analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

7a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exe

Full analysis: https://app.any.run/tasks/5d675687-5711-4900-b5e9-13bc0c33c8b2
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: April 01, 2024, 13:46:05
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
evasion
generic
stealer
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

85AEA19A596F59D0DBF368F99BE6A139

SHA1:

9FD84C0780B6555CDEED499B30E5D67071998FBC

SHA256:

7A95214E7077D7324C0E8DC7D20F2A4E625BC0AC7E14B1446E37C47DFF7EEB5B

SSDEEP:

393216:cBFg+NNv9Oc6JRdadA8I5A6VcshPm5+jq1HmWH+13gMEl8W0alZTFet74jAdH8fB:cB9nO5JwqAWFkkq1GLgvH0aUi

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • 7a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exe (PID: 7068)
    • Drops the executable file immediately after the start

      • 7a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exe (PID: 7068)
      • SerenityTherapyInstaller.exe (PID: 7124)
    • Changes powershell execution policy (Unrestricted)

      • SerenityTherapyInstaller.exe (PID: 7124)
    • Actions looks like stealing of personal data

      • SerenityTherapyInstaller.exe (PID: 7124)
    • DISCORDGRABBER has been detected (YARA)

      • SerenityTherapyInstaller.exe (PID: 7124)
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • 7a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exe (PID: 7068)
    • Process drops legitimate windows executable

      • 7a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exe (PID: 7068)
    • Starts CMD.EXE for commands execution

      • 7a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exe (PID: 7068)
      • SerenityTherapyInstaller.exe (PID: 7124)
    • Get information on the list of running processes

      • cmd.exe (PID: 6676)
      • 7a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exe (PID: 7068)
      • SerenityTherapyInstaller.exe (PID: 7124)
      • cmd.exe (PID: 5844)
    • The process creates files with name similar to system file names

      • 7a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exe (PID: 7068)
      • powershell.exe (PID: 6372)
    • Drops 7-zip archiver for unpacking

      • 7a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exe (PID: 7068)
    • Creates a software uninstall entry

      • 7a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exe (PID: 7068)
    • Reads security settings of Internet Explorer

      • 7a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exe (PID: 7068)
    • Starts POWERSHELL.EXE for commands execution

      • SerenityTherapyInstaller.exe (PID: 7124)
    • The process hides Powershell's copyright startup banner

      • SerenityTherapyInstaller.exe (PID: 7124)
    • The process bypasses the loading of PowerShell profile settings

      • SerenityTherapyInstaller.exe (PID: 7124)
    • Starts application with an unusual extension

      • cmd.exe (PID: 3784)
    • Application launched itself

      • SerenityTherapyInstaller.exe (PID: 7124)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 6836)
    • Checks for external IP

      • SerenityTherapyInstaller.exe (PID: 7124)
  • INFO

    • Checks supported languages

      • 7a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exe (PID: 7068)
      • SerenityTherapyInstaller.exe (PID: 7124)
      • chcp.com (PID: 5324)
      • SerenityTherapyInstaller.exe (PID: 4744)
      • SerenityTherapyInstaller.exe (PID: 2364)
    • Reads the computer name

      • 7a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exe (PID: 7068)
      • SerenityTherapyInstaller.exe (PID: 7124)
      • SerenityTherapyInstaller.exe (PID: 2364)
      • SerenityTherapyInstaller.exe (PID: 4744)
    • Creates files or folders in the user directory

      • 7a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exe (PID: 7068)
      • SerenityTherapyInstaller.exe (PID: 7124)
    • Create files in a temporary directory

      • 7a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exe (PID: 7068)
      • SerenityTherapyInstaller.exe (PID: 7124)
    • Reads Environment values

      • SerenityTherapyInstaller.exe (PID: 7124)
    • Manual execution by a user

      • SerenityTherapyInstaller.exe (PID: 7124)
    • Checks proxy server information

      • SerenityTherapyInstaller.exe (PID: 7124)
      • slui.exe (PID: 5228)
    • Reads the machine GUID from the registry

      • SerenityTherapyInstaller.exe (PID: 7124)
    • Reads CPU info

      • SerenityTherapyInstaller.exe (PID: 7124)
    • Reads the software policy settings

      • slui.exe (PID: 5228)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

ProductVersion: 1.0.0
ProductName: SerenityTherapyInstaller
LegalCopyright: Copyright © 2024 SerenityTherapyInstaller Inc
FileVersion: 1.0.0
FileDescription: -
CompanyName: SerenityTherapyInstaller Inc
CharacterSet: Windows, Latin1
LanguageCode: English (U.S.)
FileSubtype: -
ObjectFileType: Executable application
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x0000
ProductVersionNumber: 1.0.0.0
FileVersionNumber: 1.0.0.0
Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: 6
OSVersion: 4
EntryPoint: 0x338f
UninitializedDataSize: 16384
InitializedDataSize: 473088
CodeSize: 26624
LinkerVersion: 6
PEType: PE32
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
TimeStamp: 2018:12:15 22:26:14+00:00
MachineType: Intel 386 or later, and compatibles
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
149
Monitored processes
28
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 7a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exe cmd.exe no specs conhost.exe no specs tasklist.exe no specs find.exe no specs #DISCORDGRABBER serenitytherapyinstaller.exe cmd.exe no specs conhost.exe no specs chcp.com no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs powershell.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs conhost.exe no specs serenitytherapyinstaller.exe no specs serenitytherapyinstaller.exe no specs cmd.exe no specs conhost.exe no specs findstr.exe no specs cmd.exe no specs conhost.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
7068"C:\Users\admin\AppData\Local\Temp\7a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exe" C:\Users\admin\AppData\Local\Temp\7a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exe
explorer.exe
User:
admin
Company:
SerenityTherapyInstaller Inc
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.0.0
Modules
Images
c:\users\admin\appdata\local\temp\7a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6676cmd /c tasklist /FI "USERNAME eq %USERNAME%" /FI "IMAGENAME eq SerenityTherapyInstaller.exe" /FO csv | %SYSTEMROOT%\System32\find.exe "SerenityTherapyInstaller.exe"C:\Windows\SysWOW64\cmd.exe7a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.746 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
2660\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6696tasklist /FI "USERNAME eq admin" /FI "IMAGENAME eq SerenityTherapyInstaller.exe" /FO csv C:\Windows\SysWOW64\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
2864C:\WINDOWS\System32\find.exe "SerenityTherapyInstaller.exe"C:\Windows\SysWOW64\find.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (grep) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\find.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
7124"C:\Users\admin\AppData\Local\Programs\SerenityTherapyInstaller\SerenityTherapyInstaller.exe" C:\Users\admin\AppData\Local\Programs\SerenityTherapyInstaller\SerenityTherapyInstaller.exe
explorer.exe
User:
admin
Company:
SerenityTherapyInstaller Inc
Integrity Level:
MEDIUM
Description:
SerenityTherapyInstaller
Version:
1.0.0
Modules
Images
c:\users\admin\appdata\local\programs\serenitytherapyinstaller\serenitytherapyinstaller.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
3784C:\WINDOWS\system32\cmd.exe /d /s /c "chcp"C:\Windows\SysWOW64\cmd.exeSerenityTherapyInstaller.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.746 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
3868\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5324chcpC:\Windows\SysWOW64\chcp.comcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Change CodePage Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\chcp.com
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
5844C:\WINDOWS\system32\cmd.exe /d /s /c "tasklist"C:\Windows\SysWOW64\cmd.exeSerenityTherapyInstaller.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.746 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
24 883
Read events
24 846
Write events
37
Delete events
0

Modification events

(PID) Process:(7068) 7a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exeKey:HKEY_CURRENT_USER\SOFTWARE\cfbc383d-9aa0-5771-9485-7b806e8442d5
Operation:writeName:InstallLocation
Value:
C:\Users\admin\AppData\Local\Programs\SerenityTherapyInstaller
(PID) Process:(7068) 7a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exeKey:HKEY_CURRENT_USER\SOFTWARE\cfbc383d-9aa0-5771-9485-7b806e8442d5
Operation:writeName:KeepShortcuts
Value:
true
(PID) Process:(7068) 7a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exeKey:HKEY_CURRENT_USER\SOFTWARE\cfbc383d-9aa0-5771-9485-7b806e8442d5
Operation:writeName:ShortcutName
Value:
SerenityTherapyInstaller
(PID) Process:(7068) 7a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\cfbc383d-9aa0-5771-9485-7b806e8442d5
Operation:writeName:DisplayName
Value:
SerenityTherapyInstaller 1.0.0
(PID) Process:(7068) 7a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\cfbc383d-9aa0-5771-9485-7b806e8442d5
Operation:writeName:UninstallString
Value:
"C:\Users\admin\AppData\Local\Programs\SerenityTherapyInstaller\Uninstall SerenityTherapyInstaller.exe" /currentuser
(PID) Process:(7068) 7a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\cfbc383d-9aa0-5771-9485-7b806e8442d5
Operation:writeName:QuietUninstallString
Value:
"C:\Users\admin\AppData\Local\Programs\SerenityTherapyInstaller\Uninstall SerenityTherapyInstaller.exe" /currentuser /S
(PID) Process:(7068) 7a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\cfbc383d-9aa0-5771-9485-7b806e8442d5
Operation:writeName:DisplayVersion
Value:
1.0.0
(PID) Process:(7068) 7a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\cfbc383d-9aa0-5771-9485-7b806e8442d5
Operation:writeName:DisplayIcon
Value:
C:\Users\admin\AppData\Local\Programs\SerenityTherapyInstaller\SerenityTherapyInstaller.exe,0
(PID) Process:(7068) 7a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\cfbc383d-9aa0-5771-9485-7b806e8442d5
Operation:writeName:Publisher
Value:
SerenityTherapyInstaller Inc
(PID) Process:(7068) 7a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\cfbc383d-9aa0-5771-9485-7b806e8442d5
Operation:writeName:NoModify
Value:
1
Executable files
23
Suspicious files
118
Text files
13
Unknown types
6

Dropped files

PID
Process
Filename
Type
70687a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exeC:\Users\admin\AppData\Local\Temp\nse79EF.tmp\System.dllexecutable
MD5:
SHA256:
70687a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exeC:\Users\admin\AppData\Local\Temp\nse79EF.tmp\StdUtils.dllexecutable
MD5:
SHA256:
70687a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exeC:\Users\admin\AppData\Local\Temp\nse79EF.tmp\SpiderBanner.dllexecutable
MD5:
SHA256:
70687a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exeC:\Users\admin\AppData\Local\Temp\nse79EF.tmp\nsExec.dllexecutable
MD5:
SHA256:
70687a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exeC:\Users\admin\AppData\Local\Temp\nse79EF.tmp\app-32.7z
MD5:
SHA256:
70687a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exeC:\Users\admin\AppData\Local\Temp\nse79EF.tmp\nsis7z.dllexecutable
MD5:
SHA256:
70687a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exeC:\Users\admin\AppData\Local\Temp\nse79EF.tmp\7z-out\chrome_100_percent.pakbinary
MD5:
SHA256:
70687a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exeC:\Users\admin\AppData\Local\Temp\nse79EF.tmp\7z-out\chrome_200_percent.pakbinary
MD5:
SHA256:
70687a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exeC:\Users\admin\AppData\Local\Temp\nse79EF.tmp\7z-out\icudtl.dat
MD5:
SHA256:
70687a95214e7077d7324c0e8dc7d20f2a4e625bc0ac7e14b1446e37c47dff7eeb5b.exeC:\Users\admin\AppData\Local\Temp\nse79EF.tmp\7z-out\LICENSE.electron.txttext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
72
DNS requests
14
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3996
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
unknown
GET
200
88.221.125.143:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
unknown
GET
200
88.221.125.143:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
unknown
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
239.255.255.250:1900
unknown
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
20.190.159.71:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
20.190.159.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
3996
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
unknown
40.68.123.157:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
88.221.125.143:80
www.microsoft.com
AKAMAI-AS
DE
unknown
20.223.35.26:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
unknown
20.242.39.171:443
fe3cr.delivery.mp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown

DNS requests

Domain
IP
Reputation
ocsp.digicert.com
  • 192.229.221.95
whitelisted
slscr.update.microsoft.com
  • 40.68.123.157
whitelisted
www.microsoft.com
  • 88.221.125.143
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted
ipinfo.io
  • 34.117.186.192
shared
illitmagnetic.site
  • 49.13.77.253
unknown
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
  • 20.73.194.208
whitelisted
nexusrules.officeapps.live.com
  • 52.111.227.13
whitelisted

Threats

PID
Process
Class
Message
Device Retrieving External IP Address Detected
ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)
No debug info