File name:

UZWQKZQO.msi

Full analysis: https://app.any.run/tasks/e260461a-9ead-440a-b33b-8d85efe84087
Verdict: Malicious activity
Threats:

HijackLoader is a modular malware acting as a vehicle for distributing different types of malicious software on compromised systems. It gained prominence during the summer of 2023 and has since been used in multiple attacks against organizations from various sectors, including hospitality businesses.

Analysis date: April 18, 2025, 11:45:25
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
generated-doc
hijackloader
loader
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Number of Characters: 0, Last Saved By: InstallShield, Number of Words: 0, Title: Installation Database, Comments: Contact: Your local administrator, Keywords: Installer,MSI,Database, Subject: Blank Project Template, Author: InstallShield, Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 2021 - Premier Edition with Virtualization Pack 27, Last Saved Time/Date: Wed Apr 16 23:40:31 2025, Create Time/Date: Wed Apr 16 23:40:31 2025, Last Printed: Wed Apr 16 23:40:31 2025, Revision Number: {232C0583-F062-4AF1-8D0B-46C5034E7530}, Code page: 1252, Template: Intel;1033
MD5:

741A1E78AA32FBA1A21FA16C24116301

SHA1:

1520A6849ADF7B89CAF4DC3DE471DA8483FD7B0F

SHA256:

329F64BB5413CB69ED61DCDCAFD3686782D8AC163301DE64FF60BA158F35B5C9

SSDEEP:

98304:U6n1cLVbtJACD3H4o7mMyIc0nME+3q323x327D1icyZ94VV2njyofgR3XfBQ53vF:UYMt3CS1yXsZnQtx

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • ISBEW64.exe (PID: 6744)
      • ISBEW64.exe (PID: 1180)
      • ISBEW64.exe (PID: 2108)
      • ISBEW64.exe (PID: 7148)
      • ISBEW64.exe (PID: 4300)
      • ISBEW64.exe (PID: 5800)
      • ISBEW64.exe (PID: 2236)
      • ISBEW64.exe (PID: 5124)
      • ISBEW64.exe (PID: 2108)
      • ISBEW64.exe (PID: 7052)
    • HIJACKLOADER has been detected (YARA)

      • Deco_I.exe (PID: 2108)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • Deco_I.exe (PID: 2108)
  • INFO

    • Checks supported languages

      • msiexec.exe (PID: 6728)
      • msiexec.exe (PID: 1660)
      • ISBEW64.exe (PID: 6744)
      • ISBEW64.exe (PID: 1180)
      • ISBEW64.exe (PID: 2108)
      • ISBEW64.exe (PID: 7148)
      • ISBEW64.exe (PID: 5124)
      • ISBEW64.exe (PID: 4300)
      • ISBEW64.exe (PID: 5800)
      • ISBEW64.exe (PID: 2236)
      • ISBEW64.exe (PID: 2108)
      • ISBEW64.exe (PID: 7052)
    • An automatically generated document

      • msiexec.exe (PID: 1088)
    • The sample compiled with english language support

      • msiexec.exe (PID: 1088)
      • msiexec.exe (PID: 1660)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 1088)
      • msiexec.exe (PID: 1660)
    • Reads the computer name

      • msiexec.exe (PID: 1660)
      • msiexec.exe (PID: 6728)
      • ISBEW64.exe (PID: 6744)
      • ISBEW64.exe (PID: 1180)
      • ISBEW64.exe (PID: 2108)
      • ISBEW64.exe (PID: 7148)
      • ISBEW64.exe (PID: 2108)
      • ISBEW64.exe (PID: 4300)
      • ISBEW64.exe (PID: 5800)
      • ISBEW64.exe (PID: 2236)
      • ISBEW64.exe (PID: 5124)
      • ISBEW64.exe (PID: 7052)
    • Create files in a temporary directory

      • msiexec.exe (PID: 1660)
      • Deco_I.exe (PID: 2108)
    • Reads the software policy settings

      • slui.exe (PID: 3268)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.mst | Windows SDK Setup Transform Script (60.2)
.msi | Microsoft Installer (100)

EXIF

FlashPix

Characters: -
LastModifiedBy: InstallShield
Words: -
Title: Installation Database
Comments: Contact: Your local administrator
Keywords: Installer,MSI,Database
Subject: Blank Project Template
Author: InstallShield
Security: Password protected
Pages: 200
Software: InstallShield? 2021 - Premier Edition with Virtualization Pack 27
ModifyDate: 2025:04:16 23:40:31
CreateDate: 2025:04:16 23:40:31
LastPrinted: 2025:04:16 23:40:31
RevisionNumber: {232C0583-F062-4AF1-8D0B-46C5034E7530}
CodePage: Windows Latin 1 (Western European)
Template: Intel;1033
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
150
Monitored processes
20
Malicious processes
4
Suspicious processes
9

Behavior graph

Click at the process to see the details
start msiexec.exe msiexec.exe no specs sppextcomobj.exe no specs slui.exe msiexec.exe isbew64.exe no specs isbew64.exe no specs isbew64.exe no specs isbew64.exe no specs isbew64.exe no specs isbew64.exe no specs isbew64.exe no specs isbew64.exe no specs isbew64.exe no specs isbew64.exe no specs deco_i.exe no specs certutil.exe cmd.exe no specs conhost.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1088"C:\Windows\System32\msiexec.exe" /i C:\Users\admin\AppData\Local\Temp\UZWQKZQO.msiC:\Windows\System32\msiexec.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1180C:\Users\admin\AppData\Local\Temp\{21C96AF3-EEFE-4521-A638-380F49F65B9F}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{9EAE3CE2-33D7-4EE8-A138-77570FB3544C}C:\Users\admin\AppData\Local\Temp\{21C96AF3-EEFE-4521-A638-380F49F65B9F}\ISBEW64.exemsiexec.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\{21c96af3-eefe-4521-a638-380f49f65b9f}\isbew64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
1660C:\Windows\syswow64\MsiExec.exe -Embedding 218DF575CC22474B082344A8F3FA01AF CC:\Windows\SysWOW64\msiexec.exe
msiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
2108C:\Users\admin\AppData\Local\Temp\{21C96AF3-EEFE-4521-A638-380F49F65B9F}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{8F5188C5-88FF-4A67-BFA0-DFFD9CCFE69C}C:\Users\admin\AppData\Local\Temp\{21C96AF3-EEFE-4521-A638-380F49F65B9F}\ISBEW64.exemsiexec.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\{21c96af3-eefe-4521-a638-380f49f65b9f}\isbew64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
2108C:\Users\admin\AppData\Local\Temp\{21C96AF3-EEFE-4521-A638-380F49F65B9F}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{B8ACF381-56FB-49FC-959C-742563020973}C:\Users\admin\AppData\Local\Temp\{21C96AF3-EEFE-4521-A638-380F49F65B9F}\ISBEW64.exemsiexec.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\{21c96af3-eefe-4521-a638-380f49f65b9f}\isbew64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
2108C:\ProgramData\Ultraupload_v4\Deco_I.exeC:\ProgramData\Ultraupload_v4\Deco_I.exe
User:
admin
Company:
TiVo Inc.
Integrity Level:
MEDIUM
Description:
TiVo Windows Media Library Publisher
Version:
2.8.3
2236C:\Users\admin\AppData\Local\Temp\{21C96AF3-EEFE-4521-A638-380F49F65B9F}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{7A55C37C-925B-4466-A2B8-FDD6E3D51A9D}C:\Users\admin\AppData\Local\Temp\{21C96AF3-EEFE-4521-A638-380F49F65B9F}\ISBEW64.exemsiexec.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\{21c96af3-eefe-4521-a638-380f49f65b9f}\isbew64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
3268"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4120C:\WINDOWS\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exeDeco_I.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
4244\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
1 338
Read events
1 336
Write events
2
Delete events
0

Modification events

(PID) Process:(4448) certutil.exeKey:HKEY_CURRENT_USER\SOFTWARE\Application10
Operation:writeName:b
Value:
2233613139356165352D346662632D386330342D363634352D61383832623839386262346122
(PID) Process:(4448) certutil.exeKey:HKEY_CURRENT_USER\SOFTWARE\Application10
Operation:writeName:c
Value:
7B2231223A22614E6B76567978355255424D39774434593850695A79506A4E75343D222C2230223A7B2232223A22486578442F42774233447575747A734B54767779414176446F30733D222C2230223A747275652C2231223A5B7B2230223A2231222C2231223A225E5C5C732A286263317C5B31335D295B612D7A412D484A2D4E502D5A302D395D7B32362C33357D5C5C732A24222C2232223A226263317137636B6177766A7A657574616A6E36366178613272657370357333377676736B3973616C6B38227D2C7B2230223A2232222C2231223A225E5C5C732A6263315B612D7A412D484A2D4E502D5A302D395D7B33352C34317D5C5C732A24222C2232223A226263317137636B6177766A7A657574616A6E36366178613272657370357333377676736B3973616C6B38227D2C7B2230223A2233222C2231223A225E5C5C732A345B302D3941425D5B312D39412D484A2D4E502D5A612D6B6D2D7A5D7B39337D5C5C732A24222C2232223A22344244726E613269555250647244677258513938324E434A6D67666D5778754B5A4553345770747951704836394C4D67686D677247764C52336D67577836423547694D437A37576A78614B7A68624D5131376F626B4D50473557746E6E6A63227D2C7B2230223A2234222C2231223A225E5C5C732A475B302D39612D7A412D5A5D7B35357D5C5C732A24227D2C7B2230223A2235222C2231223A225E5C5C732A725B302D39612D7A412D5A5D7B32342C33347D5C5C732A24222C2232223A227266726B5A6862673173547234477748595857367077436554763577475877446575227D2C7B2230223A2236222C2231223A225E5C5C732A283F3A4C7C4D7C6C746331295B612D7A412D5A302D395D7B32362C33357D5C5C732A24227D2C7B2230223A2237222C2231223A225E5C5C732A6C7463315B612D7A302D395D7B33392C35397D5C5C732A24222C2232223A226C7463317175786A36686A6A64647871617533747071366339706530726570746832716435323539793732227D2C7B2230223A2238222C2231223A225E5C5C732A415B302D39612D7A412D5A5D7B33337D5C5C732A24227D2C7B2230223A2239222C2231223A225E5C5C732A28626974636F696E636173683A293F2828717C70295B612D7A302D395D7B34317D7C28317C33295B612D7A412D5A302D395D7B32362C33357D295C5C732A24227D2C7B2230223A223130222C2231223A225E5C5C732A585B312D39412D484A2D4E502D5A612D6B6D2D7A5D7B33337D5C5C732A24227D2C7B2230223A223131222C2231223A225E5C5C732A447B317D5B352D39412D484A2D4E502D555D7B317D5B312D39412D484A2D4E502D5A612D6B6D2D7A5D7B33327D5C5C732A24227D2C7B2230223A223132222C2231223A225E5C5C732A626E625B612D7A412D5A302D395D7B33397D5C5C732A24227D2C7B2230223A223133222C2231223A225E5C5C732A30785B612D66412D46302D395D7B34307D5C5C732A24222C2232223A22307837336537346634393465386633353962393061616363323265313136346237373166336534373739227D2C7B2230223A223134222C2231223A225E5C5C732A545B612D7A412D5A302D395D7B32382C33337D5C5C732A24222C2232223A2254435978745636483735696A6331565632676854387365514A4445716A4D4B483974227D2C7B2230223A223135222C2231223A225E5C5C732A74315B302D39412D7A5D7B33337D5C5C732A24227D5D7D7D
Executable files
11
Suspicious files
5
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
2108Deco_I.exeC:\Users\admin\AppData\Local\Temp\EB9C8D0.tmp
MD5:
SHA256:
1660msiexec.exeC:\Users\admin\AppData\Local\Temp\{142E3B50-832B-4288-A02C-44FE6C0F48FC}\Deco_I.exeexecutable
MD5:120294ADD3DD3AFE92C575EBF1D0546E
SHA256:F897D601FB962F0DF620B15101181BC5BA5611FBE3FD1A8241212B1CB81E3EE0
1660msiexec.exeC:\Users\admin\AppData\Local\Temp\{142E3B50-832B-4288-A02C-44FE6C0F48FC}\BorlndMm.dllexecutable
MD5:F2264ABAE9D3DA4BD185F8177016C234
SHA256:D2A651547A83723BE81FB4E87BD75FAE6F95666050E072A30C22D7ACE0CB5F20
1088msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIBF3B.tmpexecutable
MD5:A0E940A3D3C1523416675125E3B0C07E
SHA256:B8FA7AA425E4084EA3721780A13D11E08B8D53D1C5414B73F22FAECA1BFD314F
2108Deco_I.exeC:\Users\admin\AppData\Local\Temp\EDBF05F.tmpbinary
MD5:93D88CCFA54D1788FEFD8599AE4A82AF
SHA256:10C6E766B077DBD95C6DEF9B2A428AFC2A6E9AC0DEBC6A552ED4CF567F00C18A
1660msiexec.exeC:\Users\admin\AppData\Local\Temp\{21C96AF3-EEFE-4521-A638-380F49F65B9F}\ISBEW64.exeexecutable
MD5:40F3A092744E46F3531A40B917CCA81E
SHA256:561F14CDECE85B38617403E1C525FF0B1B752303797894607A4615D0BD66F97F
1660msiexec.exeC:\Users\admin\AppData\Local\Temp\{21C96AF3-EEFE-4521-A638-380F49F65B9F}\ISRT.dllexecutable
MD5:8AF02BF8E358E11CAEC4F2E7884B43CC
SHA256:58A724D23C63387A2DDA27CCFDBC8CA87FD4DB671BEA8BB636247667F6A5A11E
1660msiexec.exeC:\Users\admin\AppData\Local\Temp\{21C96AF3-EEFE-4521-A638-380F49F65B9F}\String1033.txtbinary
MD5:798A61CD8A5807588E045508FEE112D5
SHA256:9C4AABA8CE0CD6E269B236F19579EE5F405BFB210F82C623C04FBEE6029A6326
1660msiexec.exeC:\Users\admin\AppData\Local\Temp\{21C96AF3-EEFE-4521-A638-380F49F65B9F}\setup.inxbinary
MD5:4C660D85D001FD1BABD7FBFC8BFF2BCF
SHA256:A35FCAD9765F8C3F05A2BFF4A6EAD46B35EF36EFD07F6D8B895866B3C23D1EB1
1660msiexec.exeC:\Users\admin\AppData\Local\Temp\{21C96AF3-EEFE-4521-A638-380F49F65B9F}\_isres_0x0409.dllexecutable
MD5:7DE024BC275F9CDEAF66A865E6FD8E58
SHA256:BD32468EE7E8885323F22EABBFF9763A0F6FFEF3CC151E0BD0481DF5888F4152
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
20
DNS requests
15
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1532
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1532
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
4448
certutil.exe
GET
101
104.21.53.74:80
http://games1-server.cfd/c
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.32.140:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1532
SIHClient.exe
4.175.87.197:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
1532
SIHClient.exe
2.16.253.202:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
google.com
  • 142.250.181.238
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 40.126.32.140
  • 40.126.32.68
  • 40.126.32.136
  • 20.190.160.128
  • 20.190.160.2
  • 20.190.160.65
  • 40.126.32.76
  • 20.190.160.67
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
www.microsoft.com
  • 2.16.253.202
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted
games1-server.cfd
  • 104.21.53.74
  • 172.67.210.97
unknown

Threats

PID
Process
Class
Message
4448
certutil.exe
A Network Trojan was detected
ET MALWARE DeerStealer Websocket Initial Request
No debug info