File name:

zenmap-7.97.msi

Full analysis: https://app.any.run/tasks/6abd1bec-1ad5-45eb-bb64-012b064af096
Verdict: Malicious activity
Analysis date: May 29, 2025, 00:36:52
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
generated-doc
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: nmap, Author: nmap, Keywords: Installer, Comments: This installer database contains the logic and data required to install nmap., Template: x64;1033, Revision Number: {68BF0968-ADE4-47B2-97F8-76D977F31566}, Create Time/Date: Wed May 28 11:56:10 2025, Last Saved Time/Date: Wed May 28 11:56:10 2025, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
MD5:

93730D57460C98988AC0F6931F87DE19

SHA1:

9ADC9C86A6A6F17FA49EB0ED91EBB9F22E8A55CF

SHA256:

9514B84ABED58AD7C02E39020C8847B80975E5D49CEA5D33F22C75AF3C3DB583

SSDEEP:

393216:PG2+t/xkMo7cpC6eivNfm4mFrMVWluYPpoa7AJrbk5jKFrzdf:O3tyMC6eiA5yWluYPp77cAJKFR

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • dwm.exe (PID: 5936)
    • Connects to the CnC server

      • dwm.exe (PID: 5936)
    • Run PowerShell with an invisible window

      • powershell.exe (PID: 4424)
      • powershell.exe (PID: 5864)
      • powershell.exe (PID: 4400)
      • powershell.exe (PID: 1912)
      • powershell.exe (PID: 3032)
      • powershell.exe (PID: 6048)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • msiexec.exe (PID: 1616)
      • msiexec.exe (PID: 1812)
    • Executes as Windows Service

      • VSSVC.exe (PID: 5772)
    • Starts a Microsoft application from unusual location

      • dwm.exe (PID: 5936)
    • Executable content was dropped or overwritten

      • nmap-7.95-setup.exe (PID: 300)
      • npcap-1.79.exe (PID: 4112)
      • drvinst.exe (PID: 904)
      • NPFInstall.exe (PID: 5172)
    • Contacting a server suspected of hosting an CnC

      • dwm.exe (PID: 5936)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • npcap-1.79.exe (PID: 4112)
    • The process bypasses the loading of PowerShell profile settings

      • npcap-1.79.exe (PID: 4112)
    • The process hide an interactive prompt from the user

      • npcap-1.79.exe (PID: 4112)
    • Drops a system driver (possible attempt to evade defenses)

      • npcap-1.79.exe (PID: 4112)
      • drvinst.exe (PID: 904)
      • NPFInstall.exe (PID: 5172)
    • Starts POWERSHELL.EXE for commands execution

      • npcap-1.79.exe (PID: 4112)
    • Returns all items found within a container (POWERSHELL)

      • powershell.exe (PID: 4424)
      • powershell.exe (PID: 5864)
      • powershell.exe (PID: 4400)
      • powershell.exe (PID: 6048)
    • Removes files via Powershell

      • powershell.exe (PID: 5864)
      • powershell.exe (PID: 6048)
  • INFO

    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 1616)
    • The sample compiled with english language support

      • msiexec.exe (PID: 1616)
      • msiexec.exe (PID: 1812)
      • nmap-7.95-setup.exe (PID: 300)
      • npcap-1.79.exe (PID: 4112)
    • Checks proxy server information

      • msiexec.exe (PID: 1616)
    • Reads the computer name

      • msiexec.exe (PID: 1812)
    • Checks supported languages

      • msiexec.exe (PID: 1812)
    • Reads the software policy settings

      • msiexec.exe (PID: 1616)
    • Creates files or folders in the user directory

      • msiexec.exe (PID: 1616)
    • Manages system restore points

      • SrTasks.exe (PID: 736)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 1812)
    • Returns hidden items found within a container (POWERSHELL)

      • conhost.exe (PID: 6640)
      • conhost.exe (PID: 4056)
      • conhost.exe (PID: 1600)
      • conhost.exe (PID: 4844)
      • conhost.exe (PID: 5548)
      • conhost.exe (PID: 4628)
      • conhost.exe (PID: 2084)
      • conhost.exe (PID: 3396)
      • conhost.exe (PID: 6264)
      • conhost.exe (PID: 7036)
      • conhost.exe (PID: 1452)
      • conhost.exe (PID: 3268)
      • conhost.exe (PID: 2040)
      • powershell.exe (PID: 3032)
      • conhost.exe (PID: 6828)
      • conhost.exe (PID: 3896)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msi | Microsoft Installer (100)

EXIF

FlashPix

CodePage: Windows Latin 1 (Western European)
Title: Installation Database
Subject: nmap
Author: nmap
Keywords: Installer
Comments: This installer database contains the logic and data required to install nmap.
Template: x64;1033
RevisionNumber: {68BF0968-ADE4-47B2-97F8-76D977F31566}
CreateDate: 2025:05:28 11:56:10
ModifyDate: 2025:05:28 11:56:10
Pages: 200
Words: 2
Software: Windows Installer XML Toolset (3.11.2.4516)
Security: Read-only recommended
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
183
Monitored processes
44
Malicious processes
4
Suspicious processes
2

Behavior graph

Click at the process to see the details
start msiexec.exe msiexec.exe vssvc.exe no specs srtasks.exe no specs conhost.exe no specs dwm.exe nmap-7.95-setup.exe slui.exe npcap-1.79.exe npfinstall.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs certutil.exe no specs certutil.exe no specs conhost.exe no specs certutil.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs certutil.exe no specs certutil.exe no specs conhost.exe no specs certutil.exe no specs conhost.exe no specs certutil.exe no specs conhost.exe no specs npfinstall.exe no specs conhost.exe no specs pnputil.exe no specs conhost.exe no specs npfinstall.exe no specs conhost.exe no specs npfinstall.exe conhost.exe no specs drvinst.exe powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
300"C:\Users\admin\AppData\Local\Temp\ApplicationInstallationFolder_11\nmap-7.95-setup.exe"C:\Users\admin\AppData\Local\Temp\ApplicationInstallationFolder_11\nmap-7.95-setup.exe
msiexec.exe
User:
admin
Company:
Insecure.org
Integrity Level:
MEDIUM
Description:
Nmap installer
Version:
7.95
Modules
Images
c:\users\admin\appdata\local\temp\applicationinstallationfolder_11\nmap-7.95-setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
644\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeNPFInstall.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
736C:\WINDOWS\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:11C:\Windows\System32\SrTasks.exemsiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Windows System Protection background tasks.
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\srtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
736certutil.exe -verifystore "Root" "0563b8630d62d75abbc8ab1e4bdfb5a899b24d43"C:\Windows\SysWOW64\certutil.exenpcap-1.79.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
CertUtil.exe
Exit code:
2148073489
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\certutil.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
744pnputil.exe -eC:\Windows\System32\pnputil.exeNPFInstall.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft PnP Utility - Tool to add, delete, export, and enumerate driver packages.
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\pnputil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
904DrvInst.exe "4" "1" "C:\Program Files\Npcap\NPCAP.inf" "9" "405306be3" "00000000000001E0" "WinSta0\Default" "00000000000001F0" "208" "C:\Program Files\Npcap"C:\Windows\System32\drvinst.exe
svchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\drvinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\devrtl.dll
c:\windows\system32\drvstore.dll
1240\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeSrTasks.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1452\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeNPFInstall.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1600\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1616"C:\Windows\System32\msiexec.exe" /i C:\Users\admin\AppData\Local\Temp\zenmap-7.97.msiC:\Windows\System32\msiexec.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
Total events
53 916
Read events
53 569
Write events
320
Delete events
27

Modification events

(PID) Process:(5772) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4800000000000000887ECFD131D0DB018C1600009C040000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(5772) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4800000000000000887ECFD131D0DB018C160000BC080000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(5772) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4800000000000000887ECFD131D0DB018C16000054140000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(5772) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4800000000000000887ECFD131D0DB018C160000CC040000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(5772) VSSVC.exeKey:HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\11000001
Operation:delete keyName:(default)
Value:
(PID) Process:(5772) VSSVC.exeKey:HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\11000001
Operation:writeName:Element
Value:
0000000000000000000000000000000006000000000000004800000000000000715E5C2FA985EB1190A89A9B763584210000000000000000745E5C2FA985EB1190A89A9B7635842100000000000000000000000000000000
(PID) Process:(5772) VSSVC.exeKey:HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\12000002
Operation:delete keyName:(default)
Value:
(PID) Process:(5772) VSSVC.exeKey:HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\12000002
Operation:writeName:Element
Value:
\EFI\Microsoft\Boot\bootmgfw.efi
(PID) Process:(5772) VSSVC.exeKey:HKEY_LOCAL_MACHINE\BCD00000000\Objects\{5b970157-8568-11eb-b45c-806e6f6e6963}\Elements\11000001
Operation:delete keyName:(default)
Value:
(PID) Process:(5772) VSSVC.exeKey:HKEY_LOCAL_MACHINE\BCD00000000\Objects\{5b970157-8568-11eb-b45c-806e6f6e6963}\Elements\11000001
Operation:writeName:Element
Value:
0000000000000000000000000000000006000000000000004800000000000000715E5C2FA985EB1190A89A9B763584210000000000000000745E5C2FA985EB1190A89A9B7635842100000000000000000000000000000000
Executable files
31
Suspicious files
66
Text files
825
Unknown types
0

Dropped files

PID
Process
Filename
Type
1812msiexec.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
1812msiexec.exeC:\Windows\Installer\111e43.msi
MD5:
SHA256:
1812msiexec.exeC:\Users\admin\AppData\Local\Temp\ApplicationInstallationFolder_11\nmap-7.95-setup.exe
MD5:
SHA256:
1812msiexec.exeC:\Windows\Installer\111e45.msi
MD5:
SHA256:
1616msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554Ebinary
MD5:431C428AC31F380234121D6E7C91C7B5
SHA256:6953EA30844D0D828221111589B39EAC4F6529E6A856D978418E666AC69767F9
1812msiexec.exeC:\Windows\Temp\~DF2DF8AC5383737C19.TMPbinary
MD5:BF619EAC0CDF3F68D496EA9344137E8B
SHA256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
1616msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554Ebinary
MD5:81CA39BA0B512299991EC171143A3DB5
SHA256:5265FA2E83340CFFE7E08206CA3E3AEDDD92212FF8A03B3F0523B8C3C7F371C7
1616msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\357F04AD41BCF5FE18FCB69F60C6680F_A98E62152E5B3955C0691E77FD489F12binary
MD5:AF2DD24533639A7FA0537DE3B5ED8440
SHA256:6583D1E5AF72718DCAE2FAD9F05C8AEAA472603F74CB269679D759624D31F79C
1812msiexec.exeC:\System Volume Information\SPP\OnlineMetadataCache\{237b8133-5382-4342-8d51-5b7bcd3fffa6}_OnDiskSnapshotPropbinary
MD5:39C1BD929018833552CD5D93B5532C50
SHA256:16470CA5B711BB45179F1E7B095D979339941B8A8F311B3E733F452A2EEA3CFF
1812msiexec.exeC:\Windows\Installer\MSI2335.tmpbinary
MD5:789D4C702B31A0750AF2E7651793A550
SHA256:24CA2D025EF7AF6098C936C3948D2A3CF0E74C9456128D502EF3DF83EA10C670
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
43
DNS requests
32
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.166:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1616
msiexec.exe
GET
200
151.101.130.133:80
http://ocsp.globalsign.com/codesigningrootr45/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQVFZP5vqhCrtRN5SWf40Rn6NM1IAQUHwC%2FRoAK%2FHg5t6W0Q9lWULvOljsCEHe9DgW3WQu2HUdhUx4%2Fde0%3D
unknown
whitelisted
1616
msiexec.exe
GET
200
151.101.130.133:80
http://ocsp.globalsign.com/gsgccr45evcodesignca2020/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBQaCbVYh07WONuW4e63Ydlu4AlbDAQUJZ3Q%2FFkJhmPF7POxEztXHAOSNhECDCHLZjLc8G1PAc6kMA%3D%3D
unknown
whitelisted
6424
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6424
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.166:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
6544
svchost.exe
40.126.31.130:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
2112
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1616
msiexec.exe
151.101.130.133:80
ocsp.globalsign.com
FASTLY
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 23.48.23.166
  • 23.48.23.143
  • 23.48.23.156
whitelisted
google.com
  • 142.250.181.238
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 23.219.150.101
whitelisted
login.live.com
  • 40.126.31.130
  • 40.126.31.2
  • 20.190.159.75
  • 40.126.31.129
  • 40.126.31.0
  • 40.126.31.3
  • 40.126.31.128
  • 20.190.159.129
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
ocsp.globalsign.com
  • 151.101.130.133
  • 151.101.194.133
  • 151.101.2.133
  • 151.101.66.133
whitelisted
go.microsoft.com
  • 95.100.186.9
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted

Threats

PID
Process
Class
Message
5936
dwm.exe
Malware Command and Control Activity Detected
ET MALWARE BumbleBee Loader CnC Checkin
No debug info