creates files in the program directory

      • ScrapeBox v2.0.0.84.exe (PID: 2420)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Orcus

(PID) Process(3852) Orcus.exe
C2 (1)127.0.0.1:10134
Keys
AESc1409156d5263156a70da33a5edeed842c6211ec73e78d061a42b8b79d3c889b
Salt
Options
AutostartBuilderProperty
AutostartMethodDisable
TaskSchedulerTaskNameOrcus
TaskHighestPrivilegestrue
RegistryHiddenStarttrue
RegistryKeyNameOrcus
TryAllAutostartMethodsOnFailtrue
ChangeAssemblyInformationBuilderProperty
ChangeAssemblyInformationfalse
AssemblyTitlenull
AssemblyDescriptionnull
AssemblyCompanyNamenull
AssemblyProductNamenull
AssemblyCopyrightnull
AssemblyTrademarksnull
AssemblyProductVersion1.0.0.0
AssemblyFileVersion1.0.0.0
ChangeCreationDateBuilderProperty
IsEnabledfalse
NewCreationDate2019-10-29T20:58:14.2812428+02:00
ChangeIconBuilderProperty
ChangeIconfalse
IconPathnull
ClientTagBuilderProperty
ClientTagnull
DataFolderBuilderProperty
Path%appdata%\Orcus
DefaultPrivilegesBuilderProperty
RequireAdministratorRightsfalse
DisableInstallationPromptBuilderProperty
IsDisabledfalse
FrameworkVersionBuilderProperty
FrameworkVersionNET35
HideFileBuilderProperty
HideFilefalse
InstallationLocationBuilderProperty
Path%programfiles%\Orcus\Orcus.exe
InstallBuilderProperty
Installtrue
KeyloggerBuilderProperty
IsEnabledfalse
MutexBuilderProperty
Mutex3869f62ea43243589f85c060feacc528
ProxyBuilderProperty
ProxyOptionNone
ProxyAddressnull
ProxyPort1080
ProxyType2
ReconnectDelayProperty
Delay10000
RequireAdministratorPrivilegesInstallerBuilderProperty
RequireAdministratorPrivilegestrue
RespawnTaskBuilderProperty
IsEnabledfalse
TaskNameOrcus Respawner
ServiceBuilderProperty
Installfalse
SetRunProgramAsAdminFlagBuilderProperty
SetFlagfalse
WatchdogBuilderProperty
IsEnabledfalse
NameOrcusWatchdog.exe
WatchdogLocationAppData
PreventFileDeletionfalse
Plugins
PluginNameDisable Webcam Lights
PluginVersion1.0
ResourceNamee2c012dfd9a34995b5ce0be5a0f97525
ResourceTypeClientPlugin
Guide6ee5674-bb94-46c7-8bbc-5729af6e2c28
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
51
Monitored processes
8
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe #ORCUS scrapebox v2.0.0.84.exe no specs csc.exe cvtres.exe no specs #ORCUS scrapebox v2.0.0.84.exe csc.exe cvtres.exe no specs #ORCUS orcus.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2300"C:\Users\admin\Desktop\ScrapeBox v2.0.0.84 Cracked\ScrapeBox v2.0.0.84.exe" C:\Users\admin\Desktop\ScrapeBox v2.0.0.84 Cracked\ScrapeBox v2.0.0.84.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\scrapebox v2.0.0.84 cracked\scrapebox v2.0.0.84.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2348C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RES113E.tmp" "c:\Users\admin\AppData\Local\Temp\CSC113D.tmp"C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
8.00.50727.5003 (Win7SP1GDR.050727-5400)
Modules
Images
c:\windows\microsoft.net\framework\v2.0.50727\cvtres.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.4940_none_d08cc06a442b34fc\msvcr80.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cryptsp.dll
2420"C:\Users\admin\Desktop\ScrapeBox v2.0.0.84 Cracked\ScrapeBox v2.0.0.84.exe" /waitC:\Users\admin\Desktop\ScrapeBox v2.0.0.84 Cracked\ScrapeBox v2.0.0.84.exe
ScrapeBox v2.0.0.84.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\scrapebox v2.0.0.84 cracked\scrapebox v2.0.0.84.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2944"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\hlapvw-6.cmdline"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
ScrapeBox v2.0.0.84.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
8.0.50727.5483 (Win7SP1GDR.050727-5400)
Modules
Images
c:\windows\microsoft.net\framework\v2.0.50727\csc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.4940_none_d08cc06a442b34fc\msvcr80.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3364C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RES242A.tmp" "c:\Users\admin\AppData\Local\Temp\CSC2429.tmp"C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
8.00.50727.5003 (Win7SP1GDR.050727-5400)
Modules
Images
c:\windows\microsoft.net\framework\v2.0.50727\cvtres.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.4940_none_d08cc06a442b34fc\msvcr80.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cryptsp.dll
3424"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\ScrapeBox v2.0.0.84 Cracked.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3584"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\gl0-jubm.cmdline"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
ScrapeBox v2.0.0.84.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
8.0.50727.5483 (Win7SP1GDR.050727-5400)
Modules
Images
c:\windows\microsoft.net\framework\v2.0.50727\csc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.4940_none_d08cc06a442b34fc\msvcr80.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3852"C:\Program Files\Orcus\Orcus.exe" C:\Program Files\Orcus\Orcus.exe
ScrapeBox v2.0.0.84.exe
User:
admin
Integrity Level:
HIGH
Version:
1.0.0.0
Modules
Images
c:\program files\orcus\orcus.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Orcus
(PID) Process(3852) Orcus.exe
C2 (1)127.0.0.1:10134
Keys
AESc1409156d5263156a70da33a5edeed842c6211ec73e78d061a42b8b79d3c889b
Salt
Options
AutostartBuilderProperty
AutostartMethodDisable
TaskSchedulerTaskNameOrcus
TaskHighestPrivilegestrue
RegistryHiddenStarttrue
RegistryKeyNameOrcus
TryAllAutostartMethodsOnFailtrue
ChangeAssemblyInformationBuilderProperty
ChangeAssemblyInformationfalse
AssemblyTitlenull
AssemblyDescriptionnull
AssemblyCompanyNamenull
AssemblyProductNamenull
AssemblyCopyrightnull
AssemblyTrademarksnull
AssemblyProductVersion1.0.0.0
AssemblyFileVersion1.0.0.0
ChangeCreationDateBuilderProperty
IsEnabledfalse
NewCreationDate2019-10-29T20:58:14.2812428+02:00
ChangeIconBuilderProperty
ChangeIconfalse
IconPathnull
ClientTagBuilderProperty
ClientTagnull
DataFolderBuilderProperty
Path%appdata%\Orcus
DefaultPrivilegesBuilderProperty
RequireAdministratorRightsfalse
DisableInstallationPromptBuilderProperty
IsDisabledfalse
FrameworkVersionBuilderProperty
FrameworkVersionNET35
HideFileBuilderProperty
HideFilefalse
InstallationLocationBuilderProperty
Path%programfiles%\Orcus\Orcus.exe
InstallBuilderProperty
Installtrue
KeyloggerBuilderProperty
IsEnabledfalse
MutexBuilderProperty
Mutex3869f62ea43243589f85c060feacc528
ProxyBuilderProperty
ProxyOptionNone
ProxyAddressnull
ProxyPort1080
ProxyType2
ReconnectDelayProperty
Delay10000
RequireAdministratorPrivilegesInstallerBuilderProperty
RequireAdministratorPrivilegestrue
RespawnTaskBuilderProperty
IsEnabledfalse
TaskNameOrcus Respawner
ServiceBuilderProperty
Installfalse
SetRunProgramAsAdminFlagBuilderProperty
SetFlagfalse
WatchdogBuilderProperty
IsEnabledfalse
NameOrcusWatchdog.exe
WatchdogLocationAppData
PreventFileDeletionfalse
Plugins
PluginNameDisable Webcam Lights
PluginVersion1.0
ResourceNamee2c012dfd9a34995b5ce0be5a0f97525
ResourceTypeClientPlugin
Guide6ee5674-bb94-46c7-8bbc-5729af6e2c28
Total events
5 119
Read events
5 081
Write events
38
Delete events
0

Modification events

(PID) Process:(3424) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3424) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3424) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3424) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(3424) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(3424) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(3424) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\ScrapeBox v2.0.0.84 Cracked.rar
(PID) Process:(3424) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3424) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3424) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
Executable files
4
Suspicious files
5
Text files
12
Unknown types
0

Dropped files

PID
Process
Filename
Type
2944csc.exeC:\Users\admin\AppData\Local\Temp\hlapvw-6.dllexecutable
MD5:21FBB91BE644635E868BD95D2290B7A2
SHA256:361D0BA0F5781CEEDECE9AFF1BBE20567416C9F99678CCE8BD73BA37F12A2CD2
3424WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3424.11946\ScrapeBox v2.0.0.84 Cracked\block-list.txttext
MD5:DC7AB9888897071C7FAC87BB3438E28B
SHA256:68816E76B153C5FD1D9FC06D6DB72772FBD13232E1481BCF74493474B6E000F7
2300ScrapeBox v2.0.0.84.exeC:\Users\admin\AppData\Local\Temp\hlapvw-6.0.cstext
MD5:30C9B68AF0F82F1B3FF821DA41CFD510
SHA256:378D1A3E1838629B446E2EF3E73AD593FA24084158FB3CDF398F148602910522
2348cvtres.exeC:\Users\admin\AppData\Local\Temp\RES113E.tmpbinary
MD5:9EB80DE3743615160832FA1195979FC4
SHA256:1B736E25A35AA885476AB63FA34907241DD69267AD5B02AC8C261DDC3801F4F7
3424WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3424.11946\ScrapeBox v2.0.0.84 Cracked\ScrapeBox v2.0.0.84.exeexecutable
MD5:7FCB9CCB3AF51581B21CAAAC764222FB
SHA256:DAC431DA90D3FCCFC1DB4C0EC7BEEC303F6218A754C078CC4D5621AC1B787D3F
3424WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3424.11946\ScrapeBox v2.0.0.84 Cracked\NLog.configxml
MD5:073D7A3051DACAB30B6EB6468756AF8A
SHA256:89EF6ADE268F50F86B543DB939DF5DF2DBFD72503E8E3DC74F0866C6549C82D5
2300ScrapeBox v2.0.0.84.exeC:\Users\admin\AppData\Local\Temp\hlapvw-6.cmdlinetext
MD5:3C051EA0B56E96949F954533ADE72EF1
SHA256:63C2F53F9BA7141D1E1E64510B50B617B488A50FBC1B8BEE352892648B94A73A
2944csc.exeC:\Users\admin\AppData\Local\Temp\CSC113D.tmpres
MD5:55E3C2338D2B45C4B1A5D62CD779A6B3
SHA256:FC9B1FD0CE73BA4AF3757EE9FCBEFB2B83468BDA77846209EAE0304882CED269
2300ScrapeBox v2.0.0.84.exeC:\Users\admin\AppData\Roaming\.orcusInstallationtext
MD5:1C6E489EFA1DB2DC4D12F858199E0530
SHA256:298CD773955F4F30FAE990C5CB0B4231E4922506D4CCFBDD227757F250CACBF9
3424WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3424.11946\ScrapeBox v2.0.0.84 Cracked\config.iniini
MD5:2152388780302946DAB15337ECFEAE05
SHA256:D3527EBFB29B1AB7B02A50F47CEA3892527312FAEFDBCB8422A56F9DD97E03EE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
9
DNS requests
4
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1372
svchost.exe
GET
304
217.20.58.101:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?33775f6043c93e33
unknown
unknown
1372
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
unknown
1372
svchost.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1372
svchost.exe
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1060
svchost.exe
224.0.0.252:5355
unknown
1372
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1372
svchost.exe
217.20.58.101:80
ctldl.windowsupdate.com
US
unknown
1372
svchost.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
unknown
1372
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
ctldl.windowsupdate.com
  • 217.20.58.101
  • 217.20.58.98
  • 217.20.58.100
  • 217.20.58.99
  • 217.20.56.44
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted

Threats

No threats detected
No debug info