File name:

Manifest_NonUFSFiles_Win64.txt

Full analysis: https://app.any.run/tasks/2e4e47fc-38b8-4b28-a486-0e3d77a9576f
Verdict: Malicious activity
Analysis date: April 28, 2025, 12:33:23
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: text/plain
File info: ASCII text, with CRLF line terminators
MD5:

36E5F538B08726749619678ADC7D8109

SHA1:

C3A02679DB6441439FBBC765D5E062E40626FA58

SHA256:

C317E27E8D7C0A5B77EE800707767F3462F0950ADAE910AF810CCCCA6748AF37

SSDEEP:

48:saeMrSNVai9urO3aPskB00Q6+lcehChclVE:HLrfi9EO3aUkB00QdWehChMi

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • UE4PrereqSetup_x64.exe (PID: 4892)
      • UE4PrereqSetup_x64.exe (PID: 1660)
      • DXSETUP.exe (PID: 1568)
      • infinst.exe (PID: 2092)
      • infinst.exe (PID: 3896)
      • infinst.exe (PID: 7924)
      • infinst.exe (PID: 2644)
      • infinst.exe (PID: 5680)
      • infinst.exe (PID: 1276)
      • infinst.exe (PID: 7372)
      • infinst.exe (PID: 744)
    • Registers / Runs the DLL via REGSVR32.EXE

      • DXSETUP.exe (PID: 1568)
  • SUSPICIOUS

    • Searches for installed software

      • UE4PrereqSetup_x64.exe (PID: 4892)
      • dllhost.exe (PID: 1056)
    • Reads security settings of Internet Explorer

      • UE4PrereqSetup_x64.exe (PID: 4892)
    • Executable content was dropped or overwritten

      • UE4PrereqSetup_x64.exe (PID: 4892)
      • vcredist_x86.exe (PID: 7976)
      • vcredist_x86.exe (PID: 8024)
      • vcredist_x64.exe (PID: 7796)
      • vcredist_x64.exe (PID: 7896)
      • UE4PrereqSetup_x64.exe (PID: 1660)
      • rundll32.exe (PID: 6512)
      • DXSETUP.exe (PID: 1568)
      • infinst.exe (PID: 2092)
      • infinst.exe (PID: 3896)
      • infinst.exe (PID: 7924)
      • infinst.exe (PID: 744)
      • infinst.exe (PID: 2644)
      • infinst.exe (PID: 7372)
      • infinst.exe (PID: 1276)
      • infinst.exe (PID: 5680)
    • Executes as Windows Service

      • VSSVC.exe (PID: 1188)
    • There is functionality for taking screenshot (YARA)

      • UE4PrereqSetup_x64.exe (PID: 4892)
      • UE4PrereqSetup_x64.exe (PID: 1660)
    • Process drops legitimate windows executable

      • UE4PrereqSetup_x64.exe (PID: 4892)
      • UE4PrereqSetup_x64.exe (PID: 1660)
      • vcredist_x86.exe (PID: 7976)
      • vcredist_x64.exe (PID: 7896)
      • msiexec.exe (PID: 8096)
      • infinst.exe (PID: 2092)
      • DXSETUP.exe (PID: 1568)
      • infinst.exe (PID: 3896)
      • infinst.exe (PID: 7924)
      • infinst.exe (PID: 744)
      • infinst.exe (PID: 2644)
      • infinst.exe (PID: 5680)
      • infinst.exe (PID: 1276)
      • infinst.exe (PID: 7372)
    • Starts a Microsoft application from unusual location

      • vcredist_x86.exe (PID: 8024)
      • vcredist_x64.exe (PID: 7796)
    • The process drops C-runtime libraries

      • msiexec.exe (PID: 8096)
    • Application launched itself

      • msiexec.exe (PID: 8096)
    • Uses RUNDLL32.EXE to load library

      • msiexec.exe (PID: 4944)
  • INFO

    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 7560)
    • Reads the software policy settings

      • slui.exe (PID: 7712)
    • Manual execution by a user

      • UE4PrereqSetup_x64.exe (PID: 4892)
      • TNAF_ND.exe (PID: 7536)
      • TNAF_ND.exe (PID: 5364)
      • TNAF_ND.exe (PID: 1244)
      • TNAF_ND.exe (PID: 3992)
      • TNAF_ND.exe (PID: 2108)
    • The sample compiled with english language support

      • UE4PrereqSetup_x64.exe (PID: 4892)
      • UE4PrereqSetup_x64.exe (PID: 1660)
      • vcredist_x64.exe (PID: 7896)
      • vcredist_x86.exe (PID: 7976)
      • vcredist_x86.exe (PID: 8024)
      • vcredist_x64.exe (PID: 7796)
      • msiexec.exe (PID: 8096)
      • DXSETUP.exe (PID: 1568)
      • infinst.exe (PID: 2092)
      • infinst.exe (PID: 3896)
      • infinst.exe (PID: 7924)
      • rundll32.exe (PID: 6512)
      • infinst.exe (PID: 744)
      • infinst.exe (PID: 2644)
      • infinst.exe (PID: 1276)
      • infinst.exe (PID: 5680)
      • infinst.exe (PID: 7372)
    • Reads the computer name

      • UE4PrereqSetup_x64.exe (PID: 4892)
      • UE4PrereqSetup_x64.exe (PID: 1660)
    • Checks supported languages

      • UE4PrereqSetup_x64.exe (PID: 4892)
      • UE4PrereqSetup_x64.exe (PID: 1660)
    • Process checks computer location settings

      • UE4PrereqSetup_x64.exe (PID: 4892)
    • Create files in a temporary directory

      • UE4PrereqSetup_x64.exe (PID: 4892)
    • Manages system restore points

      • SrTasks.exe (PID: 7752)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 8096)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
171
Monitored processes
33
Malicious processes
15
Suspicious processes
0

Behavior graph

Click at the process to see the details
start notepad.exe no specs sppextcomobj.exe no specs slui.exe slui.exe ue4prereqsetup_x64.exe ue4prereqsetup_x64.exe SPPSurrogate no specs vssvc.exe no specs srtasks.exe no specs conhost.exe no specs vcredist_x86.exe vcredist_x86.exe vcredist_x64.exe vcredist_x64.exe msiexec.exe msiexec.exe no specs rundll32.exe dxsetup.exe SPPSurrogate no specs infinst.exe infinst.exe infinst.exe infinst.exe infinst.exe infinst.exe infinst.exe infinst.exe regsvr32.exe no specs tnaf_nd.exe no specs tnaf_nd.exe tnaf_nd.exe no specs tnaf_nd.exe no specs tnaf_nd.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
744C:\Users\admin\AppData\Local\Temp\DX6DA6.tmp\infinst.exe d3dx10_43_x64.infC:\Users\admin\AppData\Local\Temp\DX6DA6.tmp\infinst.exe
DXSETUP.exe
User:
SYSTEM
Integrity Level:
SYSTEM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\dx6da6.tmp\infinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
1056C:\WINDOWS\system32\DllHost.exe /Processid:{F32D97DF-E3E5-4CB9-9E3E-0EB5B4E49801}C:\Windows\System32\dllhost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
1188C:\WINDOWS\system32\vssvc.exeC:\Windows\System32\VSSVC.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1244"C:\Users\admin\Desktop\TNAF_ND.exe" C:\Users\admin\Desktop\TNAF_ND.exeexplorer.exe
User:
admin
Company:
Epic Games, Inc.
Integrity Level:
MEDIUM
Description:
BootstrapPackagedGame
Exit code:
9005
Modules
Images
c:\users\admin\desktop\tnaf_nd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
1276C:\Users\admin\AppData\Local\Temp\DX6DA6.tmp\infinst.exe D3DCompiler_43_x64.infC:\Users\admin\AppData\Local\Temp\DX6DA6.tmp\infinst.exe
DXSETUP.exe
User:
SYSTEM
Integrity Level:
SYSTEM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\dx6da6.tmp\infinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
1568"C:\WINDOWS\Installer\MSI67AC.tmp-\DXSetup.exe" /silentC:\Windows\Installer\MSI67AC.tmp-\DXSETUP.exe
rundll32.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft DirectX Setup
Exit code:
0
Version:
4.9.0.0904
Modules
Images
c:\windows\installer\msi67ac.tmp-\dxsetup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
1660"C:\Users\admin\AppData\Local\Temp\{0d995f46-317b-4b5f-bf3e-9f98bae9d339}\.be\UE4PrereqSetup_x64.exe" -q -burn.elevated BurnPipe.{D5F4F225-000A-4581-BB83-10698A028F02} {F675368C-8863-40F7-96B5-4BEDECC252B0} 4892C:\Users\admin\AppData\Local\Temp\{0d995f46-317b-4b5f-bf3e-9f98bae9d339}\.be\UE4PrereqSetup_x64.exe
UE4PrereqSetup_x64.exe
User:
admin
Company:
Epic Games, Inc.
Integrity Level:
HIGH
Description:
UE4 Prerequisites (x64)
Exit code:
0
Version:
1.0.14.0
Modules
Images
c:\users\admin\appdata\local\temp\{0d995f46-317b-4b5f-bf3e-9f98bae9d339}\.be\ue4prereqsetup_x64.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
2092C:\Users\admin\AppData\Local\Temp\DX6DA6.tmp\infinst.exe xinput1_3_x64.inf, Install_DriverC:\Users\admin\AppData\Local\Temp\DX6DA6.tmp\infinst.exe
DXSETUP.exe
User:
SYSTEM
Integrity Level:
SYSTEM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\dx6da6.tmp\infinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
2108"C:\Users\admin\Desktop\TNAF_ND.exe" C:\Users\admin\Desktop\TNAF_ND.exeexplorer.exe
User:
admin
Company:
Epic Games, Inc.
Integrity Level:
MEDIUM
Description:
BootstrapPackagedGame
Exit code:
9005
Modules
Images
c:\users\admin\desktop\tnaf_nd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
2644C:\Users\admin\AppData\Local\Temp\DX6DA6.tmp\infinst.exe d3dx11_43_x64.infC:\Users\admin\AppData\Local\Temp\DX6DA6.tmp\infinst.exe
DXSETUP.exe
User:
SYSTEM
Integrity Level:
SYSTEM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\dx6da6.tmp\infinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
16 454
Read events
15 972
Write events
448
Delete events
34

Modification events

(PID) Process:(1660) UE4PrereqSetup_x64.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
4000000000000000E4A8FBF339B8DB017C060000F0100000D5070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1056) dllhost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Enter)
Value:
4800000000000000E4A8FBF339B8DB012004000080180000D20700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1056) dllhost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Leave)
Value:
4800000000000000A7713EF439B8DB012004000080180000D20700000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1056) dllhost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Enter)
Value:
4800000000000000A7713EF439B8DB012004000080180000D10700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1056) dllhost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Leave)
Value:
480000000000000047D540F439B8DB012004000080180000D10700000100000000000000010000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1056) dllhost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
4800000000000000049D45F439B8DB012004000080180000D00700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1056) dllhost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
Operation:writeName:LastIndex
Value:
11
(PID) Process:(1056) dllhost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGatherWriterMetadata (Enter)
Value:
48000000000000000DC9BCF439B8DB012004000080180000D30700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1056) dllhost.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssapiPublisher
Operation:writeName:IDENTIFY (Enter)
Value:
48000000000000009A2DBFF439B8DB0120040000A8020000E80300000100000000000000000000002DB2F63B1847F5408A19AAAB3F2CE00700000000000000000000000000000000
(PID) Process:(1188) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer
Operation:writeName:IDENTIFY (Leave)
Value:
4800000000000000C09FD4F439B8DB01A404000064180000E80300000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000
Executable files
88
Suspicious files
129
Text files
78
Unknown types
0

Dropped files

PID
Process
Filename
Type
1056dllhost.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
4892UE4PrereqSetup_x64.exeC:\Users\admin\AppData\Local\Temp\{0d995f46-317b-4b5f-bf3e-9f98bae9d339}\PrereqSetup
MD5:
SHA256:
4892UE4PrereqSetup_x64.exeC:\Users\admin\AppData\Local\Temp\{0d995f46-317b-4b5f-bf3e-9f98bae9d339}\.ba1\Banner.bmpimage
MD5:461FA4877514F318A0D5CBC602DAF7DF
SHA256:638D5BFC987B45D28A308E8A4D68BD7C0A82D21E615E534FBFAA3CD0AD53889E
4892UE4PrereqSetup_x64.exeC:\Users\admin\AppData\Local\Temp\{0d995f46-317b-4b5f-bf3e-9f98bae9d339}\.ba1\LogoSide.pngimage
MD5:63C9775D703EC8BDC9703F80D52FFC24
SHA256:8F03C6E8CE5F4898CC230E04D485E0E0744EB7EE180A3D8BB154F2FC9C7A93E5
4892UE4PrereqSetup_x64.exeC:\Users\admin\AppData\Local\Temp\{0d995f46-317b-4b5f-bf3e-9f98bae9d339}\.ba1\thm.xmlxml
MD5:002167DD020013C2814485A91E9AC1BA
SHA256:5046116159F25D0DCF96FB3EDF486A8630F240C8D5578910636CD702970B1BD0
4892UE4PrereqSetup_x64.exeC:\Users\admin\AppData\Local\Temp\{0d995f46-317b-4b5f-bf3e-9f98bae9d339}\VC140_X86executable
MD5:24E8177B25C072F4FB0D37496CCDBB34
SHA256:E59AE3E886BD4571A811FE31A47959AE5C40D87C583F786816C60440252CD7EC
4892UE4PrereqSetup_x64.exeC:\Users\admin\AppData\Local\Temp\{0d995f46-317b-4b5f-bf3e-9f98bae9d339}\.ba1\license.rtftext
MD5:37EC54C5DA383498C2662742AF83F502
SHA256:71BB04E77BFDAECA81AEBEF50B7862EACEB7A18816B3C6D7FB81AB1928E84AC7
1056dllhost.exeC:\System Volume Information\SPP\snapshot-2binary
MD5:8CC82C76C953D195FF77D8937A1186B9
SHA256:84EDEE1EDF1AD894E41C8AE0099A0E58701DC144CEF9755B7C3D4D6E253A2160
4892UE4PrereqSetup_x64.exeC:\Users\admin\AppData\Local\Temp\{0d995f46-317b-4b5f-bf3e-9f98bae9d339}\.ba1\BootstrapperApplicationData.xmlxml
MD5:0F62A5FADF01C56B6E7DF5301E54EBD4
SHA256:8493DF9FCBFFCF666777EFA7A94F59219F88E914324866FC5FD5F7C5B145D7A0
4892UE4PrereqSetup_x64.exeC:\Users\admin\AppData\Local\Temp\{0d995f46-317b-4b5f-bf3e-9f98bae9d339}\.be\UE4PrereqSetup_x64.exeexecutable
MD5:DDF7B1641565DA963C4B5FA54DA0C6FB
SHA256:62182DA08E543EDB383BE4CCCBA214E30F1DCD73395F461AF3A142A69893F254
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
25
TCP/UDP connections
44
DNS requests
29
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
2.16.168.119:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.16.168.119:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2104
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7408
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7408
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
1660
UE4PrereqSetup_x64.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1660
UE4PrereqSetup_x64.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
5496
MoUsoCoreWorker.exe
2.16.168.119:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
2.16.168.119:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
5496
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
2104
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.3:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.110
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 2.16.168.119
  • 2.16.168.114
  • 2.16.164.49
  • 2.16.164.120
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 23.35.229.160
whitelisted
client.wns.windows.com
  • 172.211.123.248
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.160.3
  • 20.190.160.14
  • 20.190.160.5
  • 40.126.32.76
  • 20.190.160.131
  • 40.126.32.133
  • 40.126.32.140
  • 40.126.32.138
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info