File name:

s.msi

Full analysis: https://app.any.run/tasks/5860243f-5400-44dc-95a6-bac5e0d24e7f
Verdict: Malicious activity
Analysis date: June 11, 2025, 19:21:36
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
generated-doc
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {ADBD41DF-2756-4AB0-ACDA-AC75FD96ABC1}, Number of Words: 10, Subject: Traiolx Custom Utils, Author: Viwaso Loqpol, Name of Creating Application: Traiolx Custom Utils, Template: x64;1033, Comments: This installer database contains the logic and data required to install Traiolx Custom Utils., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Wed Jun 11 15:29:03 2025, Last Saved Time/Date: Wed Jun 11 15:29:03 2025, Last Printed: Wed Jun 11 15:29:03 2025, Number of Pages: 450
MD5:

FC0265A960F4A205E76313A9151077C0

SHA1:

0C9CBF3AC5FEDAD364E7AB623850AB62718A1EF6

SHA256:

1A7EAA4BD75D0D8EFABB4C33940918BA0E87468C239F52C9E540B14EDCB62617

SSDEEP:

393216:1xmhndyL/8/aDzj9U82/PVoATjN2h0objZMdmYxIg2AZkygH:Qdij9RcVoATjN2h0objZB2Ifl

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 6876)
    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 5232)
    • Process drops python dynamic module

      • msiexec.exe (PID: 6876)
    • Process drops legitimate windows executable

      • msiexec.exe (PID: 6876)
    • The process drops C-runtime libraries

      • msiexec.exe (PID: 6876)
    • Drops 7-zip archiver for unpacking

      • msiexec.exe (PID: 6876)
    • Executing commands from a ".bat" file

      • msiexec.exe (PID: 6876)
    • The executable file from the user directory is run by the CMD process

      • 7z.exe (PID: 5124)
    • The process executes via Task Scheduler

      • updater.exe (PID: 2324)
    • Application launched itself

      • updater.exe (PID: 2324)
    • Starts CMD.EXE for commands execution

      • msiexec.exe (PID: 6876)
  • INFO

    • Reads Environment values

      • msiexec.exe (PID: 5232)
    • Reads the computer name

      • msiexec.exe (PID: 6876)
      • msiexec.exe (PID: 5232)
      • updater.exe (PID: 2324)
      • 7z.exe (PID: 5124)
    • An automatically generated document

      • msiexec.exe (PID: 7164)
    • Checks proxy server information

      • msiexec.exe (PID: 5232)
      • slui.exe (PID: 5896)
    • Checks supported languages

      • msiexec.exe (PID: 5232)
      • msiexec.exe (PID: 6876)
      • 7z.exe (PID: 5124)
      • updater.exe (PID: 2324)
      • updater.exe (PID: 6492)
    • Reads the machine GUID from the registry

      • msiexec.exe (PID: 5232)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 6876)
    • Creates files or folders in the user directory

      • msiexec.exe (PID: 5232)
      • msiexec.exe (PID: 6876)
    • Reads the software policy settings

      • msiexec.exe (PID: 5232)
      • slui.exe (PID: 5896)
    • The sample compiled with english language support

      • msiexec.exe (PID: 6876)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 6876)
    • Create files in a temporary directory

      • msiexec.exe (PID: 7164)
    • Manual execution by a user

      • WinRAR.exe (PID: 4104)
      • WinRAR.exe (PID: 4456)
      • cmd.exe (PID: 5772)
      • cmd.exe (PID: 6672)
      • cmd.exe (PID: 3672)
    • Process checks whether UAC notifications are on

      • updater.exe (PID: 2324)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msi | Microsoft Windows Installer (88.6)
.mst | Windows SDK Setup Transform Script (10)
.msi | Microsoft Installer (100)

EXIF

FlashPix

Security: None
CodePage: Windows Latin 1 (Western European)
RevisionNumber: {ADBD41DF-2756-4AB0-ACDA-AC75FD96ABC1}
Words: 10
Subject: Traiolx Custom Utils
Author: Viwaso Loqpol
LastModifiedBy: -
Software: Traiolx Custom Utils
Template: x64;1033
Comments: This installer database contains the logic and data required to install Traiolx Custom Utils.
Title: Installation Database
Keywords: Installer, MSI, Database
CreateDate: 2025:06:11 15:29:03
ModifyDate: 2025:06:11 15:29:03
LastPrinted: 2025:06:11 15:29:03
Pages: 450
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
160
Monitored processes
21
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start msiexec.exe no specs msiexec.exe msiexec.exe cmd.exe no specs conhost.exe no specs 7z.exe no specs slui.exe rundll32.exe no specs updater.exe no specs updater.exe no specs winrar.exe no specs winrar.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe conhost.exe no specs cmd.exe no specs conhost.exe no specs 7z.exe no specs 7z.exe no specs 7z.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
432\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
10447z.exe drata.dat -y -p0C:\Users\admin\AppData\Roaming\Traiolx Custom Utils\7z.execmd.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
MEDIUM
Description:
7-Zip Console
Exit code:
7
Version:
24.09
Modules
Images
c:\users\admin\appdata\roaming\traiolx custom utils\7z.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
2072\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2324"C:\Program Files (x86)\Google\GoogleUpdater\134.0.6985.0\updater.exe" --wake --systemC:\Program Files (x86)\Google\GoogleUpdater\134.0.6985.0\updater.exesvchost.exe
User:
SYSTEM
Company:
Google LLC
Integrity Level:
SYSTEM
Description:
Google Updater
Exit code:
0
Version:
134.0.6985.0
Modules
Images
c:\program files (x86)\google\googleupdater\134.0.6985.0\updater.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
25207z.exe x drata.dat -y -p2209C:\Users\admin\AppData\Roaming\Traiolx Custom Utils\7z.execmd.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
MEDIUM
Description:
7-Zip Console
Exit code:
2
Version:
24.09
Modules
Images
c:\users\admin\appdata\roaming\traiolx custom utils\7z.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
3672"C:\Windows\System32\cmd.exe" C:\Windows\System32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\wldp.dll
4072\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4104"C:\Program Files\WinRAR\WinRAR.exe" x -iext -ow -ver -- "C:\Users\admin\AppData\Roaming\Traiolx Custom Utils\drata.zip" "C:\Users\admin\AppData\Roaming\Traiolx Custom Utils\"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
255
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
4456"C:\Program Files\WinRAR\WinRAR.exe" x -iext -ow -ver -- "C:\Users\admin\AppData\Roaming\Traiolx Custom Utils\drata.rar" "C:\Users\admin\AppData\Roaming\Traiolx Custom Utils\drata\"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
255
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
4960C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
Total events
4 163
Read events
3 825
Write events
329
Delete events
9

Modification events

(PID) Process:(6876) msiexec.exeKey:HKEY_USERS\S-1-5-21-1693682860-607145093-2874071422-1001\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Owner
Value:
DC1A00003A4EC71606DBDB01
(PID) Process:(6876) msiexec.exeKey:HKEY_USERS\S-1-5-21-1693682860-607145093-2874071422-1001\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:SessionHash
Value:
A8DC793E87C746CC6D273960EE45BFF91E8C4A7F1E0DEF79668242C463A982EC
(PID) Process:(6876) msiexec.exeKey:HKEY_USERS\S-1-5-21-1693682860-607145093-2874071422-1001\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Sequence
Value:
1
(PID) Process:(5232) msiexec.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(5232) msiexec.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(5232) msiexec.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(6876) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-1693682860-607145093-2874071422-1001\Components\297BB0845463FC14D9BF829CFA0204A1
Operation:writeName:514771724BF65274AA892B8EDA8BB3F8
Value:
C:\Users\admin\AppData\Roaming\Traiolx Custom Utils\locale\fr\LC_MESSAGES\wxstd.mo
(PID) Process:(6876) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-1693682860-607145093-2874071422-1001\Components\D7A88B54480B0684D8E004188AB0804A
Operation:writeName:514771724BF65274AA892B8EDA8BB3F8
Value:
C:\Users\admin\AppData\Roaming\Traiolx Custom Utils\locale\gl_ES\LC_MESSAGES\wxstd.mo
(PID) Process:(6876) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-1693682860-607145093-2874071422-1001\Components\95B92E541618FC24997C091E51D1FCBC
Operation:writeName:514771724BF65274AA892B8EDA8BB3F8
Value:
C:\Users\admin\AppData\Roaming\Traiolx Custom Utils\locale\hi\LC_MESSAGES\wxstd.mo
(PID) Process:(6876) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-1693682860-607145093-2874071422-1001\Components\99FE6F3F0A930974C8DF694CC11975AC
Operation:writeName:514771724BF65274AA892B8EDA8BB3F8
Value:
C:\Users\admin\AppData\Roaming\Traiolx Custom Utils\locale\hu\LC_MESSAGES\wxstd.mo
Executable files
117
Suspicious files
165
Text files
101
Unknown types
99

Dropped files

PID
Process
Filename
Type
6876msiexec.exeC:\Windows\Installer\177520.msi
MD5:
SHA256:
6876msiexec.exeC:\Windows\Installer\MSI77C4.tmpexecutable
MD5:805680BE3B2F96DDD652257156481EBB
SHA256:B5D0C2958F7C59410EB7E255E978563403A71B17D2105498005E1CED7F643489
5232msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\37B114A7D931F8A326F0586E65C5BE9Dbinary
MD5:4ACACD1D65AC1E7C06C70787BAAEDD8D
SHA256:5081780A9808E7783305A97F4289404DE7D4F08AE9E664E7B4F9895991BD14AA
6876msiexec.exeC:\Windows\Installer\MSI7E6D.tmpbinary
MD5:6BFBB02FD649EC4BFBD66C28E6813D46
SHA256:AC5004F1E1A57483C71DA391F39E6A1BB9457066D3303C28E1F8ECB40F7D0CDD
6876msiexec.exeC:\Windows\Temp\~DF3CB6C50F8D1F1EDC.TMPbinary
MD5:EFD8099F71245EF0FFDE619FAA5DDBE2
SHA256:C40E45910EDA466D084759D3DC6FA04C5DACD1B3DD1B6559D5DAB418B4410EDB
5232msiexec.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\diagnostics[1].htmbinary
MD5:CFCD208495D565EF66E7DFF9F98764DA
SHA256:5FECEB66FFC86F38D952786C6D696C79C2DBC239DD4E91B46729D73A27FB57E9
6876msiexec.exeC:\Windows\Installer\inprogressinstallinfo.ipibinary
MD5:EFD8099F71245EF0FFDE619FAA5DDBE2
SHA256:C40E45910EDA466D084759D3DC6FA04C5DACD1B3DD1B6559D5DAB418B4410EDB
6876msiexec.exeC:\Users\admin\AppData\Roaming\Traiolx Custom Utils\_socket.pydexecutable
MD5:07789A8C23BCEBE32F8BFD4CE4AF5FFB
SHA256:235CC97584C3D31E5F3146121F64699D30CF372A86868EA755A9A0AFA6C56144
5232msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37B114A7D931F8A326F0586E65C5BE9Dbinary
MD5:39E3F513A10544388A829D4CEBB6BC1F
SHA256:4B942BF779BD866AA051ECB8E7013011566E05C9F98539790DB96936E6D3194E
6876msiexec.exeC:\Windows\Installer\MSI7726.tmpexecutable
MD5:B717117EB31436F2FBD8182C3AAB267A
SHA256:4516899C2D5369CAC039258668E5AEF2651B33502849C1FA0778D3D63654CE9E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
26
DNS requests
17
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
184.24.77.9:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.24.77.9:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5232
msiexec.exe
GET
200
65.9.66.40:80
http://r11.c.lencr.org/119.crl
unknown
whitelisted
1212
backgroundTaskHost.exe
GET
200
23.54.109.203:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D
unknown
whitelisted
480
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2940
svchost.exe
GET
200
23.35.233.46:80
http://x1.c.lencr.org/
unknown
whitelisted
480
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
5944
MoUsoCoreWorker.exe
184.24.77.9:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.24.77.9:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5944
MoUsoCoreWorker.exe
23.52.120.96:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
23.52.120.96:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
1268
svchost.exe
23.52.120.96:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5232
msiexec.exe
169.150.247.36:443
birdeemusic.com
GB
unknown
5232
msiexec.exe
65.9.66.40:80
r11.c.lencr.org
AMAZON-02
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.142
whitelisted
crl.microsoft.com
  • 184.24.77.9
  • 184.24.77.38
  • 184.24.77.22
  • 184.24.77.31
  • 184.24.77.29
  • 184.24.77.37
  • 184.24.77.18
  • 184.24.77.6
  • 184.24.77.24
whitelisted
www.microsoft.com
  • 23.52.120.96
  • 23.35.229.160
whitelisted
birdeemusic.com
  • 169.150.247.36
unknown
r11.c.lencr.org
  • 65.9.66.40
  • 65.9.66.2
  • 65.9.66.41
  • 65.9.66.96
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
  • 40.91.76.224
whitelisted
x1.c.lencr.org
  • 23.35.233.46
whitelisted
self.events.data.microsoft.com
  • 13.89.179.9
whitelisted
arc.msn.com
  • 20.199.58.43
whitelisted
ocsp.digicert.com
  • 23.54.109.203
whitelisted

Threats

No threats detected
No debug info