File name:

PDFDocCentral.msi

Full analysis: https://app.any.run/tasks/c32c19c7-65ce-4919-8938-ce836b71abc0
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: January 23, 2025, 09:27:25
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
generated-doc
loader
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {0364C4B6-FB10-4A81-BAB2-048733D5F660}, Number of Words: 10, Subject: EPI PDF, Author: EPI Software, Name of Creating Application: EPI PDF, Template: ;1033, Comments: EPI PDF 20.1.2017.2, Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Thu Dec 12 09:36:41 2024, Last Saved Time/Date: Thu Dec 12 09:36:41 2024, Last Printed: Thu Dec 12 09:36:41 2024, Number of Pages: 450
MD5:

0DC8874DA66480B329F42292768CEA53

SHA1:

0E1768AA430FFC39F241E84A59948C673621F47D

SHA256:

76F4A99ED8227E3B912295DA2935EFE9FB564D9F1CEBEF7AC14701699002A027

SSDEEP:

98304:s9IMoWPuJfbQniutlJXi1yluol5igSE1X0giduJy1:8

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executes as Windows Service

      • VSSVC.exe (PID: 6448)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 772)
    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 4540)
    • Potential Corporate Privacy Violation

      • msiexec.exe (PID: 4540)
    • Process requests binary or script from the Internet

      • msiexec.exe (PID: 4540)
    • Reads the date of Windows installation

      • MSI2540.tmp (PID: 1344)
    • Executable content was dropped or overwritten

      • installer.exe (PID: 6412)
    • Application launched itself

      • setup.exe (PID: 6560)
  • INFO

    • Checks proxy server information

      • msiexec.exe (PID: 6072)
      • msiexec.exe (PID: 4540)
    • An automatically generated document

      • msiexec.exe (PID: 6072)
    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 6072)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 6072)
      • msiexec.exe (PID: 772)
    • Reads the software policy settings

      • msiexec.exe (PID: 6072)
      • msiexec.exe (PID: 772)
    • Checks supported languages

      • msiexec.exe (PID: 772)
      • msiexec.exe (PID: 6152)
      • MSI2540.tmp (PID: 1344)
      • installer.exe (PID: 6412)
      • setup.exe (PID: 6560)
    • Reads the computer name

      • msiexec.exe (PID: 6152)
      • msiexec.exe (PID: 772)
      • MSI2540.tmp (PID: 1344)
      • installer.exe (PID: 6412)
    • Reads Environment values

      • msiexec.exe (PID: 6152)
      • msiexec.exe (PID: 4540)
    • The sample compiled with english language support

      • msiexec.exe (PID: 6072)
      • msiexec.exe (PID: 772)
      • msiexec.exe (PID: 4540)
      • installer.exe (PID: 6412)
    • Manages system restore points

      • SrTasks.exe (PID: 3876)
    • Process checks computer location settings

      • MSI2540.tmp (PID: 1344)
    • Starts application with an unusual extension

      • msiexec.exe (PID: 772)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msi | Microsoft Windows Installer (88.6)
.mst | Windows SDK Setup Transform Script (10)
.msi | Microsoft Installer (100)

EXIF

FlashPix

Security: None
CodePage: Windows Latin 1 (Western European)
RevisionNumber: {0364C4B6-FB10-4A81-BAB2-048733D5F660}
Words: 10
Subject: EPI PDF
Author: EPI Software
LastModifiedBy: -
Software: EPI PDF
Template: ;1033
Comments: EPI PDF 20.1.2017.2
Title: Installation Database
Keywords: Installer, MSI, Database
CreateDate: 2024:12:12 09:36:41
ModifyDate: 2024:12:12 09:36:41
LastPrinted: 2024:12:12 09:36:41
Pages: 450
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
140
Monitored processes
11
Malicious processes
0
Suspicious processes
2

Behavior graph

Click at the process to see the details
start msiexec.exe msiexec.exe msiexec.exe no specs vssvc.exe no specs srtasks.exe no specs conhost.exe no specs msiexec.exe msi2540.tmp no specs installer.exe setup.exe no specs setup.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
772C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1344"C:\WINDOWS\Installer\MSI2540.tmp" /HideWindow "C:\Users\admin\AppData\Local\EPISoftware\\installer.exe" --import C:\Windows\Installer\MSI2540.tmpmsiexec.exe
User:
admin
Company:
Caphyon LTD
Integrity Level:
MEDIUM
Description:
File that launches another file
Version:
22.2.0.0
Modules
Images
c:\windows\installer\msi2540.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\msi.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1792C:\Users\admin\AppData\Local\EPISoftware\CR_20F1D.tmp\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\EPISoftware\EpiBrowser\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=EpiBrowser --annotation=ver=130.0.6723.147 --initial-client-data=0x298,0x29c,0x2a0,0x274,0x2a4,0x7ff6b54ec158,0x7ff6b54ec164,0x7ff6b54ec170C:\Users\admin\AppData\Local\EPISoftware\CR_20F1D.tmp\setup.exesetup.exe
User:
admin
Company:
EPI Software
Integrity Level:
MEDIUM
Description:
EpiBrowser Installer
Version:
130.0.6723.147
Modules
Images
c:\users\admin\appdata\local\episoftware\cr_20f1d.tmp\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
3876C:\WINDOWS\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:11C:\Windows\System32\SrTasks.exemsiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Windows System Protection background tasks.
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\srtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4540C:\Windows\syswow64\MsiExec.exe -Embedding 724C3BB9A2B3E795DF40C6787A96570CC:\Windows\SysWOW64\msiexec.exe
msiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
5472\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeSrTasks.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6072"C:\Windows\System32\msiexec.exe" /i C:\Users\admin\AppData\Local\Temp\PDFDocCentral.msiC:\Windows\System32\msiexec.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
6152C:\Windows\syswow64\MsiExec.exe -Embedding C24C7B4804C3D2E416A2AB3B313C6F7F CC:\Windows\SysWOW64\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
6412"C:\Users\admin\AppData\Local\EPISoftware\installer.exe" --import C:\Users\admin\AppData\Local\EPISoftware\installer.exe
MSI2540.tmp
User:
admin
Company:
EPI Software
Integrity Level:
MEDIUM
Description:
EpiBrowser Installer
Version:
130.0.6723.147
Modules
Images
c:\users\admin\appdata\local\episoftware\installer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\shell32.dll
6448C:\WINDOWS\system32\vssvc.exeC:\Windows\System32\VSSVC.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
11 413
Read events
11 221
Write events
178
Delete events
14

Modification events

(PID) Process:(772) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Leave)
Value:
4800000000000000D6DE900C796DDB010403000020190000D10700000100000000000000010000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(772) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
48000000000000001D42930C796DDB010403000020190000D00700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(772) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
4800000000000000B433040C796DDB010403000020190000D50700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(772) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Enter)
Value:
4800000000000000B433040C796DDB010403000020190000D20700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(772) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssapiPublisher
Operation:writeName:IDENTIFY (Enter)
Value:
48000000000000006F390F0D796DDB0104030000B4190000E8030000010000000000000000000000F864E10A936D694B833C0C0E3BDB9A4300000000000000000000000000000000
(PID) Process:(6448) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
Operation:writeName:IDENTIFY (Enter)
Value:
480000000000000069C0180D796DDB013019000058190000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6448) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
Operation:writeName:IDENTIFY (Enter)
Value:
480000000000000069C0180D796DDB013019000050190000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6448) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer
Operation:writeName:IDENTIFY (Enter)
Value:
480000000000000069C0180D796DDB0130190000D0190000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6448) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
Operation:writeName:IDENTIFY (Enter)
Value:
480000000000000069C0180D796DDB013019000054190000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6448) VSSVC.exeKey:HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\11000001
Operation:delete keyName:(default)
Value:
Executable files
15
Suspicious files
19
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
772msiexec.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
6072msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\357F04AD41BCF5FE18FCB69F60C6680F_4DDE75866266A71A5A904F85370F1C4Ebinary
MD5:87122F997A989099F095F635E255DB7D
SHA256:C6FDB9863AE80FCF514BA8FA85AB6B097186DE8D664DC56BB95A678CD412F65C
6072msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554Ebinary
MD5:C7A132FE3863A6EB12E2B60A5BE23E2F
SHA256:B6852913454B28A76167B14C47DC1CD4577B392969D649F1007C8B0582E3D2CB
6072msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\357F04AD41BCF5FE18FCB69F60C6680F_4DDE75866266A71A5A904F85370F1C4Ebinary
MD5:239C0C11F7DE2F1123D6FBBD710D8CB7
SHA256:01FC863B47CABBD84573D2D6AB76C4469FBE4D2048047103BBDB2A861540D1B7
6072msiexec.exeC:\Users\admin\AppData\Local\Temp\MSI6DC2.tmpexecutable
MD5:EE09D6A1BB908B42C05FD0BEEB67DFD2
SHA256:7BBF611F5E2A16439DC8CD11936F6364F6D5CC0044545C92775DA5646AFC7752
4540msiexec.exeC:\Users\admin\AppData\Local\EPISoftware\installer.exe.part
MD5:
SHA256:
4540msiexec.exeC:\Users\admin\AppData\Local\EPISoftware\installer.exe
MD5:
SHA256:
6072msiexec.exeC:\Users\admin\AppData\Local\Temp\MSI695C.tmpexecutable
MD5:EE09D6A1BB908B42C05FD0BEEB67DFD2
SHA256:7BBF611F5E2A16439DC8CD11936F6364F6D5CC0044545C92775DA5646AFC7752
772msiexec.exeC:\System Volume Information\SPP\snapshot-2binary
MD5:8283D51D01FF99FA18A447BE89856748
SHA256:2105C99E3B83DAFB26E0071B5C356189930EEA8775CDDDFCC4A6838364D8C7F9
6072msiexec.exeC:\Users\admin\AppData\Local\Temp\MSI6F5D.tmpexecutable
MD5:EE09D6A1BB908B42C05FD0BEEB67DFD2
SHA256:7BBF611F5E2A16439DC8CD11936F6364F6D5CC0044545C92775DA5646AFC7752
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
37
DNS requests
20
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6072
msiexec.exe
GET
200
151.101.66.133:80
http://ocsp.globalsign.com/codesigningrootr45/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQVFZP5vqhCrtRN5SWf40Rn6NM1IAQUHwC%2FRoAK%2FHg5t6W0Q9lWULvOljsCEHe9DgW3WQu2HUdhUx4%2Fde0%3D
unknown
whitelisted
6072
msiexec.exe
GET
200
151.101.66.133:80
http://ocsp.globalsign.com/gsgccr45evcodesignca2020/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBQaCbVYh07WONuW4e63Ydlu4AlbDAQUJZ3Q%2FFkJhmPF7POxEztXHAOSNhECDHH03tIzxzKRPT7zQg%3D%3D
unknown
whitelisted
4540
msiexec.exe
GET
200
65.9.66.125:80
http://resources.epibrowser.com/epibrowser_installer_130.0.6723.147.exe
unknown
unknown
5000
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6784
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
5000
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6072
msiexec.exe
151.101.66.133:80
ocsp.globalsign.com
FASTLY
US
whitelisted
2744
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2324
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5064
SearchApp.exe
104.126.37.161:443
www.bing.com
Akamai International B.V.
DE
whitelisted
1176
svchost.exe
40.126.31.67:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1176
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
5064
SearchApp.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted

DNS requests

Domain
IP
Reputation
www.microsoft.com
  • 184.30.21.171
whitelisted
ocsp.globalsign.com
  • 151.101.66.133
  • 151.101.194.133
  • 151.101.130.133
  • 151.101.2.133
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
www.bing.com
  • 104.126.37.161
  • 104.126.37.155
  • 104.126.37.168
  • 104.126.37.163
  • 104.126.37.160
  • 104.126.37.153
  • 104.126.37.162
  • 104.126.37.147
  • 104.126.37.154
whitelisted
login.live.com
  • 40.126.31.67
  • 20.190.159.71
  • 20.190.159.2
  • 40.126.31.73
  • 20.190.159.4
  • 20.190.159.73
  • 20.190.159.75
  • 20.190.159.23
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
detectportal.firefox.com
  • 34.107.221.82
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted

Threats

PID
Process
Class
Message
4540
msiexec.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
4540
msiexec.exe
Potentially Bad Traffic
ET INFO Executable served from Amazon S3
No debug info