URL:

https://www.slimjet.com/

Full analysis: https://app.any.run/tasks/1500f9b9-cceb-4441-884c-7be683a972fb
Verdict: Malicious activity
Analysis date: December 09, 2023, 01:18:48
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

0504ABC95D7AD255C641DC8EAC778858

SHA1:

119DA4E41817D8B66700A2BFC1BDC37CA152E31F

SHA256:

7C1091DA4AA1AB9BF10F9C0BEFCF7750BD2A7A0FF566B6A63942A38CE7D99749

SSDEEP:

3:N8DSL0cyK3:2OL0G

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • sjtwebsetup_x86.exe (PID: 2836)
      • sjtsetup_x86.exe (PID: 2364)
      • sjt7z_x86_console.exe (PID: 2504)
  • SUSPICIOUS

    • Reads the Internet Settings

      • sjtwebsetup_x86.exe (PID: 2836)
      • webinstaller.exe (PID: 2948)
    • The process creates files with name similar to system file names

      • sjtwebsetup_x86.exe (PID: 2836)
      • sjtsetup_x86.exe (PID: 2364)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • sjtwebsetup_x86.exe (PID: 2836)
      • sjtsetup_x86.exe (PID: 2364)
    • Reads settings of System Certificates

      • webinstaller.exe (PID: 2948)
    • Adds/modifies Windows certificates

      • webinstaller.exe (PID: 2948)
    • Checks Windows Trust Settings

      • webinstaller.exe (PID: 2948)
    • Reads security settings of Internet Explorer

      • webinstaller.exe (PID: 2948)
    • Process requests binary or script from the Internet

      • webinstaller.exe (PID: 2948)
    • Starts application with an unusual extension

      • sjtsetup_x86.exe (PID: 2364)
    • Process drops legitimate windows executable

      • sjt7z_x86_console.exe (PID: 2504)
    • Drops 7-zip archiver for unpacking

      • sjt7z_x86_console.exe (PID: 2504)
    • Explorer used for Indirect Command Execution

      • explorer.exe (PID: 4016)
  • INFO

    • Application launched itself

      • chrome.exe (PID: 1556)
    • Checks supported languages

      • wmpnscfg.exe (PID: 3340)
      • sjtwebsetup_x86.exe (PID: 2836)
      • webinstaller.exe (PID: 2948)
      • ns165F.tmp (PID: 1028)
      • sjtsetup_x86.exe (PID: 2364)
      • sjt7z_x86_console.exe (PID: 2504)
    • Reads the computer name

      • wmpnscfg.exe (PID: 3340)
      • sjtwebsetup_x86.exe (PID: 2836)
      • webinstaller.exe (PID: 2948)
      • sjtsetup_x86.exe (PID: 2364)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 3340)
      • explorer.exe (PID: 1432)
      • slimjet.exe (PID: 1936)
    • The process uses the downloaded file

      • chrome.exe (PID: 3652)
      • chrome.exe (PID: 2128)
      • chrome.exe (PID: 2436)
      • chrome.exe (PID: 1556)
    • Drops the executable file immediately after the start

      • chrome.exe (PID: 1556)
    • Create files in a temporary directory

      • sjtwebsetup_x86.exe (PID: 2836)
      • sjtsetup_x86.exe (PID: 2364)
      • webinstaller.exe (PID: 2948)
    • Checks proxy server information

      • sjtwebsetup_x86.exe (PID: 2836)
      • webinstaller.exe (PID: 2948)
    • Reads the machine GUID from the registry

      • webinstaller.exe (PID: 2948)
      • sjtsetup_x86.exe (PID: 2364)
    • Creates files or folders in the user directory

      • webinstaller.exe (PID: 2948)
      • sjtsetup_x86.exe (PID: 2364)
    • Creates files in the program directory

      • sjtsetup_x86.exe (PID: 2364)
      • sjt7z_x86_console.exe (PID: 2504)
    • Reads Environment values

      • sjtsetup_x86.exe (PID: 2364)
    • Reads the Internet Settings

      • explorer.exe (PID: 3528)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
79
Monitored processes
34
Malicious processes
6
Suspicious processes
0

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs wmpnscfg.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs sjtwebsetup_x86.exe no specs sjtwebsetup_x86.exe webinstaller.exe explorer.exe no specs sjtsetup_x86.exe ns165f.tmp no specs sjt7z_x86_console.exe no specs slimjet.exe no specs explorer.exe no specs explorer.exe no specs slimjet.exe no specs slimjet.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
292"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --disable-quic --mojo-platform-channel-handle=3876 --field-trial-handle=1132,i,11269331173937500977,1908815433233384982,131072 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
296"C:\Users\admin\Downloads\sjtwebsetup_x86.exe" C:\Users\admin\Downloads\sjtwebsetup_x86.exechrome.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\downloads\sjtwebsetup_x86.exe
c:\windows\system32\ntdll.dll
684"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgACAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 --field-trial-handle=1132,i,11269331173937500977,1908815433233384982,131072 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
984"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --disable-quic --mojo-platform-channel-handle=2976 --field-trial-handle=1132,i,11269331173937500977,1908815433233384982,131072 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1028"C:\Users\admin\AppData\Local\Temp\nsiA47A.tmp\ns165F.tmp" "C:\Users\admin\AppData\Local\Temp\sjt7z_x86_console.exe" -o"C:\Program Files\Slimjet" -yC:\Users\admin\AppData\Local\Temp\nsiA47A.tmp\ns165F.tmpsjtsetup_x86.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\nsia47a.tmp\ns165f.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1432"C:\Windows\explorer.exe" C:\Windows\explorer.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1556"C:\Program Files\Google\Chrome\Application\chrome.exe" --disk-cache-dir=null --disk-cache-size=1 --media-cache-size=1 --disable-gpu-shader-disk-cache --disable-background-networking "https://www.slimjet.com/"C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1600"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --disable-quic --mojo-platform-channel-handle=3740 --field-trial-handle=1132,i,11269331173937500977,1908815433233384982,131072 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1616"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --disable-quic --mojo-platform-channel-handle=3172 --field-trial-handle=1132,i,11269331173937500977,1908815433233384982,131072 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1936"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2012 --field-trial-handle=1132,i,11269331173937500977,1908815433233384982,131072 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
Total events
15 389
Read events
15 018
Write events
371
Delete events
0

Modification events

(PID) Process:(1556) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(1556) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(1556) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(1556) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(1556) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(1556) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
1
(PID) Process:(1556) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(1556) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(1556) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:metricsid_installdate
Value:
0
(PID) Process:(1556) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:metricsid_enableddate
Value:
0
Executable files
31
Suspicious files
201
Text files
420
Unknown types
0

Dropped files

PID
Process
Filename
Type
1556chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF2103b8.TMP
MD5:
SHA256:
1556chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
1556chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Last Versiontext
MD5:9F941EA08DBDCA2EB3CFA1DBBBA6F5DC
SHA256:127F71DF0D2AD895D4F293E62284D85971AE047CA15F90B87BF6335898B0B655
1556chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datbinary
MD5:9C016064A1F864C8140915D77CF3389A
SHA256:0E7265D4A8C16223538EDD8CD620B8820611C74538E420A88E333BE7F62AC787
1556chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF2103c8.TMPtext
MD5:E91E138A25FD7E5BCA5E60111F39C91A
SHA256:B1F7E3537A31A4B847F862858E5D2581993CC9372F19ABF19EA2A9185FE42A4F
1556chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.oldtext
MD5:43550DBA2277BE44F5F842196E084145
SHA256:D19055342C06316F8B80D0B029BD233A3E48AD4C591953AF7B712ADA7F68F403
1556chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old~RF210a02.TMP
MD5:
SHA256:
1556chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old
MD5:
SHA256:
1556chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\LOG.old~RF2104e1.TMPtext
MD5:8268A4D53A6A9432A8266584CBD7D624
SHA256:F785C42945CFE320C52C763837CD41541A8CAAB3E5FD567999EED5343CF0FD7A
1556chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.oldtext
MD5:8175FB7046E977DAAD01289080C116EF
SHA256:19E403B4BEF7D83DD425AB6A54DE943D244A16E5EA121DEC91C417608AEAACB7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
125
TCP/UDP connections
182
DNS requests
55
Threats
179

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2836
sjtwebsetup_x86.exe
GET
301
148.72.22.223:80
http://www.slimjet.com/redir.php?id=startdl_sjt
unknown
html
256 b
unknown
2836
sjtwebsetup_x86.exe
GET
301
148.72.22.223:80
http://www.slimjet.com/redir.php?id=startdl_sjt
unknown
html
256 b
unknown
2836
sjtwebsetup_x86.exe
GET
301
148.72.22.223:80
http://www.slimjet.com/redir.php?id=startdl_sjt
unknown
html
256 b
unknown
2836
sjtwebsetup_x86.exe
GET
301
148.72.22.223:80
http://www.slimjet.com/redir.php?id=startdl_sjt
unknown
html
256 b
unknown
2836
sjtwebsetup_x86.exe
GET
301
148.72.22.223:80
http://www.slimjet.com/redir.php?id=startdl_sjt
unknown
html
256 b
unknown
2836
sjtwebsetup_x86.exe
GET
301
148.72.22.223:80
http://www.slimjet.com/redir.php?id=startdl_sjt
unknown
html
256 b
unknown
2836
sjtwebsetup_x86.exe
GET
301
148.72.22.223:80
http://www.slimjet.com/redir.php?id=startdl_sjt
unknown
html
256 b
unknown
2836
sjtwebsetup_x86.exe
GET
301
148.72.22.223:80
http://www.slimjet.com/redir.php?id=startdl_sjt
unknown
html
256 b
unknown
2948
webinstaller.exe
GET
301
148.72.22.223:80
http://www.slimjet.com/redir.php?id=webinstaller&source=start
unknown
html
274 b
unknown
2836
sjtwebsetup_x86.exe
GET
301
148.72.22.223:80
http://www.slimjet.com/redir.php?id=startdl_sjt
unknown
html
256 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1080
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1556
chrome.exe
239.255.255.250:1900
whitelisted
2868
chrome.exe
148.72.22.223:443
www.slimjet.com
AS-26496-GO-DADDY-COM-LLC
US
unknown
2868
chrome.exe
173.194.76.84:443
accounts.google.com
GOOGLE
US
whitelisted
2588
svchost.exe
239.255.255.250:1900
whitelisted
2868
chrome.exe
142.250.184.228:443
www.google.com
GOOGLE
US
whitelisted
2868
chrome.exe
157.240.252.13:443
connect.facebook.net
FACEBOOK
DE
unknown
2868
chrome.exe
142.250.185.110:443
www.google-analytics.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
www.slimjet.com
  • 148.72.22.223
unknown
accounts.google.com
  • 173.194.76.84
shared
www.google.com
  • 142.250.184.228
whitelisted
www.google-analytics.com
  • 142.250.185.110
whitelisted
connect.facebook.net
  • 157.240.252.13
whitelisted
content-autofill.googleapis.com
  • 142.250.181.234
  • 172.217.16.138
  • 142.250.184.202
  • 142.250.184.234
  • 142.250.186.138
  • 142.250.186.42
  • 172.217.18.10
  • 172.217.16.202
  • 142.250.186.170
  • 216.58.206.42
  • 172.217.18.106
  • 216.58.212.170
  • 172.217.23.106
  • 216.58.212.138
  • 142.250.185.74
  • 142.250.185.106
whitelisted
www.googletagmanager.com
  • 142.250.181.232
whitelisted
region1.google-analytics.com
  • 216.239.34.36
  • 216.239.32.36
whitelisted
www.facebook.com
  • 157.240.0.35
  • 157.240.252.35
whitelisted
optimizationguide-pa.googleapis.com
  • 142.250.185.234
  • 142.250.186.74
  • 142.250.186.106
  • 142.250.181.234
  • 172.217.16.138
  • 142.250.184.202
  • 142.250.184.234
  • 142.250.186.138
  • 142.250.186.42
  • 172.217.18.10
  • 172.217.16.202
  • 142.250.186.170
  • 216.58.206.42
  • 172.217.18.106
  • 142.250.185.74
  • 142.250.185.106
whitelisted

Threats

PID
Process
Class
Message
2948
webinstaller.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
178 ETPRO signatures available at the full report
Process
Message
webinstaller.exe
webinstaller.exe
Starting download...
webinstaller.exe
webinstaller.exe
Redirection succeeded. Opening new URL
webinstaller.exe
webinstaller.exe
Redirecting... - http://www.slimjetbrowser.com/release/sjtsetup_x86.exe
webinstaller.exe
[Section 1] - Started
webinstaller.exe
Opening file on the disk...
webinstaller.exe
webinstaller.exe
Succeeded