File name:

setup.exe

Full analysis: https://app.any.run/tasks/f40ad53c-cea2-4573-9d43-1d736193da5e
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: May 15, 2025, 16:00:08
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
stealer
loader
delphi
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections
MD5:

852693707C534FCE63DD285F34DE76EC

SHA1:

A6A3D68C9388A19E6137714511E83AB9C345A251

SHA256:

6D21DC14D527B8428A3FDCF6901F618C618701D00C66E036AD2167961EF2B4ED

SSDEEP:

12288:GpGLIAulxsNcxo3EqxSHNCORPvkCxfZtXMlYQWfN:GpEIAulxsaoPYHNCwPvkwht8l7WfN

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • setup.exe (PID: 2560)
      • VirtuServer128.exe (PID: 5280)
    • Steals credentials from Web Browsers

      • setup.exe (PID: 2560)
    • Executing a file with an untrusted certificate

      • hjksfk.exe (PID: 5392)
      • hjksfc.exe (PID: 5260)
      • DistriCompiler89.exe (PID: 1240)
      • DistriCompiler89.exe (PID: 5964)
      • DistriCompiler89.exe (PID: 6132)
      • VirtuServer128.exe (PID: 5280)
      • shark.exe (PID: 6576)
    • Antivirus name has been found in the command line (generic signature)

      • hjksfc.exe (PID: 5260)
    • Known privilege escalation attack

      • dllhost.exe (PID: 896)
    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 6576)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • setup.exe (PID: 2560)
      • VirtuServer128.exe (PID: 5280)
      • MicrosoftEdgeUpdate.exe (PID: 4268)
      • MicrosoftEdgeWebview2Setup.exe (PID: 6156)
    • Starts a Microsoft application from unusual location

      • setup.exe (PID: 2560)
      • MicrosoftEdgeUpdate.exe (PID: 4268)
    • Executable content was dropped or overwritten

      • setup.exe (PID: 2560)
      • hjksfc.exe (PID: 5260)
      • DistriCompiler89.exe (PID: 5964)
      • DistriCompiler89.exe (PID: 1240)
      • DistriCompiler89.exe (PID: 6132)
      • hjksfk.exe (PID: 5392)
      • VirtuServer128.exe (PID: 5280)
      • MicrosoftEdgeWebview2Setup.exe (PID: 6156)
    • Potential Corporate Privacy Violation

      • setup.exe (PID: 2560)
    • Reads security settings of Internet Explorer

      • setup.exe (PID: 2560)
      • hjksfc.exe (PID: 5260)
      • VirtuServer128.exe (PID: 5280)
      • MicrosoftEdgeUpdate.exe (PID: 4268)
    • Starts itself from another location

      • DistriCompiler89.exe (PID: 5964)
    • Drops 7-zip archiver for unpacking

      • DistriCompiler89.exe (PID: 1240)
    • There is functionality for taking screenshot (YARA)

      • hjksfk.exe (PID: 5392)
    • Executes application which crashes

      • hjksfk.exe (PID: 5392)
      • shark.exe (PID: 6576)
    • Starts CMD.EXE for commands execution

      • hjksfk.exe (PID: 5392)
    • Connects to unusual port

      • VirtuServer128.exe (PID: 5280)
      • shark.exe (PID: 6576)
    • Starts POWERSHELL.EXE for commands execution

      • VirtuServer128.exe (PID: 5280)
    • Starts process via Powershell

      • powershell.exe (PID: 4336)
    • Disables SEHOP

      • MicrosoftEdgeUpdate.exe (PID: 4268)
    • The process executes via Task Scheduler

      • shark.exe (PID: 6576)
    • Uses WMIC.EXE to obtain Windows Installer data

      • shark.exe (PID: 6576)
  • INFO

    • The sample compiled with english language support

      • setup.exe (PID: 2560)
      • DistriCompiler89.exe (PID: 1240)
      • DistriCompiler89.exe (PID: 6132)
      • VirtuServer128.exe (PID: 5280)
      • MicrosoftEdgeWebview2Setup.exe (PID: 6156)
      • MicrosoftEdgeUpdate.exe (PID: 4268)
    • Checks supported languages

      • setup.exe (PID: 2560)
      • elevation_service.exe (PID: 5588)
      • hjksfk.exe (PID: 5392)
      • hjksfc.exe (PID: 5260)
      • DistriCompiler89.exe (PID: 5964)
      • DistriCompiler89.exe (PID: 1240)
      • 7za.exe (PID: 5352)
      • DistriCompiler89.exe (PID: 6132)
      • VirtuServer128.exe (PID: 5280)
      • 7za.exe (PID: 5972)
      • MicrosoftEdgeWebview2Setup.exe (PID: 6156)
      • MicrosoftEdgeUpdate.exe (PID: 4268)
      • shark.exe (PID: 6576)
    • Reads the machine GUID from the registry

      • setup.exe (PID: 2560)
      • 7za.exe (PID: 5352)
      • VirtuServer128.exe (PID: 5280)
      • shark.exe (PID: 6576)
    • Executes as Windows Service

      • elevation_service.exe (PID: 5588)
    • Reads the computer name

      • elevation_service.exe (PID: 5588)
      • setup.exe (PID: 2560)
      • DistriCompiler89.exe (PID: 5964)
      • DistriCompiler89.exe (PID: 1240)
      • hjksfc.exe (PID: 5260)
      • 7za.exe (PID: 5352)
      • DistriCompiler89.exe (PID: 6132)
      • 7za.exe (PID: 5972)
      • VirtuServer128.exe (PID: 5280)
      • MicrosoftEdgeUpdate.exe (PID: 4268)
      • shark.exe (PID: 6576)
    • Process checks computer location settings

      • setup.exe (PID: 2560)
      • hjksfc.exe (PID: 5260)
      • MicrosoftEdgeUpdate.exe (PID: 4268)
    • Creates files in the program directory

      • DistriCompiler89.exe (PID: 5964)
      • DistriCompiler89.exe (PID: 1240)
      • hjksfk.exe (PID: 5392)
      • DistriCompiler89.exe (PID: 6132)
      • MicrosoftEdgeWebview2Setup.exe (PID: 6156)
      • VirtuServer128.exe (PID: 5280)
    • Create files in a temporary directory

      • DistriCompiler89.exe (PID: 1240)
      • DistriCompiler89.exe (PID: 6132)
    • Compiled with Borland Delphi (YARA)

      • hjksfk.exe (PID: 5392)
    • Checks transactions between databases Windows and Oracle

      • 7za.exe (PID: 5352)
    • Reads security settings of Internet Explorer

      • dllhost.exe (PID: 896)
    • Drops encrypted JS script (Microsoft Script Encoder)

      • hjksfk.exe (PID: 5392)
      • shark.exe (PID: 6576)
    • Checks proxy server information

      • VirtuServer128.exe (PID: 5280)
      • MicrosoftEdgeUpdate.exe (PID: 4268)
      • wermgr.exe (PID: 6044)
    • Reads the software policy settings

      • slui.exe (PID: 2284)
      • VirtuServer128.exe (PID: 5280)
      • wermgr.exe (PID: 6044)
      • MicrosoftEdgeUpdate.exe (PID: 4268)
      • shark.exe (PID: 6576)
    • Creates files or folders in the user directory

      • VirtuServer128.exe (PID: 5280)
      • wermgr.exe (PID: 6044)
    • Reads Environment values

      • MicrosoftEdgeUpdate.exe (PID: 4268)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2017:11:18 21:37:28+00:00
ImageFileCharacteristics: Executable, 32-bit, Removable run from swap, Net run from swap
PEType: PE32
LinkerVersion: 14
CodeSize: 301056
InitializedDataSize: 161280
UninitializedDataSize: -
EntryPoint: 0x2e06d
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 14.28.29325.2
ProductVersionNumber: 14.28.29325.2
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: Microsoft Corporation
FileDescription: Microsoft Visual C++ 2015-2019 Redistributable (x64) - 14.28.29325
FileVersion: 14.28.29325.2
InternalName: setup
LegalCopyright: Copyright (c) Microsoft Corporation. All rights reserved.
OriginalFileName: VC_redist.x64.exe
ProductName: Microsoft Visual C++ 2015-2019 Redistributable (x64) - 14.28.29325
ProductVersion: 14.28.29325.2
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
194
Monitored processes
49
Malicious processes
11
Suspicious processes
1

Behavior graph

Click at the process to see the details
start setup.exe sppextcomobj.exe no specs slui.exe chrome.exe no specs msedge.exe no specs elevation_service.exe no specs chrome.exe no specs msedge.exe no specs chrome.exe no specs msedge.exe no specs chrome.exe no specs msedge.exe no specs hjksfk.exe hjksfc.exe districompiler89.exe districompiler89.exe 7za.exe no specs conhost.exe no specs werfault.exe no specs werfault.exe no specs werfault.exe no specs CMSTPLUA districompiler89.exe werfault.exe no specs werfault.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs werfault.exe no specs werfault.exe no specs virtuserver128.exe slui.exe no specs 7za.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs microsoftedgewebview2setup.exe microsoftedgeupdate.exe wermgr.exe shark.exe werfault.exe no specs werfault.exe no specs werfault.exe no specs werfault.exe no specs werfault.exe no specs werfault.exe no specs wmic.exe no specs conhost.exe no specs werfault.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
720"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exesetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
856C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
896C:\WINDOWS\system32\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}C:\Windows\System32\dllhost.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
1096\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1188"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exesetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
1
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1240C:\ProgramData\Iaclientv2\DistriCompiler89.exeC:\ProgramData\Iaclientv2\DistriCompiler89.exe
DistriCompiler89.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\programdata\iaclientv2\districompiler89.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
1276C:\WINDOWS\SysWOW64\WerFault.exe -u -p 6576 -s 540C:\Windows\SysWOW64\WerFault.exeshark.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
1280"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exesetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
1
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1660C:\WINDOWS\SysWOW64\WerFault.exe -u -p 5392 -s 604C:\Windows\SysWOW64\WerFault.exehjksfk.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
2148C:\WINDOWS\SysWOW64\WerFault.exe -u -p 5392 -s 624C:\Windows\SysWOW64\WerFault.exehjksfk.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
Total events
18 245
Read events
18 193
Write events
50
Delete events
2

Modification events

(PID) Process:(720) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(720) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(6964) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
1
(PID) Process:(6028) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(6028) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(2152) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
1
(PID) Process:(4208) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
2
(PID) Process:(4208) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
3
(PID) Process:(1280) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
2
(PID) Process:(1280) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
3
Executable files
214
Suspicious files
25
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
4208chrome.exeC:\Users\admin\AppData\Local\Temp\Cookiesbinary
MD5:06AD9E737639FDC745B3B65312857109
SHA256:C8925892CA8E213746633033AE95ACFB8DD9531BC376B82066E686AC6F40A404
2560setup.exeC:\Users\admin\hjksfk.exeexecutable
MD5:7019B60173E7DE285F19621945DEDF25
SHA256:25A375F5CBA3DCE4024BC78F7D4768A83CF09A64DDB971BD10C87FA97E4A5D65
6964chrome.exeC:\Users\admin\AppData\Local\Temp\Login Databinary
MD5:A45465CDCDC6CB30C8906F3DA4EC114C
SHA256:4412319EF944EBCCA9581CBACB1D4E1DC614C348D1DFC5D2FAAAAD863D300209
5504chrome.exeC:\Users\admin\AppData\Local\Temp\Web Databinary
MD5:F6C33AC5E1032A0873BE7BFC65169287
SHA256:D97895CEDED32E33D57BDCACCDBE144E58AA87AF4D2F8855D630286CE30A8D83
1240DistriCompiler89.exeC:\ProgramData\Iaclientv2\7za.exeexecutable
MD5:874D01860E2C726CF7D18E0054E30ACA
SHA256:EC835CBAAD5C14EF5ABCD659199C2027D2C05CEE852FB82018D9D065261F304F
5964DistriCompiler89.exeC:\ProgramData\Iaclientv2\IconX.dllexecutable
MD5:F36412FC804A3D4B2236B59195232B16
SHA256:AF51DE13B16EE6EA6E09E59C4B2B32CBBA200F4A47A558B48E879C63D1AB1164
5964DistriCompiler89.exeC:\ProgramData\Iaclientv2\balata.appbinary
MD5:B91B05B3D67760A786C8B1EFC5955BC3
SHA256:3BF2616347DA3CF6440536EE343CA7B44811E9D5F7307CFEF9BE54714AB8AF00
6132DistriCompiler89.exeC:\Users\admin\AppData\Local\Temp\F496DFA.tmp
MD5:
SHA256:
5392hjksfk.exeC:\ProgramData\shark.exeexecutable
MD5:7019B60173E7DE285F19621945DEDF25
SHA256:25A375F5CBA3DCE4024BC78F7D4768A83CF09A64DDB971BD10C87FA97E4A5D65
1240DistriCompiler89.exeC:\Users\admin\AppData\Local\Temp\F0924AC.tmpbinary
MD5:F876121366BEEB5E77F75B68B003CE06
SHA256:9008F45A94BF66B6A74D4F035E7D24F85A29C757EC253088D6CEBB901FCCD419
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
47
DNS requests
23
Threats
8

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
2.20.245.137:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
2560
setup.exe
GET
200
104.21.45.251:80
http://h4.tykeblot.today/shark.bin
unknown
unknown
2560
setup.exe
GET
200
104.21.45.251:80
http://h4.tykeblot.today/sh.ext.bin
unknown
unknown
2088
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5280
VirtuServer128.exe
GET
200
18.245.38.41:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwdzEk8qlS4%2B0YpYvbhdG8DOXyc%3D
unknown
whitelisted
2088
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5280
VirtuServer128.exe
GET
200
143.204.99.128:80
http://ocsp.r2m04.amazontrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTihuFvpmFDw5hOcIp918Jm5B3CQgQUH1KSYVaCVH%2BBZtgdPQqqMlyH3QgCEAqlOECbKpghQnC3N5zkTKU%3D
unknown
unknown
6044
wermgr.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
2.20.245.137:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
23.219.150.101:80
www.microsoft.com
AKAMAI-AS
CL
whitelisted
2104
svchost.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
2112
svchost.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.129:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.142
whitelisted
crl.microsoft.com
  • 2.20.245.137
  • 2.20.245.139
  • 23.48.23.177
  • 23.48.23.168
  • 23.48.23.173
  • 23.48.23.166
  • 23.48.23.181
  • 23.48.23.171
  • 23.48.23.174
  • 23.48.23.180
  • 23.48.23.164
whitelisted
www.microsoft.com
  • 23.219.150.101
  • 184.30.21.171
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 20.190.159.129
  • 20.190.159.2
  • 40.126.31.2
  • 40.126.31.1
  • 20.190.159.73
  • 20.190.159.23
  • 40.126.31.3
  • 40.126.31.69
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

PID
Process
Class
Message
2560
setup.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
2560
setup.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
2560
setup.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
2560
setup.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
2196
svchost.exe
Misc activity
ET TA_ABUSED_SERVICES DNS Query to Commonly Actor Abused Online Service (data-seed-prebsc-1-s1 .binance .org)
5280
VirtuServer128.exe
Misc activity
ET TA_ABUSED_SERVICES Observed Commonly Actor Abused Online Service Domain (data-seed-prebsc-1-s1 .binance .org in TLS SNI)
2196
svchost.exe
Misc activity
ET TA_ABUSED_SERVICES DNS Query to Commonly Actor Abused Online Service (data-seed-prebsc-2-s1 .binance .org)
6576
shark.exe
Misc activity
ET TA_ABUSED_SERVICES Observed Commonly Actor Abused Online Service Domain (data-seed-prebsc-2-s1 .binance .org in TLS SNI)
No debug info