download:

/ytisf/theZoo/raw/master/malware/Binaries/Ransomware.TeslaCrypt/Ransomware.TeslaCrypt.zip

Full analysis: https://app.any.run/tasks/23c02cbe-9078-4a6a-a64d-0d88c3bcdb30
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: July 23, 2024, 21:20:28
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
ransomware
teslacrypt
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

F755A44BBB97E9BA70BF38F1BDC67722

SHA1:

F70331EB64FD893047F263623FFB1E74E6FE4187

SHA256:

3B246FAA7E4B2A8550AA619F4DA893DB83721AACF62B46E5863644A5249AA87E

SSDEEP:

6144:xQAq0svy/pQhk1NBePvxGNWeOyqYAGfr/H/h60BHtzbprAvNGTG/fi5QCIq3h11Z:LyKoUlWeOP8HXrINZ/2uJUgVu

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • 3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370.exe (PID: 6588)
      • WinRAR.exe (PID: 4188)
      • gvokppw.exe (PID: 6224)
    • Changes the autorun value in the registry

      • gvokppw.exe (PID: 6224)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370.exe (PID: 6588)
    • Hides command output

      • cmd.exe (PID: 5788)
    • Starts CMD.EXE for commands execution

      • 3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370.exe (PID: 6588)
    • Starts itself from another location

      • 3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370.exe (PID: 6588)
    • Reads the date of Windows installation

      • 3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370.exe (PID: 6588)
    • Reads security settings of Internet Explorer

      • 3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370.exe (PID: 6588)
      • gvokppw.exe (PID: 6224)
      • ShellExperienceHost.exe (PID: 504)
  • INFO

    • Checks supported languages

      • 3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370.exe (PID: 6588)
      • gvokppw.exe (PID: 6224)
      • ShellExperienceHost.exe (PID: 504)
    • Dropped object may contain TOR URL's

      • WinRAR.exe (PID: 4188)
      • 3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370.exe (PID: 6588)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 4188)
    • Manual execution by a user

      • 3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370.exe (PID: 6588)
      • WINWORD.EXE (PID: 3164)
      • Taskmgr.exe (PID: 1704)
      • Taskmgr.exe (PID: 1392)
      • mspaint.exe (PID: 6820)
      • mspaint.exe (PID: 6748)
      • mspaint.exe (PID: 2092)
    • Creates files or folders in the user directory

      • 3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370.exe (PID: 6588)
      • gvokppw.exe (PID: 6224)
    • Reads the computer name

      • 3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370.exe (PID: 6588)
      • gvokppw.exe (PID: 6224)
      • ShellExperienceHost.exe (PID: 504)
    • Reads the machine GUID from the registry

      • gvokppw.exe (PID: 6224)
    • Process checks computer location settings

      • 3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370.exe (PID: 6588)
    • Reads security settings of Internet Explorer

      • Taskmgr.exe (PID: 1392)
    • Checks proxy server information

      • slui.exe (PID: 4028)
      • gvokppw.exe (PID: 6224)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0009
ZipCompression: Deflated
ZipModifyDate: 2015:04:08 12:36:46
ZipCRC: 0x85f212e0
ZipCompressedSize: 181367
ZipUncompressedSize: 267278
ZipFileName: E906FA3D51E86A61741B3499145A114E9BFB7C56
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
155
Monitored processes
15
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe slui.exe 3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370.exe gvokppw.exe cmd.exe no specs conhost.exe no specs winword.exe ai.exe no specs taskmgr.exe no specs taskmgr.exe shellexperiencehost.exe no specs rundll32.exe no specs mspaint.exe no specs mspaint.exe no specs mspaint.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
504"C:\WINDOWS\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mcaC:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Shell Experience Host
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\systemapps\shellexperiencehost_cw5n1h2txyewy\shellexperiencehost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\wincorlib.dll
1392"C:\WINDOWS\system32\taskmgr.exe" /4C:\Windows\System32\Taskmgr.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Manager
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
1704"C:\WINDOWS\system32\taskmgr.exe" /4C:\Windows\System32\Taskmgr.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Manager
Exit code:
3221226540
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
1728"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exe" "3012A71E-AC22-49EC-8C81-6230EEBF0DF6" "FAFD3632-B15E-42C7-9CEC-06E72C1CC559" "3164"C:\Program Files\Microsoft Office\root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\ai.exeWINWORD.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Artificial Intelligence (AI) Host for the Microsoft® Windows® Operating System and Platform x64.
Exit code:
0
Version:
0.12.2.0
Modules
Images
c:\program files\microsoft office\root\vfs\programfilescommonx64\microsoft shared\office16\ai.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files\common files\microsoft shared\clicktorun\appvisvsubsystems64.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\program files\common files\microsoft shared\clicktorun\c2r64.dll
c:\windows\system32\ole32.dll
2092"C:\WINDOWS\system32\mspaint.exe" "C:\Users\admin\Downloads\outdoornotice.jpg"C:\Windows\System32\mspaint.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Paint
Exit code:
0
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\mspaint.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\acgenral.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
3164"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\admin\Desktop\dvdsmaterials.rtf" /o ""C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
16.0.16026.20146
Modules
Images
c:\program files\microsoft office\root\office16\winword.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
4028C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4188"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Downloads\Ransomware.TeslaCrypt.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
4516C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
5788"C:\WINDOWS\system32\cmd.exe" /c del C:\Users\admin\Desktop\3372C1~1.EXE >> NULC:\Windows\SysWOW64\cmd.exe3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
Total events
23 740
Read events
23 281
Write events
425
Delete events
34

Modification events

(PID) Process:(4188) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(4188) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(4188) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(4188) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Downloads\Ransomware.TeslaCrypt.zip
(PID) Process:(4188) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(4188) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(4188) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(4188) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(4188) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(6588) 3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
11
Suspicious files
2 182
Text files
11
Unknown types
8

Dropped files

PID
Process
Filename
Type
4188WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb4188.44945\51B4EF5DC9D26B7A26E214CEE90598631E2EAA67executable
MD5:6E080AA085293BB9FBDCC9015337D309
SHA256:9B462800F1BEF019D7EC00098682D3EA7FC60E6721555F616399228E4E3AD122
6224gvokppw.exeC:\Program Files\Adobe\Acrobat DC\Acrobat\acrobat_reader_appicon_16.png.eccbinary
MD5:5FB2E2F19A0215009CC07E4F5FDB3B8C
SHA256:069F67C87ABE7FC4FFA3013442BA829AC36C046FF3A47568C03E85C929366CE5
6224gvokppw.exeC:\Program Files\Adobe\Acrobat DC\Acrobat\1494870C-9912-C184-4CC9-B401-A53F4D8DE290.pdfbinary
MD5:B25FE68716301EFDB31978E00C1E2325
SHA256:99D4E3E7F7EC714FD8B1CEF4EFCB10B48C06ABFA42B46606F1C2741846B10712
6224gvokppw.exeC:\Users\admin\AppData\Roaming\key.datbinary
MD5:DBEAB5875CACA2343607BDF29A3C6B74
SHA256:7ECEDD7FE9B9974CE2D93811E1B26D21EF78B1CD149B9DF49783AD58D2110C41
4188WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb4188.44945\3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370executable
MD5:209A288C68207D57E0CE6E60EBF60729
SHA256:3372C1EDAB46837F1E973164FA2D726C5C5E17BCB888828CCD7C4DFCC234A370
65883372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370.exeC:\Users\admin\AppData\Roaming\gvokppw.exeexecutable
MD5:209A288C68207D57E0CE6E60EBF60729
SHA256:3372C1EDAB46837F1E973164FA2D726C5C5E17BCB888828CCD7C4DFCC234A370
4188WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb4188.44945\E906FA3D51E86A61741B3499145A114E9BFB7C56executable
MD5:6D3D62A4CFF19B4F2CC7CE9027C33BE8
SHA256:AFABA2400552C7032A5C4C6E6151DF374D0E98DC67204066281E30E6699DBD18
6224gvokppw.exeC:\Program Files\Adobe\Acrobat DC\Acrobat\AcroCEF\cef.pak.eccbinary
MD5:06B764F7822DAF651E91C7C11BCD78B4
SHA256:AA634B11CE975726EFEA9449737909E3A9F74D0C74547B120089A6D264492A6B
6224gvokppw.exeC:\Program Files\Adobe\Acrobat DC\Acrobat\AcroCEF\resources.pak
MD5:
SHA256:
6224gvokppw.exeC:\Program Files\Adobe\Acrobat DC\Acrobat\AcroCEF\resources.pak.ecc
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
51
DNS requests
32
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3164
WINWORD.EXE
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6012
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:138
whitelisted
4292
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
3380
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
95.101.27.78:443
Akamai International B.V.
DE
unknown
3952
svchost.exe
239.255.255.250:1900
whitelisted
4204
svchost.exe
4.209.33.156:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
4
System
192.168.100.255:137
whitelisted
3380
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1388
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 4.231.128.59
  • 51.124.78.146
whitelisted
google.com
  • 172.217.16.142
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
www.bing.com
  • 95.101.27.97
  • 95.101.27.105
  • 95.101.27.108
  • 95.101.27.90
  • 95.101.27.113
  • 95.101.27.69
  • 95.101.27.82
  • 95.101.27.98
  • 95.101.27.89
whitelisted
login.live.com
  • 20.190.159.64
  • 20.190.159.71
  • 40.126.31.67
  • 40.126.31.69
  • 40.126.31.71
  • 20.190.159.68
  • 20.190.159.0
  • 20.190.159.23
whitelisted
client.wns.windows.com
  • 40.115.3.253
  • 40.113.103.199
whitelisted
arc.msn.com
  • 20.103.156.88
whitelisted
go.microsoft.com
  • 23.213.166.81
whitelisted
fd.api.iris.microsoft.com
  • 20.199.58.43
whitelisted
slscr.update.microsoft.com
  • 13.85.23.86
whitelisted

Threats

PID
Process
Class
Message
2284
svchost.exe
A Network Trojan was detected
ET MALWARE Win32/Teslacrypt Ransomware .onion domain (7tno4hib47vlep5o)
2284
svchost.exe
A Network Trojan was detected
ET MALWARE Win32/Teslacrypt Ransomware .onion domain (7tno4hib47vlep5o)
2284
svchost.exe
A Network Trojan was detected
ET MALWARE Win32/Teslacrypt Ransomware .onion domain (7tno4hib47vlep5o)
2284
svchost.exe
A Network Trojan was detected
ET MALWARE Win32/Teslacrypt Ransomware .onion domain (7tno4hib47vlep5o)
Process
Message
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.