File name:

Trusted HWID Spoofer - Made By Trusted Cheat's.zip

Full analysis: https://app.any.run/tasks/49c80552-3963-4690-8cd0-27597beb5c6c
Verdict: Malicious activity
Analysis date: May 19, 2025, 17:05:46
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-doc
confuser
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=store
MD5:

3D2B3EE80B2AD62CF5FEB9A3343D4694

SHA1:

480025B86BE91D0495BC93759208B4B06087B908

SHA256:

A7013C10CAE3CED6C216C9E26FC2C122A5484B0A7BBDFECA120D7AF4DCD33828

SSDEEP:

98304:yczHSSI5HgRO9/yLvYrAs9iHTmobRc5Y4YYP4IHQ0ekmSnuT5dl/K1A5H4nbm6uf:fL4vqVBtWpLy

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 7220)
    • The process creates files with name similar to system file names

      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 8040)
      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 7492)
    • Executes application which crashes

      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 7212)
      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 8040)
      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 7504)
      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 4628)
      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 7684)
  • INFO

    • Manual execution by a user

      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 7992)
      • notepad.exe (PID: 7920)
      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 8040)
      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 7212)
      • Taskmgr.exe (PID: 720)
      • Taskmgr.exe (PID: 1180)
      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 7492)
      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 5744)
      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 7684)
      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 7504)
      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 7864)
      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 4628)
    • Checks supported languages

      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 8040)
      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 7212)
      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 7504)
      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 7492)
    • Disables trace logs

      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 8040)
      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 7492)
      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 7504)
    • Checks proxy server information

      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 8040)
      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 7492)
      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 7504)
      • slui.exe (PID: 6388)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 7920)
      • Taskmgr.exe (PID: 720)
    • Creates files or folders in the user directory

      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 8040)
      • WerFault.exe (PID: 7036)
      • WerFault.exe (PID: 5544)
      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 7492)
      • WerFault.exe (PID: 2644)
    • Reads the computer name

      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 7212)
      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 8040)
      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 7492)
      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 7504)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7220)
    • Reads the machine GUID from the registry

      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 7212)
      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 8040)
      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 7492)
      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 7504)
    • Confuser has been detected (YARA)

      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 8040)
      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 7504)
      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 7492)
      • Trusted HWID Spoofer - Made By Trusted Cheat's.exe (PID: 7684)
    • Reads the software policy settings

      • slui.exe (PID: 6388)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2022:05:26 12:33:48
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: Trusted HWID Spoofer - Made By Trusted Cheat's/.ovpn file's/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
167
Monitored processes
20
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe rundll32.exe no specs notepad.exe no specs trusted hwid spoofer - made by trusted cheat's.exe no specs trusted hwid spoofer - made by trusted cheat's.exe trusted hwid spoofer - made by trusted cheat's.exe werfault.exe no specs slui.exe werfault.exe no specs taskmgr.exe no specs taskmgr.exe trusted hwid spoofer - made by trusted cheat's.exe trusted hwid spoofer - made by trusted cheat's.exe werfault.exe no specs trusted hwid spoofer - made by trusted cheat's.exe no specs trusted hwid spoofer - made by trusted cheat's.exe trusted hwid spoofer - made by trusted cheat's.exe no specs trusted hwid spoofer - made by trusted cheat's.exe werfault.exe no specs werfault.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
720"C:\WINDOWS\system32\taskmgr.exe" /4C:\Windows\System32\Taskmgr.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Manager
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1180"C:\WINDOWS\system32\taskmgr.exe" /4C:\Windows\System32\Taskmgr.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Manager
Exit code:
3221226540
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
1748C:\WINDOWS\SysWOW64\WerFault.exe -u -p 4628 -s 1312C:\Windows\SysWOW64\WerFault.exeTrusted HWID Spoofer - Made By Trusted Cheat's.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
2644C:\WINDOWS\SysWOW64\WerFault.exe -u -p 7504 -s 1644C:\Windows\SysWOW64\WerFault.exeTrusted HWID Spoofer - Made By Trusted Cheat's.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
4376C:\WINDOWS\SysWOW64\WerFault.exe -u -p 7684 -s 1664C:\Windows\SysWOW64\WerFault.exeTrusted HWID Spoofer - Made By Trusted Cheat's.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
4628"C:\Users\admin\Desktop\Trusted HWID Spoofer - Made By Trusted Cheat's\Trusted HWID Spoofer - Made By Trusted Cheat's.exe" C:\Users\admin\Desktop\Trusted HWID Spoofer - Made By Trusted Cheat's\Trusted HWID Spoofer - Made By Trusted Cheat's.exe
explorer.exe
User:
admin
Company:
Trusted Cheat's
Integrity Level:
HIGH
Description:
Trusted HWID Spoofer - Made By Trusted Cheat's
Exit code:
3762504530
Version:
2.4.8.9
Modules
Images
c:\users\admin\desktop\trusted hwid spoofer - made by trusted cheat's\trusted hwid spoofer - made by trusted cheat's.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
5544C:\WINDOWS\SysWOW64\WerFault.exe -u -p 7212 -s 1316C:\Windows\SysWOW64\WerFault.exeTrusted HWID Spoofer - Made By Trusted Cheat's.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
5744"C:\Users\admin\Desktop\Trusted HWID Spoofer - Made By Trusted Cheat's\Trusted HWID Spoofer - Made By Trusted Cheat's.exe" C:\Users\admin\Desktop\Trusted HWID Spoofer - Made By Trusted Cheat's\Trusted HWID Spoofer - Made By Trusted Cheat's.exeexplorer.exe
User:
admin
Company:
Trusted Cheat's
Integrity Level:
MEDIUM
Description:
Trusted HWID Spoofer - Made By Trusted Cheat's
Exit code:
3221226540
Version:
2.4.8.9
Modules
Images
c:\users\admin\desktop\trusted hwid spoofer - made by trusted cheat's\trusted hwid spoofer - made by trusted cheat's.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6388C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7036C:\WINDOWS\SysWOW64\WerFault.exe -u -p 8040 -s 1676C:\Windows\SysWOW64\WerFault.exeTrusted HWID Spoofer - Made By Trusted Cheat's.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
Total events
13 992
Read events
13 921
Write events
55
Delete events
16

Modification events

(PID) Process:(7220) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7220) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7220) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7220) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Trusted HWID Spoofer - Made By Trusted Cheat's.zip
(PID) Process:(7220) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7220) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7220) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7220) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7220) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF7A000000280000003A04000011020000
(PID) Process:(7220) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:name
Value:
256
Executable files
3
Suspicious files
10
Text files
91
Unknown types
0

Dropped files

PID
Process
Filename
Type
7220WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7220.19074\Trusted HWID Spoofer - Made By Trusted Cheat's\.ovpn file's\TCP\de.frankfurt.ovpn.com.ovpntext
MD5:9BD70FD1718E80A49066BC8D6FA6AFA2
SHA256:9A7B26271EAAED1BBB48851ADFFC55BCC7F6F343888E894EFA5E6D079EA056EC
7220WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7220.19074\Trusted HWID Spoofer - Made By Trusted Cheat's\.ovpn file's\TCP\au.ovpn.com.ovpntext
MD5:23C34863536C4F0CF1ED3D338A317A3F
SHA256:E7DCD414B0AEEFBD5896B8CF5DB7D21190D65F05F54BC9C868D77CA330DAD84F
7220WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7220.19074\Trusted HWID Spoofer - Made By Trusted Cheat's\.ovpn file's\TCP\gb.london.ovpn.com.ovpntext
MD5:5532F7EF4E2C5F9017FBAD0EF00AF144
SHA256:3EDFFF7975CA1E3FCC0062E605A204AD3F661C33354E53361B477CD04208A47D
7220WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7220.19074\Trusted HWID Spoofer - Made By Trusted Cheat's\.ovpn file's\TCP\at.ovpn.com.ovpntext
MD5:3F06D67A811868098F06D6A9F91CB82E
SHA256:0F41DC3C58D0564E8853DCBAED03F0A05EB3AEBF019016176961747C630B4048
7220WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7220.19074\Trusted HWID Spoofer - Made By Trusted Cheat's\.ovpn file's\TCP\dk.copenhagen.ovpn.com.ovpntext
MD5:08617F6ED05A364F5A762786C91AC4FC
SHA256:D0F496854718DEDCCD60C2DB0475C706F30B6DCEE68AC14CD37BF8ADAB8278F1
7220WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7220.19074\Trusted HWID Spoofer - Made By Trusted Cheat's\.ovpn file's\TCP\at.vienna.ovpn.com.ovpntext
MD5:2FDE39221AB22B1EE738BFB7D09ACB12
SHA256:D6393A6521AE99E676E411482C54ADFD12C918DBC7326731008479EC020CC4FD
7220WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7220.19074\Trusted HWID Spoofer - Made By Trusted Cheat's\.ovpn file's\TCP\fi.helsinki.ovpn.com.ovpntext
MD5:A0CD9117C3A915CBD5530F858A58FBDD
SHA256:A6A3B16861BE7BF7EEF87180309AAA0E9E63B8597441B2656A2E25C9CAEA3229
7220WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7220.19074\Trusted HWID Spoofer - Made By Trusted Cheat's\.ovpn file's\TCP\fr.paris.ovpn.com.ovpntext
MD5:010B19EA8F4BBD0C6942315866D6C254
SHA256:1BA0169D3368F44EC0B2D13DC8F8F8D157DAE74CC222B17F6ED58BE17937C6CF
7220WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7220.19074\Trusted HWID Spoofer - Made By Trusted Cheat's\.ovpn file's\TCP\dk.ovpn.com.ovpntext
MD5:77610EAC1204450AC803AAC4EB7C98D4
SHA256:C9AFE5AF11F53325112A3DD0293E3604465EE68CEDD9E01778567CDC4FDF6CB8
7220WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7220.19074\Trusted HWID Spoofer - Made By Trusted Cheat's\.ovpn file's\TCP\ch.zurich.ovpn.com.ovpntext
MD5:95B0944A49AC47E6F48563DF6B87D773
SHA256:F65A62472CAABEE41C7F8AE891754BC5AE2EAA4CFC844356785D3B837D7B16BD
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
32
DNS requests
20
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7700
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5984
backgroundTaskHost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D
unknown
whitelisted
GET
200
23.216.77.39:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7700
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
23.216.77.39:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
7700
SIHClient.exe
4.175.87.197:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7700
SIHClient.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 23.216.77.39
  • 23.216.77.37
  • 23.216.77.35
  • 23.216.77.36
  • 23.216.77.38
  • 23.216.77.42
  • 23.216.77.41
  • 23.216.77.5
  • 23.216.77.32
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 2.23.246.101
whitelisted
google.com
  • 172.217.18.14
whitelisted
client.wns.windows.com
  • 172.211.123.250
  • 172.211.123.249
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted
nexusrules.officeapps.live.com
  • 52.111.243.31
whitelisted
login.live.com
  • 40.126.31.1
  • 20.190.159.73
  • 20.190.159.131
  • 20.190.159.4
  • 40.126.31.73
  • 40.126.31.129
  • 40.126.31.71
  • 40.126.31.131
whitelisted

Threats

No threats detected
No debug info