File name:

NordVPNSetup.exe

Full analysis: https://app.any.run/tasks/55914dc6-92ee-45d0-ae87-c27601978fcb
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: June 09, 2024, 20:24:00
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
adware
innosetup
loader
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

5D6F0577264346D7C28F1853871D89B7

SHA1:

A606FA6E79ED5CA473EED30CC8483901CA67FAE1

SHA256:

391B613C8DB8F21FE6545D6448ADB188DD2B54749F31E7CD7ABEFB6E61F388D2

SSDEEP:

49152:O7HecD4dnbibBlf8+XVUQ+c31Bfw2Jt+Cf1ZLwr9+QC2JiLA1KYPAQEb0bJAl5Hb:W+cD4dncBU482vor9+OE9bQfylxrlHC0

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • NordVPNSetup.exe (PID: 6304)
      • NordVPNSetup.exe (PID: 6416)
      • NordVPNSetup.tmp (PID: 6456)
      • NordVPNSetup.exe (PID: 6932)
      • NordUpdaterSetup.exe (PID: 4724)
      • vcredist2019_x64.exe (PID: 6316)
      • NordUpdaterSetup.tmp (PID: 2160)
      • vcredist2019_x64.exe (PID: 6892)
      • NordVPNSetup.tmp (PID: 6952)
      • VC_redist.x64.exe (PID: 6492)
      • msiexec.exe (PID: 924)
      • VC_redist.x64.exe (PID: 4532)
      • VC_redist.x64.exe (PID: 6836)
    • Creates a writable file in the system directory

      • NordUpdateService.exe (PID: 2508)
      • msiexec.exe (PID: 924)
    • Changes the autorun value in the registry

      • VC_redist.x64.exe (PID: 6492)
    • Actions looks like stealing of personal data

      • icacls.exe (PID: 736)
      • icacls.exe (PID: 1512)
      • icacls.exe (PID: 4752)
      • NordVPNSetup.tmp (PID: 6952)
      • _setup64.tmp (PID: 5152)
      • icacls.exe (PID: 6940)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • NordVPNSetup.exe (PID: 6304)
      • NordVPNSetup.exe (PID: 6416)
      • NordVPNSetup.tmp (PID: 6456)
      • NordVPNSetup.exe (PID: 6932)
      • NordUpdaterSetup.exe (PID: 4724)
      • NordVPNSetup.tmp (PID: 6952)
      • NordUpdaterSetup.tmp (PID: 2160)
      • vcredist2019_x64.exe (PID: 6892)
      • vcredist2019_x64.exe (PID: 6316)
      • VC_redist.x64.exe (PID: 6492)
      • VC_redist.x64.exe (PID: 4532)
      • VC_redist.x64.exe (PID: 6836)
    • Reads security settings of Internet Explorer

      • NordVPNSetup.tmp (PID: 6332)
      • NordVPNSetup.tmp (PID: 6456)
      • NordVPNSetup.tmp (PID: 6952)
      • NordUpdateService.exe (PID: 2508)
      • vcredist2019_x64.exe (PID: 6316)
      • VC_redist.x64.exe (PID: 4532)
    • Reads the date of Windows installation

      • NordVPNSetup.tmp (PID: 6332)
      • NordVPNSetup.tmp (PID: 6952)
      • vcredist2019_x64.exe (PID: 6316)
      • VC_redist.x64.exe (PID: 4532)
    • Reads the Windows owner or organization settings

      • NordVPNSetup.tmp (PID: 6456)
      • NordVPNSetup.tmp (PID: 6952)
      • NordUpdaterSetup.tmp (PID: 2160)
      • msiexec.exe (PID: 924)
    • Checks Windows Trust Settings

      • NordVPNSetup.tmp (PID: 6456)
      • NordVPNSetup.tmp (PID: 6952)
      • NordUpdateService.exe (PID: 2508)
      • msiexec.exe (PID: 924)
    • Adds/modifies Windows certificates

      • NordVPNSetup.tmp (PID: 6456)
    • Uses TASKKILL.EXE to kill process

      • NordVPNSetup.tmp (PID: 6952)
    • Searches for installed software

      • NordVPNSetup.tmp (PID: 6952)
      • VC_redist.x64.exe (PID: 6492)
      • dllhost.exe (PID: 6960)
      • vcredist2019_x64.exe (PID: 6316)
      • VC_redist.x64.exe (PID: 6836)
      • VC_redist.x64.exe (PID: 4532)
    • Process drops legitimate windows executable

      • NordVPNSetup.tmp (PID: 6952)
      • NordUpdaterSetup.tmp (PID: 2160)
      • vcredist2019_x64.exe (PID: 6892)
      • vcredist2019_x64.exe (PID: 6316)
      • VC_redist.x64.exe (PID: 6492)
      • msiexec.exe (PID: 924)
      • VC_redist.x64.exe (PID: 6836)
    • Executes as Windows Service

      • NordUpdateService.exe (PID: 2508)
      • VSSVC.exe (PID: 6336)
    • Uses ICACLS.EXE to modify access control lists

      • NordUpdaterSetup.tmp (PID: 2160)
      • NordVPNSetup.tmp (PID: 6952)
    • Starts a Microsoft application from unusual location

      • vcredist2019_x64.exe (PID: 6892)
      • vcredist2019_x64.exe (PID: 6316)
      • VC_redist.x64.exe (PID: 6492)
    • Starts itself from another location

      • vcredist2019_x64.exe (PID: 6316)
    • Creates a software uninstall entry

      • VC_redist.x64.exe (PID: 6492)
      • VC_redist.x64.exe (PID: 6836)
    • The process checks if it is being run in the virtual environment

      • msiexec.exe (PID: 924)
    • Application launched itself

      • VC_redist.x64.exe (PID: 5812)
      • VC_redist.x64.exe (PID: 4532)
    • The process drops C-runtime libraries

      • msiexec.exe (PID: 924)
    • Drops a system driver (possible attempt to evade defenses)

      • NordVPNSetup.tmp (PID: 6952)
    • Drops 7-zip archiver for unpacking

      • NordVPNSetup.tmp (PID: 6952)
  • INFO

    • Checks supported languages

      • NordVPNSetup.exe (PID: 6304)
      • NordVPNSetup.tmp (PID: 6332)
      • NordVPNSetup.exe (PID: 6416)
      • NordVPNSetup.tmp (PID: 6456)
      • NordVPNSetup.exe (PID: 6932)
      • NordVPNSetup.tmp (PID: 6952)
      • NordUpdaterSetup.exe (PID: 4724)
      • NordUpdaterSetup.tmp (PID: 2160)
      • _setup64.tmp (PID: 4548)
      • NordUpdateService.exe (PID: 2508)
      • vcredist2019_x64.exe (PID: 6892)
      • vcredist2019_x64.exe (PID: 6316)
      • VC_redist.x64.exe (PID: 6492)
      • msiexec.exe (PID: 924)
      • VC_redist.x64.exe (PID: 5812)
      • VC_redist.x64.exe (PID: 6836)
      • VC_redist.x64.exe (PID: 4532)
      • _setup64.tmp (PID: 5152)
    • Create files in a temporary directory

      • NordVPNSetup.exe (PID: 6304)
      • NordVPNSetup.exe (PID: 6416)
      • NordVPNSetup.tmp (PID: 6456)
      • NordVPNSetup.exe (PID: 6932)
      • NordVPNSetup.tmp (PID: 6952)
      • NordUpdaterSetup.exe (PID: 4724)
      • NordUpdaterSetup.tmp (PID: 2160)
      • vcredist2019_x64.exe (PID: 6316)
      • VC_redist.x64.exe (PID: 6492)
      • VC_redist.x64.exe (PID: 4532)
    • Reads the computer name

      • NordVPNSetup.tmp (PID: 6332)
      • NordVPNSetup.tmp (PID: 6456)
      • NordVPNSetup.tmp (PID: 6952)
      • NordUpdaterSetup.tmp (PID: 2160)
      • NordUpdateService.exe (PID: 2508)
      • VC_redist.x64.exe (PID: 6492)
      • vcredist2019_x64.exe (PID: 6316)
      • msiexec.exe (PID: 924)
      • VC_redist.x64.exe (PID: 4532)
      • VC_redist.x64.exe (PID: 6836)
    • Process checks computer location settings

      • NordVPNSetup.tmp (PID: 6332)
      • NordVPNSetup.tmp (PID: 6952)
      • vcredist2019_x64.exe (PID: 6316)
      • VC_redist.x64.exe (PID: 4532)
    • Reads Environment values

      • NordVPNSetup.tmp (PID: 6456)
      • NordVPNSetup.tmp (PID: 6952)
    • Reads the machine GUID from the registry

      • NordVPNSetup.tmp (PID: 6456)
      • NordVPNSetup.tmp (PID: 6952)
      • NordUpdateService.exe (PID: 2508)
      • msiexec.exe (PID: 924)
      • VC_redist.x64.exe (PID: 6492)
    • Disables trace logs

      • NordVPNSetup.tmp (PID: 6456)
      • NordVPNSetup.tmp (PID: 6952)
    • Checks proxy server information

      • NordVPNSetup.tmp (PID: 6456)
      • NordVPNSetup.tmp (PID: 6952)
    • Reads the software policy settings

      • NordVPNSetup.tmp (PID: 6456)
      • NordVPNSetup.tmp (PID: 6952)
      • NordUpdateService.exe (PID: 2508)
      • msiexec.exe (PID: 924)
    • Creates files or folders in the user directory

      • NordVPNSetup.tmp (PID: 6456)
      • NordVPNSetup.tmp (PID: 6952)
    • Creates files in the program directory

      • NordUpdaterSetup.tmp (PID: 2160)
      • NordUpdateService.exe (PID: 2508)
      • VC_redist.x64.exe (PID: 6492)
      • NordVPNSetup.tmp (PID: 6952)
    • Creates a software uninstall entry

      • NordUpdaterSetup.tmp (PID: 2160)
      • msiexec.exe (PID: 924)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 924)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (67.7)
.exe | Win32 EXE PECompact compressed (generic) (25.6)
.exe | Win32 Executable (generic) (2.7)
.exe | Win16/32 Executable Delphi generic (1.2)
.exe | Generic Win/DOS Executable (1.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:02:15 14:54:16+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 741888
InitializedDataSize: 123392
UninitializedDataSize: -
EntryPoint: 0xb5eec
OSVersion: 6.1
ImageVersion: 6
SubsystemVersion: 6.1
Subsystem: Windows GUI
FileVersionNumber: 0.0.11.0
ProductVersionNumber: 0.0.11.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName: NordVPN
FileDescription: NordVPN Web Installer
FileVersion: 0.0.11.0
LegalCopyright:
OriginalFileName:
ProductName: NordVPN
ProductVersion: 0.0.11.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
182
Monitored processes
64
Malicious processes
20
Suspicious processes
1

Behavior graph

Click at the process to see the details
start nordvpnsetup.exe nordvpnsetup.tmp no specs nordvpnsetup.exe nordvpnsetup.tmp nordvpnsetup.exe nordvpnsetup.tmp taskkill.exe no specs conhost.exe no specs nordupdatersetup.exe nordupdatersetup.tmp _setup64.tmp no specs conhost.exe no specs icacls.exe no specs conhost.exe no specs icacls.exe no specs conhost.exe no specs icacls.exe no specs conhost.exe no specs icacls.exe no specs conhost.exe no specs icacls.exe no specs conhost.exe no specs icacls.exe no specs conhost.exe no specs icacls.exe no specs conhost.exe no specs icacls.exe no specs conhost.exe no specs icacls.exe no specs conhost.exe no specs icacls.exe no specs conhost.exe no specs icacls.exe no specs conhost.exe no specs icacls.exe no specs conhost.exe no specs icacls.exe no specs conhost.exe no specs icacls.exe no specs conhost.exe no specs nordupdateservice.exe vcredist2019_x64.exe vcredist2019_x64.exe vc_redist.x64.exe SPPSurrogate no specs vssvc.exe no specs srtasks.exe no specs conhost.exe no specs msiexec.exe vc_redist.x64.exe no specs vc_redist.x64.exe vc_redist.x64.exe _setup64.tmp conhost.exe no specs icacls.exe conhost.exe no specs icacls.exe conhost.exe no specs icacls.exe conhost.exe no specs icacls.exe conhost.exe no specs icacls.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
428\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeicacls.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
608"C:\WINDOWS\system32\taskkill.exe" /f /im NordVPN.exeC:\Windows\SysWOW64\taskkill.exeNordVPNSetup.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
712"C:\WINDOWS\system32\icacls.exe" C:\ProgramData\NordUpdater /grant Users:(RX)C:\Windows\System32\icacls.exeNordUpdaterSetup.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\icacls.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
736"C:\WINDOWS\system32\icacls.exe" C:\ProgramData\NordVPN /remove Users /TC:\Windows\System32\icacls.exe
NordVPNSetup.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\icacls.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
924C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1120"C:\WINDOWS\system32\icacls.exe" "C:\Program Files\NordUpdater" /grant *S-1-5-32-545:(OI)(CI)(RX)C:\Windows\System32\icacls.exeNordUpdaterSetup.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\icacls.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1176\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeicacls.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1332\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeicacls.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1428\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeicacls.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1512"C:\WINDOWS\system32\icacls.exe" C:\ProgramData\NordVPN /grant Users:(RX)C:\Windows\System32\icacls.exe
NordVPNSetup.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\icacls.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
39 340
Read events
38 218
Write events
727
Delete events
395

Modification events

(PID) Process:(6456) NordVPNSetup.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Owner
Value:
38190000044C5EFDAABADA01
(PID) Process:(6456) NordVPNSetup.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:SessionHash
Value:
4504368713CF9A0F439C7388E8FC2631BAA0C0DF50F3B87D62EB155CA8497C4D
(PID) Process:(6456) NordVPNSetup.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Sequence
Value:
1
(PID) Process:(6456) NordVPNSetup.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(6456) NordVPNSetup.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\NordVPNSetup_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6456) NordVPNSetup.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\NordVPNSetup_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6456) NordVPNSetup.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\NordVPNSetup_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(6456) NordVPNSetup.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\NordVPNSetup_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(6456) NordVPNSetup.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\NordVPNSetup_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(6456) NordVPNSetup.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\NordVPNSetup_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
Executable files
770
Suspicious files
107
Text files
102
Unknown types
7

Dropped files

PID
Process
Filename
Type
6456NordVPNSetup.tmpC:\Users\admin\AppData\Local\Temp\is-JTG3E.tmp\is-KTBQS.tmp
MD5:
SHA256:
6456NordVPNSetup.tmpC:\Users\admin\AppData\Local\Temp\is-JTG3E.tmp\NordVPNSetup.exe
MD5:
SHA256:
6456NordVPNSetup.tmpC:\Users\admin\AppData\Local\Temp\is-JTG3E.tmp\_isetup\_setup64.tmpexecutable
MD5:E4211D6D009757C078A9FAC7FF4F03D4
SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
6304NordVPNSetup.exeC:\Users\admin\AppData\Local\Temp\is-RSMCP.tmp\NordVPNSetup.tmpexecutable
MD5:6693DDACA0479CDEEA33386155E9CACF
SHA256:384DAB757AF95F6D6D4A80351507F6F455C0FCE58F2AA32FF1C1E8CEEB3ADE82
6456NordVPNSetup.tmpC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_50385F8EB1F713E33924A830D7A2A41Cder
MD5:1B0B8F47E76FA35BBEDFD8BEF3326FF8
SHA256:82D9DBDD7E7BA3C8A4BE4786AB58290D4C917F532C688BAE9C4B1CB1F4BFA44A
6456NordVPNSetup.tmpC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\357F04AD41BCF5FE18FCB69F60C6680F_6D77B5DFCBD6480F4BD6D0FA3C394104binary
MD5:77F864637228063AA24A02BCC0EC42B6
SHA256:FE3B256D32489E013BBE7F05C058A34CD20374F7ACE0D66D56734FFBB84EC3CA
6456NordVPNSetup.tmpC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\357F04AD41BCF5FE18FCB69F60C6680F_6D77B5DFCBD6480F4BD6D0FA3C394104binary
MD5:560C3E436F3A18D7D20DC89B830F52A8
SHA256:24E08954CFBB5C5AC5D4A21D59ADBA6677B23BB15734A0691B375177BBADD567
6456NordVPNSetup.tmpC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554Ebinary
MD5:F93549EDEAA55DECF28C16FD05C753B1
SHA256:73A367C9C4CF2C9DFB053720DC56A38ED3C05329FFA508B125BFF74780B8C137
6456NordVPNSetup.tmpC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\439F613B3D55693954E1B080DE3085B4_C4927E03400A4F6EDB9D613E6354F864der
MD5:CDAC726A55DE7E2FFF194BE345F412BE
SHA256:96E8CFFEB81E162C1AF50E4B75B57C6F2A9E7C645C0D34291FF88A22BB9CF4A8
6456NordVPNSetup.tmpC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\439F613B3D55693954E1B080DE3085B4_C4927E03400A4F6EDB9D613E6354F864binary
MD5:948CE82E17D15AF8056D4FAC71364149
SHA256:94DF4838E4699A50ABFAF28B6A012814B080E3A9CE75909CC5A79564BE606CA2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
43
TCP/UDP connections
40
DNS requests
17
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5140
MoUsoCoreWorker.exe
GET
200
23.61.152.46:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
unknown
636
RUXIMICS.exe
GET
200
23.33.27.88:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
5140
MoUsoCoreWorker.exe
GET
200
23.33.27.88:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
4232
svchost.exe
GET
200
23.33.27.88:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
4232
svchost.exe
GET
200
23.61.152.46:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
unknown
636
RUXIMICS.exe
GET
200
23.61.152.46:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
unknown
6456
NordVPNSetup.tmp
GET
200
104.18.20.226:80
http://ocsp.globalsign.com/rootr3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT1nGh%2FJBjWKnkPdZIzB1bqhelHBwQUj%2FBLf6guRSSuTVD6Y5qL3uLdG7wCEHgDGEJFcIpBz28BuO60qVQ%3D
unknown
unknown
6456
NordVPNSetup.tmp
GET
200
104.18.20.226:80
http://ocsp.globalsign.com/codesigningrootr45/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQVFZP5vqhCrtRN5SWf40Rn6NM1IAQUHwC%2FRoAK%2FHg5t6W0Q9lWULvOljsCEHe9DgW3WQu2HUdhUx4%2Fde0%3D
unknown
unknown
6456
NordVPNSetup.tmp
GET
200
104.18.20.226:80
http://ocsp.globalsign.com/gsgccr45evcodesignca2020/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBQaCbVYh07WONuW4e63Ydlu4AlbDAQUJZ3Q%2FFkJhmPF7POxEztXHAOSNhECDGLN%2BBiNNqTPN6M0%2FQ%3D%3D
unknown
unknown
6456
NordVPNSetup.tmp
GET
200
104.18.21.226:80
http://ocsp2.globalsign.com/rootr6/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBRi%2B7TJbHYn9EmJ9W03lecB7P%2BG7QQUrmwFo5MT4qLn4tcc1sfwf8hnU6ACDQHsHJJA3v0uQF18R3Q%3D
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4364
svchost.exe
239.255.255.250:1900
unknown
4
System
192.168.100.255:138
whitelisted
4232
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
636
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5140
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
636
RUXIMICS.exe
23.33.27.88:80
crl.microsoft.com
Akamai International B.V.
FR
unknown
5140
MoUsoCoreWorker.exe
23.33.27.88:80
crl.microsoft.com
Akamai International B.V.
FR
unknown
4232
svchost.exe
23.33.27.88:80
crl.microsoft.com
Akamai International B.V.
FR
unknown
5140
MoUsoCoreWorker.exe
23.61.152.46:80
www.microsoft.com
AKAMAI-AS
BR
unknown
4232
svchost.exe
23.61.152.46:80
www.microsoft.com
AKAMAI-AS
BR
unknown

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 23.33.27.88
  • 23.33.27.99
whitelisted
www.microsoft.com
  • 23.61.152.46
whitelisted
api.nordvpn.com
  • 104.19.159.190
  • 104.16.208.203
unknown
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
downloads.nordcdn.com
  • 104.16.156.111
  • 104.16.155.111
unknown
applytics.zwyr157wwiu6eior.com
  • 104.16.168.111
  • 104.16.167.111
unknown
downloads77.nordcdn.com
  • 195.181.170.19
  • 195.181.175.41
  • 212.102.56.182
  • 212.102.56.178
  • 156.146.33.140
  • 195.181.175.16
  • 156.146.33.138
  • 156.146.33.15
unknown
ocsp.globalsign.com
  • 104.18.20.226
  • 104.18.21.226
whitelisted
ocsp2.globalsign.com
  • 104.18.21.226
  • 104.18.20.226
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted

Threats

PID
Process
Class
Message
Possibly Unwanted Program Detected
ADWARE [ANY.RUN] InnoSetup Installer
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Misc activity
ET INFO EXE - Served Attached HTTP
Process
Message
msiexec.exe
Failed to release Service