File name:

ROBLOX.msi

Full analysis: https://app.any.run/tasks/a00c4f66-9e73-401e-af16-43e458979c4c
Verdict: Malicious activity
Analysis date: April 12, 2025, 11:26:39
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
generated-doc
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 5.2, MSI Installer, Number of Characters: 0, Last Saved By: DavidHacker, Number of Words: 0, Title: Roblox Database, Comments: This installer database contains the logic and data required to install ROBLOX., Keywords: Installer,MSI,Database, Subject: ROBLOX, Author: Roblox Corporation, Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 12 - Professional Edition 12.0, Last Saved Time/Date: Wed Jan 16 14:15:17 2008, Create Time/Date: Wed Jan 16 14:15:17 2008, Last Printed: Wed Jan 16 14:15:17 2008, Revision Number: {3E85A94D-AE1B-4F82-BB83-E876CFE98859}, Code page: 1252, Template: Intel;1033
MD5:

12E30377CEDB343061EF95DA94F27A9F

SHA1:

9D46A8392C6BDED0F3259EFBFAE6E97C488A3A93

SHA256:

47729BC654B0DA51D400840D9EE9781810F4EAE77E9ECE6CB0F04F26709D837F

SSDEEP:

98304:boMA2pc0Yri23+zBAZU0iuhVaWUzeJt9nRmCqN7aRyqbBkERJu42CVfYT1Cqdzn/:0MI1j/1EV+Jp6k+e7CKb

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executes as Windows Service

      • VSSVC.exe (PID: 8144)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 7556)
    • The process drops C-runtime libraries

      • msiexec.exe (PID: 7556)
      • TiWorker.exe (PID: 7184)
    • Creates/Modifies COM task schedule object

      • msiexec.exe (PID: 7556)
    • Changes default file association

      • msiexec.exe (PID: 7556)
    • Process drops legitimate windows executable

      • msiexec.exe (PID: 7556)
      • TiWorker.exe (PID: 7184)
    • Executable content was dropped or overwritten

      • TiWorker.exe (PID: 7184)
    • Reads security settings of Internet Explorer

      • Roblox.exe (PID: 5964)
    • Reads Microsoft Outlook installation path

      • Roblox.exe (PID: 5964)
    • Reads Internet Explorer settings

      • Roblox.exe (PID: 5964)
  • INFO

    • Reads the computer name

      • msiexec.exe (PID: 7556)
      • msiexec.exe (PID: 7596)
      • msiexec.exe (PID: 2284)
      • msiexec.exe (PID: 732)
      • Roblox.exe (PID: 5964)
    • An automatically generated document

      • msiexec.exe (PID: 7424)
    • Checks supported languages

      • msiexec.exe (PID: 7556)
      • msiexec.exe (PID: 7596)
      • msiexec.exe (PID: 2284)
      • msiexec.exe (PID: 732)
      • Roblox.exe (PID: 5964)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 7424)
      • msiexec.exe (PID: 7556)
    • The sample compiled with english language support

      • msiexec.exe (PID: 7424)
      • msiexec.exe (PID: 7556)
      • TiWorker.exe (PID: 7184)
    • Manages system restore points

      • SrTasks.exe (PID: 3180)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 7556)
    • Reads the software policy settings

      • slui.exe (PID: 7744)
      • Roblox.exe (PID: 5964)
    • Manual execution by a user

      • Roblox.exe (PID: 5964)
    • Checks proxy server information

      • Roblox.exe (PID: 5964)
    • Creates files or folders in the user directory

      • Roblox.exe (PID: 5964)
    • Reads the machine GUID from the registry

      • Roblox.exe (PID: 5964)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msi | Microsoft Windows Installer (88.6)
.mst | Windows SDK Setup Transform Script (10)
.msi | Microsoft Installer (100)

EXIF

FlashPix

Characters: -
LastModifiedBy: DavidHacker
Words: -
Title: Roblox Database
Comments: This installer database contains the logic and data required to install ROBLOX.
Keywords: Installer,MSI,Database
Subject: ROBLOX
Author: Roblox Corporation
Security: Password protected
Pages: 200
Software: InstallShield? 12 - Professional Edition 12.0
ModifyDate: 2008:01:16 14:15:17
CreateDate: 2008:01:16 14:15:17
LastPrinted: 2008:01:16 14:15:17
RevisionNumber: {3E85A94D-AE1B-4F82-BB83-E876CFE98859}
CodePage: Windows Latin 1 (Western European)
Template: Intel;1033
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
147
Monitored processes
14
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start msiexec.exe msiexec.exe msiexec.exe no specs sppextcomobj.exe no specs slui.exe vssvc.exe no specs srtasks.exe no specs conhost.exe no specs msiexec.exe no specs msiexec.exe no specs tiworker.exe rundll32.exe no specs slui.exe no specs roblox.exe

Process information

PID
CMD
Path
Indicators
Parent process
732C:\Windows\syswow64\MsiExec.exe -Embedding 69BA36ADA4B55B48E5076DD1058CA0F3 M Global\MSI0000C:\Windows\SysWOW64\msiexec.exemsiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
1164\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeSrTasks.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2284C:\Windows\syswow64\MsiExec.exe -Embedding 440FD969B14EC96BF9A6119E111D8C79C:\Windows\SysWOW64\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
2772C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
3180C:\WINDOWS\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:11C:\Windows\System32\SrTasks.exemsiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Windows System Protection background tasks.
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\srtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5964"C:\Program Files (x86)\ROBLOX Corporation\ROBLOX\Roblox.exe" C:\Program Files (x86)\ROBLOX Corporation\ROBLOX\Roblox.exe
explorer.exe
User:
admin
Company:
ROBLOX Corporation
Integrity Level:
MEDIUM
Description:
ROBLOX Game
Exit code:
0
Version:
0, 3, 696, 0
Modules
Images
c:\program files (x86)\roblox corporation\roblox\roblox.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
7184C:\WINDOWS\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.3989_none_7ddb45627cb30e03\TiWorker.exe -EmbeddingC:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.3989_none_7ddb45627cb30e03\TiWorker.exe
svchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Modules Installer Worker
Version:
10.0.19041.3989 (WinBuild.160101.0800)
Modules
Images
c:\windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.3989_none_7ddb45627cb30e03\tiworker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
7424"C:\Windows\System32\msiexec.exe" /i C:\Users\admin\AppData\Local\Temp\ROBLOX.msiC:\Windows\System32\msiexec.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
7556C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
7596C:\Windows\syswow64\MsiExec.exe -Embedding 3C0930C0F6C3D6C65F12937C27B29F9B CC:\Windows\SysWOW64\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
Total events
8 911
Read events
8 309
Write events
552
Delete events
50

Modification events

(PID) Process:(7556) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
4800000000000000F5F57DCC9DABDB01841D0000C01F0000D50700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7556) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Enter)
Value:
4800000000000000F5F57DCC9DABDB01841D0000C01F0000D20700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7556) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Leave)
Value:
48000000000000005A16DBCC9DABDB01841D0000C01F0000D20700000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7556) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Enter)
Value:
48000000000000005A16DBCC9DABDB01841D0000C01F0000D10700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7556) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Leave)
Value:
48000000000000003753DDCC9DABDB01841D0000C01F0000D10700000100000000000000010000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7556) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
480000000000000079B7DFCC9DABDB01841D0000C01F0000D00700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7556) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
Operation:writeName:LastIndex
Value:
11
(PID) Process:(8144) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4800000000000000CFED56CD9DABDB01D01F0000F8130000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(8144) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4800000000000000CFED56CD9DABDB01D01F00002C010000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(8144) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4800000000000000CFED56CD9DABDB01D01F0000F01F0000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
Executable files
39
Suspicious files
140
Text files
367
Unknown types
0

Dropped files

PID
Process
Filename
Type
7556msiexec.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
7556msiexec.exeC:\Windows\Installer\1126a0.msi
MD5:
SHA256:
7556msiexec.exeC:\System Volume Information\SPP\OnlineMetadataCache\{7f17f2bb-4ce5-4836-bb0f-5eb191c3ea12}_OnDiskSnapshotPropbinary
MD5:9C50E0C5A83AE8A53FFA998272B28063
SHA256:A078FAEBF6A155250AD3B8898148FE0CBC28E4627ED7F228F0BB0AF01B79F620
7556msiexec.exeC:\Program Files (x86)\ROBLOX Corporation\ROBLOX\rgpar.dllexecutable
MD5:307D8BB1B68A17EBCD52D7ABB09497AD
SHA256:F4F8404728711802B3298EF60DC6B9BE6E5595078644312760D3D697FFF460C2
7556msiexec.exeC:\Windows\Installer\MSI3110.tmpbinary
MD5:91943F34AA9A3FCD1EFC96986E9A4664
SHA256:0F28DCFD86B85D0EAD6AC88F33AA104F126DB18A144F0288F7B39B3205CA0E54
7556msiexec.exeC:\Program Files (x86)\ROBLOX Corporation\ROBLOX\rgdx.dllexecutable
MD5:E023CE99F445853E244EFD51147AD157
SHA256:EC582120C3A861196618169556C40BEB502EA1D5E870226C2B5005B93A01E656
7556msiexec.exeC:\Windows\Installer\inprogressinstallinfo.ipibinary
MD5:7C724FE4BBAC7C1A8D7656C914987CD4
SHA256:C641815395C6EA1B7DDB3F9A80DDB98F3330DE82AD92CA0BF355107CC7ECE9BA
7556msiexec.exeC:\Windows\Installer\MSI2DE3.tmpexecutable
MD5:85221B3BCBA8DBE4B4A46581AA49F760
SHA256:F6E34A4550E499346F5AB1D245508F16BF765FF24C4988984B89E049CA55737F
7556msiexec.exeC:\System Volume Information\SPP\snapshot-2binary
MD5:9C50E0C5A83AE8A53FFA998272B28063
SHA256:A078FAEBF6A155250AD3B8898148FE0CBC28E4627ED7F228F0BB0AF01B79F620
7556msiexec.exeC:\Windows\Installer\MSI3140.tmpexecutable
MD5:5D2C8E69D2D3CD58FE067CC96544F553
SHA256:4316B375865B9A0838BD982B06B70153870F42E09C4A9D3C10F09652984E4FD1
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
45
DNS requests
28
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
DE
binary
825 b
whitelisted
1660
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
DE
binary
419 b
whitelisted
5964
Roblox.exe
POST
307
128.116.44.3:80
http://www.roblox.com/Game/MachineConfiguration.ashx
US
whitelisted
5964
Roblox.exe
GET
307
128.116.44.3:80
http://www.roblox.com/IDE/Start.aspx
US
whitelisted
5964
Roblox.exe
GET
200
172.64.149.23:80
http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m%2FWqorSs9UgOHYm8Cd8rIDZssCEBN9U5yqfDGppDNwGWiEeo0%3D
US
binary
2.18 Kb
whitelisted
5964
Roblox.exe
GET
200
172.64.149.23:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEDlyRDr5IrdR19NsEN0xNZU%3D
US
binary
1.42 Kb
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
DE
binary
471 b
whitelisted
1660
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
DE
binary
407 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.130:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
7568
svchost.exe
23.213.166.81:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted
1660
SIHClient.exe
172.202.163.200:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
GB
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.174
whitelisted
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.216.77.28
  • 23.216.77.25
  • 23.216.77.6
  • 23.216.77.18
  • 23.216.77.22
  • 23.216.77.20
  • 23.216.77.36
  • 23.216.77.19
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 20.190.159.130
  • 40.126.31.131
  • 40.126.31.1
  • 40.126.31.2
  • 20.190.159.73
  • 20.190.159.129
  • 40.126.31.128
  • 20.190.159.68
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
go.microsoft.com
  • 23.213.166.81
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted

Threats

No threats detected
No debug info