File name:

SecuriteInfo.com.decompression.bomb.12545.30542

Full analysis: https://app.any.run/tasks/ff0ba1ef-fcec-436d-93cc-ebfa4a564753
Verdict: Malicious activity
Analysis date: July 29, 2024, 09:20:11
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
generated-doc
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: novaPDF 11, Author: Softland, Keywords: Installer, Comments: This installer database contains the logic and data required to install novaPDF 11., Template: Intel;9, Revision Number: {CC4AACCC-9688-4A06-8F2F-1FB35B31122A}, Create Time/Date: Tue Jun 25 07:32:36 2024, Last Saved Time/Date: Tue Jun 25 07:32:36 2024, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
MD5:

21E8B9223E156D4F89210837A4D8C46D

SHA1:

FA925C2AACE744572338708C4082A8FD43DF469D

SHA256:

B90DDD4BEBDCF420EED68DE923C623EE362AD4E74153C38AC31DDBB60DACF19C

SSDEEP:

98304:nzIM0cpBApcYY381ZOAyPuG2KDVGCGEKE//eIHzHK4NEgC5coWBirWAA3Hly8jMd:r89p8d8

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • msiexec.exe (PID: 2216)
      • msiexec.exe (PID: 1256)
  • SUSPICIOUS

    • Executes as Windows Service

      • VSSVC.exe (PID: 6880)
    • Executes application which crashes

      • msiexec.exe (PID: 6836)
      • msiexec.exe (PID: 7572)
  • INFO

    • Reads the software policy settings

      • msiexec.exe (PID: 2216)
    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 2216)
    • Checks proxy server information

      • msiexec.exe (PID: 2216)
    • Creates files or folders in the user directory

      • msiexec.exe (PID: 2216)
    • Checks supported languages

      • msiexec.exe (PID: 1256)
      • msiexec.exe (PID: 1084)
    • Reads the computer name

      • msiexec.exe (PID: 1256)
      • msiexec.exe (PID: 1084)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 2216)
      • msiexec.exe (PID: 1256)
    • Create files in a temporary directory

      • msiexec.exe (PID: 1084)
    • Reads Environment values

      • msiexec.exe (PID: 1084)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msi | Microsoft Windows Installer (98.5)
.msi | Microsoft Installer (100)

EXIF

FlashPix

CodePage: Windows Latin 1 (Western European)
Title: Installation Database
Subject: novaPDF 11
Author: Softland
Keywords: Installer
Comments: This installer database contains the logic and data required to install novaPDF 11.
Template: Intel;9
RevisionNumber: {CC4AACCC-9688-4A06-8F2F-1FB35B31122A}
CreateDate: 2024:06:25 07:32:36
ModifyDate: 2024:06:25 07:32:36
Pages: 200
Words: 2
Software: Windows Installer XML Toolset (3.11.2.4516)
Security: Read-only recommended
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
159
Monitored processes
12
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start msiexec.exe msiexec.exe msiexec.exe vssvc.exe no specs slui.exe srtasks.exe no specs conhost.exe no specs msiexec.exe werfault.exe msiexec.exe msiexec.exe werfault.exe

Process information

PID
CMD
Path
Indicators
Parent process
1084C:\Windows\syswow64\MsiExec.exe -Embedding BC0FCCB18EEE31E2158C9C2FC35FED8B CC:\Windows\SysWOW64\msiexec.exe
msiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
1256C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
2216"C:\Windows\System32\msiexec.exe" /i C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.decompression.bomb.12545.30542.msiC:\Windows\System32\msiexec.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
1603
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
2240C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4212C:\WINDOWS\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:11C:\Windows\System32\SrTasks.exemsiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Windows System Protection background tasks.
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\srtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6572C:\WINDOWS\SysWOW64\WerFault.exe -u -p 6836 -s 852C:\Windows\SysWOW64\WerFault.exe
msiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
6836C:\Windows\syswow64\MsiExec.exe -Embedding 34B192DE97AD2CA243E0D1AD40E44322 E Global\MSI0000C:\Windows\SysWOW64\msiexec.exe
msiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Exit code:
3221226505
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
6880C:\WINDOWS\system32\vssvc.exeC:\Windows\System32\VSSVC.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7004\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeSrTasks.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7516C:\Windows\syswow64\MsiExec.exe -Embedding 4790B4B8AAC9029BA813BC2E2FED57CDC:\Windows\SysWOW64\msiexec.exe
msiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
Total events
19 544
Read events
18 952
Write events
362
Delete events
230

Modification events

(PID) Process:(1256) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
4800000000000000EAA63F9098E1DA01E8040000E8110000D50700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1256) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Enter)
Value:
4800000000000000EAA63F9098E1DA01E8040000E8110000D20700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1256) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Leave)
Value:
4800000000000000916EA19098E1DA01E8040000E8110000D20700000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1256) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Enter)
Value:
4800000000000000916EA19098E1DA01E8040000E8110000D10700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1256) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Leave)
Value:
480000000000000013D3A39098E1DA01E8040000E8110000D10700000100000000000000010000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1256) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
4800000000000000AB86A89098E1DA01E8040000E8110000D00700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1256) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
Operation:writeName:LastIndex
Value:
11
(PID) Process:(1256) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGatherWriterMetadata (Enter)
Value:
4800000000000000806A1D9198E1DA01E8040000E8110000D30700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1256) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssapiPublisher
Operation:writeName:IDENTIFY (Enter)
Value:
480000000000000054BC1F9198E1DA01E8040000141B0000E8030000010000000000000000000000848B8F7D860D794EB5BDADB8935E987D00000000000000000000000000000000
(PID) Process:(6880) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4800000000000000E0AF2B9198E1DA01E01A00007C180000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
Executable files
6
Suspicious files
40
Text files
25
Unknown types
14

Dropped files

PID
Process
Filename
Type
1256msiexec.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
1256msiexec.exeC:\Windows\Installer\1c485b.msi
MD5:
SHA256:
2216msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225Fbinary
MD5:C1657C09CBF653085FE5977265C03E1D
SHA256:3E9B4E775C00A2FD2B1DB9D5C7B4E83D6DF7F3683AABA7283A8137248DAD751A
1256msiexec.exeC:\Windows\Temp\~DF420B8C4D9DF7CEE6.TMPbinary
MD5:8DED280BB2483C4CC686AD8B22A14E55
SHA256:AE753B38414AEB437429F84DDAF1439DA651B3EC1634EF74322F8E2E1F6AEE26
2216msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3AA0DCD5A74331FBD6F344550EC48B87_ACAC357F39B071DF92C07DE34FDE0919binary
MD5:CDEC0440D43BCDF8AAF1566A27B0AEE6
SHA256:A3FB812E660DDD2C9EA9F3DACB4F80442DEB349F90BC7109BFABC41C0D3415D3
2216msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3AA0DCD5A74331FBD6F344550EC48B87_ACAC357F39B071DF92C07DE34FDE0919binary
MD5:66190BFBF7C57BFF8DC85B03C898DA19
SHA256:260398D210E18B122AC3E8CA3FA42413AB15303F1BFDB2DC524FFEBBE679F29C
6572WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_MsiExec.exe_5972671e377d9fbe932737b9e4cf733ebb99d0_0b7c07f9_ce121207-face-40bc-8450-be68d32c8435\Report.wer
MD5:
SHA256:
1256msiexec.exeC:\Windows\Installer\inprogressinstallinfo.ipibinary
MD5:8DED280BB2483C4CC686AD8B22A14E55
SHA256:AE753B38414AEB437429F84DDAF1439DA651B3EC1634EF74322F8E2E1F6AEE26
2216msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\18E6B4A57A6BC7EC9B861CDF2D6D0D02_EF52C1EC85F21F31CC0157A5C8803013binary
MD5:95E810BC77F5755CBC10F421F82CFD7C
SHA256:229E21E94512D97795CCF3D626A3F3DA165C2CF2B957339D692323D3B266076A
1256msiexec.exeC:\Windows\Installer\MSI4D4C.tmpbinary
MD5:98BC9695BFF223B480C1B26F0F0E6386
SHA256:D5DD9F5FB47E8D3FE48A169F7059F2D93CB3685205FC65C54E66EB950B664AB9
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
62
DNS requests
28
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2216
msiexec.exe
GET
200
104.18.38.233:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEEj8k7RgVZSNNqfJionWlBY%3D
unknown
whitelisted
2216
msiexec.exe
GET
200
172.64.149.23:80
http://ocsp.sectigo.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSdE3gf41WAic8Uh9lF92%2BIJqh5qwQUMuuSmv81lkgvKEBCcCA2kVwXheYCEDPXCKiRQFMZ4qW70zm5rW4%3D
unknown
whitelisted
2216
msiexec.exe
GET
200
172.64.149.23:80
http://ocsp.sectigo.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRd0JozUYXMqqW4y4zJTrLcMCRSkAQUgTKSQSsozUbIxKLGKjkS7EipPxQCEQCnqxy%2BEQDq95LX%2BOi9bTZe
unknown
whitelisted
5368
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
4424
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
3676
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6572
WerFault.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6572
WerFault.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4132
OfficeClickToRun.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
4940
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3976
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2796
slui.exe
40.91.76.224:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6012
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2432
slui.exe
40.91.76.224:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
5812
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5368
SearchApp.exe
131.253.33.254:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
3952
svchost.exe
239.255.255.250:1900
whitelisted
5368
SearchApp.exe
92.123.104.34:443
Akamai International B.V.
DE
unknown
4
System
192.168.100.255:138
whitelisted
104.18.38.233:80
ocsp.comodoca.com
CLOUDFLARENET
shared

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
  • 20.73.194.208
whitelisted
google.com
  • 142.250.181.238
whitelisted
ocsp.comodoca.com
  • 104.18.38.233
  • 172.64.149.23
whitelisted
ocsp.sectigo.com
  • 172.64.149.23
  • 104.18.38.233
whitelisted
fp-afd-nocache-ccp.azureedge.net
  • 13.107.246.60
whitelisted
login.live.com
  • 20.190.159.64
  • 20.190.159.4
  • 20.190.159.2
  • 20.190.159.73
  • 20.190.159.75
  • 20.190.159.68
  • 20.190.159.71
  • 20.190.159.23
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
client.wns.windows.com
  • 40.113.103.199
whitelisted
fd.api.iris.microsoft.com
  • 20.223.35.26
whitelisted
th.bing.com
  • 92.123.104.14
  • 92.123.104.12
  • 92.123.104.66
  • 92.123.104.9
  • 92.123.104.4
  • 92.123.104.10
  • 92.123.104.67
  • 92.123.104.8
  • 92.123.104.7
  • 2.23.209.191
  • 2.23.209.143
  • 2.23.209.142
  • 2.23.209.139
  • 2.23.209.130
  • 2.23.209.192
  • 2.23.209.153
  • 2.23.209.140
  • 2.23.209.136
whitelisted

Threats

No threats detected
Process
Message
msiexec.exe
2024-07-29 09:20:33 registry major version: 10
msiexec.exe
2024-07-29 09:20:33 registry minor version: 0
msiexec.exe
2024-07-29 09:20:33 registry build number: 19045
msiexec.exe
2024-07-29 09:20:33 VersionNT is set to: 1000
msiexec.exe
2024-07-29 09:20:33 DetectPrinters dll started
msiexec.exe
2024-07-29 09:20:33 SetVersionNT - start
msiexec.exe
2024-07-29 09:20:33 ReadProcessIdVariable - CustomActionData:
msiexec.exe
2024-07-29 09:20:33 VersionNT64 is set to: 1000
msiexec.exe
2024-07-29 09:20:33 SetVersionNT - end
msiexec.exe
2024-07-29 09:20:50 DetectPrinters dll started