File name:

TinyWall-v3-Installer.msi

Full analysis: https://app.any.run/tasks/488b6762-a4d3-4608-8b50-f2a47d8acd07
Verdict: Malicious activity
Analysis date: January 16, 2025, 02:05:48
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
generated-doc
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1250, Title: Installation Database, Subject: A non-intrusive firewall solution., Author: Kroly Pados, Keywords: Installer, Comments: This installer database contains the logic and data required to install TinyWall., Template: Intel;1033, Revision Number: {B29362A5-AC89-446C-9D15-99D364C13890}, Create Time/Date: Sun Mar 12 17:54:36 2023, Last Saved Time/Date: Sun Mar 12 17:54:36 2023, Number of Pages: 301, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
MD5:

792984FCABFDA6BFA2DF1D6975F02DBE

SHA1:

7B14C031514B80FC58E313E1FB9EC2AEE372D874

SHA256:

250B56EFF2CD5316C6CF8C8B92CB5F29FB3849089E69C8138BF5DD9BD0E9E001

SSDEEP:

98304:V46A+JoD0NQchKRRcqKjyLb1tGbmGRWpB0d7qsDOu33/naa5ybHnJGT:G

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executes as Windows Service

      • VSSVC.exe (PID: 6580)
      • TinyWall.exe (PID: 6492)
    • Checks Windows Trust Settings

      • msiexec.exe (PID: 968)
      • TinyWall.exe (PID: 6992)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 968)
    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 6316)
      • msiexec.exe (PID: 6428)
      • TinyWall.exe (PID: 640)
      • TinyWall.exe (PID: 6992)
    • Process drops legitimate windows executable

      • msiexec.exe (PID: 968)
    • The process checks if it is being run in the virtual environment

      • TinyWall.exe (PID: 6992)
      • TinyWall.exe (PID: 6408)
      • TinyWall.exe (PID: 2796)
    • Reads Mozilla Firefox installation path

      • TinyWall.exe (PID: 6992)
    • The process executes via Task Scheduler

      • PLUGScheduler.exe (PID: 2480)
      • TinyWall.exe (PID: 2796)
  • INFO

    • Reads the software policy settings

      • msiexec.exe (PID: 1140)
      • msiexec.exe (PID: 968)
      • TinyWall.exe (PID: 6992)
    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 1140)
    • Reads the computer name

      • msiexec.exe (PID: 6452)
      • msiexec.exe (PID: 968)
      • msiexec.exe (PID: 6316)
      • msiexec.exe (PID: 6428)
      • TinyWall.exe (PID: 640)
      • TinyWall.exe (PID: 2796)
      • PLUGScheduler.exe (PID: 2480)
    • An automatically generated document

      • msiexec.exe (PID: 1140)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 1140)
      • msiexec.exe (PID: 968)
    • Checks supported languages

      • msiexec.exe (PID: 968)
      • msiexec.exe (PID: 6452)
      • msiexec.exe (PID: 6316)
      • msiexec.exe (PID: 6428)
      • TinyWall.exe (PID: 640)
      • TinyWall.exe (PID: 6492)
      • TinyWall.exe (PID: 6992)
      • TinyWall.exe (PID: 6408)
      • TinyWall.exe (PID: 2796)
      • PLUGScheduler.exe (PID: 2480)
    • Manages system restore points

      • SrTasks.exe (PID: 4520)
    • Reads the machine GUID from the registry

      • msiexec.exe (PID: 968)
      • TinyWall.exe (PID: 640)
      • TinyWall.exe (PID: 6492)
      • TinyWall.exe (PID: 6992)
      • TinyWall.exe (PID: 6408)
      • TinyWall.exe (PID: 2796)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 968)
    • Reads Environment values

      • TinyWall.exe (PID: 640)
      • TinyWall.exe (PID: 6492)
      • TinyWall.exe (PID: 6992)
      • TinyWall.exe (PID: 6408)
    • Creates files in the program directory

      • TinyWall.exe (PID: 640)
      • TinyWall.exe (PID: 6492)
    • The process uses the downloaded file

      • TinyWall.exe (PID: 640)
    • Reads product name

      • TinyWall.exe (PID: 6492)
    • Manual execution by a user

      • TinyWall.exe (PID: 6408)
      • firefox.exe (PID: 6948)
    • Disables trace logs

      • TinyWall.exe (PID: 6492)
    • Application launched itself

      • firefox.exe (PID: 6948)
      • firefox.exe (PID: 6460)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msi | Microsoft Windows Installer (98.5)
.msi | Microsoft Installer (100)

EXIF

FlashPix

CodePage: Windows Latin 2 (Central European)
Title: Installation Database
Subject: A non-intrusive firewall solution.
Author: Károly Pados
Keywords: Installer
Comments: This installer database contains the logic and data required to install TinyWall.
Template: Intel;1033
RevisionNumber: {B29362A5-AC89-446C-9D15-99D364C13890}
CreateDate: 2023:03:12 17:54:36
ModifyDate: 2023:03:12 17:54:36
Pages: 301
Words: 2
Software: Windows Installer XML Toolset (3.11.2.4516)
Security: Read-only recommended
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
280
Monitored processes
25
Malicious processes
4
Suspicious processes
2

Behavior graph

Click at the process to see the details
start msiexec.exe msiexec.exe msiexec.exe no specs vssvc.exe no specs srtasks.exe no specs conhost.exe no specs msiexec.exe no specs msiexec.exe no specs tinywall.exe no specs tinywall.exe tinywall.exe no specs tinywall.exe no specs firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs plugscheduler.exe no specs tinywall.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
640"C:\Program Files (x86)\TinyWall\TinyWall.exe" /installC:\Program Files (x86)\TinyWall\TinyWall.exemsiexec.exe
User:
admin
Company:
Károly Pados
Integrity Level:
MEDIUM
Description:
TinyWall
Exit code:
0
Version:
3.3.1.0
Modules
Images
c:\program files (x86)\tinywall\tinywall.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
968C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1140"C:\Windows\System32\msiexec.exe" /i C:\Users\admin\Desktop\TinyWall-v3-Installer.msiC:\Windows\System32\msiexec.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1192"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4244 -childID 2 -isForBrowser -prefsHandle 4236 -prefMapHandle 4232 -prefsLen 36588 -prefMapSize 244583 -jsInitHandle 1536 -jsInitLen 235124 -parentBuildID 20240213221259 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2c890d47-4448-4a93-a6cb-02ced0970b98} 6460 "\\.\pipe\gecko-crash-server-pipe.6460" 1e5932d8850 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
123.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\msvcp140.dll
c:\windows\system32\vcruntime140.dll
1468"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2624 -childID 6 -isForBrowser -prefsHandle 4072 -prefMapHandle 4068 -prefsLen 31144 -prefMapSize 244583 -jsInitHandle 1536 -jsInitLen 235124 -parentBuildID 20240213221259 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b93ff239-10c5-4c1b-b56c-378c670b3d67} 6460 "\\.\pipe\gecko-crash-server-pipe.6460" 1e5969aad90 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
123.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\msvcp140.dll
c:\windows\system32\vcruntime140_1.dll
2480"C:\Program Files\RUXIM\PLUGscheduler.exe"C:\Program Files\RUXIM\PLUGScheduler.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Update LifeCycle Component Scheduler
Exit code:
0
Version:
10.0.19041.3623 (WinBuild.160101.0800)
Modules
Images
c:\program files\ruxim\plugscheduler.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
2796"C:\Program Files (x86)\TinyWall\TinyWall.exe"C:\Program Files (x86)\TinyWall\TinyWall.exesvchost.exe
User:
admin
Company:
Károly Pados
Integrity Level:
HIGH
Description:
TinyWall
Version:
3.3.1.0
Modules
Images
c:\program files (x86)\tinywall\tinywall.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
4076\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeSrTasks.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4400"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5064 -childID 5 -isForBrowser -prefsHandle 5056 -prefMapHandle 5052 -prefsLen 31144 -prefMapSize 244583 -jsInitHandle 1536 -jsInitLen 235124 -parentBuildID 20240213221259 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f1d54b1f-22e8-40b0-9073-a5d166d19aac} 6460 "\\.\pipe\gecko-crash-server-pipe.6460" 1e5969aa150 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
123.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\msvcp140.dll
c:\windows\system32\vcruntime140.dll
4520C:\WINDOWS\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:11C:\Windows\System32\SrTasks.exemsiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Windows System Protection background tasks.
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\srtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
32 223
Read events
31 847
Write events
363
Delete events
13

Modification events

(PID) Process:(968) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
48000000000000004D8FEF31BB67DB01C8030000A4190000D50700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(968) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Enter)
Value:
48000000000000004D8FEF31BB67DB01C8030000A4190000D20700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(968) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Leave)
Value:
4800000000000000C8E63B32BB67DB01C8030000A4190000D20700000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(968) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Enter)
Value:
4800000000000000C8E63B32BB67DB01C8030000A4190000D10700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(968) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Leave)
Value:
4800000000000000DC9B4032BB67DB01C8030000A4190000D10700000100000000000000010000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(968) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
Operation:writeName:LastIndex
Value:
11
(PID) Process:(968) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
48000000000000005B654532BB67DB01C8030000A4190000D00700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(968) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGatherWriterMetadata (Enter)
Value:
4800000000000000CB29C632BB67DB01C8030000A4190000D30700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(968) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssapiPublisher
Operation:writeName:IDENTIFY (Enter)
Value:
4800000000000000B58CC832BB67DB01C8030000341A0000E8030000010000000000000000000000F1E78A64DA73F54C94E2ADA92722630D00000000000000000000000000000000
(PID) Process:(6580) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
Operation:writeName:IDENTIFY (Leave)
Value:
48000000000000008D06DE32BB67DB01B4190000D0190000E80300000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000
Executable files
31
Suspicious files
147
Text files
40
Unknown types
37

Dropped files

PID
Process
Filename
Type
968msiexec.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
1140msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\54C62B182F5BF07FA8427C07B0A3AAF8_4DBBCB40FA282C06F1543D887F4F4DCCbinary
MD5:B800D2749C9A0FBE3B14F7091FFE1F8C
SHA256:EAA27E3E118208C3FD669C38DBE0A6D3C8BD81D4C6D8499FC62BE75E7183577B
968msiexec.exeC:\System Volume Information\SPP\snapshot-2binary
MD5:03A190811C28C2D7A1BA1A460A5D747F
SHA256:83C33A2A8228B1623634D5E53751390B525D9322E099786136AE7BB4CF588BFC
1140msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\54C62B182F5BF07FA8427C07B0A3AAF8_4DBBCB40FA282C06F1543D887F4F4DCCbinary
MD5:D956637D0CCA7958EDF0A745551F963A
SHA256:DA742499D726DEE9ED6E3A458E6175BFFBB50D11A617912E90B8ABD1C7D81E45
1140msiexec.exeC:\Users\admin\AppData\Local\Temp\MSI7988.tmpexecutable
MD5:4FDD16752561CF585FED1506914D73E0
SHA256:AECD2D2FE766F6D439ACC2BBF1346930ECC535012CF5AD7B3273D2875237B7E7
968msiexec.exeC:\Windows\Installer\MSIDC0C.tmpexecutable
MD5:A3AE5D86ECF38DB9427359EA37A5F646
SHA256:C8D190D5BE1EFD2D52F72A72AE9DFA3940AB3FACEB626405959349654FE18B74
1140msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D682FDDA10064185EC8111DC39DBA8ECbinary
MD5:3994FE3E5AF1C1A574F201F555F0E7F2
SHA256:912D3F5ADEB73E9CA987DE3B9F77614979782BB116580A4B76F9791FD25A8B9B
968msiexec.exeC:\System Volume Information\SPP\OnlineMetadataCache\{648ae7f1-73da-4cf5-94e2-ada92722630d}_OnDiskSnapshotPropbinary
MD5:03A190811C28C2D7A1BA1A460A5D747F
SHA256:83C33A2A8228B1623634D5E53751390B525D9322E099786136AE7BB4CF588BFC
1140msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D682FDDA10064185EC8111DC39DBA8ECbinary
MD5:3BF570B92034FE150FEF6B29334D4B07
SHA256:D7A0F1EF35E8C0AA06A23B6D1B2E9DE3710E054F32A1B0D896555F1F3B9CF6E9
968msiexec.exeC:\Windows\Installer\MSIDBCD.tmpbinary
MD5:206842AD20E7A7D01B299E43B3ED256A
SHA256:BB69CB6F6946E2DBD7B5AF379D29CAD5458611DDDEE9E37D09A75B0F5B9F827C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
18
TCP/UDP connections
67
DNS requests
77
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1140
msiexec.exe
GET
200
18.173.205.113:80
http://ocsps.ssl.com/MEkwRzBFMEMwQTAJBgUrDgMCGgUABBQMDtATfnJO6JAXDQoHl8pAaJdhTQQU3QQJB6L1en1SUxKSle44gCUNplkCCGQzUdPHOJ8I
unknown
whitelisted
1140
msiexec.exe
GET
200
18.244.18.54:80
http://crls.ssl.com/SSLcom-SubCA-CodeSigning-RSA-4096-R1.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
3060
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
3060
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6828
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
6460
firefox.exe
POST
200
195.138.255.24:80
http://r11.o.lencr.org/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2736
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4712
MoUsoCoreWorker.exe
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
6032
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1140
msiexec.exe
18.173.205.113:80
ocsps.ssl.com
US
whitelisted
1140
msiexec.exe
18.244.18.54:80
crls.ssl.com
US
whitelisted
3976
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5064
SearchApp.exe
2.23.227.215:443
www.bing.com
Ooredoo Q.S.C.
QA
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 23.53.40.178
  • 23.53.40.176
whitelisted
google.com
  • 142.250.185.238
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
ocsps.ssl.com
  • 18.173.205.113
  • 18.173.205.76
  • 18.173.205.57
  • 18.173.205.43
whitelisted
crls.ssl.com
  • 18.244.18.54
  • 18.244.18.60
  • 18.244.18.55
  • 18.244.18.92
whitelisted
www.bing.com
  • 2.23.227.215
  • 2.23.227.208
  • 2.21.65.132
  • 2.21.65.154
whitelisted
login.live.com
  • 40.126.32.68
  • 40.126.32.74
  • 40.126.32.134
  • 40.126.32.138
  • 20.190.160.22
  • 20.190.160.14
  • 20.190.160.17
  • 40.126.32.76
  • 20.190.159.4
  • 40.126.31.71
  • 20.190.159.2
  • 20.190.159.75
  • 20.190.159.71
  • 20.190.159.0
  • 20.190.159.64
  • 40.126.31.69
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
go.microsoft.com
  • 2.23.242.9
whitelisted

Threats

No threats detected
No debug info