File name:

2e33f42df7869fe19967ae9839d9346a976b13213e68e80a8611d71c864d8ba9.zip

Full analysis: https://app.any.run/tasks/ecabcb31-f497-446b-a988-875eeeba1dec
Verdict: Malicious activity
Analysis date: February 16, 2025, 20:24:37
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
Indicators:
MIME: application/zip
File info: Zip archive data, at least v5.1 to extract, compression method=AES Encrypted
MD5:

68A7B10704B51F65F1107A8799C7D670

SHA1:

F14F41F5A836F404122B4692504FA834B014A90F

SHA256:

14BD85C5613C71E49AAC825CF1EC0269F91784A9E395E8D94CC7D26CDA34FFA8

SSDEEP:

786432:MFd2I7vobNN2CFPjAr5NncfZfNQhtzeiZoYmDQ:MFsI7vobr28jAr5tcFNQhUiyYmDQ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 1512)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 1512)
      • 2e33f42df7869fe19967ae9839d9346a976b13213e68e80a8611d71c864d8ba9.exe (PID: 1228)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • 2e33f42df7869fe19967ae9839d9346a976b13213e68e80a8611d71c864d8ba9.exe (PID: 1228)
    • The process creates files with name similar to system file names

      • 2e33f42df7869fe19967ae9839d9346a976b13213e68e80a8611d71c864d8ba9.exe (PID: 1228)
    • Executable content was dropped or overwritten

      • 2e33f42df7869fe19967ae9839d9346a976b13213e68e80a8611d71c864d8ba9.exe (PID: 1228)
    • Drops 7-zip archiver for unpacking

      • 2e33f42df7869fe19967ae9839d9346a976b13213e68e80a8611d71c864d8ba9.exe (PID: 1228)
    • Get information on the list of running processes

      • 2e33f42df7869fe19967ae9839d9346a976b13213e68e80a8611d71c864d8ba9.exe (PID: 1228)
      • cmd.exe (PID: 3696)
    • Starts CMD.EXE for commands execution

      • 2e33f42df7869fe19967ae9839d9346a976b13213e68e80a8611d71c864d8ba9.exe (PID: 1228)
    • Process drops legitimate windows executable

      • 2e33f42df7869fe19967ae9839d9346a976b13213e68e80a8611d71c864d8ba9.exe (PID: 1228)
    • There is functionality for taking screenshot (YARA)

      • 2e33f42df7869fe19967ae9839d9346a976b13213e68e80a8611d71c864d8ba9.exe (PID: 1228)
    • Creates a software uninstall entry

      • 2e33f42df7869fe19967ae9839d9346a976b13213e68e80a8611d71c864d8ba9.exe (PID: 1228)
    • Application launched itself

      • Instant App Deploy.exe (PID: 2428)
  • INFO

    • Reads the computer name

      • 2e33f42df7869fe19967ae9839d9346a976b13213e68e80a8611d71c864d8ba9.exe (PID: 1228)
      • Instant App Deploy.exe (PID: 2428)
      • Instant App Deploy.exe (PID: 2200)
      • Instant App Deploy.exe (PID: 3032)
      • identity_helper.exe (PID: 7496)
    • Checks supported languages

      • 2e33f42df7869fe19967ae9839d9346a976b13213e68e80a8611d71c864d8ba9.exe (PID: 1228)
      • Instant App Deploy.exe (PID: 2428)
      • Instant App Deploy.exe (PID: 432)
      • Instant App Deploy.exe (PID: 2200)
      • Instant App Deploy.exe (PID: 3032)
      • Instant App Deploy.exe (PID: 4468)
      • identity_helper.exe (PID: 7496)
    • The sample compiled with english language support

      • 2e33f42df7869fe19967ae9839d9346a976b13213e68e80a8611d71c864d8ba9.exe (PID: 1228)
    • Create files in a temporary directory

      • 2e33f42df7869fe19967ae9839d9346a976b13213e68e80a8611d71c864d8ba9.exe (PID: 1228)
      • Instant App Deploy.exe (PID: 2428)
    • Creates files or folders in the user directory

      • 2e33f42df7869fe19967ae9839d9346a976b13213e68e80a8611d71c864d8ba9.exe (PID: 1228)
      • Instant App Deploy.exe (PID: 3032)
      • Instant App Deploy.exe (PID: 2428)
    • Manual execution by a user

      • Instant App Deploy.exe (PID: 2428)
      • msedge.exe (PID: 4908)
    • Process checks computer location settings

      • Instant App Deploy.exe (PID: 2428)
      • Instant App Deploy.exe (PID: 432)
      • Instant App Deploy.exe (PID: 4468)
    • Reads product name

      • Instant App Deploy.exe (PID: 2428)
    • Checks proxy server information

      • Instant App Deploy.exe (PID: 2428)
    • Reads the machine GUID from the registry

      • Instant App Deploy.exe (PID: 2428)
    • Reads Environment values

      • Instant App Deploy.exe (PID: 2428)
      • identity_helper.exe (PID: 7496)
    • Application launched itself

      • msedge.exe (PID: 4908)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 51
ZipBitFlag: 0x0003
ZipCompression: Unknown (99)
ZipModifyDate: 2025:02:16 20:23:50
ZipCRC: 0x7bd63545
ZipCompressedSize: 81708751
ZipUncompressedSize: 81859520
ZipFileName: 2e33f42df7869fe19967ae9839d9346a976b13213e68e80a8611d71c864d8ba9.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
182
Monitored processes
61
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe no specs 2e33f42df7869fe19967ae9839d9346a976b13213e68e80a8611d71c864d8ba9.exe cmd.exe no specs conhost.exe no specs tasklist.exe no specs find.exe no specs instant app deploy.exe no specs instant app deploy.exe no specs instant app deploy.exe instant app deploy.exe no specs instant app deploy.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
236"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=4872 --field-trial-handle=2452,i,11525307760223030094,12991848126235294980,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
432"C:\Users\admin\AppData\Local\Programs\InstantAppDeploy\Instant App Deploy.exe" --type=renderer --user-data-dir="C:\Users\admin\AppData\Roaming\InstantAppDeploy" --app-path="C:\Users\admin\AppData\Local\Programs\InstantAppDeploy\resources\app.asar" --enable-sandbox --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=4 --field-trial-handle=2584,i,3910922880775103414,3285254522777538866,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=2580 /prefetch:1C:\Users\admin\AppData\Local\Programs\InstantAppDeploy\Instant App Deploy.exeInstant App Deploy.exe
User:
admin
Company:
GitHub, Inc.
Integrity Level:
LOW
Description:
Instant App Deploy
Exit code:
0
Version:
2.1.0
Modules
Images
c:\users\admin\appdata\local\programs\instantappdeploy\instant app deploy.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ws2_32.dll
1228"C:\Users\admin\AppData\Local\Temp\Rar$EXb1512.33138\2e33f42df7869fe19967ae9839d9346a976b13213e68e80a8611d71c864d8ba9.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb1512.33138\2e33f42df7869fe19967ae9839d9346a976b13213e68e80a8611d71c864d8ba9.exe
WinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
2.1.0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb1512.33138\2e33f42df7869fe19967ae9839d9346a976b13213e68e80a8611d71c864d8ba9.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
1512"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\2e33f42df7869fe19967ae9839d9346a976b13213e68e80a8611d71c864d8ba9.zipC:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
1580"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5880 --field-trial-handle=2452,i,11525307760223030094,12991848126235294980,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1876"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5992 --field-trial-handle=2452,i,11525307760223030094,12991848126235294980,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2072"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6216 --field-trial-handle=2452,i,11525307760223030094,12991848126235294980,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2200"C:\Users\admin\AppData\Local\Programs\InstantAppDeploy\Instant App Deploy.exe" --type=gpu-process --user-data-dir="C:\Users\admin\AppData\Roaming\InstantAppDeploy" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1836,i,3910922880775103414,3285254522777538866,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=1828 /prefetch:2C:\Users\admin\AppData\Local\Programs\InstantAppDeploy\Instant App Deploy.exeInstant App Deploy.exe
User:
admin
Company:
GitHub, Inc.
Integrity Level:
LOW
Description:
Instant App Deploy
Version:
2.1.0
Modules
Images
c:\users\admin\appdata\local\programs\instantappdeploy\instant app deploy.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2424"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=41 --mojo-platform-channel-handle=7708 --field-trial-handle=2452,i,11525307760223030094,12991848126235294980,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2428"C:\Users\admin\AppData\Local\Programs\InstantAppDeploy\Instant App Deploy.exe" C:\Users\admin\AppData\Local\Programs\InstantAppDeploy\Instant App Deploy.exeexplorer.exe
User:
admin
Company:
GitHub, Inc.
Integrity Level:
MEDIUM
Description:
Instant App Deploy
Version:
2.1.0
Modules
Images
c:\users\admin\appdata\local\programs\instantappdeploy\instant app deploy.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
10 251
Read events
10 162
Write events
71
Delete events
18

Modification events

(PID) Process:(1512) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(1512) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(1512) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(1512) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\2e33f42df7869fe19967ae9839d9346a976b13213e68e80a8611d71c864d8ba9.zip
(PID) Process:(1512) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1512) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1512) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1512) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1512) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(1228) 2e33f42df7869fe19967ae9839d9346a976b13213e68e80a8611d71c864d8ba9.exeKey:HKEY_CURRENT_USER\SOFTWARE\c7062070-279b-58f2-9aed-9ae1f29f455c
Operation:writeName:InstallLocation
Value:
C:\Users\admin\AppData\Local\Programs\InstantAppDeploy
Executable files
63
Suspicious files
904
Text files
90
Unknown types
0

Dropped files

PID
Process
Filename
Type
1512WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb1512.33138\2e33f42df7869fe19967ae9839d9346a976b13213e68e80a8611d71c864d8ba9.exe
MD5:
SHA256:
12282e33f42df7869fe19967ae9839d9346a976b13213e68e80a8611d71c864d8ba9.exeC:\Users\admin\AppData\Local\Temp\nsnF800.tmp\app-64.7z
MD5:
SHA256:
12282e33f42df7869fe19967ae9839d9346a976b13213e68e80a8611d71c864d8ba9.exeC:\Users\admin\AppData\Local\Temp\nsnF800.tmp\7z-out\icudtl.dat
MD5:
SHA256:
12282e33f42df7869fe19967ae9839d9346a976b13213e68e80a8611d71c864d8ba9.exeC:\Users\admin\AppData\Local\Temp\nsnF800.tmp\7z-out\LICENSES.chromium.html
MD5:
SHA256:
12282e33f42df7869fe19967ae9839d9346a976b13213e68e80a8611d71c864d8ba9.exeC:\Users\admin\AppData\Local\Temp\nsnF800.tmp\System.dllexecutable
MD5:0D7AD4F45DC6F5AA87F606D0331C6901
SHA256:3EB38AE99653A7DBC724132EE240F6E5C4AF4BFE7C01D31D23FAF373F9F2EACA
12282e33f42df7869fe19967ae9839d9346a976b13213e68e80a8611d71c864d8ba9.exeC:\Users\admin\AppData\Local\Temp\nsnF800.tmp\nsExec.dllexecutable
MD5:EC0504E6B8A11D5AAD43B296BEEB84B2
SHA256:5D9CEB1CE5F35AEA5F9E5A0C0EDEEEC04DFEFE0C77890C80C70E98209B58B962
12282e33f42df7869fe19967ae9839d9346a976b13213e68e80a8611d71c864d8ba9.exeC:\Users\admin\AppData\Local\Temp\nsnF800.tmp\StdUtils.dllexecutable
MD5:C6A6E03F77C313B267498515488C5740
SHA256:B72E9013A6204E9F01076DC38DABBF30870D44DFC66962ADBF73619D4331601E
12282e33f42df7869fe19967ae9839d9346a976b13213e68e80a8611d71c864d8ba9.exeC:\Users\admin\AppData\Local\Temp\nsnF800.tmp\7z-out\locales\bg.pakbinary
MD5:D9D3B4D420BE9277D69584A3C0B5080A
SHA256:F08DE6909FAF88465C28388AA03FDF08E165866A5A23C738ED33382275C4EC83
12282e33f42df7869fe19967ae9839d9346a976b13213e68e80a8611d71c864d8ba9.exeC:\Users\admin\AppData\Local\Temp\nsnF800.tmp\7z-out\locales\am.pakbinary
MD5:873548BF4AB0FEADF7C83068036377CA
SHA256:8F46CCB4459B50FE06C4F825DD42C4D458DCC05DF9631FDFB9D5A0926038246E
12282e33f42df7869fe19967ae9839d9346a976b13213e68e80a8611d71c864d8ba9.exeC:\Users\admin\AppData\Local\Temp\nsnF800.tmp\7z-out\LICENSE.electron.txttext
MD5:4D42118D35941E0F664DDDBD83F633C5
SHA256:5154E165BD6C2CC0CFBCD8916498C7ABAB0497923BAFCD5CB07673FE8480087D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
206
DNS requests
157
Threats
125

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1016
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1016
svchost.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.54.109.203:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
5588
backgroundTaskHost.exe
GET
200
23.54.109.203:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
2624
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2624
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
1176
svchost.exe
GET
200
23.54.109.203:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
104.126.37.176:443
www.bing.com
Akamai International B.V.
DE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1016
svchost.exe
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1016
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
104.126.37.154:443
www.bing.com
Akamai International B.V.
DE
whitelisted
23.54.109.203:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
www.bing.com
  • 104.126.37.176
  • 104.126.37.154
  • 104.126.37.163
  • 104.126.37.153
  • 104.126.37.160
  • 104.126.37.178
  • 104.126.37.186
  • 104.126.37.185
  • 104.126.37.145
  • 92.123.104.32
  • 92.123.104.38
  • 92.123.104.34
  • 2.21.22.131
  • 2.21.22.144
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
google.com
  • 142.250.181.238
whitelisted
crl.microsoft.com
  • 23.53.40.178
  • 23.53.40.176
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 2.20.102.93
whitelisted
ocsp.digicert.com
  • 23.54.109.203
whitelisted
login.live.com
  • 20.190.159.131
  • 20.190.159.68
  • 40.126.31.131
  • 20.190.159.64
  • 20.190.159.4
  • 40.126.31.129
  • 40.126.31.1
  • 20.190.159.75
  • 20.190.159.71
  • 20.190.159.130
  • 20.190.159.0
  • 40.126.31.3
  • 40.126.31.128
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

PID
Process
Class
Message
6300
msedge.exe
Misc activity
ET FILE_SHARING File Sharing Related Domain in DNS Lookup (wormhole .app)
6300
msedge.exe
Misc activity
ET FILE_SHARING File Sharing Related Domain in DNS Lookup (wormhole .app)
6300
msedge.exe
Misc activity
ET FILE_SHARING File Sharing Related Domain in DNS Lookup (wormhole .app)
6300
msedge.exe
Misc activity
ET FILE_SHARING File Sharing Related Domain in DNS Lookup (wormhole .app)
6300
msedge.exe
Misc activity
ET FILE_SHARING File Sharing Domain Observed in TLS SNI (wormhole .app)
6300
msedge.exe
Misc activity
ET INFO Session Traversal Utilities for NAT (STUN Binding Request On Non-Standard Low Port)
6300
msedge.exe
Misc activity
ET INFO Session Traversal Utilities for NAT (STUN Binding Request On Non-Standard Low Port)
6300
msedge.exe
Misc activity
ET INFO Session Traversal Utilities for NAT (STUN Binding Request On Non-Standard Low Port)
6300
msedge.exe
Misc activity
ET INFO Session Traversal Utilities for NAT (STUN Binding Request On Non-Standard Low Port)
6300
msedge.exe
Generic Protocol Command Decode
SURICATA QUIC error on data
No debug info