File name:

2b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exe

Full analysis: https://app.any.run/tasks/3120680f-798f-44ff-9ac3-98551c5fb8f0
Verdict: Malicious activity
Analysis date: July 05, 2024, 09:38:21
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32+ executable (GUI) x86-64, for MS Windows
MD5:

FCB1D3F10BAB0D68CB50FE8DBCE9DBE7

SHA1:

ACA74F1767843CBE1DBD7A5310409ACC9C1D68F5

SHA256:

2B15F9988D849C591FC1639F2BA9E8005E5B32635EE2922D0A56482B81561605

SSDEEP:

393216:pWpGpfZeRL2ccU+eB8FrDlRi+09Bn3s8m9P461oM/s7EzC+sNmuJwQpMNN:pdpfZU2eB8di+NQ61DhC5HfpW

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • 2b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exe (PID: 6616)
      • installer.exe (PID: 5532)
      • msiexec.exe (PID: 2452)
    • Creates a writable file in the system directory

      • installer.exe (PID: 5532)
  • SUSPICIOUS

    • Checks for Java to be installed

      • 2b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exe (PID: 6884)
      • msiexec.exe (PID: 6752)
      • msiexec.exe (PID: 2452)
      • ssvagent.exe (PID: 6508)
      • installer.exe (PID: 5532)
      • jp2launcher.exe (PID: 6988)
      • jp2launcher.exe (PID: 7244)
      • javaw.exe (PID: 7556)
    • Reads security settings of Internet Explorer

      • 2b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exe (PID: 6884)
      • installer.exe (PID: 5532)
      • jp2launcher.exe (PID: 6988)
      • jp2launcher.exe (PID: 7244)
    • Reads Microsoft Outlook installation path

      • 2b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exe (PID: 6884)
    • Checks Windows Trust Settings

      • 2b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exe (PID: 6884)
      • msiexec.exe (PID: 2452)
    • Reads Internet Explorer settings

      • 2b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exe (PID: 6884)
    • Reads Mozilla Firefox installation path

      • MSI6B78.tmp (PID: 7088)
      • installer.exe (PID: 5532)
    • Process drops legitimate windows executable

      • msiexec.exe (PID: 2452)
    • The process drops C-runtime libraries

      • msiexec.exe (PID: 2452)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 2452)
    • Executable content was dropped or overwritten

      • installer.exe (PID: 5532)
    • Creates/Modifies COM task schedule object

      • ssvagent.exe (PID: 6508)
      • installer.exe (PID: 5532)
  • INFO

    • Reads the machine GUID from the registry

      • 2b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exe (PID: 6884)
      • msiexec.exe (PID: 2452)
    • Checks supported languages

      • 2b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exe (PID: 6616)
      • 2b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exe (PID: 6884)
      • msiexec.exe (PID: 2452)
      • MSI6B78.tmp (PID: 7088)
      • jaureg.exe (PID: 5968)
      • msiexec.exe (PID: 6752)
      • installer.exe (PID: 5532)
      • javaw.exe (PID: 5392)
      • javaws.exe (PID: 6652)
      • ssvagent.exe (PID: 6508)
      • javaws.exe (PID: 7224)
      • jp2launcher.exe (PID: 7244)
      • msiexec.exe (PID: 7416)
      • javaw.exe (PID: 7556)
      • jp2launcher.exe (PID: 6988)
      • msiexec.exe (PID: 7676)
      • javaw.exe (PID: 7724)
    • Create files in a temporary directory

      • 2b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exe (PID: 6616)
      • MSI6B78.tmp (PID: 7088)
      • javaw.exe (PID: 5392)
      • jp2launcher.exe (PID: 6988)
      • jp2launcher.exe (PID: 7244)
    • Reads the computer name

      • 2b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exe (PID: 6616)
      • 2b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exe (PID: 6884)
      • msiexec.exe (PID: 2452)
      • MSI6B78.tmp (PID: 7088)
      • installer.exe (PID: 5532)
      • msiexec.exe (PID: 6752)
      • javaws.exe (PID: 6652)
      • jp2launcher.exe (PID: 6988)
      • javaws.exe (PID: 7224)
      • msiexec.exe (PID: 7416)
      • jp2launcher.exe (PID: 7244)
      • javaw.exe (PID: 7556)
      • msiexec.exe (PID: 7676)
      • javaw.exe (PID: 7724)
    • Creates files or folders in the user directory

      • 2b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exe (PID: 6884)
      • msiexec.exe (PID: 2452)
    • Checks proxy server information

      • 2b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exe (PID: 6884)
      • jp2launcher.exe (PID: 7244)
      • jp2launcher.exe (PID: 6988)
    • Reads Environment values

      • 2b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exe (PID: 6884)
    • Reads the software policy settings

      • 2b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exe (PID: 6884)
      • msiexec.exe (PID: 2452)
    • Process checks Internet Explorer phishing filters

      • 2b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exe (PID: 6884)
    • Manual execution by a user

      • WINWORD.EXE (PID: 5380)
    • Application launched itself

      • msiexec.exe (PID: 2452)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 2452)
    • Starts application with an unusual extension

      • msiexec.exe (PID: 2452)
    • Reads CPU info

      • msiexec.exe (PID: 2452)
    • Creates files in the program directory

      • installer.exe (PID: 5532)
      • javaw.exe (PID: 5392)
    • Reads Microsoft Office registry keys

      • installer.exe (PID: 5532)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 2452)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 EXE PECompact compressed (generic) (53.4)
.exe | Win64 Executable (generic) (35.5)
.exe | Win32 Executable (generic) (5.8)
.exe | Generic Win/DOS Executable (2.5)
.exe | DOS Executable Generic (2.5)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:03:13 08:05:42+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.31
CodeSize: 253440
InitializedDataSize: 68533760
UninitializedDataSize: -
EntryPoint: 0x18fe4
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 8.0.4110.9
ProductVersionNumber: 8.0.4110.9
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Oracle Corporation
FileDescription: Java Platform SE binary
FileVersion: 8.0.4110.9
FullVersion: 1.8.0_411-b09
InternalName: Setup Launcher
LegalCopyright: Copyright © 2024
OriginalFileName: wrapper_jre_offline.exe
ProductName: Java Platform SE 8 U411
ProductVersion: 8.0.4110.9
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
162
Monitored processes
24
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 2b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exe 2b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exe winword.exe msiexec.exe msiexec.exe no specs ai.exe no specs msi6b78.tmp no specs jaureg.exe conhost.exe no specs sppextcomobj.exe no specs slui.exe installer.exe javaw.exe ssvagent.exe no specs javaws.exe jp2launcher.exe no specs javaws.exe jp2launcher.exe no specs msiexec.exe no specs msiexec.exe no specs javaw.exe no specs msiexec.exe no specs javaw.exe no specs 2b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2052C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
2452C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
4452"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exe" "1DA9B206-97D2-46B6-AFAE-104D3990CF6D" "3873DD46-8443-44E8-AC19-0E0CB41B395F" "5380"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exeWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Artificial Intelligence (AI) Host for the Microsoft® Windows® Operating System and Platform x64.
Version:
0.12.2.0
Modules
Images
c:\program files\microsoft office\root\vfs\programfilescommonx64\microsoft shared\office16\ai.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files\common files\microsoft shared\clicktorun\appvisvsubsystems64.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
4860"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5380"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\admin\Desktop\allowsgreen.rtf" /o ""C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
16.0.16026.20146
Modules
Images
c:\program files\microsoft office\root\office16\winword.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
5392"C:\Program Files\Java\jre-1.8\bin\javaw.exe" -Xshare:dump -Djdk.disableLastUsageTrackingC:\Program Files\Java\jre-1.8\bin\javaw.exe
installer.exe
User:
SYSTEM
Company:
Oracle Corporation
Integrity Level:
SYSTEM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.4110.9
Modules
Images
c:\program files\java\jre-1.8\bin\javaw.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5532"C:\Program Files\Java\jre-1.8\installer.exe" /s INSTALLDIR="C:\Program Files\Java\jre-1.8\\" INSTALL_SILENT=1 AUTO_UPDATE=0 SPONSORS=0 REPAIRMODE=0 ProductCode={77924AE4-039E-4CA4-87B4-2F64180411F0}C:\Program Files\Java\jre-1.8\installer.exe
msiexec.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
HIGH
Description:
Java Platform SE binary
Exit code:
0
Version:
8.0.4110.9
Modules
Images
c:\program files\java\jre-1.8\installer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ole32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\combase.dll
c:\windows\system32\gdi32.dll
5584\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exejaureg.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5968"C:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe" -u auto-updateC:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe
MSI6B78.tmp
User:
SYSTEM
Company:
Oracle Corporation
Integrity Level:
SYSTEM
Description:
Java Update Registration
Version:
2.8.271.9
Modules
Images
c:\program files (x86)\common files\java\java update\jaureg.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ole32.dll
6356"C:\Users\admin\AppData\Local\Temp\2b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exe" C:\Users\admin\AppData\Local\Temp\2b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exeexplorer.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java Platform SE binary
Exit code:
3221226540
Version:
8.0.4110.9
Modules
Images
c:\users\admin\appdata\local\temp\2b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exe
c:\windows\system32\ntdll.dll
Total events
60 712
Read events
33 649
Write events
12 653
Delete events
14 410

Modification events

(PID) Process:(6884) 2b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\JavaSoft
Operation:delete valueName:InstallStatus
Value:
(PID) Process:(6884) 2b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6884) 2b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6884) 2b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(6884) 2b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(6884) 2b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(6884) 2b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(6884) 2b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(6884) 2b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\JavaSoft\Java Update\Policy
Operation:writeName:Country
Value:
DE
(PID) Process:(6884) 2b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\LowRegistry
Operation:delete valueName:AddToFavoritesInitialSelection
Value:
Executable files
341
Suspicious files
211
Text files
248
Unknown types
23

Dropped files

PID
Process
Filename
Type
66162b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exeC:\Users\admin\AppData\Local\Temp\jds1912781.tmp\jds1912781.tmp
MD5:
SHA256:
66162b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exeC:\Users\admin\AppData\Local\Temp\jds1912781.tmp\2b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exe
MD5:
SHA256:
68842b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exeC:\Users\admin\AppData\LocalLow\Oracle\Java\jre1.8.0_411_x64\jre1.8.0_41164.msi
MD5:
SHA256:
2452msiexec.exeC:\WINDOWS\Installer\1d5b03.msi
MD5:
SHA256:
66162b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exeC:\Users\admin\AppData\Local\Temp\jusched.logtext
MD5:A5A78C8847A0C20F445BECCD2002E2CC
SHA256:2AC4E8DC95889CF2DCA2637069A4CE5152A493134285D1ADA2F3B47EBC2965E4
68842b15f9988d849c591fc1639f2ba9e8005e5b32635ee2922d0a56482b81561605.exeC:\Users\admin\AppData\LocalLow\Oracle\Java\jre1.8.0_411_x64\Java3BillDevices.pngimage
MD5:8E52EFC6798ED074072F527309A1BA25
SHA256:12491EBC4EB99BF014D3BC44F770114BDE013E84CBEC2633303559A8C6E5F991
2452msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141binary
MD5:8E363443549111FE84076AFCD4076C49
SHA256:0D382DFBAB5FFE48235299ACD49AD6C51D2451649B0F9D395671E6CA5F6C6ECA
2452msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEBbinary
MD5:20DD2F2A1D093D9AF285489B784E5698
SHA256:0A3FB699ECBEACF681351BF5E72FBAB63D34944CF1F8FC09DEB6C97F1B9773AA
2452msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141binary
MD5:D17B6852B198F5E7D56FF19B51239940
SHA256:EDB402BFCDFD2F3BD27F5CE51B9D4151B8898497E7E70B9BA6C92B80B6B39E16
2452msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEBbinary
MD5:04DC8658585FB8C5CE3BED30BC267FC4
SHA256:A2156AB261F278F7EE31E45CDCC69E1E2F2694E898A01EA1A460BB4197796A31
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
22
TCP/UDP connections
136
DNS requests
41
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4084
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
unknown
2452
msiexec.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT3xL4LQLXDRDM9P665TW442vrsUQQUReuir%2FSSy4IxLVGLp6chnfNtyA8CEA6bGI750C3n79tQ4ghAGFo%3D
unknown
unknown
6520
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
unknown
2452
msiexec.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxXWRM3y5nP%2Be6mK4cD08CEAitQLJg0pxMn17Nqb2Trtk%3D
unknown
unknown
5380
WINWORD.EXE
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D
unknown
unknown
6600
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
unknown
2452
msiexec.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSRXerF0eFeSWRripTgTkcJWMm7iQQUaDfg67Y7%2BF8Rhvv%2BYXsIiGX0TkICEAYOL4%2BeG4vlGNX%2BK2nPzLE%3D
unknown
unknown
5380
WINWORD.EXE
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/microsoftrootcert.crl
unknown
unknown
5380
WINWORD.EXE
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicCodSigPCA_08-31-2010.crl
unknown
unknown
5380
WINWORD.EXE
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
239.255.255.250:1900
whitelisted
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1888
svchost.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
unknown
1888
svchost.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2088
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
3656
svchost.exe
20.190.159.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4656
SearchApp.exe
2.23.209.185:443
www.bing.com
Akamai International B.V.
GB
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
  • 2.16.241.12
  • 2.16.241.19
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 88.221.169.152
  • 23.211.9.92
whitelisted
www.bing.com
  • 2.23.209.185
  • 2.23.209.189
  • 2.23.209.180
  • 2.23.209.177
  • 2.23.209.130
  • 2.23.209.178
  • 2.23.209.183
  • 2.23.209.193
  • 2.23.209.176
  • 92.123.104.7
  • 92.123.104.67
  • 92.123.104.8
  • 92.123.104.4
  • 92.123.104.5
  • 92.123.104.6
  • 92.123.104.65
  • 92.123.104.9
  • 92.123.104.66
whitelisted
login.live.com
  • 20.190.159.71
  • 20.190.159.64
  • 20.190.159.2
  • 40.126.31.67
  • 40.126.31.69
  • 40.126.31.73
  • 20.190.159.4
  • 20.190.159.75
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 23.43.62.58
whitelisted
javadl-esd-secure.oracle.com
  • 104.102.46.104
whitelisted
rps-svcs.oracle.com
  • 23.199.222.107
unknown
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted

Threats

No threats detected
Process
Message
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.