File name:

OpenVPN-2.6.12-I001-amd64.msi

Full analysis: https://app.any.run/tasks/2625d322-dd65-4325-a923-729104a003c2
Verdict: Malicious activity
Analysis date: August 11, 2024, 16:43:13
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
generated-doc
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: OpenVPN 2.6.12-I001 amd64, Author: OpenVPN, Inc., Keywords: Installer, Comments: This installer database contains the logic and data required to install OpenVPN 2.6.12-I001 amd64., Template: x64;1033, Revision Number: {BF5745AD-8DEC-4CA6-B592-CA6F82192E1C}, Create Time/Date: Thu Jul 18 10:22:00 2024, Last Saved Time/Date: Thu Jul 18 10:22:00 2024, Number of Pages: 500, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.14.1.8722), Security: 4
MD5:

635B9D9D72F6E455F35365801FB4B040

SHA1:

A9DF3D98EECFCA7372C03FEE38D530F5B7AEBCF8

SHA256:

525759FE9E52A77A7D2CAD99F5AF1923D7D3027CAB775CCFB7469CE0FD2B1758

SSDEEP:

98304:0HtpwDAQ/+jcyOIWEw15FS76szPBKyNMxCxM4/8pz9AKinu/CvhHRplv9i8Q6Nx2:cKvxT/FsQ1+

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Opens a text file (SCRIPT)

      • msiexec.exe (PID: 1184)
    • Deletes a file (SCRIPT)

      • msiexec.exe (PID: 1184)
    • Changes the autorun value in the registry

      • msiexec.exe (PID: 6568)
      • msiexec.exe (PID: 1184)
    • Accesses system services(Win32_Service) via WMI (SCRIPT)

      • msiexec.exe (PID: 1184)
    • Creates a new registry key or changes the value of an existing one (SCRIPT)

      • msiexec.exe (PID: 1184)
    • Modifies registry startup key (SCRIPT)

      • msiexec.exe (PID: 1184)
  • SUSPICIOUS

    • Drops the executable file immediately after the start

      • msiexec.exe (PID: 6436)
      • msiexec.exe (PID: 6568)
      • msiexec.exe (PID: 1184)
      • drvinst.exe (PID: 3904)
      • drvinst.exe (PID: 7060)
      • drvinst.exe (PID: 7108)
      • drvinst.exe (PID: 5464)
      • drvinst.exe (PID: 7060)
      • drvinst.exe (PID: 3972)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 6568)
    • Checks Windows Trust Settings

      • msiexec.exe (PID: 6568)
      • drvinst.exe (PID: 3904)
      • drvinst.exe (PID: 7060)
      • drvinst.exe (PID: 7108)
    • Executes as Windows Service

      • VSSVC.exe (PID: 6392)
      • openvpnserv.exe (PID: 5744)
      • openvpnserv2.exe (PID: 5240)
    • Drops a system driver (possible attempt to evade defenses)

      • msiexec.exe (PID: 6568)
      • msiexec.exe (PID: 1184)
      • drvinst.exe (PID: 3904)
      • drvinst.exe (PID: 7060)
      • drvinst.exe (PID: 7108)
      • drvinst.exe (PID: 5464)
      • drvinst.exe (PID: 3972)
      • drvinst.exe (PID: 7060)
    • Process drops legitimate windows executable

      • msiexec.exe (PID: 6568)
    • Creates files in the driver directory

      • drvinst.exe (PID: 3904)
      • msiexec.exe (PID: 1184)
      • drvinst.exe (PID: 7060)
      • drvinst.exe (PID: 7108)
      • drvinst.exe (PID: 5464)
      • drvinst.exe (PID: 3972)
      • drvinst.exe (PID: 7060)
    • The process drops C-runtime libraries

      • msiexec.exe (PID: 6568)
    • Executable content was dropped or overwritten

      • drvinst.exe (PID: 7060)
      • drvinst.exe (PID: 3904)
      • drvinst.exe (PID: 7108)
      • drvinst.exe (PID: 5464)
      • drvinst.exe (PID: 3972)
      • drvinst.exe (PID: 7060)
    • Checks whether a specific file exists (SCRIPT)

      • msiexec.exe (PID: 1184)
    • Writes binary data to a Stream object (SCRIPT)

      • msiexec.exe (PID: 1184)
    • Creates or modifies Windows services

      • drvinst.exe (PID: 5464)
      • drvinst.exe (PID: 7060)
      • drvinst.exe (PID: 3972)
    • Reads data from a binary Stream object (SCRIPT)

      • msiexec.exe (PID: 1184)
    • Creates FileSystem object to access computer's file system (SCRIPT)

      • msiexec.exe (PID: 1184)
    • Suspicious use of NETSH.EXE

      • msiexec.exe (PID: 1184)
    • Uses WMI to retrieve WMI-managed resources (SCRIPT)

      • msiexec.exe (PID: 1184)
    • Executes WMI query (SCRIPT)

      • msiexec.exe (PID: 1184)
    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 1184)
      • msiexec.exe (PID: 6656)
    • Starts SC.EXE for service management

      • msiexec.exe (PID: 1184)
    • Reads the date of Windows installation

      • msiexec.exe (PID: 1184)
      • msiexec.exe (PID: 6656)
    • Runs shell command (SCRIPT)

      • msiexec.exe (PID: 1184)
  • INFO

    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 6436)
      • msiexec.exe (PID: 6568)
      • msiexec.exe (PID: 1184)
    • Checks supported languages

      • msiexec.exe (PID: 6568)
      • msiexec.exe (PID: 3188)
      • msiexec.exe (PID: 6656)
      • msiexec.exe (PID: 1184)
      • drvinst.exe (PID: 3904)
      • drvinst.exe (PID: 7108)
      • drvinst.exe (PID: 7060)
      • drvinst.exe (PID: 5464)
      • drvinst.exe (PID: 7060)
      • openvpnserv.exe (PID: 5744)
      • openvpnserv2.exe (PID: 5240)
      • TextInputHost.exe (PID: 5904)
      • openvpn-gui.exe (PID: 6248)
      • openvpn.exe (PID: 6940)
      • openvpn-gui.exe (PID: 1372)
      • openvpn-gui.exe (PID: 2424)
      • openvpn-gui.exe (PID: 420)
      • drvinst.exe (PID: 3972)
    • Creates files or folders in the user directory

      • msiexec.exe (PID: 6436)
    • Checks proxy server information

      • msiexec.exe (PID: 6436)
    • Reads the software policy settings

      • msiexec.exe (PID: 6436)
      • msiexec.exe (PID: 6568)
      • drvinst.exe (PID: 3904)
      • drvinst.exe (PID: 7060)
      • drvinst.exe (PID: 7108)
    • Reads the machine GUID from the registry

      • msiexec.exe (PID: 6568)
      • drvinst.exe (PID: 3904)
      • drvinst.exe (PID: 7060)
      • drvinst.exe (PID: 7108)
    • Reads the computer name

      • msiexec.exe (PID: 3188)
      • msiexec.exe (PID: 6656)
      • msiexec.exe (PID: 6568)
      • msiexec.exe (PID: 1184)
      • drvinst.exe (PID: 3904)
      • drvinst.exe (PID: 7060)
      • drvinst.exe (PID: 7108)
      • drvinst.exe (PID: 5464)
      • drvinst.exe (PID: 3972)
      • drvinst.exe (PID: 7060)
      • openvpnserv.exe (PID: 5744)
      • openvpnserv2.exe (PID: 5240)
      • TextInputHost.exe (PID: 5904)
      • openvpn-gui.exe (PID: 6248)
    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 6436)
    • Application launched itself

      • msiexec.exe (PID: 6568)
    • Reads Environment values

      • msiexec.exe (PID: 3188)
      • msiexec.exe (PID: 1184)
    • Disables trace logs

      • netsh.exe (PID: 4056)
      • netsh.exe (PID: 6180)
      • netsh.exe (PID: 6244)
    • Process checks computer location settings

      • msiexec.exe (PID: 1184)
      • msiexec.exe (PID: 6656)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 6568)
    • Manual execution by a user

      • openvpn-gui.exe (PID: 1372)
      • openvpn-gui.exe (PID: 420)
      • openvpn-gui.exe (PID: 2424)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msi | Microsoft Windows Installer (98.5)
.msi | Microsoft Installer (100)

EXIF

FlashPix

CodePage: Windows Latin 1 (Western European)
Title: Installation Database
Subject: OpenVPN 2.6.12-I001 amd64
Author: OpenVPN, Inc.
Keywords: Installer
Comments: This installer database contains the logic and data required to install OpenVPN 2.6.12-I001 amd64.
Template: x64;1033
RevisionNumber: {BF5745AD-8DEC-4CA6-B592-CA6F82192E1C}
CreateDate: 2024:07:18 10:22:00
ModifyDate: 2024:07:18 10:22:00
Pages: 500
Words: 2
Software: Windows Installer XML Toolset (3.14.1.8722)
Security: Read-only enforced
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
179
Monitored processes
33
Malicious processes
8
Suspicious processes
0

Behavior graph

Click at the process to see the details
start msiexec.exe msiexec.exe msiexec.exe no specs vssvc.exe no specs srtasks.exe no specs conhost.exe no specs msiexec.exe no specs msiexec.exe drvinst.exe drvinst.exe drvinst.exe drvinst.exe netsh.exe no specs conhost.exe no specs drvinst.exe netsh.exe no specs conhost.exe no specs drvinst.exe netsh.exe no specs conhost.exe no specs openvpnserv.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs openvpnserv2.exe no specs openvpn-gui.exe no specs openvpn.exe no specs conhost.exe no specs textinputhost.exe no specs openvpn-gui.exe no specs openvpn-gui.exe no specs openvpn-gui.exe

Process information

PID
CMD
Path
Indicators
Parent process
420"C:\Program Files\OpenVPN\bin\openvpn-gui.exe" C:\Program Files\OpenVPN\bin\openvpn-gui.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\program files\openvpn\bin\openvpn-gui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\msvcrt.dll
1184C:\Windows\System32\MsiExec.exe -Embedding 48637097AA468DF203DCD6F21F3B16DE E Global\MSI0000C:\Windows\System32\msiexec.exe
msiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1360\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exenetsh.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1372"C:\Program Files\OpenVPN\bin\openvpn-gui.exe" C:\Program Files\OpenVPN\bin\openvpn-gui.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\program files\openvpn\bin\openvpn-gui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shlwapi.dll
2068"C:\Windows\System32\sc.exe" config OpenVPNService start= autoC:\Windows\System32\sc.exemsiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Service Control Manager Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
2424"C:\Program Files\OpenVPN\bin\openvpn-gui.exe" C:\Program Files\OpenVPN\bin\openvpn-gui.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\program files\openvpn\bin\openvpn-gui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\netapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ucrtbase.dll
2636"C:\Windows\System32\sc.exe" start OpenVPNServiceC:\Windows\System32\sc.exemsiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Service Control Manager Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
2928\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeSrTasks.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3188C:\Windows\System32\MsiExec.exe -Embedding 9145023D3BA1A1CC65E2F5C5B903A936C:\Windows\System32\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
3520\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exesc.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
31 413
Read events
30 852
Write events
521
Delete events
40

Modification events

(PID) Process:(6568) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
48000000000000000185CBA10DECDA01A819000004190000D50700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6568) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Enter)
Value:
48000000000000000185CBA10DECDA01A819000004190000D20700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6568) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Leave)
Value:
480000000000000090CE2FA20DECDA01A819000004190000D20700000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6568) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Enter)
Value:
480000000000000090CE2FA20DECDA01A819000004190000D10700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6568) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Leave)
Value:
4800000000000000D07234A20DECDA01A819000004190000D10700000100000000000000010000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6568) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
4800000000000000D78D3BA20DECDA01A819000004190000D00700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6568) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
Operation:writeName:LastIndex
Value:
11
(PID) Process:(6568) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGatherWriterMetadata (Enter)
Value:
48000000000000000F40E0A20DECDA01A819000004190000D30700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6568) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssapiPublisher
Operation:writeName:IDENTIFY (Enter)
Value:
4800000000000000D1E0E4A20DECDA01A8190000A8170000E803000001000000000000000000000024991858AFB6C247AD689F07AE27632900000000000000000000000000000000
(PID) Process:(6392) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4800000000000000D2F4F7A20DECDA01F81800007C180000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
Executable files
42
Suspicious files
152
Text files
21
Unknown types
3

Dropped files

PID
Process
Filename
Type
6568msiexec.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
6568msiexec.exeC:\Windows\Installer\f1776.msi
MD5:
SHA256:
6436msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEBder
MD5:8358092757B62F879CF39DC9274894CA
SHA256:D72B634CD47262CF36FEBD296BA48F3F984F972DA03116C3C0C16E94B7F5738E
6436msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141binary
MD5:1AEC62B1296C10640116E5918563BC52
SHA256:40CFFCDBF3B4B367C10937B020D196649E30C632C6DDB82B81A6835CBA720D84
6436msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_27898B4F26C8322E2EB8CCE79E81B433der
MD5:3FE658DD9464B704B19C7B3F2036164E
SHA256:1B4C2561CC1E3F9AD81491B9BF9D23DE6309EABE72F2EE7EB86E3F0DF05830CA
6568msiexec.exeC:\System Volume Information\SPP\OnlineMetadataCache\{58189924-b6af-47c2-ad68-9f07ae276329}_OnDiskSnapshotPropbinary
MD5:2492BFBBBF377817710C5DB7D332602E
SHA256:E4482DFE4BA8C89377155D153735E8AB28269D515AF6CCC5658CE9EA5223F12E
6568msiexec.exeC:\Windows\Temp\~DFCEFDFD1E3CF5BB33.TMPbinary
MD5:15F834B9EEE1CA3A565C9FD73E968F75
SHA256:5E3BAEBBD2C4187BBE98346D0241E41B8FD6BDB2C518C1DAFA61E211D5F8BF70
6436msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_27898B4F26C8322E2EB8CCE79E81B433binary
MD5:65509341600FB19CFB772DD0D2038C22
SHA256:ED9DFF8AE2BBA2A059DEA72D768CA760379A948D63B1F8D274E01FBBB122411F
6568msiexec.exeC:\System Volume Information\SPP\snapshot-2binary
MD5:2492BFBBBF377817710C5DB7D332602E
SHA256:E4482DFE4BA8C89377155D153735E8AB28269D515AF6CCC5658CE9EA5223F12E
6568msiexec.exeC:\Windows\Installer\MSI2100.tmpexecutable
MD5:84A1CC9540D5CDAD74BC54F8090DD27A
SHA256:2738720DA0B6CE474CA6EB51A92372D047ECA2D713C256F0CD6C147AC3A0DB21
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
66
DNS requests
26
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6436
msiexec.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT3xL4LQLXDRDM9P665TW442vrsUQQUReuir%2FSSy4IxLVGLp6chnfNtyA8CEA6bGI750C3n79tQ4ghAGFo%3D
unknown
whitelisted
6436
msiexec.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxXWRM3y5nP%2Be6mK4cD08CEAitQLJg0pxMn17Nqb2Trtk%3D
unknown
whitelisted
6436
msiexec.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSRXerF0eFeSWRripTgTkcJWMm7iQQUaDfg67Y7%2BF8Rhvv%2BYXsIiGX0TkICEAzUxnaTjMm9vxp0%2F7fWexo%3D
unknown
whitelisted
2656
OfficeClickToRun.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
whitelisted
5336
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
5300
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5336
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
5300
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6908
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6944
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3888
svchost.exe
239.255.255.250:1900
whitelisted
3360
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5116
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2120
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
6436
msiexec.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
3360
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
5336
SearchApp.exe
23.36.162.84:443
www.bing.com
Akamai International B.V.
DE
unknown
5336
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
whitelisted
google.com
  • 142.250.185.110
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
www.bing.com
  • 23.36.162.84
  • 23.36.162.68
  • 2.23.209.130
  • 2.23.209.183
  • 2.23.209.133
  • 2.23.209.140
  • 2.23.209.135
  • 2.23.209.189
  • 2.23.209.141
  • 2.23.209.185
  • 2.23.209.182
  • 204.79.197.200
  • 13.107.21.200
whitelisted
client.wns.windows.com
  • 40.115.3.253
whitelisted
login.live.com
  • 20.190.159.75
  • 20.190.159.64
  • 20.190.159.0
  • 40.126.31.67
  • 20.190.159.23
  • 20.190.159.73
  • 20.190.159.68
  • 40.126.31.73
whitelisted
th.bing.com
  • 92.123.104.67
  • 92.123.104.64
  • 92.123.104.52
  • 92.123.104.62
  • 92.123.104.53
  • 92.123.104.61
  • 92.123.104.5
  • 92.123.104.51
  • 92.123.104.58
  • 2.23.209.135
  • 2.23.209.149
  • 2.23.209.140
  • 2.23.209.141
  • 2.23.209.187
  • 2.23.209.130
  • 2.23.209.189
  • 2.23.209.133
  • 2.23.209.185
whitelisted
fd.api.iris.microsoft.com
  • 20.31.169.57
whitelisted
arc.msn.com
  • 20.223.36.55
whitelisted
slscr.update.microsoft.com
  • 20.114.59.183
whitelisted

Threats

No threats detected
No debug info