File name:

OpenVPN-2.6.12-I001-amd64.msi

Full analysis: https://app.any.run/tasks/8ef1dd12-2604-4c2a-8fbb-4ef056d25b59
Verdict: Malicious activity
Analysis date: January 24, 2025, 02:18:08
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
generated-doc
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: OpenVPN 2.6.12-I001 amd64, Author: OpenVPN, Inc., Keywords: Installer, Comments: This installer database contains the logic and data required to install OpenVPN 2.6.12-I001 amd64., Template: x64;1033, Revision Number: {BF5745AD-8DEC-4CA6-B592-CA6F82192E1C}, Create Time/Date: Thu Jul 18 10:22:00 2024, Last Saved Time/Date: Thu Jul 18 10:22:00 2024, Number of Pages: 500, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.14.1.8722), Security: 4
MD5:

635B9D9D72F6E455F35365801FB4B040

SHA1:

A9DF3D98EECFCA7372C03FEE38D530F5B7AEBCF8

SHA256:

525759FE9E52A77A7D2CAD99F5AF1923D7D3027CAB775CCFB7469CE0FD2B1758

SSDEEP:

98304:0HtpwDAQ/+jcyOIWEw15FS76szPBKyNMxCxM4/8pz9AKinu/CvhHRplv9i8Q6Nx2:cKvxT/FsQ1+

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Opens a text file (SCRIPT)

      • msiexec.exe (PID: 2996)
    • Deletes a file (SCRIPT)

      • msiexec.exe (PID: 2996)
    • Changes the autorun value in the registry

      • msiexec.exe (PID: 6572)
      • msiexec.exe (PID: 2996)
    • Accesses system services(Win32_Service) via WMI (SCRIPT)

      • msiexec.exe (PID: 2996)
    • Modifies registry startup key (SCRIPT)

      • msiexec.exe (PID: 2996)
    • Creates a new registry key or changes the value of an existing one (SCRIPT)

      • msiexec.exe (PID: 2996)
  • SUSPICIOUS

    • Executes as Windows Service

      • VSSVC.exe (PID: 7076)
      • openvpnserv.exe (PID: 624)
      • openvpnserv2.exe (PID: 7156)
    • Checks Windows Trust Settings

      • msiexec.exe (PID: 6572)
      • drvinst.exe (PID: 6828)
      • drvinst.exe (PID: 5268)
      • drvinst.exe (PID: 5616)
    • Process drops legitimate windows executable

      • msiexec.exe (PID: 6572)
    • Drops a system driver (possible attempt to evade defenses)

      • msiexec.exe (PID: 6572)
      • drvinst.exe (PID: 6828)
      • msiexec.exe (PID: 2996)
      • drvinst.exe (PID: 5268)
      • drvinst.exe (PID: 5616)
      • drvinst.exe (PID: 2796)
      • drvinst.exe (PID: 372)
      • drvinst.exe (PID: 6288)
    • The process drops C-runtime libraries

      • msiexec.exe (PID: 6572)
    • Creates files in the driver directory

      • msiexec.exe (PID: 2996)
      • drvinst.exe (PID: 6828)
      • drvinst.exe (PID: 5616)
      • drvinst.exe (PID: 5268)
      • drvinst.exe (PID: 2796)
      • drvinst.exe (PID: 372)
      • drvinst.exe (PID: 6288)
    • Executable content was dropped or overwritten

      • drvinst.exe (PID: 5268)
      • drvinst.exe (PID: 6828)
      • drvinst.exe (PID: 5616)
      • drvinst.exe (PID: 2796)
      • drvinst.exe (PID: 372)
      • drvinst.exe (PID: 6288)
    • Creates FileSystem object to access computer's file system (SCRIPT)

      • msiexec.exe (PID: 2996)
    • Checks whether a specific file exists (SCRIPT)

      • msiexec.exe (PID: 2996)
    • Writes binary data to a Stream object (SCRIPT)

      • msiexec.exe (PID: 2996)
    • Creates or modifies Windows services

      • drvinst.exe (PID: 2796)
      • drvinst.exe (PID: 372)
      • drvinst.exe (PID: 6288)
    • Reads data from a binary Stream object (SCRIPT)

      • msiexec.exe (PID: 2996)
    • Suspicious use of NETSH.EXE

      • msiexec.exe (PID: 2996)
    • Sets the service to start on system boot

      • sc.exe (PID: 5080)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 6572)
    • Executes WMI query (SCRIPT)

      • msiexec.exe (PID: 2996)
    • Reads the date of Windows installation

      • msiexec.exe (PID: 2996)
      • msiexec.exe (PID: 6640)
    • Uses WMI to retrieve WMI-managed resources (SCRIPT)

      • msiexec.exe (PID: 2996)
    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 2996)
      • ShellExperienceHost.exe (PID: 4540)
      • msiexec.exe (PID: 6640)
    • Starts SC.EXE for service management

      • msiexec.exe (PID: 2996)
    • Windows service management via SC.EXE

      • sc.exe (PID: 4556)
    • Runs shell command (SCRIPT)

      • msiexec.exe (PID: 2996)
  • INFO

    • Reads the computer name

      • msiexec.exe (PID: 6572)
      • msiexec.exe (PID: 4512)
      • msiexec.exe (PID: 6640)
      • msiexec.exe (PID: 2996)
      • drvinst.exe (PID: 6828)
      • drvinst.exe (PID: 5268)
      • drvinst.exe (PID: 5616)
      • drvinst.exe (PID: 2796)
      • drvinst.exe (PID: 372)
      • openvpnserv.exe (PID: 624)
      • drvinst.exe (PID: 6288)
      • ShellExperienceHost.exe (PID: 4540)
      • openvpnserv2.exe (PID: 7156)
      • openvpn-gui.exe (PID: 7088)
    • Checks proxy server information

      • msiexec.exe (PID: 6400)
    • Reads the software policy settings

      • msiexec.exe (PID: 6400)
      • drvinst.exe (PID: 6828)
      • drvinst.exe (PID: 5268)
      • drvinst.exe (PID: 5616)
      • msiexec.exe (PID: 6572)
    • The sample compiled with english language support

      • msiexec.exe (PID: 6400)
      • msiexec.exe (PID: 2996)
      • msiexec.exe (PID: 6572)
      • drvinst.exe (PID: 5268)
      • drvinst.exe (PID: 6828)
      • drvinst.exe (PID: 5616)
      • drvinst.exe (PID: 2796)
      • drvinst.exe (PID: 372)
      • drvinst.exe (PID: 6288)
    • Reads Environment values

      • msiexec.exe (PID: 4512)
      • msiexec.exe (PID: 2996)
    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 6400)
    • Creates files or folders in the user directory

      • msiexec.exe (PID: 6400)
    • Checks supported languages

      • msiexec.exe (PID: 6572)
      • msiexec.exe (PID: 6640)
      • msiexec.exe (PID: 2996)
      • drvinst.exe (PID: 6828)
      • drvinst.exe (PID: 5268)
      • drvinst.exe (PID: 5616)
      • drvinst.exe (PID: 2796)
      • drvinst.exe (PID: 372)
      • openvpnserv.exe (PID: 624)
      • drvinst.exe (PID: 6288)
      • msiexec.exe (PID: 4512)
      • openvpnserv2.exe (PID: 7156)
      • openvpn-gui.exe (PID: 6632)
      • openvpn-gui.exe (PID: 5588)
      • openvpn-gui.exe (PID: 4400)
      • ShellExperienceHost.exe (PID: 4540)
      • openvpn-gui.exe (PID: 7088)
      • openvpn.exe (PID: 5160)
      • openvpn-gui.exe (PID: 372)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 6400)
      • msiexec.exe (PID: 6572)
      • msiexec.exe (PID: 2996)
    • Application launched itself

      • msiexec.exe (PID: 6572)
    • Reads the machine GUID from the registry

      • drvinst.exe (PID: 6828)
      • drvinst.exe (PID: 5616)
      • drvinst.exe (PID: 5268)
      • msiexec.exe (PID: 6572)
    • Disables trace logs

      • netsh.exe (PID: 5304)
      • netsh.exe (PID: 6648)
      • netsh.exe (PID: 4764)
    • Process checks computer location settings

      • msiexec.exe (PID: 2996)
      • msiexec.exe (PID: 6640)
    • Manages system restore points

      • SrTasks.exe (PID: 4716)
    • The process uses the downloaded file

      • msiexec.exe (PID: 6640)
      • msiexec.exe (PID: 2996)
    • Manual execution by a user

      • openvpn-gui.exe (PID: 5588)
      • openvpn-gui.exe (PID: 6632)
      • openvpn-gui.exe (PID: 372)
      • openvpn-gui.exe (PID: 4400)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 6572)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msi | Microsoft Windows Installer (98.5)
.msi | Microsoft Installer (100)

EXIF

FlashPix

CodePage: Windows Latin 1 (Western European)
Title: Installation Database
Subject: OpenVPN 2.6.12-I001 amd64
Author: OpenVPN, Inc.
Keywords: Installer
Comments: This installer database contains the logic and data required to install OpenVPN 2.6.12-I001 amd64.
Template: x64;1033
RevisionNumber: {BF5745AD-8DEC-4CA6-B592-CA6F82192E1C}
CreateDate: 2024:07:18 10:22:00
ModifyDate: 2024:07:18 10:22:00
Pages: 500
Words: 2
Software: Windows Installer XML Toolset (3.14.1.8722)
Security: Read-only enforced
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
168
Monitored processes
34
Malicious processes
8
Suspicious processes
0

Behavior graph

Click at the process to see the details
start msiexec.exe msiexec.exe msiexec.exe no specs vssvc.exe no specs srtasks.exe no specs conhost.exe no specs msiexec.exe no specs msiexec.exe drvinst.exe drvinst.exe drvinst.exe drvinst.exe netsh.exe no specs conhost.exe no specs drvinst.exe netsh.exe no specs conhost.exe no specs drvinst.exe netsh.exe no specs conhost.exe no specs openvpnserv.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs openvpnserv2.exe no specs openvpn-gui.exe no specs openvpn.exe no specs conhost.exe no specs openvpn-gui.exe no specs openvpn-gui.exe no specs openvpn-gui.exe no specs openvpn-gui.exe no specs shellexperiencehost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
372DrvInst.exe "2" "11" "ROOT\NET\0001" "C:\WINDOWS\INF\oem6.inf" "oem6.inf:3beb73aff103cc24:tap0901.ndi:9.27.0.0:root\tap0901," "433338203" "0000000000000238"C:\Windows\System32\drvinst.exe
svchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\drvinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\devrtl.dll
c:\windows\system32\drvstore.dll
372"C:\Program Files\OpenVPN\bin\openvpn-gui.exe" C:\Program Files\OpenVPN\bin\openvpn-gui.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\program files\openvpn\bin\openvpn-gui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shlwapi.dll
624"C:\Program Files\OpenVPN\bin\openvpnserv.exe"C:\Program Files\OpenVPN\bin\openvpnserv.exeservices.exe
User:
SYSTEM
Company:
The OpenVPN Project
Integrity Level:
SYSTEM
Description:
OpenVPN Service
Version:
2.6.12.0
Modules
Images
c:\program files\openvpn\bin\openvpnserv.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1020\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exenetsh.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1864\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exesc.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2796DrvInst.exe "2" "11" "ROOT\NET\0000" "C:\WINDOWS\INF\oem1.inf" "oem1.inf:9ef34515d755ec66:Wintun.Install:0.8.0.0:wintun," "42b53aaff" "000000000000021C"C:\Windows\System32\drvinst.exe
svchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\drvinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\devrtl.dll
c:\windows\system32\drvstore.dll
2996C:\Windows\System32\MsiExec.exe -Embedding 8B2307DB3DA2AC6BBBD85EB860F4FA74 E Global\MSI0000C:\Windows\System32\msiexec.exe
msiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
4400"C:\Program Files\OpenVPN\bin\openvpn-gui.exe" C:\Program Files\OpenVPN\bin\openvpn-gui.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\program files\openvpn\bin\openvpn-gui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\netapi32.dll
c:\windows\system32\shlwapi.dll
4512C:\Windows\System32\MsiExec.exe -Embedding 2801891AF7A9250546BE1DFBB21C83BBC:\Windows\System32\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
4540"C:\WINDOWS\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mcaC:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Shell Experience Host
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\systemapps\shellexperiencehost_cw5n1h2txyewy\shellexperiencehost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\dxgi.dll
Total events
25 100
Read events
24 568
Write events
494
Delete events
38

Modification events

(PID) Process:(6572) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Leave)
Value:
4800000000000000A9535B43066EDB01AC190000941B0000D20700000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6572) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Enter)
Value:
4800000000000000A9535B43066EDB01AC190000941B0000D10700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6572) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
480000000000000023E7D342066EDB01AC190000941B0000D50700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6572) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Enter)
Value:
480000000000000023E7D342066EDB01AC190000941B0000D20700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6572) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssapiPublisher
Operation:writeName:IDENTIFY (Enter)
Value:
48000000000000008E48D743066EDB01AC190000FC1B0000E8030000010000000000000000000000A0E8366A3B10FD4C8181BE5629ACF00700000000000000000000000000000000
(PID) Process:(6572) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Leave)
Value:
4800000000000000DB716743066EDB01AC190000941B0000D10700000100000000000000010000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6572) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
48000000000000008F9C6943066EDB01AC190000941B0000D00700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6572) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
Operation:writeName:LastIndex
Value:
11
(PID) Process:(6572) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGatherWriterMetadata (Enter)
Value:
4800000000000000F9E3D443066EDB01AC190000941B0000D30700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7076) VSSVC.exeKey:HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\11000001
Operation:delete keyName:(default)
Value:
Executable files
46
Suspicious files
155
Text files
17
Unknown types
0

Dropped files

PID
Process
Filename
Type
6572msiexec.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
6572msiexec.exeC:\Windows\Installer\13d40c.msi
MD5:
SHA256:
6400msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141binary
MD5:E505FC7E9B6779C632D15129002ACB86
SHA256:720D0FD776AFEC4BA7D9842AA71044411EB3A840670C6E5168D122AD6B757AF3
6400msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEBbinary
MD5:18682B67264E19270B436B95362FA7E3
SHA256:6F477DAE534CE072527FF42E1F031FA8A652D8F9ABA3913758FA36AB854BEA77
6400msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_27898B4F26C8322E2EB8CCE79E81B433binary
MD5:ED45171D6F0C02141551E6718778723C
SHA256:62D3A9DA631F941B20148F6E259E7E88C66AC77B21F622027B87BA3B6AD05CBE
6572msiexec.exeC:\System Volume Information\SPP\snapshot-2binary
MD5:9403F246E753BE4DDA4D9EFEAC4D40ED
SHA256:C6C80345DAB7205F79600F86BACDB28E3DE68C2C36C3639E6A99661E537018DE
6572msiexec.exeC:\Windows\Installer\MSIDC1E.tmpexecutable
MD5:718222E232D11298DFBABBC2B70D8B14
SHA256:45E855461F5D1BE28A2F88416603070BD1778055ABDD06834AE58E97B7DDF53C
6572msiexec.exeC:\Windows\Installer\MSIDBEE.tmpexecutable
MD5:2232C07E354364E0EB1DC80024593826
SHA256:FB1CD5E7C3EA30DFAFD3CC1862E311388361D896610DB28C63716DA9D71E8F3F
6572msiexec.exeC:\System Volume Information\SPP\OnlineMetadataCache\{6a36e8a0-103b-4cfd-8181-be5629acf007}_OnDiskSnapshotPropbinary
MD5:9403F246E753BE4DDA4D9EFEAC4D40ED
SHA256:C6C80345DAB7205F79600F86BACDB28E3DE68C2C36C3639E6A99661E537018DE
6400msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_27898B4F26C8322E2EB8CCE79E81B433binary
MD5:ED9F1E8B91FC98FECFEEAE421C5EBADF
SHA256:A4A4F44B3E3DE8764A801D1F2AE078637BB82787B968845AB54B99AE5085106B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
36
DNS requests
18
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
23.216.77.25:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2040
svchost.exe
GET
200
23.216.77.25:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1176
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2040
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6400
msiexec.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT3xL4LQLXDRDM9P665TW442vrsUQQUReuir%2FSSy4IxLVGLp6chnfNtyA8CEA6bGI750C3n79tQ4ghAGFo%3D
unknown
whitelisted
6400
msiexec.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxXWRM3y5nP%2Be6mK4cD08CEAitQLJg0pxMn17Nqb2Trtk%3D
unknown
whitelisted
6400
msiexec.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSRXerF0eFeSWRripTgTkcJWMm7iQQUaDfg67Y7%2BF8Rhvv%2BYXsIiGX0TkICEAzUxnaTjMm9vxp0%2F7fWexo%3D
unknown
whitelisted
4244
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
23.216.77.25:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:137
whitelisted
2040
svchost.exe
23.216.77.25:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2040
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5696
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
2.23.227.208:443
www.bing.com
Ooredoo Q.S.C.
QA
whitelisted
1176
svchost.exe
40.126.32.74:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 23.216.77.25
  • 23.216.77.30
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 95.101.149.131
whitelisted
google.com
  • 216.58.206.78
whitelisted
www.bing.com
  • 2.23.227.208
  • 2.23.227.215
whitelisted
login.live.com
  • 40.126.32.74
  • 40.126.32.134
  • 40.126.32.138
  • 40.126.32.72
  • 20.190.160.22
  • 40.126.32.140
  • 40.126.32.133
  • 40.126.32.68
whitelisted
ocsp.digicert.com
  • 2.17.190.73
  • 2.23.77.188
whitelisted
go.microsoft.com
  • 184.30.18.9
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
arc.msn.com
  • 20.31.169.57
whitelisted

Threats

No threats detected
No debug info