File name:

setup.exe

Full analysis: https://app.any.run/tasks/f40ad53c-cea2-4573-9d43-1d736193da5e
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: May 15, 2025, 16:00:08
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
stealer
loader
delphi
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections
MD5:

852693707C534FCE63DD285F34DE76EC

SHA1:

A6A3D68C9388A19E6137714511E83AB9C345A251

SHA256:

6D21DC14D527B8428A3FDCF6901F618C618701D00C66E036AD2167961EF2B4ED

SSDEEP:

12288:GpGLIAulxsNcxo3EqxSHNCORPvkCxfZtXMlYQWfN:GpEIAulxsaoPYHNCwPvkwht8l7WfN

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • setup.exe (PID: 2560)
      • VirtuServer128.exe (PID: 5280)
    • Steals credentials from Web Browsers

      • setup.exe (PID: 2560)
    • Executing a file with an untrusted certificate

      • hjksfk.exe (PID: 5392)
      • hjksfc.exe (PID: 5260)
      • DistriCompiler89.exe (PID: 5964)
      • DistriCompiler89.exe (PID: 1240)
      • DistriCompiler89.exe (PID: 6132)
      • VirtuServer128.exe (PID: 5280)
      • shark.exe (PID: 6576)
    • Antivirus name has been found in the command line (generic signature)

      • hjksfc.exe (PID: 5260)
    • Known privilege escalation attack

      • dllhost.exe (PID: 896)
    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 6576)
  • SUSPICIOUS

    • Starts a Microsoft application from unusual location

      • setup.exe (PID: 2560)
      • MicrosoftEdgeUpdate.exe (PID: 4268)
    • Process drops legitimate windows executable

      • setup.exe (PID: 2560)
      • VirtuServer128.exe (PID: 5280)
      • MicrosoftEdgeWebview2Setup.exe (PID: 6156)
      • MicrosoftEdgeUpdate.exe (PID: 4268)
    • Potential Corporate Privacy Violation

      • setup.exe (PID: 2560)
    • Reads security settings of Internet Explorer

      • setup.exe (PID: 2560)
      • hjksfc.exe (PID: 5260)
      • VirtuServer128.exe (PID: 5280)
      • MicrosoftEdgeUpdate.exe (PID: 4268)
    • Executable content was dropped or overwritten

      • hjksfc.exe (PID: 5260)
      • DistriCompiler89.exe (PID: 5964)
      • DistriCompiler89.exe (PID: 1240)
      • hjksfk.exe (PID: 5392)
      • DistriCompiler89.exe (PID: 6132)
      • MicrosoftEdgeWebview2Setup.exe (PID: 6156)
      • VirtuServer128.exe (PID: 5280)
      • setup.exe (PID: 2560)
    • Starts itself from another location

      • DistriCompiler89.exe (PID: 5964)
    • Executes application which crashes

      • hjksfk.exe (PID: 5392)
      • shark.exe (PID: 6576)
    • Starts CMD.EXE for commands execution

      • hjksfk.exe (PID: 5392)
    • Drops 7-zip archiver for unpacking

      • DistriCompiler89.exe (PID: 1240)
    • There is functionality for taking screenshot (YARA)

      • hjksfk.exe (PID: 5392)
    • Connects to unusual port

      • VirtuServer128.exe (PID: 5280)
      • shark.exe (PID: 6576)
    • Starts POWERSHELL.EXE for commands execution

      • VirtuServer128.exe (PID: 5280)
    • Starts process via Powershell

      • powershell.exe (PID: 4336)
    • Disables SEHOP

      • MicrosoftEdgeUpdate.exe (PID: 4268)
    • The process executes via Task Scheduler

      • shark.exe (PID: 6576)
    • Uses WMIC.EXE to obtain Windows Installer data

      • shark.exe (PID: 6576)
  • INFO

    • Checks supported languages

      • setup.exe (PID: 2560)
      • elevation_service.exe (PID: 5588)
      • hjksfk.exe (PID: 5392)
      • hjksfc.exe (PID: 5260)
      • DistriCompiler89.exe (PID: 5964)
      • DistriCompiler89.exe (PID: 1240)
      • 7za.exe (PID: 5352)
      • DistriCompiler89.exe (PID: 6132)
      • VirtuServer128.exe (PID: 5280)
      • 7za.exe (PID: 5972)
      • MicrosoftEdgeWebview2Setup.exe (PID: 6156)
      • MicrosoftEdgeUpdate.exe (PID: 4268)
      • shark.exe (PID: 6576)
    • The sample compiled with english language support

      • setup.exe (PID: 2560)
      • DistriCompiler89.exe (PID: 1240)
      • DistriCompiler89.exe (PID: 6132)
      • VirtuServer128.exe (PID: 5280)
      • MicrosoftEdgeWebview2Setup.exe (PID: 6156)
      • MicrosoftEdgeUpdate.exe (PID: 4268)
    • Reads the computer name

      • setup.exe (PID: 2560)
      • elevation_service.exe (PID: 5588)
      • hjksfc.exe (PID: 5260)
      • DistriCompiler89.exe (PID: 5964)
      • DistriCompiler89.exe (PID: 1240)
      • 7za.exe (PID: 5352)
      • DistriCompiler89.exe (PID: 6132)
      • VirtuServer128.exe (PID: 5280)
      • 7za.exe (PID: 5972)
      • MicrosoftEdgeUpdate.exe (PID: 4268)
      • shark.exe (PID: 6576)
    • Executes as Windows Service

      • elevation_service.exe (PID: 5588)
    • Reads the machine GUID from the registry

      • setup.exe (PID: 2560)
      • 7za.exe (PID: 5352)
      • VirtuServer128.exe (PID: 5280)
      • shark.exe (PID: 6576)
    • Process checks computer location settings

      • setup.exe (PID: 2560)
      • hjksfc.exe (PID: 5260)
      • MicrosoftEdgeUpdate.exe (PID: 4268)
    • Creates files in the program directory

      • DistriCompiler89.exe (PID: 5964)
      • DistriCompiler89.exe (PID: 1240)
      • hjksfk.exe (PID: 5392)
      • VirtuServer128.exe (PID: 5280)
      • DistriCompiler89.exe (PID: 6132)
      • MicrosoftEdgeWebview2Setup.exe (PID: 6156)
    • Checks transactions between databases Windows and Oracle

      • 7za.exe (PID: 5352)
    • Reads security settings of Internet Explorer

      • dllhost.exe (PID: 896)
    • Drops encrypted JS script (Microsoft Script Encoder)

      • hjksfk.exe (PID: 5392)
      • shark.exe (PID: 6576)
    • Compiled with Borland Delphi (YARA)

      • hjksfk.exe (PID: 5392)
    • Create files in a temporary directory

      • DistriCompiler89.exe (PID: 1240)
      • DistriCompiler89.exe (PID: 6132)
    • Reads the software policy settings

      • slui.exe (PID: 2284)
      • VirtuServer128.exe (PID: 5280)
      • MicrosoftEdgeUpdate.exe (PID: 4268)
      • wermgr.exe (PID: 6044)
      • shark.exe (PID: 6576)
    • Checks proxy server information

      • VirtuServer128.exe (PID: 5280)
      • MicrosoftEdgeUpdate.exe (PID: 4268)
      • wermgr.exe (PID: 6044)
    • Creates files or folders in the user directory

      • VirtuServer128.exe (PID: 5280)
      • wermgr.exe (PID: 6044)
    • Reads Environment values

      • MicrosoftEdgeUpdate.exe (PID: 4268)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2017:11:18 21:37:28+00:00
ImageFileCharacteristics: Executable, 32-bit, Removable run from swap, Net run from swap
PEType: PE32
LinkerVersion: 14
CodeSize: 301056
InitializedDataSize: 161280
UninitializedDataSize: -
EntryPoint: 0x2e06d
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 14.28.29325.2
ProductVersionNumber: 14.28.29325.2
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: Microsoft Corporation
FileDescription: Microsoft Visual C++ 2015-2019 Redistributable (x64) - 14.28.29325
FileVersion: 14.28.29325.2
InternalName: setup
LegalCopyright: Copyright (c) Microsoft Corporation. All rights reserved.
OriginalFileName: VC_redist.x64.exe
ProductName: Microsoft Visual C++ 2015-2019 Redistributable (x64) - 14.28.29325
ProductVersion: 14.28.29325.2
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
194
Monitored processes
49
Malicious processes
11
Suspicious processes
1

Behavior graph

Click at the process to see the details
start setup.exe sppextcomobj.exe no specs slui.exe chrome.exe no specs msedge.exe no specs elevation_service.exe no specs chrome.exe no specs msedge.exe no specs chrome.exe no specs msedge.exe no specs chrome.exe no specs msedge.exe no specs hjksfk.exe hjksfc.exe districompiler89.exe districompiler89.exe 7za.exe no specs conhost.exe no specs werfault.exe no specs werfault.exe no specs werfault.exe no specs CMSTPLUA districompiler89.exe werfault.exe no specs werfault.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs werfault.exe no specs werfault.exe no specs virtuserver128.exe slui.exe no specs 7za.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs microsoftedgewebview2setup.exe microsoftedgeupdate.exe wermgr.exe shark.exe werfault.exe no specs werfault.exe no specs werfault.exe no specs werfault.exe no specs werfault.exe no specs werfault.exe no specs wmic.exe no specs conhost.exe no specs werfault.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
720"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exesetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
856C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
896C:\WINDOWS\system32\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}C:\Windows\System32\dllhost.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
1096\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1188"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exesetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
1
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1240C:\ProgramData\Iaclientv2\DistriCompiler89.exeC:\ProgramData\Iaclientv2\DistriCompiler89.exe
DistriCompiler89.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\programdata\iaclientv2\districompiler89.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
1276C:\WINDOWS\SysWOW64\WerFault.exe -u -p 6576 -s 540C:\Windows\SysWOW64\WerFault.exeshark.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
1280"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exesetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
1
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1660C:\WINDOWS\SysWOW64\WerFault.exe -u -p 5392 -s 604C:\Windows\SysWOW64\WerFault.exehjksfk.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
2148C:\WINDOWS\SysWOW64\WerFault.exe -u -p 5392 -s 624C:\Windows\SysWOW64\WerFault.exehjksfk.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
Total events
18 245
Read events
18 193
Write events
50
Delete events
2

Modification events

(PID) Process:(720) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(720) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(6964) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
1
(PID) Process:(6028) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(6028) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(2152) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
1
(PID) Process:(4208) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
2
(PID) Process:(4208) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
3
(PID) Process:(1280) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
2
(PID) Process:(1280) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
3
Executable files
214
Suspicious files
25
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
2560setup.exeC:\Users\admin\hjksfk.exeexecutable
MD5:7019B60173E7DE285F19621945DEDF25
SHA256:25A375F5CBA3DCE4024BC78F7D4768A83CF09A64DDB971BD10C87FA97E4A5D65
5260hjksfc.exeC:\Users\admin\DistriCompiler89.exeexecutable
MD5:9E90C7BA64A66D9AB4703AF006540193
SHA256:A519304C3BBA23EAE2045A85E01AAE44E6556B2F787966654B7209DB13CFA0C4
5504chrome.exeC:\Users\admin\AppData\Local\Temp\Web Databinary
MD5:F6C33AC5E1032A0873BE7BFC65169287
SHA256:D97895CEDED32E33D57BDCACCDBE144E58AA87AF4D2F8855D630286CE30A8D83
4208chrome.exeC:\Users\admin\AppData\Local\Temp\Cookiesbinary
MD5:06AD9E737639FDC745B3B65312857109
SHA256:C8925892CA8E213746633033AE95ACFB8DD9531BC376B82066E686AC6F40A404
5964DistriCompiler89.exeC:\ProgramData\Iaclientv2\DistriCompiler89.exeexecutable
MD5:9E90C7BA64A66D9AB4703AF006540193
SHA256:A519304C3BBA23EAE2045A85E01AAE44E6556B2F787966654B7209DB13CFA0C4
5964DistriCompiler89.exeC:\ProgramData\Iaclientv2\dx0.dllexecutable
MD5:693DFBB9B324E80B70660927CA1DEA69
SHA256:7C28D90E3484B566EE00ADAB4679A3D1C51F86F01560035D86C8F7788AC05234
1240DistriCompiler89.exeC:\Users\admin\AppData\Local\Temp\F0924AC.tmpbinary
MD5:F876121366BEEB5E77F75B68B003CE06
SHA256:9008F45A94BF66B6A74D4F035E7D24F85A29C757EC253088D6CEBB901FCCD419
6132DistriCompiler89.exeC:\Users\admin\AppData\Local\Temp\F496DFA.tmp
MD5:
SHA256:
5260hjksfc.exeC:\Users\admin\IconX.dllexecutable
MD5:F36412FC804A3D4B2236B59195232B16
SHA256:AF51DE13B16EE6EA6E09E59C4B2B32CBBA200F4A47A558B48E879C63D1AB1164
5392hjksfk.exeC:\ProgramData\shark.exeexecutable
MD5:7019B60173E7DE285F19621945DEDF25
SHA256:25A375F5CBA3DCE4024BC78F7D4768A83CF09A64DDB971BD10C87FA97E4A5D65
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
47
DNS requests
23
Threats
8

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.20.245.137:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
2560
setup.exe
GET
200
104.21.45.251:80
http://h4.tykeblot.today/shark.bin
unknown
unknown
2560
setup.exe
GET
200
104.21.45.251:80
http://h4.tykeblot.today/sh.ext.bin
unknown
unknown
2088
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2088
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5280
VirtuServer128.exe
GET
200
18.245.38.41:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwdzEk8qlS4%2B0YpYvbhdG8DOXyc%3D
unknown
whitelisted
5280
VirtuServer128.exe
GET
200
143.204.99.128:80
http://ocsp.r2m04.amazontrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTihuFvpmFDw5hOcIp918Jm5B3CQgQUH1KSYVaCVH%2BBZtgdPQqqMlyH3QgCEAqlOECbKpghQnC3N5zkTKU%3D
unknown
unknown
6044
wermgr.exe
GET
200
23.48.23.177:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
2.20.245.137:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
23.219.150.101:80
www.microsoft.com
AKAMAI-AS
CL
whitelisted
2104
svchost.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
2112
svchost.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.129:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.142
whitelisted
crl.microsoft.com
  • 2.20.245.137
  • 2.20.245.139
  • 23.48.23.177
  • 23.48.23.168
  • 23.48.23.173
  • 23.48.23.166
  • 23.48.23.181
  • 23.48.23.171
  • 23.48.23.174
  • 23.48.23.180
  • 23.48.23.164
whitelisted
www.microsoft.com
  • 23.219.150.101
  • 184.30.21.171
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 20.190.159.129
  • 20.190.159.2
  • 40.126.31.2
  • 40.126.31.1
  • 20.190.159.73
  • 20.190.159.23
  • 40.126.31.3
  • 40.126.31.69
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

PID
Process
Class
Message
2560
setup.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
2560
setup.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
2560
setup.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
2560
setup.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
2196
svchost.exe
Misc activity
ET TA_ABUSED_SERVICES DNS Query to Commonly Actor Abused Online Service (data-seed-prebsc-1-s1 .binance .org)
5280
VirtuServer128.exe
Misc activity
ET TA_ABUSED_SERVICES Observed Commonly Actor Abused Online Service Domain (data-seed-prebsc-1-s1 .binance .org in TLS SNI)
2196
svchost.exe
Misc activity
ET TA_ABUSED_SERVICES DNS Query to Commonly Actor Abused Online Service (data-seed-prebsc-2-s1 .binance .org)
6576
shark.exe
Misc activity
ET TA_ABUSED_SERVICES Observed Commonly Actor Abused Online Service Domain (data-seed-prebsc-2-s1 .binance .org in TLS SNI)
No debug info