File name:

Net-Worm.Sasser.zip

Full analysis: https://app.any.run/tasks/0d939e9a-b3ca-4a7b-ba5f-6140f8dfcf6c
Verdict: Malicious activity
Analysis date: November 20, 2024, 16:55:10
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
arch-scr
scan
smbscan
smb
Indicators:
MIME: application/zip
File info: Zip archive data, at least v5.1 to extract, compression method=AES Encrypted
MD5:

F6139CF3825E90B40E429CA6F0A60009

SHA1:

F12363ADB76C2CE1307559CC0337A3C6EA6AD1FC

SHA256:

56D78EBF518DB023E35202BC074C6EB7882D67EB04D697BFCE277E2EAEC30E65

SSDEEP:

384:JtqIrmOcpnaLEk5Mj6fDaNW2jt6mbJTW0X0lKm1Y/VPrBX:HqINcpE6YaNW2cOJ60klKm18Jd

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 4140)
    • Attempt to connect to SMB server

      • Net-Worm.Sasser.exe (PID: 6604)
    • Attempting to scan the network

      • Net-Worm.Sasser.exe (PID: 6604)
    • SMBSCAN has been detected (SURICATA)

      • Net-Worm.Sasser.exe (PID: 6604)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Net-Worm.Sasser.exe (PID: 4872)
    • Potential Corporate Privacy Violation

      • Net-Worm.Sasser.exe (PID: 6604)
    • Application launched itself

      • Net-Worm.Sasser.exe (PID: 6604)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 4140)
    • Manual execution by a user

      • WinRAR.exe (PID: 6536)
      • Net-Worm.Sasser.exe (PID: 6604)
      • Net-Worm.Sasser.exe (PID: 6256)
      • WINWORD.EXE (PID: 2284)
      • wscript.exe (PID: 5560)
      • Net-Worm.Sasser.exe (PID: 6188)
      • Net-Worm.Sasser.exe (PID: 4872)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0001
ZipCompression: Unknown (99)
ZipModifyDate: 2018:08:15 18:41:10
ZipCRC: 0x00000000
ZipCompressedSize: 14458
ZipUncompressedSize: 15872
ZipFileName: Net-Worm.Sasser.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
155
Monitored processes
17
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe winrar.exe no specs #SMBSCAN net-worm.sasser.exe net-worm.sasser.exe no specs textinputhost.exe no specs rundll32.exe no specs winword.exe net-worm.sasser.exe no specs ai.exe no specs net-worm.sasser.exe no specs wscript.exe no specs outlook.exe net-worm.sasser.exe no specs net-worm.sasser.exe net-worm.sasser.exe no specs net-worm.sasser.exe net-worm.sasser.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1932C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
2284"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\admin\Documents\displaycost.rtf" /o ""C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Exit code:
0
Version:
16.0.16026.20146
Modules
Images
c:\program files\microsoft office\root\office16\winword.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
4140"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\Net-Worm.Sasser.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
4872"C:\Users\admin\Desktop\Net-Worm.Sasser.exe" C:\Users\admin\Desktop\Net-Worm.Sasser.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
5560"C:\WINDOWS\System32\WScript.exe" "C:\Users\admin\Desktop\Email-Worm.AnnaKournikova.vbs" C:\Windows\System32\wscript.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5752C:\Users\admin\Desktop\Net-Worm.Sasser.exe 127.5.74.32C:\Users\admin\Desktop\Net-Worm.Sasser.exeNet-Worm.Sasser.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\desktop\net-worm.sasser.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
5856C:\Users\admin\Desktop\Net-Worm.Sasser.exe 127.16.176.84C:\Users\admin\Desktop\Net-Worm.Sasser.exeNet-Worm.Sasser.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\net-worm.sasser.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6044C:\Users\admin\Desktop\Net-Worm.Sasser.exe 192.227.219.82C:\Users\admin\Desktop\Net-Worm.Sasser.exe
Net-Worm.Sasser.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\desktop\net-worm.sasser.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6188"C:\Users\admin\Desktop\Net-Worm.Sasser.exe" C:\Users\admin\Desktop\Net-Worm.Sasser.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
6256"C:\Users\admin\Desktop\Net-Worm.Sasser.exe" C:\Users\admin\Desktop\Net-Worm.Sasser.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\net-worm.sasser.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
Total events
19 443
Read events
18 783
Write events
593
Delete events
67

Modification events

(PID) Process:(4140) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(4140) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(4140) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(4140) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Net-Worm.Sasser.zip
(PID) Process:(4140) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(4140) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(4140) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(4140) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(4140) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:15
Value:
(PID) Process:(4140) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:14
Value:
Executable files
2
Suspicious files
35
Text files
7
Unknown types
0

Dropped files

PID
Process
Filename
Type
2284WINWORD.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04binary
MD5:49DDD9B4A6ACBA468941A213881B0D56
SHA256:59A38707647D50495F010199777E3068794D0ED3A2E4333709ED49DD6B58C67E
4140WinRAR.exeC:\Users\admin\Desktop\Email-Worm.AnnaKournikova.zipcompressed
MD5:905DD32D9EF165CA25E97E139909C8EE
SHA256:1D537A4A7211D6FE2476BBCEDE25667D333C0CD2B1E8DEFF8317000993E8133F
4140WinRAR.exeC:\Users\admin\Desktop\Net-Worm.Sasser.exeexecutable
MD5:1A2C0E6130850F8FD9B9B5309413CD00
SHA256:09398D3F5CC102F7D932B765036E1AC1FF5DC27405D7357B81EAF48CA8EC71B8
2284WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmbinary
MD5:30A3767C16DA8B16910B45FFF246454F
SHA256:84BF35CEF679C0072BD8832EB7332E98289E3C5902F4B5674144C66FD179E1D3
6536WinRAR.exeC:\Users\admin\Desktop\Email-Worm.AnnaKournikova.vbstext
MD5:A312DC3504108FCFD1B1AE5D32B3E1FE
SHA256:2C7964292FA38B6EC52F6C2D8197EBC119392FBC2254243125D133A3AE8B9A84
2284WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbresbinary
MD5:05C386DDE8AC677E987B3D3020AFD86B
SHA256:8BF463114A2791D1B0D6A4726E0DE87831B537CD06FCB3C3E4A0761FC5EF3000
2284WINWORD.EXEC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04binary
MD5:E3431ED71BC42F71361C2DD2689A89C0
SHA256:71D88A514A6DAA2CD530FB9ECADD214FCCD8DC853EC0E64A9FAA977CA88D1038
2284WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\UsageMetricsStore\FileActivityStoreV3\Word\ASkwMDAwMDAwMC0wMDAwLTAwMDAtMDAwMC0wMDAwMDAwMDAwMDBfTnVsbAA.Sbinary
MD5:9C812FF6EE1293E11302EBC0F12DF480
SHA256:D29A9E527589D62354DA321D6966EC192522CA6371433EC14B7A6C93253EA53A
2284WINWORD.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntities.bintext
MD5:CC90D669144261B198DEAD45AA266572
SHA256:89C701EEFF939A44F28921FD85365ECD87041935DCD0FE0BAF04957DA12C9899
2284WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\index.datini
MD5:000B925A9FDE721E8652A9599BCAD4AF
SHA256:156E225ABFC967A2E8E35DB88550FFB15B77B1DB003FCBD3D8E2D595370BE1F3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
1 529
DNS requests
34
Threats
31

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4932
svchost.exe
GET
200
23.53.40.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4932
svchost.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6380
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6380
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5124
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
2284
WINWORD.EXE
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
whitelisted
2284
WINWORD.EXE
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5492
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4932
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
4932
svchost.exe
23.53.40.176:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4932
svchost.exe
23.52.120.96:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5064
SearchApp.exe
2.16.110.130:443
www.bing.com
Akamai International B.V.
DE
whitelisted
1176
svchost.exe
40.126.31.67:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5064
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
google.com
  • 172.217.18.110
whitelisted
crl.microsoft.com
  • 23.53.40.176
  • 23.53.40.178
whitelisted
www.microsoft.com
  • 23.52.120.96
whitelisted
www.bing.com
  • 2.16.110.130
  • 2.16.110.203
  • 2.16.110.131
  • 2.16.110.137
  • 2.16.110.123
  • 2.16.110.144
  • 2.16.110.138
  • 2.16.110.136
  • 2.16.110.146
  • 2.16.110.121
  • 2.16.110.171
  • 2.16.110.195
  • 2.16.110.170
  • 2.16.110.193
  • 2.16.110.179
whitelisted
login.live.com
  • 40.126.31.67
  • 20.190.159.73
  • 20.190.159.2
  • 20.190.159.0
  • 20.190.159.75
  • 40.126.31.69
  • 20.190.159.4
  • 20.190.159.64
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
go.microsoft.com
  • 23.213.166.81
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted

Threats

PID
Process
Class
Message
6604
Net-Worm.Sasser.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Attempting to scan SMB servers inside a home network
6604
Net-Worm.Sasser.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Attempting to scan SMB servers outside a home network
6604
Net-Worm.Sasser.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Attempting to scan SMB servers outside a home network
6604
Net-Worm.Sasser.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Attempting to scan SMB servers inside a home network
6604
Net-Worm.Sasser.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Attempting to scan SMB servers outside a home network
6604
Net-Worm.Sasser.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Attempting to scan SMB servers outside a home network
6604
Net-Worm.Sasser.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Attempting to scan SMB servers inside a home network
6604
Net-Worm.Sasser.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Attempting to scan SMB servers outside a home network
6604
Net-Worm.Sasser.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Attempting to scan SMB servers outside a home network
6604
Net-Worm.Sasser.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Attempting to scan SMB servers outside a home network
Process
Message
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
WINWORD.EXE
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.