File name:

VC_redist.x86.exe

Full analysis: https://app.any.run/tasks/4eff2e74-b7ae-4737-a00a-ec519e86d252
Verdict: Malicious activity
Analysis date: November 06, 2025, 17:46:24
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

99F52708B06B9C695A8D64A44740BF08

SHA1:

C2743FFC36D2AF40ADE0E370BE52D6B202874114

SHA256:

0C09F2611660441084CE0DF425C51C11E147E6447963C3690F97E0B25C55ED64

SSDEEP:

98304:I1svXJG6gIS6tHeVtWLPmZbbnTpwyfy8QAq38pOPdzMGqoXlF0cgl95rQXcA3RGr:j8+enNsqQ3pC/Ex9bb4

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • VC_redist.x86.exe (PID: 7808)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • VC_redist.x86.exe (PID: 7536)
      • VC_redist.x86.exe (PID: 7564)
      • VC_redist.x86.exe (PID: 7808)
      • msiexec.exe (PID: 3460)
      • VC_redist.x86.exe (PID: 7716)
    • Starts a Microsoft application from unusual location

      • VC_redist.x86.exe (PID: 7536)
      • VC_redist.x86.exe (PID: 7564)
      • VC_redist.x86.exe (PID: 7808)
    • Executable content was dropped or overwritten

      • VC_redist.x86.exe (PID: 7536)
      • VC_redist.x86.exe (PID: 7564)
      • VC_redist.x86.exe (PID: 7808)
      • VC_redist.x86.exe (PID: 2756)
      • VC_redist.x86.exe (PID: 7716)
    • Searches for installed software

      • VC_redist.x86.exe (PID: 7564)
      • dllhost.exe (PID: 7856)
      • VC_redist.x86.exe (PID: 2756)
      • VC_redist.x86.exe (PID: 7716)
    • Reads security settings of Internet Explorer

      • VC_redist.x86.exe (PID: 7564)
      • VC_redist.x86.exe (PID: 2756)
    • Starts itself from another location

      • VC_redist.x86.exe (PID: 7564)
    • Executes as Windows Service

      • VSSVC.exe (PID: 7900)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 3460)
    • Application launched itself

      • VC_redist.x86.exe (PID: 7528)
      • VC_redist.x86.exe (PID: 2756)
    • The process drops C-runtime libraries

      • msiexec.exe (PID: 3460)
  • INFO

    • The sample compiled with english language support

      • VC_redist.x86.exe (PID: 7536)
      • VC_redist.x86.exe (PID: 7564)
      • VC_redist.x86.exe (PID: 7808)
      • msiexec.exe (PID: 3460)
      • VC_redist.x86.exe (PID: 2756)
      • VC_redist.x86.exe (PID: 7716)
    • Create files in a temporary directory

      • VC_redist.x86.exe (PID: 7536)
      • VC_redist.x86.exe (PID: 7564)
      • VC_redist.x86.exe (PID: 7808)
      • VC_redist.x86.exe (PID: 2756)
    • Checks supported languages

      • VC_redist.x86.exe (PID: 7536)
      • VC_redist.x86.exe (PID: 7564)
      • VC_redist.x86.exe (PID: 7808)
      • msiexec.exe (PID: 3460)
      • VC_redist.x86.exe (PID: 7528)
      • VC_redist.x86.exe (PID: 2756)
      • VC_redist.x86.exe (PID: 7716)
    • Reads the computer name

      • VC_redist.x86.exe (PID: 7564)
      • VC_redist.x86.exe (PID: 7808)
      • msiexec.exe (PID: 3460)
      • VC_redist.x86.exe (PID: 2756)
      • VC_redist.x86.exe (PID: 7716)
    • Process checks computer location settings

      • VC_redist.x86.exe (PID: 7564)
      • VC_redist.x86.exe (PID: 2756)
    • Creates files in the program directory

      • VC_redist.x86.exe (PID: 7808)
    • Creates a software uninstall entry

      • VC_redist.x86.exe (PID: 7808)
      • msiexec.exe (PID: 3460)
    • Reads the machine GUID from the registry

      • VC_redist.x86.exe (PID: 7808)
      • msiexec.exe (PID: 3460)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 3460)
    • Reads the software policy settings

      • msiexec.exe (PID: 3460)
    • Manages system restore points

      • SrTasks.exe (PID: 4712)
    • Launching a file from a Registry key

      • VC_redist.x86.exe (PID: 7808)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:03:22 22:14:43+00:00
ImageFileCharacteristics: Executable, 32-bit, Removable run from swap, Net run from swap
PEType: PE32
LinkerVersion: 14.16
CodeSize: 314368
InitializedDataSize: 164352
UninitializedDataSize: -
EntryPoint: 0x302e5
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 14.44.35211.0
ProductVersionNumber: 14.44.35211.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: Microsoft Corporation
FileDescription: Microsoft Visual C++ 2015-2022 Redistributable (x86) - 14.44.35211
FileVersion: 14.44.35211.0
InternalName: setup
LegalCopyright: Copyright (c) Microsoft Corporation. All rights reserved.
OriginalFileName: VC_redist.x86.exe
ProductName: Microsoft Visual C++ 2015-2022 Redistributable (x86) - 14.44.35211
ProductVersion: 14.44.35211.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
162
Monitored processes
11
Malicious processes
2
Suspicious processes
2

Behavior graph

Click at the process to see the details
start vc_redist.x86.exe vc_redist.x86.exe vc_redist.x86.exe SPPSurrogate no specs vssvc.exe no specs srtasks.exe no specs conhost.exe no specs msiexec.exe vc_redist.x86.exe no specs vc_redist.x86.exe vc_redist.x86.exe

Process information

PID
CMD
Path
Indicators
Parent process
2756"C:\ProgramData\Package Cache\{410c0ee1-00bb-41b6-9772-e12c2828b02f}\VC_redist.x86.exe" -burn.clean.room="C:\ProgramData\Package Cache\{410c0ee1-00bb-41b6-9772-e12c2828b02f}\VC_redist.x86.exe" -burn.filehandle.attached=544 -burn.filehandle.self=564 -uninstall -quiet -burn.related.upgrade -burn.ancestors={0b5169e3-39da-4313-808e-1f9c0407f3bf} -burn.filehandle.self=1264 -burn.embedded BurnPipe.{8ABE7914-FD93-4560-B288-E0E2C08B025B} {2964CB52-8F0D-4F6F-97AF-30B2F8BADCA6} 7808C:\ProgramData\Package Cache\{410c0ee1-00bb-41b6-9772-e12c2828b02f}\VC_redist.x86.exe
VC_redist.x86.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Visual C++ 2015-2022 Redistributable (x86) - 14.36.32532
Exit code:
0
Version:
14.36.32532.0
Modules
Images
c:\programdata\package cache\{410c0ee1-00bb-41b6-9772-e12c2828b02f}\vc_redist.x86.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
3460C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
3640\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeSrTasks.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4712C:\WINDOWS\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:15C:\Windows\System32\SrTasks.exedllhost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft® Windows System Protection background tasks.
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\srtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7528"C:\ProgramData\Package Cache\{410c0ee1-00bb-41b6-9772-e12c2828b02f}\VC_redist.x86.exe" -uninstall -quiet -burn.related.upgrade -burn.ancestors={0b5169e3-39da-4313-808e-1f9c0407f3bf} -burn.filehandle.self=1264 -burn.embedded BurnPipe.{8ABE7914-FD93-4560-B288-E0E2C08B025B} {2964CB52-8F0D-4F6F-97AF-30B2F8BADCA6} 7808C:\ProgramData\Package Cache\{410c0ee1-00bb-41b6-9772-e12c2828b02f}\VC_redist.x86.exeVC_redist.x86.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Visual C++ 2015-2022 Redistributable (x86) - 14.36.32532
Exit code:
0
Version:
14.36.32532.0
Modules
Images
c:\programdata\package cache\{410c0ee1-00bb-41b6-9772-e12c2828b02f}\vc_redist.x86.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
7536"C:\Users\admin\AppData\Local\Temp\VC_redist.x86.exe" C:\Users\admin\AppData\Local\Temp\VC_redist.x86.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Visual C++ 2015-2022 Redistributable (x86) - 14.44.35211
Exit code:
0
Version:
14.44.35211.0
Modules
Images
c:\users\admin\appdata\local\temp\vc_redist.x86.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
7564"C:\Users\admin\AppData\Local\Temp\{D0D68738-6816-499B-9F89-DD2FF99C5222}\.cr\VC_redist.x86.exe" -burn.clean.room="C:\Users\admin\AppData\Local\Temp\VC_redist.x86.exe" -burn.filehandle.attached=592 -burn.filehandle.self=692 C:\Users\admin\AppData\Local\Temp\{D0D68738-6816-499B-9F89-DD2FF99C5222}\.cr\VC_redist.x86.exe
VC_redist.x86.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Visual C++ 2015-2022 Redistributable (x86) - 14.44.35211
Exit code:
0
Version:
14.44.35211.0
Modules
Images
c:\users\admin\appdata\local\temp\{d0d68738-6816-499b-9f89-dd2ff99c5222}\.cr\vc_redist.x86.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
7716"C:\ProgramData\Package Cache\{410c0ee1-00bb-41b6-9772-e12c2828b02f}\VC_redist.x86.exe" -q -burn.elevated BurnPipe.{6F8BC6DF-9713-46FF-A70E-C03D7AC9983A} {494FF63C-DA43-4949-93E1-B7CC90526CD7} 2756C:\ProgramData\Package Cache\{410c0ee1-00bb-41b6-9772-e12c2828b02f}\VC_redist.x86.exe
VC_redist.x86.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Visual C++ 2015-2022 Redistributable (x86) - 14.36.32532
Exit code:
0
Version:
14.36.32532.0
Modules
Images
c:\programdata\package cache\{410c0ee1-00bb-41b6-9772-e12c2828b02f}\vc_redist.x86.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
7808"C:\Users\admin\AppData\Local\Temp\{6CAA0E96-D928-4B1C-9B4D-59A233C8EF04}\.be\VC_redist.x86.exe" -q -burn.elevated BurnPipe.{887F76BA-4406-4884-B605-5FCFA221C55E} {2A14C732-8A25-428F-BC51-1E6D58FBD5C6} 7564C:\Users\admin\AppData\Local\Temp\{6CAA0E96-D928-4B1C-9B4D-59A233C8EF04}\.be\VC_redist.x86.exe
VC_redist.x86.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Visual C++ 2015-2022 Redistributable (x86) - 14.44.35211
Exit code:
0
Version:
14.44.35211.0
Modules
Images
c:\users\admin\appdata\local\temp\{6caa0e96-d928-4b1c-9b4d-59a233c8ef04}\.be\vc_redist.x86.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
7856C:\WINDOWS\system32\DllHost.exe /Processid:{F32D97DF-E3E5-4CB9-9E3E-0EB5B4E49801}C:\Windows\System32\dllhost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
Total events
11 610
Read events
10 741
Write events
604
Delete events
265

Modification events

(PID) Process:(7808) VC_redist.x86.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
40000000000000000808344C454FDC01801E0000841E0000D5070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7856) dllhost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Enter)
Value:
48000000000000000808344C454FDC01B01E0000C81E0000D20700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7856) dllhost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Enter)
Value:
4800000000000000563E8C4C454FDC01B01E0000C81E0000D10700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7856) dllhost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Leave)
Value:
4800000000000000D9A08E4C454FDC01B01E0000C81E0000D10700000100000000000000010000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7856) dllhost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
Operation:writeName:LastIndex
Value:
15
(PID) Process:(7856) dllhost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGatherWriterMetadata (Enter)
Value:
48000000000000001C9FAD4C454FDC01B01E0000C81E0000D30700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7856) dllhost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssapiPublisher
Operation:writeName:IDENTIFY (Enter)
Value:
48000000000000002802B04C454FDC01B01E0000381F0000E80300000100000000000000000000003DEE3D88F0FC284C949A9BFA9A160DF200000000000000000000000000000000
(PID) Process:(7900) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer
Operation:writeName:IDENTIFY (Enter)
Value:
480000000000000059BDC04C454FDC01DC1E0000FC1E0000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7900) VSSVC.exeKey:HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\11000001
Operation:delete keyName:(default)
Value:
(PID) Process:(7900) VSSVC.exeKey:HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\11000001
Operation:writeName:Element
Value:
0000000000000000000000000000000006000000000000004800000000000000715E5C2FA985EB1190A89A9B763584210000000000000000745E5C2FA985EB1190A89A9B7635842100000000000000000000000000000000
Executable files
65
Suspicious files
59
Text files
67
Unknown types
0

Dropped files

PID
Process
Filename
Type
7536VC_redist.x86.exeC:\Users\admin\AppData\Local\Temp\{D0D68738-6816-499B-9F89-DD2FF99C5222}\.cr\VC_redist.x86.exeexecutable
MD5:F216F5EE89B18A28A3936FAB57C16179
SHA256:4A6E1044FF0F49D2E3B12F7C40352C7E573E0C58F3B3CC0B55B63C95EDE87828
7564VC_redist.x86.exeC:\Users\admin\AppData\Local\Temp\{6CAA0E96-D928-4B1C-9B4D-59A233C8EF04}\.ba\1029\thm.wxlxml
MD5:16343005D29EC431891B02F048C7F581
SHA256:07FB3EC174F25DFBE532D9D739234D9DFDA8E9D34F01FE660C5B4D56989FA779
7564VC_redist.x86.exeC:\Users\admin\AppData\Local\Temp\{6CAA0E96-D928-4B1C-9B4D-59A233C8EF04}\.ba\thm.xmlxml
MD5:F62729C6D2540015E072514226C121C7
SHA256:F13BAE0EC08C91B4A315BB2D86EE48FADE597E7A5440DCE6F751F98A3A4D6916
7564VC_redist.x86.exeC:\Users\admin\AppData\Local\Temp\{6CAA0E96-D928-4B1C-9B4D-59A233C8EF04}\.ba\logo.pngimage
MD5:D6BD210F227442B3362493D046CEA233
SHA256:335A256D4779EC5DCF283D007FB56FD8211BBCAF47DCD70FE60DED6A112744EF
7564VC_redist.x86.exeC:\Users\admin\AppData\Local\Temp\{6CAA0E96-D928-4B1C-9B4D-59A233C8EF04}\.ba\1028\thm.wxlxml
MD5:472ABBEDCBAD24DBA5B5F5E8D02C340F
SHA256:8E2E660DFB66CB453E17F1B6991799678B1C8B350A55F9EBE2BA0028018A15AD
7564VC_redist.x86.exeC:\Users\admin\AppData\Local\Temp\{6CAA0E96-D928-4B1C-9B4D-59A233C8EF04}\.ba\1028\license.rtftext
MD5:2B063D92663595DFE4781AE687A03D86
SHA256:44C76290F7A2E45940E8338912FEB49BCF4E071CFA85D2D34762857743ACBC8D
7564VC_redist.x86.exeC:\Users\admin\AppData\Local\Temp\{6CAA0E96-D928-4B1C-9B4D-59A233C8EF04}\.ba\wixstdba.dllexecutable
MD5:F68F43F809840328F4E993A54B0D5E62
SHA256:E921F69B9FB4B5AD4691809D06896C5F1D655AB75E0CE94A372319C243C56D4E
7564VC_redist.x86.exeC:\Users\admin\AppData\Local\Temp\{6CAA0E96-D928-4B1C-9B4D-59A233C8EF04}\.ba\license.rtftext
MD5:04B33F0A9081C10E85D0E495A1294F83
SHA256:8099DC3CF9502C335DA829E5C755948A12E3E6DE490EB492A99DEB673D883D8B
7564VC_redist.x86.exeC:\Users\admin\AppData\Local\Temp\{6CAA0E96-D928-4B1C-9B4D-59A233C8EF04}\.ba\1031\thm.wxlxml
MD5:561F3F32DB2453647D1992D4D932E872
SHA256:8E0DCA6E085744BFCBFF46F7DCBCFA6FBD722DFA52013EE8CEEAF682D7509581
7564VC_redist.x86.exeC:\Users\admin\AppData\Local\Temp\{6CAA0E96-D928-4B1C-9B4D-59A233C8EF04}\.ba\1029\license.rtftext
MD5:E7DC9CA9474A13FA4529D91BCD2AB8CC
SHA256:503C433DCDE2F3A9E7D388A5FF2B0612E7D8F90F5188D5B2B60228DB33044FDE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
32
DNS requests
11
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3460
msiexec.exe
GET
200
95.101.78.32:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2540
svchost.exe
GET
200
23.63.118.230:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
3460
msiexec.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl
unknown
whitelisted
5596
MoUsoCoreWorker.exe
GET
200
95.101.78.32:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2388
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5596
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2540
svchost.exe
40.126.31.69:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.16.204.136:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
8148
svchost.exe
184.28.89.167:443
go.microsoft.com
AKAMAI-AS
US
whitelisted
3460
msiexec.exe
95.101.78.32:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
3460
msiexec.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
2540
svchost.exe
20.190.159.68:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
whitelisted
login.live.com
  • 40.126.31.69
  • 20.190.159.68
  • 20.190.159.131
  • 20.190.159.73
  • 40.126.31.73
  • 40.126.31.1
  • 20.190.159.129
  • 40.126.31.67
whitelisted
www.bing.com
  • 2.16.204.136
  • 2.16.204.138
  • 2.16.204.156
  • 2.16.204.141
  • 2.16.204.137
  • 2.16.204.155
  • 2.16.204.145
  • 2.16.204.152
  • 2.16.204.135
whitelisted
google.com
  • 142.250.186.174
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
crl.microsoft.com
  • 95.101.78.32
  • 95.101.78.42
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
ocsp.digicert.com
  • 23.63.118.230
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
slscr.update.microsoft.com
  • 74.179.77.204
whitelisted

Threats

No threats detected
No debug info