File name:

Your File Is Ready To Download.exe.danger

Full analysis: https://app.any.run/tasks/b3443366-8b30-497a-877e-67061cf52950
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: May 24, 2025, 15:33:36
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
stealer
adware
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

4939CD1620712D37759293DE62C3A03D

SHA1:

C8D66C59A62C5D055D40096665EB5B9252FDB2CA

SHA256:

B6FD486840A14EF414238D38CDA7DF90D4ECAAE4D73FF3DDB870960E1857C631

SSDEEP:

98304:O6VnvKp9IxG+A+4CMP9jxFsTGxNWqzHeJTOuEYLoBRvSEjf7zvZgP6h/zhEuSuTq:DOXy2V664

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • GenericSetup.exe (PID: 1676)
    • ADWARE has been detected (SURICATA)

      • GenericSetup.exe (PID: 1676)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Your File Is Ready To Download.exe.danger.exe (PID: 6944)
      • GenericSetup.exe (PID: 1676)
      • kodi-19.1-Matrix-x64.exe (PID: 5776)
    • Reads security settings of Internet Explorer

      • GenericSetup.exe (PID: 1676)
    • Adds/modifies Windows certificates

      • GenericSetup.exe (PID: 1676)
    • Access to an unwanted program domain was detected

      • GenericSetup.exe (PID: 1676)
    • There is functionality for taking screenshot (YARA)

      • GenericSetup.exe (PID: 1676)
    • Starts CMD.EXE for commands execution

      • GenericSetup.exe (PID: 1676)
    • The process creates files with name similar to system file names

      • kodi-19.1-Matrix-x64.exe (PID: 5776)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • kodi-19.1-Matrix-x64.exe (PID: 5776)
    • The executable file from the user directory is run by the CMD process

      • kodi-19.1-Matrix-x64.exe (PID: 5776)
  • INFO

    • Checks supported languages

      • Your File Is Ready To Download.exe.danger.exe (PID: 6944)
      • GenericSetup.exe (PID: 1676)
      • kodi-19.1-Matrix-x64.exe (PID: 5776)
    • The sample compiled with english language support

      • Your File Is Ready To Download.exe.danger.exe (PID: 6944)
    • Create files in a temporary directory

      • Your File Is Ready To Download.exe.danger.exe (PID: 6944)
      • GenericSetup.exe (PID: 1676)
      • kodi-19.1-Matrix-x64.exe (PID: 5776)
    • Reads the machine GUID from the registry

      • GenericSetup.exe (PID: 1676)
    • Reads the computer name

      • GenericSetup.exe (PID: 1676)
      • kodi-19.1-Matrix-x64.exe (PID: 5776)
    • Creates files or folders in the user directory

      • GenericSetup.exe (PID: 1676)
    • Reads the software policy settings

      • GenericSetup.exe (PID: 1676)
    • Checks proxy server information

      • GenericSetup.exe (PID: 1676)
    • Disables trace logs

      • GenericSetup.exe (PID: 1676)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | InstallShield setup (36.8)
.exe | Win32 Executable MS Visual C++ (generic) (26.6)
.exe | Win64 Executable (generic) (23.6)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2011:04:18 18:54:06+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 104448
InitializedDataSize: 35328
UninitializedDataSize: -
EntryPoint: 0x148d4
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 6.91.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileVersion: 6.91.0.0
ProductVersion: 1.0.0.0
CompanyName: IC001
FileDescription: Software Installation
InternalName: 7zS.sfx
LegalCopyright: Copyright © Adaware 2022
OriginalFileName: GenericSetup.exe
ProductName: InstallCapital
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
136
Monitored processes
8
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start your file is ready to download.exe.danger.exe #ADWARE genericsetup.exe sppextcomobj.exe no specs slui.exe no specs cmd.exe no specs conhost.exe no specs kodi-19.1-matrix-x64.exe your file is ready to download.exe.danger.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
632"C:\WINDOWS\system32\cmd.exe" /C ""C:\Users\admin\Downloads\kodi-19.1-Matrix-x64.exe""C:\Windows\SysWOW64\cmd.exeGenericSetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1020"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
1676.\GenericSetup.exeC:\Users\admin\AppData\Local\Temp\7zS02B172F0\GenericSetup.exe
Your File Is Ready To Download.exe.danger.exe
User:
admin
Integrity Level:
HIGH
Description:
InstallCapital
Version:
1.4.3.5835
Modules
Images
c:\users\admin\appdata\local\temp\7zs02b172f0\genericsetup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
5064C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
5576"C:\Users\admin\Desktop\Your File Is Ready To Download.exe.danger.exe" C:\Users\admin\Desktop\Your File Is Ready To Download.exe.danger.exeexplorer.exe
User:
admin
Company:
IC001
Integrity Level:
MEDIUM
Description:
Software Installation
Exit code:
3221226540
Version:
6.91.0.0
Modules
Images
c:\users\admin\desktop\your file is ready to download.exe.danger.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
5776"C:\Users\admin\Downloads\kodi-19.1-Matrix-x64.exe"C:\Users\admin\Downloads\kodi-19.1-Matrix-x64.exe
cmd.exe
User:
admin
Company:
XBMC Foundation
Integrity Level:
HIGH
Description:
Kodi 19.1.0.0 Setup
Version:
19.1.0.0
Modules
Images
c:\users\admin\downloads\kodi-19.1-matrix-x64.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6512\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6944"C:\Users\admin\Desktop\Your File Is Ready To Download.exe.danger.exe" C:\Users\admin\Desktop\Your File Is Ready To Download.exe.danger.exe
explorer.exe
User:
admin
Company:
IC001
Integrity Level:
HIGH
Description:
Software Installation
Version:
6.91.0.0
Modules
Images
c:\users\admin\desktop\your file is ready to download.exe.danger.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
Total events
5 500
Read events
5 482
Write events
16
Delete events
2

Modification events

(PID) Process:(1676) GenericSetup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates
Operation:delete valueName:8CF427FD790C3AD166068DE81E57EFBB932272D4
Value:
(PID) Process:(1676) GenericSetup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\8CF427FD790C3AD166068DE81E57EFBB932272D4
Operation:writeName:Blob
Value:
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
(PID) Process:(1676) GenericSetup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\8CF427FD790C3AD166068DE81E57EFBB932272D4
Operation:writeName:Blob
Value:
5C0000000100000004000000000800007E000000010000000800000000C001B39667D6011400000001000000140000006A72267AD01EEF7DE73B6951D46C8D9F901266AB62000000010000002000000043DF5774B03E7FEF5FE40D931A7BEDF1BB2E6B42738C4E6D3841103D3AA7F339530000000100000041000000303F3020060A6086480186FA6C0A010230123010060A2B0601040182373C0101030200C0301B060567810C010330123010060A2B0601040182373C0101030200C0190000000100000010000000FA46CE7CBB85CFB4310075313A09EE050300000001000000140000008CF427FD790C3AD166068DE81E57EFBB932272D40F0000000100000020000000FDE5F2D9CE2026E1E10064C0A468C9F355B90ACF85BAF5CE6F52D4016837FD94090000000100000054000000305206082B0601050507030206082B06010505070303060A2B0601040182370A030406082B0601050507030406082B0601050507030606082B0601050507030706082B0601050507030106082B060105050703087F000000010000002C000000302A060A2B0601040182370A030406082B0601050507030506082B0601050507030606082B060105050703070B000000010000001800000045006E00740072007500730074002E006E006500740000001D0000000100000010000000521B5F4582C1DCAAE381B05E37CA2D340400000001000000100000004BE2C99196650CF40E5A9392A00AFEB22000000001000000420400003082043E30820326A00302010202044A538C28300D06092A864886F70D01010B05003081BE310B300906035504061302555331163014060355040A130D456E74727573742C20496E632E31283026060355040B131F536565207777772E656E74727573742E6E65742F6C6567616C2D7465726D7331393037060355040B1330286329203230303920456E74727573742C20496E632E202D20666F7220617574686F72697A656420757365206F6E6C793132303006035504031329456E747275737420526F6F742043657274696669636174696F6E20417574686F72697479202D204732301E170D3039303730373137323535345A170D3330313230373137353535345A3081BE310B300906035504061302555331163014060355040A130D456E74727573742C20496E632E31283026060355040B131F536565207777772E656E74727573742E6E65742F6C6567616C2D7465726D7331393037060355040B1330286329203230303920456E74727573742C20496E632E202D20666F7220617574686F72697A656420757365206F6E6C793132303006035504031329456E747275737420526F6F742043657274696669636174696F6E20417574686F72697479202D20473230820122300D06092A864886F70D01010105000382010F003082010A0282010100BA84B672DB9E0C6BE299E93001A776EA32B895411AC9DA614E5872CFFEF68279BF7361060AA527D8B35FD3454E1C72D64E32F2728A0FF78319D06A808000451EB0C7E79ABF1257271CA3682F0A87BD6A6B0E5E65F31C77D5D4858D7021B4B332E78BA2D5863902B1B8D247CEE4C949C43BA7DEFB547D57BEF0E86EC279B23A0B55E250981632135C2F7856C1C294B3F25AE4279A9F24D7C6ECD09B2582E3CCC2C445C58C977A066B2A119FA90A6E483B6FDBD4111942F78F07BFF5535F9C3EF4172CE669AC4E324C6277EAB7E8E5BB34BC198BAE9C51E7B77EB553B13322E56DCF703C1AFAE29B67B683F48DA5AF624C4DE058AC64341203F8B68D946324A4710203010001A3423040300E0603551D0F0101FF040403020106300F0603551D130101FF040530030101FF301D0603551D0E041604146A72267AD01EEF7DE73B6951D46C8D9F901266AB300D06092A864886F70D01010B05000382010100799F1D96C6B6793F228D87D3870304606A6B9A2E59897311AC43D1F513FF8D392BC0F2BD4F708CA92FEA17C40B549ED41B9698333CA8AD62A20076AB59696E061D7EC4B9448D98AF12D461DB0A194647F3EBF763C1400540A5D2B7F4B59A36BFA98876880455042B9C877F1A373C7E2DA51AD8D4895ECABDAC3D6CD86DAFD5F3760FCD3B8838229D6C939AC43DBF821B653FA60F5DAAFCE5B215CAB5ADC6BC3DD084E8EA0672B04D393278BF3E119C0BA49D9A21F3F09B0B3078DBC1DC8743FEBC639ACAC5C21CC9C78DFF3B125808E6B63DEC7A2C4EFB8396CE0C3C69875473A473C293FF5110AC155401D8FC05B189A17F74839A49D7DC4E7B8A486F8B45F6
(PID) Process:(1676) GenericSetup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GenericSetup_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(1676) GenericSetup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GenericSetup_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(1676) GenericSetup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GenericSetup_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(1676) GenericSetup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GenericSetup_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(1676) GenericSetup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GenericSetup_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(1676) GenericSetup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GenericSetup_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(1676) GenericSetup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GenericSetup_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
Executable files
11
Suspicious files
5
Text files
21
Unknown types
0

Dropped files

PID
Process
Filename
Type
6944Your File Is Ready To Download.exe.danger.exeC:\Users\admin\AppData\Local\Temp\7zS02B172F0\it\GenericSetup.resources.dllexecutable
MD5:9CE8CC807C8964A8D9577AC031378DC5
SHA256:250465CFD8FF147C0A145BEC949E55ACB9542F35794B1E9F0C56DE01265F094E
1676GenericSetup.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A37B8BA80004D3266CB4D93B2052DC10_5F5F520ABA6509FB550A7DDEB645B50Fbinary
MD5:5AB3584D2361B70F85B4B7A87ED0A3DF
SHA256:AA239EE3A36EAADF7CBF61E4EC2C9B7A439BA51B89673BCC6F9D8E6B276822BA
6944Your File Is Ready To Download.exe.danger.exeC:\Users\admin\AppData\Local\Temp\7zS02B172F0\pt\GenericSetup.resources.dllexecutable
MD5:CFF7140936B8C88003ADB80A77F78627
SHA256:83AE59AB44D59356CCD25DE6AC04743230045917D80534AD6436409BBB19AD6E
6944Your File Is Ready To Download.exe.danger.exeC:\Users\admin\AppData\Local\Temp\7zS02B172F0\DynActsBLL.dllexecutable
MD5:2E189EB15BCF6989B86542FCA3A75D02
SHA256:A0FEA1E00F1A225EAE3EFBC4877F0D8F66D345F9B11CEF34355085B8165CC83B
6944Your File Is Ready To Download.exe.danger.exeC:\Users\admin\AppData\Local\Temp\7zS02B172F0\de\GenericSetup.resources.dllexecutable
MD5:1F889DC2337F4AC07374DEB456B12E3B
SHA256:DD8E201A24AACF7420234D0882A40DB1734F099FEBBC4911888511B409489FDD
1676GenericSetup.exeC:\Users\admin\AppData\Local\Temp\GenericSetup.exe_1748100827\sciter32.dllexecutable
MD5:B431083586E39D018E19880AD1A5CE8F
SHA256:B525FDCC32C5A359A7F5738A30EFF0C6390734D8A2C987C62E14C619F99D406B
1676GenericSetup.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A37B8BA80004D3266CB4D93B2052DC10_5F5F520ABA6509FB550A7DDEB645B50Fbinary
MD5:6ACE7913605F697E31DFEA6FD813DB30
SHA256:E38A9DFB0E2246050FD6073DEE345601B1DC6C959585FE0BC7538AA01FAC68FE
6944Your File Is Ready To Download.exe.danger.exeC:\Users\admin\AppData\Local\Temp\7zS02B172F0\fr\GenericSetup.resources.dllexecutable
MD5:7EDD12803F15A0180EF2663D39EBFB91
SHA256:8E707984083CA3C1319290A6B044F8D44EDEF2888C3FED49E67C8C9332C6B348
6944Your File Is Ready To Download.exe.danger.exeC:\Users\admin\AppData\Local\Temp\7zS02B172F0\es\GenericSetup.resources.dllexecutable
MD5:244CD3A33B0A6FE36AA0274C0C1211D1
SHA256:FA03335241496436583DFC1AFF605A61EB26E3CA84321B2334709C5F7ECDCBCC
1676GenericSetup.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B59C386ACF967256F47CEB4C030EC6CA_09374BCDA06F0FB4474C5CB3B17DA434binary
MD5:4CF1C5F97852C742AC5FB5AF0D610056
SHA256:6A350FE75FFECD7A509317ED6512574CEEDDECAF1A11EAFEB7FD2FBFF488572F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
23
DNS requests
18
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1676
GenericSetup.exe
GET
200
23.192.154.58:80
http://ocsp.entrust.net/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQQYZiPAAGkmN%2BgbjpL0XWVofDLNAQUKgpvMiwpICF2arGsjDyvk44Oa6ICEB5Qi7I5iAi8QgpaH2e6XQs%3D
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7000
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
1676
GenericSetup.exe
GET
200
23.192.154.58:80
http://ocsp.entrust.net/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTLXNCzDvBhHecWjg70iJhBW0InywQUanImetAe733nO2lR1GyNn5ASZqsCDQCHglJgAAAAAFHTc9k%3D
unknown
whitelisted
7000
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
1676
GenericSetup.exe
23.192.154.58:80
ocsp.entrust.net
AKAMAI-AS
GB
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
1676
GenericSetup.exe
104.16.213.94:443
h2oapi.adaware.com
CLOUDFLARENET
whitelisted
6544
svchost.exe
40.126.31.0:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
google.com
  • 142.250.185.206
whitelisted
crl.microsoft.com
  • 23.53.40.178
  • 23.53.40.176
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
ocsp.entrust.net
  • 23.192.154.58
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
h2oapi.adaware.com
  • 104.16.213.94
  • 104.16.212.94
whitelisted
www.google.com
  • 172.217.16.132
whitelisted
sos.adaware.com
  • 104.16.213.94
  • 104.16.212.94
whitelisted
login.live.com
  • 40.126.31.0
  • 20.190.159.75
  • 20.190.159.71
  • 20.190.159.64
  • 40.126.31.69
  • 40.126.31.131
  • 40.126.31.128
  • 20.190.159.23
whitelisted

Threats

PID
Process
Class
Message
1676
GenericSetup.exe
Possibly Unwanted Program Detected
ADWARE [ANY.RUN] TLS SNI Domain related with Unwanted Software (sos .adaware .com)
No debug info