File name:

Minecraft-W10-Launcher-SteamRIP.com.rar

Full analysis: https://app.any.run/tasks/b0fdee66-0072-4844-8dd6-11e588fa47db
Verdict: Malicious activity
Analysis date: June 02, 2025, 02:24:44
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
arch-doc
auto-reg
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

1080CC9D09A7111A5222548DB693D11E

SHA1:

5AB8EA86652B71386885BB50D084DA6FDED7276E

SHA256:

839AF2E4626DEF466FDB115636BE9E5AECCBFBB3CE2883A7119789CBFE3B33D1

SSDEEP:

393216:qB7PocgBID7JaxKSgYHq29KJ7MoP5S3KeMPdzRf6d3jqccf77YoRwa/iXvJ:U7ocguDeKSHDwZL5+SPdoO/nnWvJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • oalinst.exe (PID: 5376)
      • oalinst.exe (PID: 5624)
      • dotNetFx40_Full_setup.exe (PID: 7172)
      • dotNetFx40_Full_setup.exe (PID: 7684)
      • dxwebsetup.exe (PID: 8000)
      • dxwebsetup.exe (PID: 7200)
      • Setup.exe (PID: 7756)
      • vcredist_x64.exe (PID: 8164)
      • vcredist_x64.exe (PID: 7900)
      • Setup.exe (PID: 4040)
    • Changes the autorun value in the registry

      • dxwebsetup.exe (PID: 7200)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 2980)
      • Setup.exe (PID: 4040)
    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 2980)
      • dotNetFx40_Full_setup.exe (PID: 7684)
      • dxwsetup.exe (PID: 6184)
      • dxwebsetup.exe (PID: 7200)
      • vcredist_x64.exe (PID: 7900)
      • msiexec.exe (PID: 8088)
    • Starts CMD.EXE for commands execution

      • Launcher.exe (PID: 516)
    • Starts a Microsoft application from unusual location

      • dotNetFx40_Full_setup.exe (PID: 7172)
      • dotNetFx40_Full_setup.exe (PID: 7684)
      • dxwebsetup.exe (PID: 8000)
      • dxwebsetup.exe (PID: 7200)
      • dxwsetup.exe (PID: 6184)
      • vcredist_x64.exe (PID: 8164)
      • vcredist_x64.exe (PID: 7900)
    • Executable content was dropped or overwritten

      • dotNetFx40_Full_setup.exe (PID: 7684)
      • dxwebsetup.exe (PID: 7200)
      • dxwsetup.exe (PID: 6184)
      • vcredist_x64.exe (PID: 7900)
    • Creates file in the systems drive root

      • dotNetFx40_Full_setup.exe (PID: 7684)
      • vcredist_x64.exe (PID: 7900)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 8088)
    • The process drops C-runtime libraries

      • msiexec.exe (PID: 8088)
    • There is functionality for taking screenshot (YARA)

      • oalinst.exe (PID: 5376)
  • INFO

    • Checks supported languages

      • Launcher.exe (PID: 516)
      • oalinst.exe (PID: 5376)
      • dotNetFx40_Full_setup.exe (PID: 7684)
      • Setup.exe (PID: 7756)
      • dxwebsetup.exe (PID: 7200)
      • dxwsetup.exe (PID: 6184)
      • vcredist_x64.exe (PID: 7900)
      • Setup.exe (PID: 4040)
      • msiexec.exe (PID: 8088)
    • Manual execution by a user

      • Launcher.exe (PID: 516)
      • oalinst.exe (PID: 5624)
      • oalinst.exe (PID: 5376)
      • dotNetFx40_Full_setup.exe (PID: 7172)
      • dotNetFx40_Full_setup.exe (PID: 7684)
      • dxwebsetup.exe (PID: 8000)
      • dxwebsetup.exe (PID: 7200)
      • rundll32.exe (PID: 7960)
      • vcredist_x64.exe (PID: 8164)
      • vcredist_x64.exe (PID: 7900)
    • Reads the computer name

      • oalinst.exe (PID: 5376)
      • dotNetFx40_Full_setup.exe (PID: 7684)
      • Setup.exe (PID: 7756)
      • dxwsetup.exe (PID: 6184)
      • vcredist_x64.exe (PID: 7900)
      • Setup.exe (PID: 4040)
      • msiexec.exe (PID: 8088)
    • Reads security settings of Internet Explorer

      • OpenWith.exe (PID: 644)
    • Create files in a temporary directory

      • dotNetFx40_Full_setup.exe (PID: 7684)
      • dxwebsetup.exe (PID: 7200)
      • Setup.exe (PID: 7756)
      • Setup.exe (PID: 4040)
    • Reads the machine GUID from the registry

      • dotNetFx40_Full_setup.exe (PID: 7684)
      • vcredist_x64.exe (PID: 7900)
      • Setup.exe (PID: 4040)
      • msiexec.exe (PID: 8088)
    • The sample compiled with arabic language support

      • dotNetFx40_Full_setup.exe (PID: 7684)
    • The sample compiled with english language support

      • dotNetFx40_Full_setup.exe (PID: 7684)
      • dxwebsetup.exe (PID: 7200)
      • dxwsetup.exe (PID: 6184)
      • vcredist_x64.exe (PID: 7900)
      • msiexec.exe (PID: 8088)
    • The sample compiled with german language support

      • dotNetFx40_Full_setup.exe (PID: 7684)
      • vcredist_x64.exe (PID: 7900)
      • msiexec.exe (PID: 8088)
    • The sample compiled with czech language support

      • dotNetFx40_Full_setup.exe (PID: 7684)
    • The sample compiled with japanese language support

      • dotNetFx40_Full_setup.exe (PID: 7684)
      • vcredist_x64.exe (PID: 7900)
      • msiexec.exe (PID: 8088)
    • The sample compiled with french language support

      • dotNetFx40_Full_setup.exe (PID: 7684)
      • vcredist_x64.exe (PID: 7900)
      • msiexec.exe (PID: 8088)
    • The sample compiled with chinese language support

      • dotNetFx40_Full_setup.exe (PID: 7684)
      • vcredist_x64.exe (PID: 7900)
      • msiexec.exe (PID: 8088)
    • The sample compiled with korean language support

      • dotNetFx40_Full_setup.exe (PID: 7684)
      • vcredist_x64.exe (PID: 7900)
      • msiexec.exe (PID: 8088)
    • The sample compiled with swedish language support

      • dotNetFx40_Full_setup.exe (PID: 7684)
    • The sample compiled with portuguese language support

      • dotNetFx40_Full_setup.exe (PID: 7684)
    • The sample compiled with Italian language support

      • dotNetFx40_Full_setup.exe (PID: 7684)
      • vcredist_x64.exe (PID: 7900)
      • msiexec.exe (PID: 8088)
    • The sample compiled with turkish language support

      • dotNetFx40_Full_setup.exe (PID: 7684)
    • The sample compiled with polish language support

      • dotNetFx40_Full_setup.exe (PID: 7684)
    • The sample compiled with russian language support

      • dotNetFx40_Full_setup.exe (PID: 7684)
      • vcredist_x64.exe (PID: 7900)
      • msiexec.exe (PID: 8088)
    • The sample compiled with spanish language support

      • dotNetFx40_Full_setup.exe (PID: 7684)
      • vcredist_x64.exe (PID: 7900)
      • msiexec.exe (PID: 8088)
    • Launch of the file from Registry key

      • dxwebsetup.exe (PID: 7200)
    • Reads CPU info

      • Setup.exe (PID: 7756)
      • Setup.exe (PID: 4040)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 8088)
    • Reads the software policy settings

      • Setup.exe (PID: 4040)
      • msiexec.exe (PID: 8088)
      • slui.exe (PID: 7268)
    • Creates files or folders in the user directory

      • msiexec.exe (PID: 8088)
    • Checks proxy server information

      • slui.exe (PID: 7268)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 8088)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)

EXIF

ZIP

FileVersion: RAR v5
CompressedSize: 9436797
UncompressedSize: 10992640
OperatingSystem: Win32
ArchivedFileName: Launcher/Custom.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
143
Monitored processes
20
Malicious processes
4
Suspicious processes
8

Behavior graph

Click at the process to see the details
start winrar.exe no specs launcher.exe no specs conhost.exe no specs cmd.exe no specs openwith.exe no specs oalinst.exe no specs oalinst.exe dotnetfx40_full_setup.exe no specs dotnetfx40_full_setup.exe dxwebsetup.exe no specs dxwebsetup.exe setup.exe no specs dxwsetup.exe rundll32.exe no specs vcredist_x64.exe no specs vcredist_x64.exe cmd.exe no specs setup.exe no specs msiexec.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
516"C:\Users\admin\Desktop\Launcher.exe" C:\Users\admin\Desktop\Launcher.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\launcher.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
644C:\WINDOWS\system32\OpenWith.exe -EmbeddingC:\Windows\System32\OpenWith.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
2656C:\WINDOWS\system32\cmd.exe /c start minecraft:C:\Windows\System32\cmd.exeLauncher.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
2980"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\Minecraft-W10-Launcher-SteamRIP.com.rarC:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
3996\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeLauncher.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4040c:\da2aa91ccc9651bffed3e3\Setup.exe C:\da2aa91ccc9651bffed3e3\Setup.exevcredist_x64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Setup Installer
Exit code:
0
Version:
10.0.30319.1 built by: RTMRel
Modules
Images
c:\da2aa91ccc9651bffed3e3\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
4724C:\WINDOWS\system32\cmd.exe /c pauseC:\Windows\System32\cmd.exeLauncher.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
5376"C:\Users\admin\Desktop\oalinst.exe" C:\Users\admin\Desktop\oalinst.exe
explorer.exe
User:
admin
Company:
Creative Labs Inc.
Integrity Level:
HIGH
Description:
OpenAL Installer
Version:
2, 0, 7, 0
Modules
Images
c:\users\admin\desktop\oalinst.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
5624"C:\Users\admin\Desktop\oalinst.exe" C:\Users\admin\Desktop\oalinst.exeexplorer.exe
User:
admin
Company:
Creative Labs Inc.
Integrity Level:
MEDIUM
Description:
OpenAL Installer
Exit code:
3221226540
Version:
2, 0, 7, 0
Modules
Images
c:\users\admin\desktop\oalinst.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
6184C:\Users\admin\AppData\Local\Temp\IXP000.TMP\dxwsetup.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\dxwsetup.exe
dxwebsetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
DirectX Setup
Version:
4.9.0.0904
Modules
Images
c:\users\admin\appdata\local\temp\ixp000.tmp\dxwsetup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
Total events
13 613
Read events
13 379
Write events
225
Delete events
9

Modification events

(PID) Process:(2980) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(2980) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(2980) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(2980) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\Minecraft-W10-Launcher-SteamRIP.com.rar
(PID) Process:(2980) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2980) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2980) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2980) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2656) cmd.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
(PID) Process:(2656) cmd.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
Executable files
75
Suspicious files
19
Text files
132
Unknown types
0

Dropped files

PID
Process
Filename
Type
7684dotNetFx40_Full_setup.exeC:\159d7f1a7066bd46b3e20afb6c6e\Graphics\Rotate8.icoimage
MD5:D1C53003264DCE4EFFAF462C807E2D96
SHA256:5FB03593071A99C7B3803FE8424520B8B548B031D02F2A86E8F5412AC519723C
7684dotNetFx40_Full_setup.exeC:\159d7f1a7066bd46b3e20afb6c6e\Graphics\Rotate7.icoimage
MD5:FB4DFEBE83F554FAF1A5CEC033A804D9
SHA256:4F46A9896DE23A92D2B5F963BCFB3237C3E85DA05B8F7660641B3D1D5AFAAE6F
7684dotNetFx40_Full_setup.exeC:\159d7f1a7066bd46b3e20afb6c6e\watermark.bmpimage
MD5:B0075CEE80173D764C0237E840BA5879
SHA256:AB18374B3AAB10E5979E080D0410579F9771DB888BA1B80A5D81BA8896E2D33A
7684dotNetFx40_Full_setup.exeC:\159d7f1a7066bd46b3e20afb6c6e\Graphics\warn.icoimage
MD5:B2B1D79591FCA103959806A4BF27D036
SHA256:FE4D06C318701BF0842D4B87D1BAD284C553BAF7A40987A7451338099D840A11
7684dotNetFx40_Full_setup.exeC:\159d7f1a7066bd46b3e20afb6c6e\SplashScreen.bmpimage
MD5:0966FCD5A4AB0DDF71F46C01EFF3CDD5
SHA256:31C13ECFC0EB27F34036FB65CC0E735CD444EEC75376EEA2642F926AC162DCB3
7684dotNetFx40_Full_setup.exeC:\159d7f1a7066bd46b3e20afb6c6e\Graphics\Rotate6.icoimage
MD5:70006BF18A39D258012875AEFB92A3D1
SHA256:19ABCEDF93D790E19FB3379CB3B46371D3CBFF48FE7E63F4FDCC2AC23A9943E4
7684dotNetFx40_Full_setup.exeC:\159d7f1a7066bd46b3e20afb6c6e\Graphics\Rotate5.icoimage
MD5:3B4861F93B465D724C60670B64FCCFCF
SHA256:7237051D9AF5DB972A1FECF0B35CD8E9021471740782B0DBF60D3801DC9F5F75
7684dotNetFx40_Full_setup.exeC:\159d7f1a7066bd46b3e20afb6c6e\Graphics\Rotate2.icoimage
MD5:8419CAA81F2377E09B7F2F6218E505AE
SHA256:DB89D8A45C369303C04988322B2774D2C7888DA5250B4DAB2846DEEF58A7DE22
7684dotNetFx40_Full_setup.exeC:\159d7f1a7066bd46b3e20afb6c6e\header.bmpimage
MD5:514BFCD8DA66722A9639EB41ED3988B7
SHA256:6B8201ED10CE18FFADE072B77C6D1FCACCF1D29ACB47D86F553D9BEEBD991290
7684dotNetFx40_Full_setup.exeC:\159d7f1a7066bd46b3e20afb6c6e\Graphics\Rotate4.icoimage
MD5:BB55B5086A9DA3097FB216C065D15709
SHA256:8D82FF7970C9A67DA8134686560FE3A6C986A160CED9D1CC1392F2BA75C698AB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
25
TCP/UDP connections
40
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5056
svchost.exe
GET
200
23.216.77.6:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
POST
200
20.190.159.64:443
https://login.live.com/RST2.srf
unknown
xml
6.67 Kb
whitelisted
POST
200
40.126.32.140:443
https://login.live.com/RST2.srf
unknown
xml
11.0 Kb
whitelisted
5056
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
POST
200
40.126.32.140:443
https://login.live.com/RST2.srf
unknown
xml
11.1 Kb
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
304
172.202.163.200:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
GET
200
172.202.163.200:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
compressed
23.9 Kb
whitelisted
7704
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
6544
svchost.exe
20.190.160.64:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
20.190.160.64:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
4
System
192.168.100.255:138
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
5056
svchost.exe
23.216.77.6:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5056
svchost.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 40.127.240.158
whitelisted
google.com
  • 142.250.186.78
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
crl.microsoft.com
  • 23.216.77.6
  • 23.216.77.28
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted
self.events.data.microsoft.com
  • 52.168.117.171
whitelisted

Threats

No threats detected
No debug info