URL:

https://www.urban-vpn.com/thank-you/

Full analysis: https://app.any.run/tasks/9bef0bd9-e59a-4338-8d56-f47c46a828a0
Verdict: Malicious activity
Analysis date: January 16, 2025, 17:55:11
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
advancedinstaller
Indicators:
MD5:

E61314DA51165150D1CDDB97ADBC546B

SHA1:

F0232E1B9CD69796B0CE44073E985CFB7A6394F1

SHA256:

58EC7210ACF7D407255EE0CBCFF87782A3517B6D3252985BE2F75F7BB2D62FB9

SSDEEP:

3:N8DSLEUKNiOcn:2OLEW

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • urbanvpn-gui.exe (PID: 7416)
  • SUSPICIOUS

    • ADVANCEDINSTALLER mutex has been found

      • UrbanVPN.exe (PID: 5576)
    • Reads the Windows owner or organization settings

      • UrbanVPN.exe (PID: 5576)
      • msiexec.exe (PID: 6868)
    • Process drops legitimate windows executable

      • UrbanVPN.exe (PID: 5576)
      • msiexec.exe (PID: 7688)
      • UrbanVPN.exe (PID: 4520)
    • Executable content was dropped or overwritten

      • UrbanVPN.exe (PID: 5576)
      • UrbanVPN.exe (PID: 4520)
      • tapinstall.exe (PID: 7392)
      • drvinst.exe (PID: 7328)
      • drvinst.exe (PID: 6644)
      • MSI2CC1.tmp (PID: 3260)
    • Checks for Java to be installed

      • msiexec.exe (PID: 7688)
    • Reads security settings of Internet Explorer

      • UrbanVPN.exe (PID: 5576)
      • UrbanVPN.exe (PID: 4520)
      • tapinstall.exe (PID: 7392)
      • MSI3560.tmp (PID: 6812)
    • Reads Internet Explorer settings

      • UrbanVPN.exe (PID: 5576)
    • Application launched itself

      • UrbanVPN.exe (PID: 5576)
    • Checks Windows Trust Settings

      • UrbanVPN.exe (PID: 4520)
      • tapinstall.exe (PID: 7392)
      • drvinst.exe (PID: 7328)
      • UrbanVPN.exe (PID: 5576)
    • Executes as Windows Service

      • VSSVC.exe (PID: 7668)
      • urbanvpnserv.exe (PID: 7248)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • MSI2CC1.tmp (PID: 3260)
    • Drops a system driver (possible attempt to evade defenses)

      • MSI2CC1.tmp (PID: 3260)
      • drvinst.exe (PID: 7328)
      • tapinstall.exe (PID: 7392)
      • drvinst.exe (PID: 6644)
    • Creates a software uninstall entry

      • MSI2CC1.tmp (PID: 3260)
    • Connects to unusual port

      • urbanvpnserv.exe (PID: 7248)
      • msiexec.exe (PID: 7816)
  • INFO

    • Checks supported languages

      • identity_helper.exe (PID: 7456)
      • msiexec.exe (PID: 7688)
      • UrbanVPN.exe (PID: 5576)
      • UrbanVPN.exe (PID: 4520)
      • msiexec.exe (PID: 6868)
      • msiexec.exe (PID: 7816)
      • MSI3560.tmp (PID: 6812)
      • drvinst.exe (PID: 7328)
    • Reads Environment values

      • identity_helper.exe (PID: 7456)
      • UrbanVPN.exe (PID: 5576)
      • msiexec.exe (PID: 7688)
      • UrbanVPN.exe (PID: 4520)
      • UrbanVPNUpdater.exe (PID: 5400)
      • msiexec.exe (PID: 7124)
    • Reads the computer name

      • identity_helper.exe (PID: 7456)
      • UrbanVPN.exe (PID: 5576)
      • UrbanVPN.exe (PID: 4520)
      • msiexec.exe (PID: 7816)
      • drvinst.exe (PID: 6644)
    • Executable content was dropped or overwritten

      • msedge.exe (PID: 6332)
      • msedge.exe (PID: 3848)
      • msiexec.exe (PID: 7688)
      • msiexec.exe (PID: 6868)
    • The sample compiled with english language support

      • msedge.exe (PID: 6332)
      • msedge.exe (PID: 3848)
      • UrbanVPN.exe (PID: 5576)
      • msiexec.exe (PID: 7688)
      • UrbanVPN.exe (PID: 4520)
      • msiexec.exe (PID: 6868)
      • MSI2CC1.tmp (PID: 3260)
      • tapinstall.exe (PID: 7392)
      • drvinst.exe (PID: 7328)
      • drvinst.exe (PID: 6644)
    • The process uses the downloaded file

      • msedge.exe (PID: 3848)
      • UrbanVPN.exe (PID: 5576)
      • MSI3560.tmp (PID: 6812)
    • Creates files or folders in the user directory

      • UrbanVPN.exe (PID: 5576)
    • Reads the software policy settings

      • UrbanVPN.exe (PID: 5576)
      • UrbanVPN.exe (PID: 4520)
      • urbanvpn-gui.exe (PID: 7416)
      • UrbanVPNUpdater.exe (PID: 5400)
    • Checks proxy server information

      • UrbanVPN.exe (PID: 5576)
      • MSI3560.tmp (PID: 6812)
    • Application launched itself

      • msedge.exe (PID: 3848)
      • msiexec.exe (PID: 6868)
    • Reads Microsoft Office registry keys

      • msiexec.exe (PID: 7688)
    • Create files in a temporary directory

      • UrbanVPN.exe (PID: 5576)
      • msiexec.exe (PID: 7688)
      • UrbanVPN.exe (PID: 4520)
      • MSI2CC1.tmp (PID: 3260)
      • tapinstall.exe (PID: 7392)
      • msiexec.exe (PID: 7124)
    • Process checks computer location settings

      • UrbanVPN.exe (PID: 5576)
    • Reads the machine GUID from the registry

      • UrbanVPN.exe (PID: 4520)
      • tapinstall.exe (PID: 7392)
      • drvinst.exe (PID: 7328)
      • UrbanVPN.exe (PID: 5576)
    • Manages system restore points

      • SrTasks.exe (PID: 3988)
    • Starts application with an unusual extension

      • msiexec.exe (PID: 6868)
    • Creates files in the program directory

      • MSI2CC1.tmp (PID: 3260)
    • Local mutex for internet shortcut management

      • MSI3560.tmp (PID: 6812)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 6868)
    • Manual execution by a user

      • UrbanVPNUpdater.exe (PID: 5400)
      • Taskmgr.exe (PID: 7972)
      • Taskmgr.exe (PID: 8152)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
212
Monitored processes
77
Malicious processes
5
Suspicious processes
4

Behavior graph

Click at the process to see the details
start msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs urbanvpn.exe no specs urbanvpn.exe msiexec.exe msiexec.exe rundll32.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs urbanvpn.exe vssvc.exe no specs srtasks.exe no specs conhost.exe no specs msiexec.exe msiexec.exe msi2cc1.tmp tapinstall.exe no specs conhost.exe no specs tapinstall.exe conhost.exe no specs drvinst.exe drvinst.exe msi3560.tmp no specs msiexec.exe msedge.exe no specs msedge.exe no specs urbanvpnupdater.exe msedge.exe no specs HNetCfg.FwPolicy2 no specs urbanvpnserv.exe msedge.exe no specs msedge.exe no specs urbanvpnupdater.exe urbanvpn-gui.exe urbanvpn.exe no specs conhost.exe no specs msedge.exe no specs msedge.exe no specs urbanvpn.exe conhost.exe no specs taskmgr.exe no specs taskmgr.exe msedge.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
188"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6736 --field-trial-handle=2344,i,15245216446867080198,14345922461469404469,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
836"C:\Users\admin\Downloads\UrbanVPN.exe" C:\Users\admin\Downloads\UrbanVPN.exemsedge.exe
User:
admin
Company:
Urban Security
Integrity Level:
MEDIUM
Description:
UrbanVPN Installer
Exit code:
3221226540
Version:
2.3.0.3
Modules
Images
c:\users\admin\downloads\urbanvpn.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
1296"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=32 --mojo-platform-channel-handle=6972 --field-trial-handle=2344,i,15245216446867080198,14345922461469404469,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1540\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exetapinstall.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2200\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exetapinstall.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2200\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeurbanvpn.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2632\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeurbanvpn.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
2736"C:\Program Files\TAP-Windows\bin\tapinstall.exe" hwids tap0901C:\Program Files\TAP-Windows\bin\tapinstall.exeMSI2CC1.tmp
User:
admin
Company:
Windows (R) Win 7 DDK provider
Integrity Level:
HIGH
Description:
Windows Setup API
Exit code:
0
Version:
10.0.10011.16384
Modules
Images
c:\program files\tap-windows\bin\tapinstall.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
3260"C:\WINDOWS\Installer\MSI2CC1.tmp" /S /SELECT_UTILITIES=1C:\Windows\Installer\MSI2CC1.tmp
msiexec.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\windows\installer\msi2cc1.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
3364urbanvpn --versionC:\Program Files\UrbanVPN\bin\urbanvpn.exeurbanvpn-gui.exe
User:
admin
Company:
Urban Cyber Security Inc.
Integrity Level:
MEDIUM
Description:
UrbanVPN Daemon
Exit code:
1
Version:
2.3.0.0
Modules
Images
c:\program files\urbanvpn\bin\urbanvpn.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
36 896
Read events
36 404
Write events
461
Delete events
31

Modification events

(PID) Process:(3848) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(3848) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(3848) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(3848) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(3848) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
3CA8A7C76C8A2F00
(PID) Process:(3848) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
3100B0C76C8A2F00
(PID) Process:(3848) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\263006
Operation:writeName:WindowTabManagerFileMappingId
Value:
{3FEB19B7-BC3A-498F-A504-24DB6A7BEA73}
(PID) Process:(3848) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\263006
Operation:writeName:WindowTabManagerFileMappingId
Value:
{5F51AA0F-FA50-46DE-A4CC-E9FBF891D79E}
(PID) Process:(3848) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
4B43E1C76C8A2F00
(PID) Process:(3848) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\263006
Operation:writeName:WindowTabManagerFileMappingId
Value:
{5514F6F8-1840-4558-96A0-59E2BE123C68}
Executable files
110
Suspicious files
371
Text files
95
Unknown types
9

Dropped files

PID
Process
Filename
Type
3848msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Local State
MD5:
SHA256:
3848msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old~RF135392.TMP
MD5:
SHA256:
3848msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
3848msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old~RF1353a1.TMP
MD5:
SHA256:
3848msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
3848msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old~RF1353d0.TMP
MD5:
SHA256:
3848msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
3848msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF1353ef.TMP
MD5:
SHA256:
3848msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF135392.TMP
MD5:
SHA256:
3848msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
35
TCP/UDP connections
179
DNS requests
118
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5576
UrbanVPN.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT3xL4LQLXDRDM9P665TW442vrsUQQUReuir%2FSSy4IxLVGLp6chnfNtyA8CEA6bGI750C3n79tQ4ghAGFo%3D
unknown
whitelisted
5576
UrbanVPN.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxXWRM3y5nP%2Be6mK4cD08CEAitQLJg0pxMn17Nqb2Trtk%3D
unknown
whitelisted
7792
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7792
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5576
UrbanVPN.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSRXerF0eFeSWRripTgTkcJWMm7iQQUaDfg67Y7%2BF8Rhvv%2BYXsIiGX0TkICEAN8OBm6V%2FQ712OcDUKDCyI%3D
unknown
whitelisted
6768
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
6332
msedge.exe
157.240.0.6:443
connect.facebook.net
whitelisted
6332
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6332
msedge.exe
142.250.186.99:443
fonts.gstatic.com
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 2.16.241.19
  • 2.16.241.12
whitelisted
google.com
  • 172.217.16.206
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 2.23.246.101
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
www.urban-vpn.com
  • 3.160.150.118
  • 3.160.150.2
  • 3.160.150.38
  • 3.160.150.69
unknown
edge.microsoft.com
  • 204.79.197.239
  • 13.107.21.239
whitelisted
business.bing.com
  • 13.107.6.158
whitelisted
edge-mobile-static.azureedge.net
  • 13.107.246.45
whitelisted
bzib.nelreports.net
  • 2.22.242.105
  • 2.22.242.11
whitelisted
www.bing.com
  • 2.21.65.132
  • 2.21.65.154
whitelisted

Threats

PID
Process
Class
Message
7248
urbanvpnserv.exe
Misc activity
ET USER_AGENTS Go HTTP Client User-Agent
7248
urbanvpnserv.exe
Misc activity
ET USER_AGENTS Go HTTP Client User-Agent
7248
urbanvpnserv.exe
Misc activity
ET USER_AGENTS Go HTTP Client User-Agent
Process
Message
msiexec.exe
Logger::SetLogFile( C:\Users\admin\AppData\Roaming\Caphyon\Advanced Installer\AI_ResourceCleaner.log ) while OLD path is:
UrbanVPNUpdater.exe
Logger::SetLogFile( C:\ProgramData\UrbanVPN\updates\updater.log ) while OLD path is:
msiexec.exe
Logger::SetLogFile( C:\Users\admin\AppData\Roaming\Caphyon\Advanced Installer\AI_ResourceCleaner.log ) while OLD path is:
msiexec.exe
Logger::SetLogFile( C:\Users\admin\AppData\Roaming\Caphyon\Advanced Installer\AI_ResourceCleaner.log ) while OLD path is:
UrbanVPNUpdater.exe
Logger::SetLogFile( C:\ProgramData\UrbanVPN\updates\updater.log ) while OLD path is:
urbanvpn-gui.exe
First instance of UrbanVPN was started.