File name:

CheatEngine76.exe

Full analysis: https://app.any.run/tasks/a0cf2ae4-3330-4765-ad13-4f325246115d
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: May 18, 2025, 20:49:23
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
delphi
inno
installer
bundleinstaller
adware
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 11 sections
MD5:

929BB4590A71EAC440A457C06874D70A

SHA1:

35C06F84B42DE0FA8F4B7C8CA0C294ACD4B8FEAE

SHA256:

C60318B77A92713978EE0A70BECC5CF0FE71AAAFECCF35AB18F60645D6377523

SSDEEP:

98304:nrq3BdwWTZwM9dHW9F1ya8U8qqgGPDiNoZA38EuSlNfdPI6bpEq8p8qnE5BFzfx9:5RH8k

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Bundleinstaller mutex has been found

      • CheatEngine76.tmp (PID: 2980)
    • Starts NET.EXE for service management

      • CheatEngine76.tmp (PID: 668)
      • net.exe (PID: 4188)
      • net.exe (PID: 2644)
      • net.exe (PID: 5596)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • CheatEngine76.exe (PID: 4756)
      • CheatEngine76.exe (PID: 664)
      • CheatEngine76.tmp (PID: 2980)
      • CheatEngine76.exe (PID: 5352)
      • CheatEngine76.tmp (PID: 668)
    • Reads security settings of Internet Explorer

      • CheatEngine76.tmp (PID: 6708)
      • WinRAR.exe (PID: 2332)
    • Reads the Windows owner or organization settings

      • CheatEngine76.tmp (PID: 2980)
      • CheatEngine76.tmp (PID: 668)
    • There is functionality for taking screenshot (YARA)

      • CheatEngine76.tmp (PID: 2980)
    • Starts SC.EXE for service management

      • CheatEngine76.tmp (PID: 668)
    • Windows service management via SC.EXE

      • sc.exe (PID: 6572)
      • sc.exe (PID: 6252)
      • sc.exe (PID: 6632)
    • Uses ICACLS.EXE to modify access control lists

      • CheatEngine76.tmp (PID: 668)
    • Process drops SQLite DLL files

      • CheatEngine76.tmp (PID: 668)
    • Process drops legitimate windows executable

      • CheatEngine76.tmp (PID: 668)
    • Application launched itself

      • WinRAR.exe (PID: 2332)
  • INFO

    • Create files in a temporary directory

      • CheatEngine76.exe (PID: 4756)
      • CheatEngine76.exe (PID: 664)
      • CheatEngine76.tmp (PID: 2980)
      • CheatEngine76.exe (PID: 5352)
      • CheatEngine76.tmp (PID: 668)
    • Checks supported languages

      • CheatEngine76.exe (PID: 4756)
      • CheatEngine76.tmp (PID: 6708)
      • CheatEngine76.exe (PID: 664)
      • CheatEngine76.tmp (PID: 2980)
      • CheatEngine76.exe (PID: 5352)
      • CheatEngine76.tmp (PID: 668)
      • _setup64.tmp (PID: 6540)
      • Kernelmoduleunloader.exe (PID: 5984)
      • windowsrepair.exe (PID: 4464)
    • Process checks computer location settings

      • CheatEngine76.tmp (PID: 6708)
    • Reads the computer name

      • CheatEngine76.tmp (PID: 6708)
      • CheatEngine76.exe (PID: 664)
      • CheatEngine76.tmp (PID: 2980)
      • CheatEngine76.tmp (PID: 668)
      • CheatEngine76.exe (PID: 5352)
      • Kernelmoduleunloader.exe (PID: 5984)
    • Detects InnoSetup installer (YARA)

      • CheatEngine76.exe (PID: 4756)
      • CheatEngine76.exe (PID: 664)
      • CheatEngine76.tmp (PID: 2980)
      • CheatEngine76.tmp (PID: 6708)
      • CheatEngine76.exe (PID: 5352)
      • CheatEngine76.tmp (PID: 668)
    • Compiled with Borland Delphi (YARA)

      • CheatEngine76.exe (PID: 4756)
      • CheatEngine76.tmp (PID: 6708)
      • CheatEngine76.exe (PID: 664)
      • CheatEngine76.tmp (PID: 2980)
      • CheatEngine76.exe (PID: 5352)
      • CheatEngine76.tmp (PID: 668)
    • The sample compiled with english language support

      • CheatEngine76.tmp (PID: 2980)
      • CheatEngine76.tmp (PID: 668)
    • Reads the software policy settings

      • CheatEngine76.tmp (PID: 2980)
      • slui.exe (PID: 4892)
    • Reads the machine GUID from the registry

      • CheatEngine76.tmp (PID: 2980)
    • Checks proxy server information

      • CheatEngine76.tmp (PID: 2980)
    • Creates files in the program directory

      • CheatEngine76.tmp (PID: 668)
    • Creates a software uninstall entry

      • CheatEngine76.tmp (PID: 668)
    • Manual execution by a user

      • WinRAR.exe (PID: 2332)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (53.5)
.exe | InstallShield setup (21)
.exe | Win32 EXE PECompact compressed (generic) (20.2)
.exe | Win32 Executable (generic) (2.1)
.exe | Win16/32 Executable Delphi generic (1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:07:12 07:26:53+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 2.25
CodeSize: 685056
InitializedDataSize: 159744
UninitializedDataSize: -
EntryPoint: 0xa83bc
OSVersion: 6.1
ImageVersion: -
SubsystemVersion: 6.1
Subsystem: Windows GUI
FileVersionNumber: 7.6.0.0
ProductVersionNumber: 7.6.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription: ЕngineGame Downloader
FileVersion: 7.6.0
LegalCopyright: © ЕngineGame
OriginalFileName:
ProductName: ЕngineGame
ProductVersion: 7.6.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
168
Monitored processes
35
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
start cheatengine76.exe cheatengine76.tmp no specs cheatengine76.exe #BUNDLEINSTALLER cheatengine76.tmp sppextcomobj.exe no specs slui.exe cheatengine76.exe cheatengine76.tmp net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs sc.exe no specs conhost.exe no specs _setup64.tmp no specs conhost.exe no specs icacls.exe no specs conhost.exe no specs kernelmoduleunloader.exe no specs windowsrepair.exe no specs icacls.exe no specs conhost.exe no specs slui.exe rundll32.exe no specs winrar.exe no specs winrar.exe

Process information

PID
CMD
Path
Indicators
Parent process
208C:\WINDOWS\system32\net1 stop BadlionAnticheatC:\Windows\System32\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Net Command
Exit code:
2
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\net1.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\samcli.dll
c:\windows\system32\ucrtbase.dll
664"C:\Users\admin\Desktop\CheatEngine76.exe" /SPAWNWND=$B0200 /NOTIFYWND=$50276 C:\Users\admin\Desktop\CheatEngine76.exe
CheatEngine76.tmp
User:
admin
Company:
Integrity Level:
HIGH
Description:
ЕngineGame Downloader
Exit code:
0
Version:
7.6.0
Modules
Images
c:\users\admin\desktop\cheatengine76.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comctl32.dll
668"C:\Users\admin\AppData\Local\Temp\is-A11ER.tmp\CheatEngine76.tmp" /SL5="$2025A,28695682,869888,C:\Users\admin\AppData\Local\Temp\is-8KV4L.tmp\CheatEngine76.exe" /VERYSILENT /ZBDISTC:\Users\admin\AppData\Local\Temp\is-A11ER.tmp\CheatEngine76.tmp
CheatEngine76.exe
User:
admin
Company:
Cheat Engine
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-a11er.tmp\cheatengine76.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comdlg32.dll
684C:\WINDOWS\system32\net1 stop vgkC:\Windows\System32\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Net Command
Exit code:
2
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\net1.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\samcli.dll
c:\windows\system32\netutils.dll
776"C:\Program Files\WinRAR\WinRAR.exe" -elevate2332C:\Program Files\WinRAR\WinRAR.exe
WinRAR.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
HIGH
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
1240"icacls" "C:\Program Files\Cheat Engine" /grant *S-1-15-2-1:(OI)(CI)(RX)C:\Windows\System32\icacls.exeCheatEngine76.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\icacls.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1280C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2332"C:\Program Files\WinRAR\WinRAR.exe" a -ep1 -scul -r0 -iext -- . "C:\Program Files\Cheat Engine"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
2420C:\WINDOWS\system32\net1 stop BadlionAnticC:\Windows\System32\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Net Command
Exit code:
2
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\net1.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\samcli.dll
c:\windows\system32\ucrtbase.dll
2644"net" stop vgkC:\Windows\System32\net.exeCheatEngine76.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Net Command
Exit code:
2
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\net.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
2 600
Read events
2 557
Write events
37
Delete events
6

Modification events

(PID) Process:(668) CheatEngine76.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Operation:writeName:RegFiles0000
Value:
C:\Program Files\Cheat Engine\windowsrepair.exe
(PID) Process:(668) CheatEngine76.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Operation:writeName:Owner
Value:
9C0200008592BC6F36C8DB01
(PID) Process:(668) CheatEngine76.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Operation:writeName:SessionHash
Value:
45BE30A703950FD4546EFC27478668B6A761D1BFB2AC8D508382DD1A66F46ABE
(PID) Process:(668) CheatEngine76.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Operation:writeName:Sequence
Value:
1
(PID) Process:(668) CheatEngine76.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Operation:writeName:RegFilesHash
Value:
51C76E3E9D20DECA55F6876FDBBF5D565C8F06A0248A18B76E710049B3E72E01
(PID) Process:(668) CheatEngine76.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Cheat Engine_is1
Operation:writeName:Inno Setup: Setup Version
Value:
6.4.1
(PID) Process:(668) CheatEngine76.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Cheat Engine_is1
Operation:writeName:Inno Setup: App Path
Value:
C:\Program Files\Cheat Engine
(PID) Process:(668) CheatEngine76.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Cheat Engine_is1
Operation:writeName:InstallLocation
Value:
C:\Program Files\Cheat Engine\
(PID) Process:(668) CheatEngine76.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Cheat Engine_is1
Operation:writeName:Inno Setup: Icon Group
Value:
Cheat Engine
(PID) Process:(668) CheatEngine76.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Cheat Engine_is1
Operation:writeName:Inno Setup: User
Value:
admin
Executable files
140
Suspicious files
72
Text files
478
Unknown types
0

Dropped files

PID
Process
Filename
Type
664CheatEngine76.exeC:\Users\admin\AppData\Local\Temp\is-DJII4.tmp\CheatEngine76.tmpexecutable
MD5:8E72FBBFD90AA6E59D684F7BC450554F
SHA256:962C9824010BCC4D275DC42CD45A3D8D1207FA5A7E43DC458CE050E470D73A68
2980CheatEngine76.tmpC:\Users\admin\AppData\Local\Temp\is-8KV4L.tmp\_isetup\_setup64.tmpexecutable
MD5:E4211D6D009757C078A9FAC7FF4F03D4
SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
2980CheatEngine76.tmpC:\Users\admin\AppData\Local\Temp\is-8KV4L.tmp\zbShieldUtils.dllexecutable
MD5:3037E3D5409FB6A697F12ADDB01BA99B
SHA256:A860BD74595430802F4E2E7AD8FD1D31D3DA3B0C9FAF17AD4641035181A5CE9E
2980CheatEngine76.tmpC:\Users\admin\AppData\Local\Temp\is-8KV4L.tmp\is-5R787.tmpexecutable
MD5:707C3A94A3B3ECF9F83707CF51706D55
SHA256:4B9130295AA7686619DBE8F163B880B2C418B56C4596B5119B67718161AB2D57
2980CheatEngine76.tmpC:\Users\admin\AppData\Local\Temp\is-8KV4L.tmp\is-H8U57.tmpimage
MD5:4CFFF8DC30D353CD3D215FD3A5DBAC24
SHA256:0C430E56D69435D8AB31CBB5916A73A47D11EF65B37D289EE7D11130ADF25856
2980CheatEngine76.tmpC:\Users\admin\AppData\Local\Temp\is-8KV4L.tmp\finish.pngimage
MD5:B24E872BD8F92295273197602AAC8352
SHA256:41031EFC4F7E322DC5FFACC94B9296FB28B9B922B1CE3B3DA13BF659A5FD2985
2980CheatEngine76.tmpC:\Users\admin\AppData\Local\Temp\is-8KV4L.tmp\WebAdvisor.pngimage
MD5:4CFFF8DC30D353CD3D215FD3A5DBAC24
SHA256:0C430E56D69435D8AB31CBB5916A73A47D11EF65B37D289EE7D11130ADF25856
2980CheatEngine76.tmpC:\Users\admin\AppData\Local\Temp\is-8KV4L.tmp\error.pngimage
MD5:2C5238DA8AAF78FB2722F82435B59EB0
SHA256:1AEE87904EAAC431C564438807BDBD8FB34290831E7B3C0A502FDF1EF8EAA6A1
668CheatEngine76.tmpC:\Program Files\Cheat Engine\windowsrepair.exeexecutable
MD5:9A4D1B5154194EA0C42EFEBEB73F318F
SHA256:2F3214F799B0F0A2F3955DBDC64C7E7C0E216F1A09D2C1AD5D0A99921782E363
2980CheatEngine76.tmpC:\Users\admin\AppData\Local\Temp\is-8KV4L.tmp\CheatEngine76.exeexecutable
MD5:707C3A94A3B3ECF9F83707CF51706D55
SHA256:4B9130295AA7686619DBE8F163B880B2C418B56C4596B5119B67718161AB2D57
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
23
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.22:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5728
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5728
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.22:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.31.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2980
CheatEngine76.tmp
18.173.184.219:443
d37tdtb0ed9odn.cloudfront.net
US
whitelisted
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.206.78
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 23.216.77.22
  • 23.216.77.28
  • 23.216.77.13
  • 23.216.77.15
  • 23.216.77.26
  • 23.216.77.19
  • 23.216.77.30
  • 23.216.77.20
  • 23.216.77.31
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 40.126.31.71
  • 40.126.31.131
  • 40.126.31.69
  • 40.126.31.67
  • 40.126.31.129
  • 40.126.31.0
  • 40.126.31.128
  • 20.190.159.71
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
d37tdtb0ed9odn.cloudfront.net
  • 18.173.184.219
  • 18.173.184.163
  • 18.173.184.62
  • 18.173.184.162
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted

Threats

No threats detected
No debug info