File name:

XXMI-Launcher-Installer-Online-v1.0.4.msi.malwr

Full analysis: https://app.any.run/tasks/ead48814-3b3a-425a-92c8-5611a5da7838
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: October 31, 2024, 21:17:27
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
generated-doc
adware
advancedinstaller
loader
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {7DDD38F9-7DA4-44CD-AC57-732249A77EAB}, Number of Words: 2, Subject: XXMI Launcher, Author: SpectrumQT, Name of Creating Application: XXMI Launcher, Template: x64;1033, Comments: This installer database contains the logic and data required to install XXMI Launcher., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Wed Oct 9 16:32:24 2024, Last Saved Time/Date: Wed Oct 9 16:32:24 2024, Last Printed: Wed Oct 9 16:32:24 2024, Number of Pages: 450
MD5:

ADE799235AAF27C7A98381A7813467EC

SHA1:

74DDDC921C62363B9DF68FE4A68CDCF569D23B47

SHA256:

68068FF8E4D417BDD54E14395FCAF965DDC0784343496D69F8DDCE1F5EC89E80

SSDEEP:

393216:joJMe40F6b+MUPRDvU5jQ1mbQSLjYfoNTksnyzAuRVQep42nRM8YdNC:TeK1UPR7WbfYfgkeyzAkVQeS2nBYNC

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • The process creates files with name similar to system file names

      • msiexec.exe (PID: 3604)
    • The process drops C-runtime libraries

      • msiexec.exe (PID: 3604)
      • msiexec.exe (PID: 2632)
    • Executable content was dropped or overwritten

      • VC_redist.x64.exe (PID: 2776)
      • VC_redist.x64.exe (PID: 4080)
      • VC_redist.x64.exe (PID: 2132)
      • VC_redist.x64.exe (PID: 6856)
      • VC_redist.x64.exe (PID: 7040)
      • EnhancedUI.exe (PID: 7088)
    • Checks Windows Trust Settings

      • msiexec.exe (PID: 7076)
    • Process drops legitimate windows executable

      • msiexec.exe (PID: 7076)
      • VC_redist.x64.exe (PID: 2776)
      • VC_redist.x64.exe (PID: 7040)
      • VC_redist.x64.exe (PID: 4080)
      • msiexec.exe (PID: 2632)
      • VC_redist.x64.exe (PID: 6856)
      • EnhancedUI.exe (PID: 7088)
    • Starts a Microsoft application from unusual location

      • VC_redist.x64.exe (PID: 7040)
      • VC_redist.x64.exe (PID: 4080)
    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 7076)
    • Application launched itself

      • VC_redist.x64.exe (PID: 4316)
      • VC_redist.x64.exe (PID: 2132)
    • Starts itself from another location

      • VC_redist.x64.exe (PID: 7040)
    • Executes as Windows Service

      • VSSVC.exe (PID: 1376)
    • Process drops python dynamic module

      • msiexec.exe (PID: 2632)
  • INFO

    • Checks supported languages

      • msiexec.exe (PID: 2632)
      • msiexec.exe (PID: 3108)
      • EnhancedUI.exe (PID: 7088)
      • msiexec.exe (PID: 7076)
    • Reads the computer name

      • msiexec.exe (PID: 2632)
      • msiexec.exe (PID: 3108)
      • msiexec.exe (PID: 7076)
      • EnhancedUI.exe (PID: 7088)
    • Create files in a temporary directory

      • msiexec.exe (PID: 3604)
      • EnhancedUI.exe (PID: 7088)
      • msiexec.exe (PID: 7076)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 3604)
      • msiexec.exe (PID: 2632)
      • msiexec.exe (PID: 7076)
    • Reads the software policy settings

      • msiexec.exe (PID: 7076)
    • Checks proxy server information

      • msiexec.exe (PID: 7076)
    • Manages system restore points

      • SrTasks.exe (PID: 6156)
      • SrTasks.exe (PID: 6552)
    • Reads Environment values

      • msiexec.exe (PID: 7076)
      • EnhancedUI.exe (PID: 7088)
    • Reads the machine GUID from the registry

      • msiexec.exe (PID: 7076)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msi | Microsoft Windows Installer (88.6)
.mst | Windows SDK Setup Transform Script (10)
.msi | Microsoft Installer (100)

EXIF

FlashPix

Security: None
CodePage: Windows Latin 1 (Western European)
RevisionNumber: {7DDD38F9-7DA4-44CD-AC57-732249A77EAB}
Words: 2
Subject: XXMI Launcher
Author: SpectrumQT
LastModifiedBy: -
Software: XXMI Launcher
Template: x64;1033
Comments: This installer database contains the logic and data required to install XXMI Launcher.
Title: Installation Database
Keywords: Installer, MSI, Database
CreateDate: 2024:10:09 16:32:24
ModifyDate: 2024:10:09 16:32:24
LastPrinted: 2024:10:09 16:32:24
Pages: 450
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
134
Monitored processes
18
Malicious processes
1
Suspicious processes
4

Behavior graph

Click at the process to see the details
start msiexec.exe msiexec.exe msiexec.exe no specs enhancedui.exe msiexec.exe vc_redist.x64.exe vc_redist.x64.exe vc_redist.x64.exe SPPSurrogate no specs vssvc.exe no specs srtasks.exe no specs conhost.exe no specs vc_redist.x64.exe no specs vc_redist.x64.exe vc_redist.x64.exe srtasks.exe no specs conhost.exe no specs msiexec.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
764\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeSrTasks.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1376C:\WINDOWS\system32\vssvc.exeC:\Windows\System32\VSSVC.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2132"C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe" -burn.clean.room="C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe" -burn.filehandle.attached=536 -burn.filehandle.self=556 -uninstall -quiet -burn.related.upgrade -burn.ancestors={c649ede4-f16a-4486-a117-dcc2f2a35165} -burn.filehandle.self=1112 -burn.embedded BurnPipe.{FA322C88-BB9E-4D19-9C6F-0EB2072A7983} {411A25FE-4576-4038-9839-F774FE1F81C6} 4080C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe
VC_redist.x64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Visual C++ 2015-2022 Redistributable (x64) - 14.36.32532
Exit code:
0
Version:
14.36.32532.0
Modules
Images
c:\programdata\package cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\vc_redist.x64.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
2632C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
2776"C:\Users\admin\AppData\Roaming\XXMI Launcher\prerequisites\Visual C++ Redistributable for Visual Studio 2015-2022\VC_redist.x64.exe" /q /norestart REBOOT=ReallySuppressC:\Users\admin\AppData\Roaming\XXMI Launcher\prerequisites\Visual C++ Redistributable for Visual Studio 2015-2022\VC_redist.x64.exe
msiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Visual C++ 2015-2022 Redistributable (x64) - 14.38.33135
Exit code:
3010
Version:
14.38.33135.0
Modules
Images
c:\users\admin\appdata\roaming\xxmi launcher\prerequisites\visual c++ redistributable for visual studio 2015-2022\vc_redist.x64.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
3108C:\Windows\syswow64\MsiExec.exe -Embedding 0D36706B40D2DEAF7B4B06CA552C5DD9 UC:\Windows\SysWOW64\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
3604"C:\Windows\System32\msiexec.exe" /i C:\Users\admin\Desktop\XXMI-Launcher-Installer-Online-v1.0.4.msi.malwr.msiC:\Windows\System32\msiexec.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
4080"C:\Users\admin\AppData\Local\Temp\{E38C8376-D206-432C-86B5-EB789C221845}\.be\VC_redist.x64.exe" -q -burn.elevated BurnPipe.{0726C1E3-D619-443E-B545-FE4A9F617CEE} {989F016A-DA11-4D04-AC4A-1689137EAC6F} 7040C:\Users\admin\AppData\Local\Temp\{E38C8376-D206-432C-86B5-EB789C221845}\.be\VC_redist.x64.exe
VC_redist.x64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Visual C++ 2015-2022 Redistributable (x64) - 14.38.33135
Exit code:
3010
Version:
14.38.33135.0
Modules
Images
c:\users\admin\appdata\local\temp\{e38c8376-d206-432c-86b5-eb789c221845}\.be\vc_redist.x64.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
4316"C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe" -uninstall -quiet -burn.related.upgrade -burn.ancestors={c649ede4-f16a-4486-a117-dcc2f2a35165} -burn.filehandle.self=1112 -burn.embedded BurnPipe.{FA322C88-BB9E-4D19-9C6F-0EB2072A7983} {411A25FE-4576-4038-9839-F774FE1F81C6} 4080C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exeVC_redist.x64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Visual C++ 2015-2022 Redistributable (x64) - 14.36.32532
Exit code:
0
Version:
14.36.32532.0
Modules
Images
c:\programdata\package cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\vc_redist.x64.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
4376\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeSrTasks.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Total events
16 952
Read events
15 951
Write events
624
Delete events
377

Modification events

(PID) Process:(7076) msiexec.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
Operation:writeName:{D0077297-54D3-45E8-B92C-7119B5049D8D}
Value:
C:\WINDOWS\system32\msiexec.exe /i "C:\Users\admin\Desktop\XXMI-Launcher-Installer-Online-v1.0.4.msi.malwr.msi" ADDLOCAL=MainFeature,C4FE6FD5B7C4D07B3A313E754A9A6A8
(PID) Process:(5372) dllhost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Enter)
Value:
4800000000000000AF4D9E7DDA2BDB01FC14000054180000D20700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(4080) VC_redist.x64.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
4000000000000000AF4D9E7DDA2BDB01F00F0000700F0000D5070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(5372) dllhost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Leave)
Value:
48000000000000001984D77DDA2BDB01FC14000054180000D20700000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(5372) dllhost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Enter)
Value:
48000000000000001984D77DDA2BDB01FC14000054180000D10700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(5372) dllhost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Leave)
Value:
4800000000000000BAE8D97DDA2BDB01FC14000054180000D10700000100000000000000010000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(5372) dllhost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
4800000000000000139DDE7DDA2BDB01FC14000054180000D00700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(5372) dllhost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
Operation:writeName:LastIndex
Value:
11
(PID) Process:(5372) dllhost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGatherWriterMetadata (Enter)
Value:
4800000000000000F80B3E7EDA2BDB01FC14000054180000D30700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(5372) dllhost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssapiPublisher
Operation:writeName:IDENTIFY (Enter)
Value:
4800000000000000F3C0427EDA2BDB01FC140000A4140000E803000001000000000000000000000052504678C57EB7448CFECCFAE1E3631000000000000000000000000000000000
Executable files
169
Suspicious files
74
Text files
1 073
Unknown types
3

Dropped files

PID
Process
Filename
Type
3604msiexec.exeC:\Users\admin\AppData\Local\Temp\MSI13253\resources.pri
MD5:
SHA256:
3604msiexec.exeC:\Users\admin\AppData\Local\Temp\MSI13253\embeddeduiproxy.dllexecutable
MD5:8DC7199AEA9216EEA74B18CD32D3A20A
SHA256:96E0FE57C2F2347E8994D6E3685C85A97B0C12F920EB37882D24BB0606FA915A
3604msiexec.exeC:\Users\admin\AppData\Local\Temp\MSI13253\EnhancedUI.exeexecutable
MD5:766D9E2EC1D3AA3AE09F09B232B42911
SHA256:30791EB229D55D42DA62B7048B36BCE26BD5DBC89E26056DDF042A951D519624
3604msiexec.exeC:\Users\admin\AppData\Local\Temp\MSI13253\Microsoft.UI.Xaml.dllexecutable
MD5:6586CDC1057963B1CD0D5D6B89B9B093
SHA256:9C2B2585B9D75E302002C8DAFE60871196FFE059855747D63843C7A570A4EE7E
3604msiexec.exeC:\Users\admin\AppData\Local\Temp\MSI13253\WinUiBootstrapperEui.dllexecutable
MD5:CBA525D7B96102F5E0EB48C73AB09FB5
SHA256:901B1D184F1077CF4C59162E9E82B4F59E44D4B3E9356469B6FD6679BD4D7BD2
3604msiexec.exeC:\Users\admin\AppData\Local\Temp\MSI13253\HtmlHostControl.xbfxbf
MD5:CE179CB5243A891F830B3030DBF227DA
SHA256:C2E888B120D063D0C58BC034733267CEFCDE3E2BE63F3D90BD2C463CA6CBE50D
3604msiexec.exeC:\Users\admin\AppData\Local\Temp\MSI13253\Microsoft.Web.WebView2.Core.dllexecutable
MD5:2B4735E30C39A0267310FCC65C1C4285
SHA256:BC3E0C69E9F4BC03EEC9C3B92846B42497419FFEF79DE12F382B27F5778E2A32
7088EnhancedUI.exeC:\Users\admin\AppData\Local\Temp\shi1205.tmpexecutable
MD5:84A34BF3486F7B9B7035DB78D78BDD1E
SHA256:F85911C910B660E528D2CF291BAA40A92D09961996D6D84E7A53A7095C7CD96E
3604msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIDEE.tmpexecutable
MD5:13056F6FC48A93C1268D690E554F4571
SHA256:AEDA49BAF2D79DA2F7A9266F1FB7884111C2620E187090321F5278AF5131C996
3604msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIF95.tmpexecutable
MD5:13056F6FC48A93C1268D690E554F4571
SHA256:AEDA49BAF2D79DA2F7A9266F1FB7884111C2620E187090321F5278AF5131C996
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
24
DNS requests
9
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.164.43:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6944
svchost.exe
GET
200
2.16.164.43:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
2.16.164.43:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6944
svchost.exe
GET
200
23.32.185.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.32.185.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
23.32.185.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2632
msiexec.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl
unknown
whitelisted
2632
msiexec.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
199.232.214.172:443
https://download.visualstudio.microsoft.com/download/pr/c7707d68-d6ce-4479-973e-e2a3dc4341fe/1AD7988C17663CC742B01BEF1A6DF2ED1741173009579AD50A94434E54F56073/VC_redist.x64.exe
unknown
executable
24.2 Mb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
6944
svchost.exe
2.16.164.43:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
2.16.164.43:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
5488
MoUsoCoreWorker.exe
2.16.164.43:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
6944
svchost.exe
23.32.185.131:80
www.microsoft.com
AKAMAI-AS
BR
whitelisted
23.32.185.131:80
www.microsoft.com
AKAMAI-AS
BR
whitelisted
5488
MoUsoCoreWorker.exe
23.32.185.131:80
www.microsoft.com
AKAMAI-AS
BR
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
whitelisted
google.com
  • 172.217.16.142
whitelisted
crl.microsoft.com
  • 2.16.164.43
  • 2.16.164.49
  • 2.16.164.18
  • 23.53.40.178
  • 23.53.40.176
whitelisted
www.microsoft.com
  • 23.32.185.131
  • 23.52.120.96
whitelisted
download.visualstudio.microsoft.com
  • 199.232.210.172
  • 199.232.214.172
whitelisted
self.events.data.microsoft.com
  • 20.189.173.13
whitelisted

Threats

PID
Process
Class
Message
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Misc activity
ET INFO EXE - Served Attached HTTP
1 ETPRO signatures available at the full report
No debug info