File name:

OpenVPN-2.6.12-I001-amd64.msi

Full analysis: https://app.any.run/tasks/8ef1dd12-2604-4c2a-8fbb-4ef056d25b59
Verdict: Malicious activity
Analysis date: January 24, 2025, 02:18:08
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
generated-doc
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: OpenVPN 2.6.12-I001 amd64, Author: OpenVPN, Inc., Keywords: Installer, Comments: This installer database contains the logic and data required to install OpenVPN 2.6.12-I001 amd64., Template: x64;1033, Revision Number: {BF5745AD-8DEC-4CA6-B592-CA6F82192E1C}, Create Time/Date: Thu Jul 18 10:22:00 2024, Last Saved Time/Date: Thu Jul 18 10:22:00 2024, Number of Pages: 500, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.14.1.8722), Security: 4
MD5:

635B9D9D72F6E455F35365801FB4B040

SHA1:

A9DF3D98EECFCA7372C03FEE38D530F5B7AEBCF8

SHA256:

525759FE9E52A77A7D2CAD99F5AF1923D7D3027CAB775CCFB7469CE0FD2B1758

SSDEEP:

98304:0HtpwDAQ/+jcyOIWEw15FS76szPBKyNMxCxM4/8pz9AKinu/CvhHRplv9i8Q6Nx2:cKvxT/FsQ1+

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Deletes a file (SCRIPT)

      • msiexec.exe (PID: 2996)
    • Opens a text file (SCRIPT)

      • msiexec.exe (PID: 2996)
    • Changes the autorun value in the registry

      • msiexec.exe (PID: 6572)
      • msiexec.exe (PID: 2996)
    • Accesses system services(Win32_Service) via WMI (SCRIPT)

      • msiexec.exe (PID: 2996)
    • Creates a new registry key or changes the value of an existing one (SCRIPT)

      • msiexec.exe (PID: 2996)
    • Modifies registry startup key (SCRIPT)

      • msiexec.exe (PID: 2996)
  • SUSPICIOUS

    • Executes as Windows Service

      • VSSVC.exe (PID: 7076)
      • openvpnserv.exe (PID: 624)
      • openvpnserv2.exe (PID: 7156)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 6572)
    • Drops a system driver (possible attempt to evade defenses)

      • msiexec.exe (PID: 6572)
      • msiexec.exe (PID: 2996)
      • drvinst.exe (PID: 6828)
      • drvinst.exe (PID: 5268)
      • drvinst.exe (PID: 5616)
      • drvinst.exe (PID: 2796)
      • drvinst.exe (PID: 372)
      • drvinst.exe (PID: 6288)
    • The process drops C-runtime libraries

      • msiexec.exe (PID: 6572)
    • Process drops legitimate windows executable

      • msiexec.exe (PID: 6572)
    • Executable content was dropped or overwritten

      • drvinst.exe (PID: 6828)
      • drvinst.exe (PID: 5268)
      • drvinst.exe (PID: 5616)
      • drvinst.exe (PID: 2796)
      • drvinst.exe (PID: 372)
      • drvinst.exe (PID: 6288)
    • Creates files in the driver directory

      • drvinst.exe (PID: 6828)
      • msiexec.exe (PID: 2996)
      • drvinst.exe (PID: 5616)
      • drvinst.exe (PID: 2796)
      • drvinst.exe (PID: 372)
      • drvinst.exe (PID: 6288)
      • drvinst.exe (PID: 5268)
    • Checks Windows Trust Settings

      • drvinst.exe (PID: 5268)
      • drvinst.exe (PID: 6828)
      • msiexec.exe (PID: 6572)
      • drvinst.exe (PID: 5616)
    • Checks whether a specific file exists (SCRIPT)

      • msiexec.exe (PID: 2996)
    • Writes binary data to a Stream object (SCRIPT)

      • msiexec.exe (PID: 2996)
    • Reads data from a binary Stream object (SCRIPT)

      • msiexec.exe (PID: 2996)
    • Creates or modifies Windows services

      • drvinst.exe (PID: 2796)
      • drvinst.exe (PID: 372)
      • drvinst.exe (PID: 6288)
    • Suspicious use of NETSH.EXE

      • msiexec.exe (PID: 2996)
    • Executes WMI query (SCRIPT)

      • msiexec.exe (PID: 2996)
    • Uses WMI to retrieve WMI-managed resources (SCRIPT)

      • msiexec.exe (PID: 2996)
    • Reads the date of Windows installation

      • msiexec.exe (PID: 2996)
      • msiexec.exe (PID: 6640)
    • Sets the service to start on system boot

      • sc.exe (PID: 5080)
    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 2996)
      • msiexec.exe (PID: 6640)
      • ShellExperienceHost.exe (PID: 4540)
    • Windows service management via SC.EXE

      • sc.exe (PID: 4556)
    • Runs shell command (SCRIPT)

      • msiexec.exe (PID: 2996)
    • Starts SC.EXE for service management

      • msiexec.exe (PID: 2996)
    • Creates FileSystem object to access computer's file system (SCRIPT)

      • msiexec.exe (PID: 2996)
  • INFO

    • The sample compiled with english language support

      • msiexec.exe (PID: 6400)
      • msiexec.exe (PID: 6572)
      • msiexec.exe (PID: 2996)
      • drvinst.exe (PID: 6828)
      • drvinst.exe (PID: 5268)
      • drvinst.exe (PID: 5616)
      • drvinst.exe (PID: 2796)
      • drvinst.exe (PID: 372)
      • drvinst.exe (PID: 6288)
    • Reads the software policy settings

      • msiexec.exe (PID: 6400)
      • drvinst.exe (PID: 6828)
      • drvinst.exe (PID: 5268)
      • msiexec.exe (PID: 6572)
      • drvinst.exe (PID: 5616)
    • Creates files or folders in the user directory

      • msiexec.exe (PID: 6400)
    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 6400)
    • Checks proxy server information

      • msiexec.exe (PID: 6400)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 6400)
      • msiexec.exe (PID: 6572)
      • msiexec.exe (PID: 2996)
    • Reads the computer name

      • msiexec.exe (PID: 6572)
      • msiexec.exe (PID: 6640)
      • msiexec.exe (PID: 2996)
      • drvinst.exe (PID: 6828)
      • drvinst.exe (PID: 5268)
      • msiexec.exe (PID: 4512)
      • drvinst.exe (PID: 5616)
      • drvinst.exe (PID: 2796)
      • drvinst.exe (PID: 372)
      • drvinst.exe (PID: 6288)
      • openvpnserv2.exe (PID: 7156)
      • openvpn-gui.exe (PID: 7088)
      • ShellExperienceHost.exe (PID: 4540)
      • openvpnserv.exe (PID: 624)
    • Checks supported languages

      • msiexec.exe (PID: 6572)
      • msiexec.exe (PID: 6640)
      • msiexec.exe (PID: 4512)
      • msiexec.exe (PID: 2996)
      • drvinst.exe (PID: 6828)
      • drvinst.exe (PID: 5268)
      • drvinst.exe (PID: 5616)
      • drvinst.exe (PID: 2796)
      • drvinst.exe (PID: 372)
      • drvinst.exe (PID: 6288)
      • openvpnserv.exe (PID: 624)
      • openvpnserv2.exe (PID: 7156)
      • openvpn-gui.exe (PID: 7088)
      • openvpn.exe (PID: 5160)
      • openvpn-gui.exe (PID: 4400)
      • openvpn-gui.exe (PID: 5588)
      • openvpn-gui.exe (PID: 6632)
      • ShellExperienceHost.exe (PID: 4540)
      • openvpn-gui.exe (PID: 372)
    • Application launched itself

      • msiexec.exe (PID: 6572)
    • Manages system restore points

      • SrTasks.exe (PID: 4716)
    • Reads the machine GUID from the registry

      • msiexec.exe (PID: 6572)
      • drvinst.exe (PID: 6828)
      • drvinst.exe (PID: 5268)
      • drvinst.exe (PID: 5616)
    • Reads Environment values

      • msiexec.exe (PID: 4512)
      • msiexec.exe (PID: 2996)
    • Disables trace logs

      • netsh.exe (PID: 5304)
      • netsh.exe (PID: 4764)
      • netsh.exe (PID: 6648)
    • Process checks computer location settings

      • msiexec.exe (PID: 2996)
      • msiexec.exe (PID: 6640)
    • The process uses the downloaded file

      • msiexec.exe (PID: 2996)
      • msiexec.exe (PID: 6640)
    • Manual execution by a user

      • openvpn-gui.exe (PID: 372)
      • openvpn-gui.exe (PID: 4400)
      • openvpn-gui.exe (PID: 5588)
      • openvpn-gui.exe (PID: 6632)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 6572)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msi | Microsoft Windows Installer (98.5)
.msi | Microsoft Installer (100)

EXIF

FlashPix

CodePage: Windows Latin 1 (Western European)
Title: Installation Database
Subject: OpenVPN 2.6.12-I001 amd64
Author: OpenVPN, Inc.
Keywords: Installer
Comments: This installer database contains the logic and data required to install OpenVPN 2.6.12-I001 amd64.
Template: x64;1033
RevisionNumber: {BF5745AD-8DEC-4CA6-B592-CA6F82192E1C}
CreateDate: 2024:07:18 10:22:00
ModifyDate: 2024:07:18 10:22:00
Pages: 500
Words: 2
Software: Windows Installer XML Toolset (3.14.1.8722)
Security: Read-only enforced
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
168
Monitored processes
34
Malicious processes
8
Suspicious processes
0

Behavior graph

Click at the process to see the details
start msiexec.exe msiexec.exe msiexec.exe no specs vssvc.exe no specs srtasks.exe no specs conhost.exe no specs msiexec.exe no specs msiexec.exe drvinst.exe drvinst.exe drvinst.exe drvinst.exe netsh.exe no specs conhost.exe no specs drvinst.exe netsh.exe no specs conhost.exe no specs drvinst.exe netsh.exe no specs conhost.exe no specs openvpnserv.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs openvpnserv2.exe no specs openvpn-gui.exe no specs openvpn.exe no specs conhost.exe no specs openvpn-gui.exe no specs openvpn-gui.exe no specs openvpn-gui.exe no specs openvpn-gui.exe no specs shellexperiencehost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
372DrvInst.exe "2" "11" "ROOT\NET\0001" "C:\WINDOWS\INF\oem6.inf" "oem6.inf:3beb73aff103cc24:tap0901.ndi:9.27.0.0:root\tap0901," "433338203" "0000000000000238"C:\Windows\System32\drvinst.exe
svchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\drvinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\devrtl.dll
c:\windows\system32\drvstore.dll
372"C:\Program Files\OpenVPN\bin\openvpn-gui.exe" C:\Program Files\OpenVPN\bin\openvpn-gui.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\program files\openvpn\bin\openvpn-gui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shlwapi.dll
624"C:\Program Files\OpenVPN\bin\openvpnserv.exe"C:\Program Files\OpenVPN\bin\openvpnserv.exeservices.exe
User:
SYSTEM
Company:
The OpenVPN Project
Integrity Level:
SYSTEM
Description:
OpenVPN Service
Version:
2.6.12.0
Modules
Images
c:\program files\openvpn\bin\openvpnserv.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1020\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exenetsh.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1864\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exesc.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2796DrvInst.exe "2" "11" "ROOT\NET\0000" "C:\WINDOWS\INF\oem1.inf" "oem1.inf:9ef34515d755ec66:Wintun.Install:0.8.0.0:wintun," "42b53aaff" "000000000000021C"C:\Windows\System32\drvinst.exe
svchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\drvinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\devrtl.dll
c:\windows\system32\drvstore.dll
2996C:\Windows\System32\MsiExec.exe -Embedding 8B2307DB3DA2AC6BBBD85EB860F4FA74 E Global\MSI0000C:\Windows\System32\msiexec.exe
msiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
4400"C:\Program Files\OpenVPN\bin\openvpn-gui.exe" C:\Program Files\OpenVPN\bin\openvpn-gui.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\program files\openvpn\bin\openvpn-gui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\netapi32.dll
c:\windows\system32\shlwapi.dll
4512C:\Windows\System32\MsiExec.exe -Embedding 2801891AF7A9250546BE1DFBB21C83BBC:\Windows\System32\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
4540"C:\WINDOWS\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mcaC:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Shell Experience Host
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\systemapps\shellexperiencehost_cw5n1h2txyewy\shellexperiencehost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\dxgi.dll
Total events
25 100
Read events
24 568
Write events
494
Delete events
38

Modification events

(PID) Process:(6572) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Leave)
Value:
4800000000000000A9535B43066EDB01AC190000941B0000D20700000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6572) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Enter)
Value:
4800000000000000A9535B43066EDB01AC190000941B0000D10700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6572) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
480000000000000023E7D342066EDB01AC190000941B0000D50700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6572) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Enter)
Value:
480000000000000023E7D342066EDB01AC190000941B0000D20700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6572) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssapiPublisher
Operation:writeName:IDENTIFY (Enter)
Value:
48000000000000008E48D743066EDB01AC190000FC1B0000E8030000010000000000000000000000A0E8366A3B10FD4C8181BE5629ACF00700000000000000000000000000000000
(PID) Process:(6572) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Leave)
Value:
4800000000000000DB716743066EDB01AC190000941B0000D10700000100000000000000010000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6572) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
48000000000000008F9C6943066EDB01AC190000941B0000D00700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6572) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
Operation:writeName:LastIndex
Value:
11
(PID) Process:(6572) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGatherWriterMetadata (Enter)
Value:
4800000000000000F9E3D443066EDB01AC190000941B0000D30700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7076) VSSVC.exeKey:HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\11000001
Operation:delete keyName:(default)
Value:
Executable files
46
Suspicious files
155
Text files
17
Unknown types
0

Dropped files

PID
Process
Filename
Type
6572msiexec.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
6572msiexec.exeC:\Windows\Installer\13d40c.msi
MD5:
SHA256:
6400msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEBbinary
MD5:61F74A9180A0759D2192C910C645B85D
SHA256:D8EE186369986536EDDF71B5F7911D679916927F2C9A60D04746B8368E0DFDD5
6400msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141binary
MD5:B56EF82C98008D1730D873E5B1216F0D
SHA256:B7A65CAF0DE8C757BA1D28EAE861FCBD0E5BDF53FEA7AF1D25260EDCD523EAF5
6400msiexec.exeC:\Users\admin\AppData\Local\Temp\MSI5E30.tmpexecutable
MD5:F97794A736B3C59CED7C005806FE9000
SHA256:3F591A709E24A1D95FE81CBB7EFE336E91A92299A95FDBDA91ADDF9AA0763030
6400msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_27898B4F26C8322E2EB8CCE79E81B433binary
MD5:ED9F1E8B91FC98FECFEEAE421C5EBADF
SHA256:A4A4F44B3E3DE8764A801D1F2AE078637BB82787B968845AB54B99AE5085106B
6572msiexec.exeC:\Windows\Temp\~DF74ECCD3A351DB103.TMPbinary
MD5:BE23411353EE6454FC73DE79C8C33B17
SHA256:D332EC2798EDD4FF777E0BAD857EBF3776D97FD9092AAF577D1A4AF1E9A6BA6B
6572msiexec.exeC:\System Volume Information\SPP\snapshot-2binary
MD5:9403F246E753BE4DDA4D9EFEAC4D40ED
SHA256:C6C80345DAB7205F79600F86BACDB28E3DE68C2C36C3639E6A99661E537018DE
6572msiexec.exeC:\Windows\Installer\MSIDB70.tmpexecutable
MD5:F97794A736B3C59CED7C005806FE9000
SHA256:3F591A709E24A1D95FE81CBB7EFE336E91A92299A95FDBDA91ADDF9AA0763030
6572msiexec.exeC:\Windows\Installer\MSIDC1E.tmpexecutable
MD5:718222E232D11298DFBABBC2B70D8B14
SHA256:45E855461F5D1BE28A2F88416603070BD1778055ABDD06834AE58E97B7DDF53C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
36
DNS requests
18
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
23.216.77.25:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6400
msiexec.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT3xL4LQLXDRDM9P665TW442vrsUQQUReuir%2FSSy4IxLVGLp6chnfNtyA8CEA6bGI750C3n79tQ4ghAGFo%3D
unknown
whitelisted
6400
msiexec.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSRXerF0eFeSWRripTgTkcJWMm7iQQUaDfg67Y7%2BF8Rhvv%2BYXsIiGX0TkICEAzUxnaTjMm9vxp0%2F7fWexo%3D
unknown
whitelisted
6400
msiexec.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxXWRM3y5nP%2Be6mK4cD08CEAitQLJg0pxMn17Nqb2Trtk%3D
unknown
whitelisted
4244
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
4244
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4976
backgroundTaskHost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
23.216.77.25:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:137
whitelisted
2040
svchost.exe
23.216.77.25:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2040
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5696
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
2.23.227.208:443
www.bing.com
Ooredoo Q.S.C.
QA
whitelisted
1176
svchost.exe
40.126.32.74:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 23.216.77.25
  • 23.216.77.30
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 95.101.149.131
whitelisted
google.com
  • 216.58.206.78
whitelisted
www.bing.com
  • 2.23.227.208
  • 2.23.227.215
whitelisted
login.live.com
  • 40.126.32.74
  • 40.126.32.134
  • 40.126.32.138
  • 40.126.32.72
  • 20.190.160.22
  • 40.126.32.140
  • 40.126.32.133
  • 40.126.32.68
whitelisted
ocsp.digicert.com
  • 2.17.190.73
  • 2.23.77.188
whitelisted
go.microsoft.com
  • 184.30.18.9
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
arc.msn.com
  • 20.31.169.57
whitelisted

Threats

No threats detected
No debug info