File name:

UWT4.zip

Full analysis: https://app.any.run/tasks/c7f046e4-a69b-40a5-9382-a4be0a5eb5ea
Verdict: Malicious activity
Analysis date: January 10, 2025, 22:58:04
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
arch-doc
confuser
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=store
MD5:

E668044896AEAF341E15F441F7C2A4FD

SHA1:

03E44CF38696BF16C3C765438C2E6CF320D99E30

SHA256:

A3D95804F4BB62D1618DDE448F0F2F2E6073ED660F1F96D88CA41EE368CEFE6A

SSDEEP:

6144:GPqVT7bmtnkt6XjP3OqEgiSCwygdKa+5ZIAo9N8Y:JXbv6+qEgx7NbCqAoH

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 5628)
    • Changes Windows Error Reporting flag

      • Ultimate Windows Tweaker 4.8.exe (PID: 6856)
    • Creates or modifies Windows services

      • Ultimate Windows Tweaker 4.8.exe (PID: 6856)
    • Disables Windows Defender

      • Ultimate Windows Tweaker 4.8.exe (PID: 6856)
    • Disables the Command Prompt (cmd)

      • Ultimate Windows Tweaker 4.8.exe (PID: 6856)
    • Disables the Shutdown in the Start menu

      • Ultimate Windows Tweaker 4.8.exe (PID: 6856)
      • Ultimate Windows Tweaker 4.8.exe (PID: 5980)
    • UAC/LUA settings modification

      • Ultimate Windows Tweaker 4.8.exe (PID: 6856)
  • SUSPICIOUS

    • Executes as Windows Service

      • VSSVC.exe (PID: 640)
    • Reads the date of Windows installation

      • Ultimate Windows Tweaker 4.8.exe (PID: 6856)
    • Reads security settings of Internet Explorer

      • Ultimate Windows Tweaker 4.8.exe (PID: 6856)
      • ShellExperienceHost.exe (PID: 6820)
    • Reads Internet Explorer settings

      • Ultimate Windows Tweaker 4.8.exe (PID: 6856)
    • Changes the desktop background image

      • Ultimate Windows Tweaker 4.8.exe (PID: 6856)
    • Creates or modifies Windows services

      • Ultimate Windows Tweaker 4.8.exe (PID: 6856)
    • Starts CMD.EXE for commands execution

      • Ultimate Windows Tweaker 4.8.exe (PID: 6856)
      • Ultimate Windows Tweaker 4.8.exe (PID: 5980)
    • The process executes via Task Scheduler

      • PLUGScheduler.exe (PID: 796)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 5628)
    • Checks supported languages

      • Ultimate Windows Tweaker 4.8.exe (PID: 6856)
      • ShellExperienceHost.exe (PID: 6820)
      • Ultimate Windows Tweaker 4.8.exe (PID: 5980)
    • Manual execution by a user

      • Ultimate Windows Tweaker 4.8.exe (PID: 6856)
      • Ultimate Windows Tweaker 4.8.exe (PID: 6804)
      • Ultimate Windows Tweaker 4.8.exe (PID: 5980)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 5628)
      • Ultimate Windows Tweaker 4.8.exe (PID: 6856)
    • Reads the computer name

      • Ultimate Windows Tweaker 4.8.exe (PID: 6856)
      • ShellExperienceHost.exe (PID: 6820)
      • PLUGScheduler.exe (PID: 796)
      • Ultimate Windows Tweaker 4.8.exe (PID: 5980)
    • Creates files in the program directory

      • Ultimate Windows Tweaker 4.8.exe (PID: 6856)
      • PLUGScheduler.exe (PID: 796)
    • Process checks computer location settings

      • Ultimate Windows Tweaker 4.8.exe (PID: 6856)
    • Reads the machine GUID from the registry

      • Ultimate Windows Tweaker 4.8.exe (PID: 6856)
      • Ultimate Windows Tweaker 4.8.exe (PID: 5980)
    • Reads CPU info

      • Ultimate Windows Tweaker 4.8.exe (PID: 6856)
    • Reads product name

      • Ultimate Windows Tweaker 4.8.exe (PID: 6856)
    • Process checks whether UAC notifications are on

      • Ultimate Windows Tweaker 4.8.exe (PID: 6856)
    • Reads Environment values

      • Ultimate Windows Tweaker 4.8.exe (PID: 6856)
    • Confuser has been detected (YARA)

      • Ultimate Windows Tweaker 4.8.exe (PID: 6856)
    • Sends debugging messages

      • ShellExperienceHost.exe (PID: 6820)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: Ultimate Windows Tweaker 4.8/
ZipUncompressedSize: -
ZipCompressedSize: -
ZipCRC: 0x00000000
ZipModifyDate: 2021:02:03 23:12:54
ZipCompression: None
ZipBitFlag: -
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
301
Monitored processes
38
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe rundll32.exe no specs ultimate windows tweaker 4.8.exe no specs ultimate windows tweaker 4.8.exe systempropertiesprotection.exe no specs vssvc.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs shellexperiencehost.exe no specs systemsettingsbroker.exe no specs plugscheduler.exe no specs ultimate windows tweaker 4.8.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
5628"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Downloads\UWT4.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6752C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
6804"C:\Users\admin\Desktop\Ultimate Windows Tweaker 4.8\Ultimate Windows Tweaker 4.8.exe" C:\Users\admin\Desktop\Ultimate Windows Tweaker 4.8\Ultimate Windows Tweaker 4.8.exeexplorer.exe
User:
admin
Company:
The Windows Club
Integrity Level:
MEDIUM
Description:
Ultimate Windows Tweaker 4.8
Exit code:
3221226540
Version:
4.8.0.0
Modules
Images
c:\users\admin\desktop\ultimate windows tweaker 4.8\ultimate windows tweaker 4.8.exe
c:\windows\system32\ntdll.dll
6856"C:\Users\admin\Desktop\Ultimate Windows Tweaker 4.8\Ultimate Windows Tweaker 4.8.exe" C:\Users\admin\Desktop\Ultimate Windows Tweaker 4.8\Ultimate Windows Tweaker 4.8.exe
explorer.exe
User:
admin
Company:
The Windows Club
Integrity Level:
HIGH
Description:
Ultimate Windows Tweaker 4.8
Exit code:
1073807364
Version:
4.8.0.0
Modules
Images
c:\users\admin\desktop\ultimate windows tweaker 4.8\ultimate windows tweaker 4.8.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
7108"C:\Windows\System32\SystemPropertiesProtection.exe" C:\Windows\System32\SystemPropertiesProtection.exeUltimate Windows Tweaker 4.8.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
System Protection Settings
Exit code:
1073807364
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\systempropertiesprotection.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sysdm.cpl
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
640C:\WINDOWS\system32\vssvc.exeC:\Windows\System32\VSSVC.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6536cmd.exe /c net stop wuauservC:\Windows\System32\cmd.exeUltimate Windows Tweaker 4.8.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
3221225786
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
6580cmd.exe /c net stop UsoSvcC:\Windows\System32\cmd.exeUltimate Windows Tweaker 4.8.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
3221225786
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
6540\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6468cmd.exe /c net stop WaaSMedicSvcC:\Windows\System32\cmd.exeUltimate Windows Tweaker 4.8.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
3221225786
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
Total events
7 847
Read events
6 646
Write events
143
Delete events
1 058

Modification events

(PID) Process:(5628) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(5628) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(5628) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(5628) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Downloads\UWT4.zip
(PID) Process:(5628) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(5628) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(5628) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(5628) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(5628) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000
(PID) Process:(5628) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:name
Value:
256
Executable files
2
Suspicious files
41
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
796PLUGScheduler.exeC:\ProgramData\PLUG\Logs\RUXIMLog.043.etlbinary
MD5:2F36C598EBFF5B5CDD898C9691D6BCCB
SHA256:8900C5931ED8E0D1B68082B45CF2F4E8C1025D36825508E0804C916D781B9F50
796PLUGScheduler.exeC:\ProgramData\PLUG\Logs\RUXIMLog.034.etlbinary
MD5:89BD161BF7B46C9078937CF832786737
SHA256:2B83DF5532E9F54ED301C8F82E2CDD489799C8D5222A2D44C97DCB151A96FAA9
5628WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa5628.20548\Ultimate Windows Tweaker 4.8\Read Me First.txttext
MD5:A0AF49B80631107F6D3C277562F0D107
SHA256:BC5910676B5CF8AB9C4F0D6FFC98FF8351E9386EA81E75A781FF988AD9DFB4DA
796PLUGScheduler.exeC:\ProgramData\PLUG\Logs\RUXIMLog.045.etlbinary
MD5:673727AF7C6805E869C9F8BE1E468F4A
SHA256:6B16B7DE97F397BCEC36EB3F18C7B64CD3DB6D2974DDF319A251CE27B80D837B
5628WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa5628.20548\Ultimate Windows Tweaker 4.8\UWT Homepage.urlbinary
MD5:2D98D02E794606F540235133D238FDFA
SHA256:9C49F370899CDC0F7DA299BF038AA374D4D4DFDB1E5EBBB2325E086BC893865D
796PLUGScheduler.exeC:\ProgramData\PLUG\Logs\RUXIMLog.044.etlbinary
MD5:079890A8EC8D5CB6523FCEC2209780AA
SHA256:0E12D2D76DD738CE196BED522E35F75E2CC91294F78CDDCBE8CE7787AAA70049
796PLUGScheduler.exeC:\ProgramData\PLUG\Logs\RUXIMLog.039.etlbinary
MD5:C8834D365FAE073DEDE1F1620454CE71
SHA256:C6DD793EEE1D5551CA507A3C5BFFECA82DD3E29C63C2C6DD218A7D4BFB37046B
796PLUGScheduler.exeC:\ProgramData\PLUG\Logs\RUXIMLog.032.etlbinary
MD5:8A2BDE0EAFA7E946196A1B114AB636E9
SHA256:1C338CBDD9316D7FD8F208341466FEDC554A04D489B3A86C736EC3831A2F2BA2
796PLUGScheduler.exeC:\ProgramData\PLUG\Logs\RUXIMLog.041.etlbinary
MD5:44A0E917AD0C126931B1BCD959285A9A
SHA256:DDFBE47E7DFD6D8B7517F2F6FF9808ECF3C0A25F588A9F96D04F4E2B4A578573
796PLUGScheduler.exeC:\ProgramData\PLUG\Logs\RUXIMLog.033.etlbinary
MD5:B53B2070E686FFB1FBC8B06994E7C8D7
SHA256:A3ABD06F4E40CB700B1908AB6BCD2E27455E13EF076E0BF2345BB2FA369EF802
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
72
DNS requests
34
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4672
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6212
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4672
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
2136
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
5088
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
2632
svchost.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
2.23.227.215:443
www.bing.com
Ooredoo Q.S.C.
QA
whitelisted
1176
svchost.exe
40.126.32.76:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1176
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.78
whitelisted
crl.microsoft.com
  • 2.16.241.12
  • 2.16.241.19
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 184.30.21.171
whitelisted
www.bing.com
  • 2.23.227.215
  • 2.23.227.208
  • 104.126.37.161
  • 104.126.37.160
  • 104.126.37.176
  • 104.126.37.129
  • 104.126.37.171
  • 104.126.37.155
  • 104.126.37.139
  • 104.126.37.170
  • 104.126.37.179
  • 104.126.37.137
  • 104.126.37.154
  • 104.126.37.168
  • 104.126.37.153
  • 104.126.37.128
  • 104.126.37.163
whitelisted
login.live.com
  • 40.126.32.76
  • 40.126.32.72
  • 20.190.160.20
  • 40.126.32.134
  • 20.190.160.14
  • 40.126.32.74
  • 20.190.160.17
  • 40.126.32.136
  • 40.126.31.69
  • 20.190.159.64
  • 20.190.159.0
  • 20.190.159.2
  • 20.190.159.71
  • 40.126.31.73
  • 40.126.31.67
  • 20.190.159.68
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 184.28.89.167
  • 23.35.238.131
  • 2.23.242.9
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.124.78.146
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
fd.api.iris.microsoft.com
  • 20.199.58.43
  • 20.223.35.26
whitelisted

Threats

No threats detected
No debug info