File name:

BootstrapperNew.exe

Full analysis: https://app.any.run/tasks/18eeb3bd-fa74-4755-a14c-5e153d14e35a
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: August 05, 2025, 19:13:39
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
loader
themida
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows, 2 sections
MD5:

1974506038C5934399DE3C2F6C7544DE

SHA1:

2178C758DE77C465014F96262CAA4059BA7D996E

SHA256:

5BCC68604C4C4ADD6D592E0455156024E52FF10F9F06DAA1F543B005D7C2A53F

SSDEEP:

98304:bYzoojJRba+nPSqNCrRasNk0LW4kr+zIIvt4Fi1VG86jieQEnW/T/2iGgr2YCQeK:U+oMW6If

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • BootstrapperNew.exe (PID: 4544)
      • MicrosoftEdgeUpdate.exe (PID: 3840)
      • Solara.exe (PID: 1568)
    • Process drops legitimate windows executable

      • BootstrapperNew.exe (PID: 4544)
      • MicrosoftEdgeWebview2Setup.exe (PID: 4400)
      • MicrosoftEdgeUpdate.exe (PID: 3840)
    • Starts a Microsoft application from unusual location

      • MicrosoftEdgeWebview2Setup.exe (PID: 4400)
      • MicrosoftEdgeUpdate.exe (PID: 3840)
    • Executable content was dropped or overwritten

      • MicrosoftEdgeWebview2Setup.exe (PID: 4400)
      • BootstrapperNew.exe (PID: 4544)
    • Disables SEHOP

      • MicrosoftEdgeUpdate.exe (PID: 3840)
    • Reads the date of Windows installation

      • BootstrapperNew.exe (PID: 4544)
    • Process requests binary or script from the Internet

      • BootstrapperNew.exe (PID: 4544)
    • The process drops C-runtime libraries

      • BootstrapperNew.exe (PID: 4544)
    • Reads the BIOS version

      • Solara.exe (PID: 1568)
    • The system shut down or reboot

      • cmd.exe (PID: 9212)
  • INFO

    • Reads the computer name

      • BootstrapperNew.exe (PID: 4544)
      • Solara.exe (PID: 1568)
      • MicrosoftEdgeUpdate.exe (PID: 3840)
      • identity_helper.exe (PID: 4400)
    • Creates files in the program directory

      • BootstrapperNew.exe (PID: 4544)
      • MicrosoftEdgeWebview2Setup.exe (PID: 4400)
      • Solara.exe (PID: 1568)
    • Disables trace logs

      • BootstrapperNew.exe (PID: 4544)
      • Solara.exe (PID: 1568)
    • Checks supported languages

      • BootstrapperNew.exe (PID: 4544)
      • MicrosoftEdgeWebview2Setup.exe (PID: 4400)
      • Solara.exe (PID: 1568)
      • MicrosoftEdgeUpdate.exe (PID: 3840)
      • identity_helper.exe (PID: 4400)
    • Reads the machine GUID from the registry

      • BootstrapperNew.exe (PID: 4544)
      • Solara.exe (PID: 1568)
    • Reads Environment values

      • BootstrapperNew.exe (PID: 4544)
      • MicrosoftEdgeUpdate.exe (PID: 3840)
      • Solara.exe (PID: 1568)
      • identity_helper.exe (PID: 4400)
    • Create files in a temporary directory

      • BootstrapperNew.exe (PID: 4544)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • BootstrapperNew.exe (PID: 4544)
    • Checks proxy server information

      • BootstrapperNew.exe (PID: 4544)
      • wermgr.exe (PID: 3932)
      • MicrosoftEdgeUpdate.exe (PID: 3840)
      • Solara.exe (PID: 1568)
      • slui.exe (PID: 8820)
    • Reads the software policy settings

      • BootstrapperNew.exe (PID: 4544)
      • MicrosoftEdgeUpdate.exe (PID: 3840)
      • wermgr.exe (PID: 3932)
      • Solara.exe (PID: 1568)
      • slui.exe (PID: 8820)
    • The sample compiled with english language support

      • BootstrapperNew.exe (PID: 4544)
      • MicrosoftEdgeWebview2Setup.exe (PID: 4400)
      • MicrosoftEdgeUpdate.exe (PID: 3840)
      • firefox.exe (PID: 7296)
    • Process checks computer location settings

      • MicrosoftEdgeUpdate.exe (PID: 3840)
      • BootstrapperNew.exe (PID: 4544)
    • Creates files or folders in the user directory

      • wermgr.exe (PID: 3932)
    • Process checks whether UAC notifications are on

      • Solara.exe (PID: 1568)
    • Manual execution by a user

      • msedge.exe (PID: 3768)
      • firefox.exe (PID: 7512)
      • cmd.exe (PID: 9212)
    • Application launched itself

      • msedge.exe (PID: 1336)
      • msedge.exe (PID: 7084)
      • msedge.exe (PID: 7648)
      • firefox.exe (PID: 7512)
      • msedge.exe (PID: 3768)
      • firefox.exe (PID: 7296)
    • Themida protector has been detected

      • Solara.exe (PID: 1568)
    • Executable content was dropped or overwritten

      • firefox.exe (PID: 7296)
    • Reads Microsoft Office registry keys

      • firefox.exe (PID: 7296)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2056:07:11 06:55:49+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 48
CodeSize: 6879232
InitializedDataSize: 9216
UninitializedDataSize: -
EntryPoint: 0x0000
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: Bootstrapper
FileVersion: 1.0.0.0
InternalName: Bootstrapper.exe
LegalCopyright: Copyright © 2024
LegalTrademarks: -
OriginalFileName: Bootstrapper.exe
ProductName: Bootstrapper
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
209
Monitored processes
63
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start bootstrappernew.exe microsoftedgewebview2setup.exe microsoftedgeupdate.exe wermgr.exe solara.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs slui.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs firefox.exe no specs firefox.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs cmd.exe conhost.exe no specs bcdedit.exe no specs shutdown.exe no specs bootstrappernew.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
188"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --disable-quic --string-annotations --always-read-main-dll --field-trial-handle=2212,i,12811375012805271511,1722783875806171191,262144 --variations-seed-version --mojo-platform-channel-handle=2484 /prefetch:3C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1232"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2428,i,3250265964803840705,2205233550134840943,262144 --variations-seed-version --mojo-platform-channel-handle=2424 /prefetch:2C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1336"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://app.revolt.chat/invite/yQBTsMHAC:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeSolara.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
1568"C:\ProgramData\Solara\Solara.exe" --bootstrapperPath "C:\Users\admin\AppData\Local\Temp" --bootstrapperExe "C:\Users\admin\AppData\Local\Temp\BootstrapperNew.exe"C:\ProgramData\Solara\Solara.exe
BootstrapperNew.exe
User:
admin
Company:
CMD Softworks
Integrity Level:
HIGH
Description:
Solara V3
Version:
3.0.0.0
Modules
Images
c:\programdata\solara\solara.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1576"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --disable-quic --string-annotations --always-read-main-dll --field-trial-handle=4136,i,18130876879097819299,9339710945956581830,262144 --variations-seed-version --mojo-platform-channel-handle=5260 /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1652"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4296 -prefsLen 44926 -prefMapHandle 4316 -prefMapSize 272997 -jsInitHandle 4320 -jsInitLen 247456 -parentBuildID 20250227124745 -ipcHandle 4332 -initialChannelId {3b2196a8-2b6f-4115-97fd-437cc6bd30cd} -parentPid 7296 -crashReporter "\\.\pipe\gecko-crash-server-pipe.7296" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
136.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\msvcp140.dll
c:\windows\system32\vcruntime140.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\crypt32.dll
2028"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250227124745 -prefsHandle 1980 -prefsLen 36520 -prefMapHandle 1984 -prefMapSize 272997 -ipcHandle 2060 -initialChannelId {1c3afa17-fc30-4026-8d29-a930571f6206} -parentPid 7296 -crashReporter "\\.\pipe\gecko-crash-server-pipe.7296" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpuC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
136.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\msvcp140.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\vcruntime140.dll
c:\windows\system32\vcruntime140_1.dll
c:\windows\system32\bcrypt.dll
2132"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --disable-quic --string-annotations --always-read-main-dll --field-trial-handle=2756,i,3250265964803840705,2205233550134840943,262144 --variations-seed-version --mojo-platform-channel-handle=2772 /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2280\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2680"C:\Users\admin\AppData\Local\Temp\BootstrapperNew.exe" C:\Users\admin\AppData\Local\Temp\BootstrapperNew.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Bootstrapper
Exit code:
3221226540
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\bootstrappernew.exe
c:\windows\system32\ntdll.dll
Total events
38 150
Read events
38 026
Write events
100
Delete events
24

Modification events

(PID) Process:(4544) BootstrapperNew.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperNew_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4544) BootstrapperNew.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperNew_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(4544) BootstrapperNew.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperNew_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(4544) BootstrapperNew.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperNew_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(4544) BootstrapperNew.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperNew_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(4544) BootstrapperNew.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperNew_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(4544) BootstrapperNew.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperNew_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(4544) BootstrapperNew.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperNew_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4544) BootstrapperNew.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperNew_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(4544) BootstrapperNew.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BootstrapperNew_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
215
Suspicious files
492
Text files
1 730
Unknown types
181

Dropped files

PID
Process
Filename
Type
4544BootstrapperNew.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_ursok3ah.trw.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
4544BootstrapperNew.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_knkjquj0.oll.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
4544BootstrapperNew.exeC:\Users\admin\AppData\Local\Temp\CONFIGbinary
MD5:0284FA0391784125AD3B12BE8C92C6AE
SHA256:789075B8C810F2B63F86DD1F8B7BE836178AC679A32F2CB2376E013BC78C68C0
4400MicrosoftEdgeWebview2Setup.exeC:\Program Files (x86)\Microsoft\Temp\EU65F.tmp\psmachine_64.dllexecutable
MD5:D7C9EA1F61311C995A54413C9BE43EEE
SHA256:775E6BA603AB85C03CF4A9FEA71581707B96C91E8B188574BAF3CC5B0371896C
4400MicrosoftEdgeWebview2Setup.exeC:\Program Files (x86)\Microsoft\Temp\EU65F.tmp\psmachine_arm64.dllexecutable
MD5:DF48414C12F739F526B01075B6B73A84
SHA256:D1F11F6FE0132E3FC9475C66823BB39AB1571A306A94C518179D19861B20225F
4400MicrosoftEdgeWebview2Setup.exeC:\Program Files (x86)\Microsoft\Temp\EU65F.tmp\psuser.dllexecutable
MD5:79D1ED3F4DBDB5103E31018D691E9309
SHA256:616DF08938F4D959081B8121CB66FBE05313E26AC776562421E574DB08C5D309
4400MicrosoftEdgeWebview2Setup.exeC:\Program Files (x86)\Microsoft\Temp\EU65F.tmp\psmachine.dllexecutable
MD5:EAD519174ECE77F205B731C834FA1254
SHA256:1CC5C90531D6DE53BD1953F61ABABCFF1E925D4A86D1FEE2EB085E1C5AB1A308
4544BootstrapperNew.exeC:\Users\admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exeexecutable
MD5:FB7FF07F000EF3F6EBF22B0044F0DC13
SHA256:1BDCFC30FD8F711134DDC400C39C126A7678ED5717E9E3A320BBF4F4E4DA2ED4
4400MicrosoftEdgeWebview2Setup.exeC:\Program Files (x86)\Microsoft\Temp\EU65F.tmp\msedgeupdate.dllexecutable
MD5:FADF3B40EA0BE2351EA8CBE57D5116F8
SHA256:E2C8B7BD5B0095F08E9A3C4142C81936B0946394E7CD0A83B8C171C44CAD3A1C
4400MicrosoftEdgeWebview2Setup.exeC:\Program Files (x86)\Microsoft\Temp\EU65F.tmp\psuser_64.dllexecutable
MD5:91CA1359EB017D7FCBAF696FCEFCD3EE
SHA256:09C1A044F1E8D96F2E1E44EF04932D7BF27A0B53A97C08F0A5E3AB0FE90F4894
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
58
TCP/UDP connections
195
DNS requests
245
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5500
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1268
svchost.exe
GET
200
23.48.23.138:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3932
wermgr.exe
GET
200
23.48.23.138:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4544
BootstrapperNew.exe
GET
301
172.67.203.125:80
http://getsolara.dev/api/endpoint.json
unknown
unknown
764
lsass.exe
GET
200
142.250.186.99:80
http://c.pki.goog/r/gsr1.crl
unknown
whitelisted
764
lsass.exe
GET
200
142.250.186.99:80
http://c.pki.goog/r/r4.crl
unknown
whitelisted
1216
SIHClient.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1216
SIHClient.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5352
msedge.exe
GET
200
150.171.28.11:80
http://edge.microsoft.com/browsernetworktime/time/1/current?cup2key=2:NZCEdelgx9SOET9wPN5GEcd-efiw3ZvwKVfgbYBuUEA&cup2hreq=e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1268
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
684
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
5500
svchost.exe
20.190.160.130:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5500
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
23.48.23.138:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
69.192.161.161:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 51.104.136.2
whitelisted
google.com
  • 172.217.16.206
whitelisted
login.live.com
  • 20.190.160.130
  • 20.190.160.64
  • 20.190.160.132
  • 20.190.160.4
  • 40.126.32.133
  • 20.190.160.2
  • 40.126.32.140
  • 40.126.32.72
  • 20.190.159.130
  • 40.126.31.0
  • 20.190.159.129
  • 20.190.159.23
  • 20.190.159.75
  • 40.126.31.73
  • 20.190.159.68
  • 20.190.159.4
whitelisted
ocsp.digicert.com
  • 2.17.190.73
  • 184.30.131.245
whitelisted
crl.microsoft.com
  • 23.48.23.138
  • 23.48.23.141
  • 23.48.23.148
  • 23.48.23.143
  • 23.48.23.134
  • 23.48.23.139
  • 23.48.23.144
  • 23.48.23.146
  • 23.48.23.137
whitelisted
www.microsoft.com
  • 69.192.161.161
whitelisted
go.microsoft.com
  • 23.52.181.141
whitelisted
msedge.sf.dl.delivery.mp.microsoft.com
  • 2.16.168.212
  • 2.16.168.197
whitelisted
config.edge.skype.com
  • 150.171.22.17
whitelisted
watson.events.data.microsoft.com
  • 135.234.160.246
  • 135.233.45.223
whitelisted

Threats

No threats detected
No debug info