File name:

twe.rar

Full analysis: https://app.any.run/tasks/ea2b5f69-d6b4-4838-a3a3-b7cfa891a934
Verdict: Malicious activity
Analysis date: August 11, 2024, 17:18:47
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

1DD147AD10AC9B591098E9122EA55766

SHA1:

53B2D5C0C5327E2F514B74902B8761080E6DA494

SHA256:

20727D0AEF43FA0EA2715227470F23C2A681BCCDD5EE836393D035A5D0CF2F0B

SSDEEP:

98304:KDtBQn41HmcgKk+2OE+1NY6isE7S/CRu0wQ4Xx9aQXKCo7VqVKmcjH52GhwbOBr3:djNHjX6pIDdGlEFXcmTZNpbT

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • msiexec.exe (PID: 6628)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 6392)
      • msiexec.exe (PID: 6628)
    • Checks for Java to be installed

      • hf.exe (PID: 5048)
      • msiexec.exe (PID: 6628)
      • installer.exe (PID: 6160)
      • ssvagent.exe (PID: 4020)
      • jp2launcher.exe (PID: 5328)
      • msiexec.exe (PID: 6196)
      • hf.exe (PID: 4024)
      • javaw.exe (PID: 6888)
      • jp2launcher.exe (PID: 236)
    • Reads security settings of Internet Explorer

      • hf.exe (PID: 5048)
      • installer.exe (PID: 6160)
      • jp2launcher.exe (PID: 236)
      • jp2launcher.exe (PID: 5328)
      • hf.exe (PID: 4024)
    • Checks Windows Trust Settings

      • hf.exe (PID: 5048)
      • hf.exe (PID: 4024)
      • msiexec.exe (PID: 6628)
    • Reads Internet Explorer settings

      • hf.exe (PID: 5048)
      • hf.exe (PID: 4024)
    • Reads Microsoft Outlook installation path

      • hf.exe (PID: 5048)
      • hf.exe (PID: 4024)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 6628)
    • Drops the executable file immediately after the start

      • msiexec.exe (PID: 6628)
      • installer.exe (PID: 6160)
      • hf.exe (PID: 4024)
    • Reads Mozilla Firefox installation path

      • MSIB77B.tmp (PID: 6556)
      • installer.exe (PID: 6160)
    • The process drops C-runtime libraries

      • msiexec.exe (PID: 6628)
    • Executable content was dropped or overwritten

      • installer.exe (PID: 6160)
      • hf.exe (PID: 4024)
    • Creates/Modifies COM task schedule object

      • ssvagent.exe (PID: 4020)
      • installer.exe (PID: 6160)
  • INFO

    • Manual execution by a user

      • hf.exe (PID: 5944)
      • hf.exe (PID: 420)
      • hf.exe (PID: 6208)
      • hf.exe (PID: 2524)
      • BRATS V4.2.exe (PID: 7120)
    • Checks supported languages

      • hf.exe (PID: 5048)
      • hf.exe (PID: 420)
      • MSIB77B.tmp (PID: 6556)
      • jaureg.exe (PID: 2852)
      • msiexec.exe (PID: 5484)
      • msiexec.exe (PID: 5292)
      • hf.exe (PID: 6208)
      • hf.exe (PID: 4024)
      • msiexec.exe (PID: 6628)
      • installer.exe (PID: 6160)
      • msiexec.exe (PID: 6632)
      • javaw.exe (PID: 4780)
      • ssvagent.exe (PID: 4020)
      • javaws.exe (PID: 2876)
      • javaws.exe (PID: 4592)
      • jp2launcher.exe (PID: 236)
      • jp2launcher.exe (PID: 5328)
      • msiexec.exe (PID: 6196)
      • javaw.exe (PID: 6888)
      • javaw.exe (PID: 6200)
      • msiexec.exe (PID: 4344)
      • msiexec.exe (PID: 6744)
      • BRATS V4.2.exe (PID: 7120)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6392)
      • msiexec.exe (PID: 6628)
    • Create files in a temporary directory

      • hf.exe (PID: 420)
      • MSIB77B.tmp (PID: 6556)
      • hf.exe (PID: 6208)
      • javaw.exe (PID: 4780)
      • jp2launcher.exe (PID: 236)
      • jp2launcher.exe (PID: 5328)
    • Creates files or folders in the user directory

      • hf.exe (PID: 5048)
      • hf.exe (PID: 4024)
      • msiexec.exe (PID: 6628)
      • jp2launcher.exe (PID: 236)
    • Checks proxy server information

      • hf.exe (PID: 5048)
      • hf.exe (PID: 4024)
      • jp2launcher.exe (PID: 236)
      • jp2launcher.exe (PID: 5328)
    • Reads the computer name

      • hf.exe (PID: 420)
      • hf.exe (PID: 5048)
      • msiexec.exe (PID: 6628)
      • MSIB77B.tmp (PID: 6556)
      • msiexec.exe (PID: 5484)
      • msiexec.exe (PID: 5292)
      • hf.exe (PID: 6208)
      • hf.exe (PID: 4024)
      • msiexec.exe (PID: 6632)
      • installer.exe (PID: 6160)
      • jp2launcher.exe (PID: 236)
      • javaws.exe (PID: 2876)
      • javaws.exe (PID: 4592)
      • jp2launcher.exe (PID: 5328)
      • msiexec.exe (PID: 6196)
      • javaw.exe (PID: 6200)
      • msiexec.exe (PID: 4344)
      • BRATS V4.2.exe (PID: 7120)
      • msiexec.exe (PID: 6744)
      • javaw.exe (PID: 6888)
    • Reads Environment values

      • hf.exe (PID: 5048)
      • hf.exe (PID: 4024)
    • Reads the machine GUID from the registry

      • hf.exe (PID: 5048)
      • hf.exe (PID: 4024)
      • msiexec.exe (PID: 6628)
    • Process checks Internet Explorer phishing filters

      • hf.exe (PID: 5048)
      • hf.exe (PID: 4024)
    • Reads the software policy settings

      • hf.exe (PID: 5048)
      • hf.exe (PID: 4024)
      • msiexec.exe (PID: 6628)
    • Reads CPU info

      • msiexec.exe (PID: 6628)
    • Application launched itself

      • msiexec.exe (PID: 6628)
    • Creates files in the program directory

      • installer.exe (PID: 6160)
      • javaw.exe (PID: 4780)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 6628)
    • Reads Microsoft Office registry keys

      • installer.exe (PID: 6160)
    • Starts application with an unusual extension

      • msiexec.exe (PID: 6628)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
166
Monitored processes
28
Malicious processes
7
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe hf.exe no specs hf.exe hf.exe msiexec.exe msib77b.tmp no specs jaureg.exe conhost.exe no specs msiexec.exe no specs msiexec.exe no specs msiexec.exe no specs hf.exe no specs hf.exe hf.exe msiexec.exe no specs installer.exe javaw.exe ssvagent.exe no specs javaws.exe jp2launcher.exe no specs javaws.exe jp2launcher.exe no specs msiexec.exe no specs javaw.exe no specs javaw.exe no specs brats v4.2.exe no specs msiexec.exe no specs msiexec.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
236"C:\Program Files\Java\jre1.8.0_421\bin\jp2launcher.exe" -secure -javaws -jre "C:\Program Files\Java\jre1.8.0_421" -vma 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 -ma LXdhaXQALWZpeAAtcGVybWlzc2lvbnMALXNpbGVudAAtbm90V2ViSmF2YQ==C:\Program Files\Java\jre1.8.0_421\bin\jp2launcher.exejavaws.exe
User:
SYSTEM
Company:
Oracle Corporation
Integrity Level:
SYSTEM
Description:
Java(TM) Web Launcher
Exit code:
0
Version:
11.421.2.09
Modules
Images
c:\program files\java\jre1.8.0_421\bin\jp2launcher.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\program files\java\jre1.8.0_421\bin\msvcp140.dll
c:\windows\system32\gdi32full.dll
420"C:\Users\admin\Desktop\hf.exe" C:\Users\admin\Desktop\hf.exe
explorer.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
HIGH
Description:
Java Platform SE binary
Exit code:
0
Version:
8.0.4210.9
Modules
Images
c:\users\admin\desktop\hf.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1116"C:\Windows\SysWOW64\msiexec.exe" /x {4A03706F-666A-4037-7777-5F2748764D10} /qnC:\Windows\SysWOW64\msiexec.exejaureg.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
2524"C:\Users\admin\Desktop\hf.exe" C:\Users\admin\Desktop\hf.exeexplorer.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java Platform SE binary
Exit code:
3221226540
Version:
8.0.4210.9
Modules
Images
c:\users\admin\desktop\hf.exe
c:\windows\system32\ntdll.dll
2852"C:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe" -u auto-updateC:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe
MSIB77B.tmp
User:
SYSTEM
Company:
Oracle Corporation
Integrity Level:
SYSTEM
Description:
Java Update Registration
Exit code:
0
Version:
2.8.271.9
Modules
Images
c:\program files (x86)\common files\java\java update\jaureg.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ole32.dll
2876"C:\Program Files\Java\jre1.8.0_421\bin\javaws.exe" -wait -fix -permissions -silentC:\Program Files\Java\jre1.8.0_421\bin\javaws.exe
installer.exe
User:
SYSTEM
Company:
Oracle Corporation
Integrity Level:
SYSTEM
Description:
Java(TM) Web Start Launcher
Exit code:
0
Version:
11.421.2.09
Modules
Images
c:\program files\java\jre1.8.0_421\bin\javaws.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
4020"C:\Program Files\Java\jre1.8.0_421\bin\ssvagent.exe" -doHKCUSSVSetupC:\Program Files\Java\jre1.8.0_421\bin\ssvagent.exeinstaller.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
1
Version:
11.421.2.09
Modules
Images
c:\program files\java\jre1.8.0_421\bin\ssvagent.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
4024"C:\Users\admin\AppData\Local\Temp\jds1102515.tmp\hf.exe"C:\Users\admin\AppData\Local\Temp\jds1102515.tmp\hf.exe
hf.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
HIGH
Description:
Java Platform SE binary
Exit code:
0
Version:
8.0.4210.9
Modules
Images
c:\users\admin\appdata\local\temp\jds1102515.tmp\hf.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ole32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\combase.dll
c:\windows\system32\gdi32.dll
4088\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exejaureg.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4344C:\Windows\syswow64\MsiExec.exe -Embedding 12E3C53FB254EE530528FC4EE29AB902C:\Windows\SysWOW64\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
Total events
51 501
Read events
24 403
Write events
12 579
Delete events
14 519

Modification events

(PID) Process:(6392) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(6392) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(6392) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(6392) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\twe.rar
(PID) Process:(6392) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6392) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6392) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6392) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6392) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:writeName:0
Value:
C:\Users\admin\Desktop
(PID) Process:(5048) hf.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\JavaSoft
Operation:delete valueName:InstallStatus
Value:
Executable files
353
Suspicious files
138
Text files
288
Unknown types
9

Dropped files

PID
Process
Filename
Type
6392WinRAR.exeC:\Users\admin\Desktop\javaCompile\classAnalysis.binbinary
MD5:1B216A899DD7F48DEFF5CEB24AF3F61B
SHA256:48804FE180688CB7B4C47CAE62A4C2D63EBA1AD73D8D2FF3B5F60849ABD58C3D
6392WinRAR.exeC:\Users\admin\Desktop\kotlin\jvm\internal\IDxLambdaShape58S0000000_2_I1.smalitext
MD5:104DB889AC0063DEC3522591386F5F7B
SHA256:E859DFC71884323575BBFF171A8FA2928553E685367C32CACC2CB6E5AC4B3F0D
6392WinRAR.exeC:\Users\admin\Desktop\kotlin\jvm\internal\IDxLambdaShape56S0000000_2_I1.smalitext
MD5:B55146CDF09A05CE0B3DDC8CE909A52D
SHA256:459CEE5083DEDF7F0DC41EFD8450E9A3D0AFA5A884569D5969E1F0DC9EC2A2D0
6392WinRAR.exeC:\Users\admin\Desktop\Script Menu\Add Timecode to all Media.cstext
MD5:DCB8B90C1D24D0240ECEC7BDCC16BBA2
SHA256:3407D353A949E51CADEF8A3C267C60A9AB6B466DD9C79D859276403ECAA099E7
6392WinRAR.exeC:\Users\admin\Desktop\kotlin\jvm\internal\IDxLambdaShape57S0000000_2_I0.smalitext
MD5:0CA13DF7A21D6DE5B86980D08AA4B0A8
SHA256:B951CDD11A090AB69501A02A859CD8F8CD25E51CAD874A233A1D1D14E5BA0D63
6392WinRAR.exeC:\Users\admin\Desktop\net\minidev\json\writer\IDxAMapperShape60S0000000_2_I1.smalitext
MD5:7BC557B618495694D357FE376D39A1E1
SHA256:C9CB57532E97C5E415AF13111096ED78ED7D44CAF9B416348D9DEEA957CDB6A2
6392WinRAR.exeC:\Users\admin\Desktop\Script Menu\Export Closed Captioning for Windows Media Player.cstext
MD5:CA509764F8DF631916C1F217EBCAC041
SHA256:88772127DADA1FC24AE4DBFECF855F147069ECEB427D373A127472AC9A608978
6392WinRAR.exeC:\Users\admin\Desktop\kotlinx\coroutines\android\AndroidExceptionPreHandler.smalitext
MD5:9A44915E8C02FD3F1F921D5C107F2F0C
SHA256:50A3CDA915F896B5A4A9B8778B3AA2020839754B8F0CEC1A9CEA814B6C8FB528
6392WinRAR.exeC:\Users\admin\Desktop\Script Menu\Batch Render.cstext
MD5:37BBAA26CFAB8777C893846E5007F2CF
SHA256:7028211EC01FEFBA1DBD9A6820BA1B34C3C1E67F89EB09F3BEBE9264F04B9B86
6392WinRAR.exeC:\Users\admin\Desktop\Script Menu\Export Closed Captioning for RealPlayer.cstext
MD5:127616A26EB137C36A3AC44643DA957B
SHA256:2D7411904E0CE0132E8FDDFD711F4CFA0543DE3B659E45C6411899DD84AEC235
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
49
DNS requests
25
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6736
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
1928
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6784
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
5048
hf.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTk45WiKdPUwcMf8JgMC07ACYqr2AQUt2ui6qiqhIx56rTaD5iyxZV2ufQCEA2ypEAZl9ZmFI%2BR0FmZENI%3D
unknown
whitelisted
5048
hf.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbY2QTVWENG9oovp1QifsQ%3D
unknown
whitelisted
6628
msiexec.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT3xL4LQLXDRDM9P665TW442vrsUQQUReuir%2FSSy4IxLVGLp6chnfNtyA8CEA6bGI750C3n79tQ4ghAGFo%3D
unknown
whitelisted
6628
msiexec.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxXWRM3y5nP%2Be6mK4cD08CEAitQLJg0pxMn17Nqb2Trtk%3D
unknown
whitelisted
5336
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6628
msiexec.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSRXerF0eFeSWRripTgTkcJWMm7iQQUaDfg67Y7%2BF8Rhvv%2BYXsIiGX0TkICEAYOL4%2BeG4vlGNX%2BK2nPzLE%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5388
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
3888
svchost.exe
239.255.255.250:1900
whitelisted
5244
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2120
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
5388
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5336
SearchApp.exe
2.23.209.154:443
www.bing.com
Akamai International B.V.
GB
unknown
5336
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
1928
svchost.exe
40.126.32.72:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
  • 51.104.136.2
  • 51.124.78.146
whitelisted
google.com
  • 172.217.18.14
whitelisted
www.bing.com
  • 2.23.209.154
  • 2.23.209.158
  • 2.23.209.149
  • 2.23.209.143
  • 2.23.209.141
  • 2.23.209.150
  • 2.23.209.156
  • 2.23.209.135
  • 2.23.209.140
  • 95.100.146.35
  • 95.100.146.33
  • 95.100.146.25
  • 95.100.146.17
  • 95.100.146.40
  • 95.100.146.27
  • 95.100.146.19
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 40.126.32.72
  • 40.126.32.76
  • 20.190.160.20
  • 40.126.32.134
  • 40.126.32.138
  • 40.126.32.136
  • 40.126.32.74
  • 40.126.32.133
whitelisted
th.bing.com
  • 2.23.209.150
  • 2.23.209.160
  • 2.23.209.156
  • 2.23.209.140
  • 2.23.209.141
  • 2.23.209.158
  • 2.23.209.149
  • 2.23.209.154
  • 2.23.209.143
whitelisted
client.wns.windows.com
  • 40.113.103.199
whitelisted
fd.api.iris.microsoft.com
  • 20.223.35.26
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
slscr.update.microsoft.com
  • 40.68.123.157
whitelisted

Threats

No threats detected
No debug info