File name:

GetPDFQuick_49223263.msi

Full analysis: https://app.any.run/tasks/dc5c271f-89e1-4cce-88d5-1a6f333b8e68
Verdict: Malicious activity
Analysis date: May 20, 2024, 15:11:24
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
generated-doc
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: PDFFlex, Author: PDFFlex.io, Keywords: Installer, MSI, Database, Comments: A base dados do instalador contm a lgica e os dados necessrios para instalar o PDFFlex., Create Time/Date: Fri May 3 06:40:18 2024, Name of Creating Application: PDFFlex, Security: 0, Template: ;1033, Last Saved By: ;1046, Revision Number: {B47F4499-DF9E-4B07-91DD-DD89A1A9640C}3.202.1208.0;{B47F4499-DF9E-4B07-91DD-DD89A1A9640C}3.202.1208.0;{50C54027-847F-4B86-849A-9C02C888EE0B}, Number of Pages: 450, Number of Characters: 63
MD5:

4012EFD9C8B10B519E58BF29930A55FA

SHA1:

7B4DAE32939D09CF18298D68F3317501D09BCF90

SHA256:

9C5D756045FD479A742B81241CCF439D02FC668581A3002913811A341278DE43

SSDEEP:

98304:S9IYolSpkBN/2Wex0xaAW9I+9DE+mzSE5lIP4GASazPtiG6CPUF0csMof+iZZjDR:gNG7z

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes powershell execution policy (Bypass)

      • msiexec.exe (PID: 820)
      • msiexec.exe (PID: 1960)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 2044)
      • powershell.exe (PID: 308)
      • powershell.exe (PID: 2460)
      • powershell.exe (PID: 2740)
    • Drops the executable file immediately after the start

      • msiexec.exe (PID: 4088)
      • msiexec.exe (PID: 1960)
    • Changes the autorun value in the registry

      • msiexec.exe (PID: 4088)
  • SUSPICIOUS

    • Reads the Internet Settings

      • msiexec.exe (PID: 3976)
      • msiexec.exe (PID: 1960)
      • powershell.exe (PID: 2460)
      • MSI6190.tmp (PID: 920)
      • powershell.exe (PID: 2740)
      • msiexec.exe (PID: 820)
    • Starts POWERSHELL.EXE for commands execution

      • msiexec.exe (PID: 820)
      • msiexec.exe (PID: 1960)
    • The process executes Powershell scripts

      • msiexec.exe (PID: 820)
      • msiexec.exe (PID: 1960)
    • Executes as Windows Service

      • VSSVC.exe (PID: 1424)
    • The process hide an interactive prompt from the user

      • msiexec.exe (PID: 820)
      • msiexec.exe (PID: 1960)
    • Reverses array data (POWERSHELL)

      • powershell.exe (PID: 308)
    • Checks Windows Trust Settings

      • msiexec.exe (PID: 4088)
      • msiexec.exe (PID: 1960)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 4088)
    • The process bypasses the loading of PowerShell profile settings

      • msiexec.exe (PID: 820)
      • msiexec.exe (PID: 1960)
    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 1960)
      • MSI6190.tmp (PID: 920)
      • msiexec.exe (PID: 820)
    • Unusual connection from system programs

      • powershell.exe (PID: 2460)
      • powershell.exe (PID: 2740)
    • Process drops legitimate windows executable

      • msiexec.exe (PID: 4088)
    • Node.exe was dropped

      • msiexec.exe (PID: 1960)
    • Starts CMD.EXE for commands execution

      • msiexec.exe (PID: 820)
  • INFO

    • An automatically generated document

      • msiexec.exe (PID: 3976)
    • Creates files or folders in the user directory

      • msiexec.exe (PID: 3976)
      • msiexec.exe (PID: 4088)
      • msiexec.exe (PID: 1960)
      • PDFFlex.exe (PID: 2768)
    • Reads the software policy settings

      • msiexec.exe (PID: 3976)
      • msiexec.exe (PID: 4088)
      • msiexec.exe (PID: 1960)
    • Checks supported languages

      • wmpnscfg.exe (PID: 4060)
      • msiexec.exe (PID: 4088)
      • msiexec.exe (PID: 820)
      • msiexec.exe (PID: 1960)
      • MSI61C0.tmp (PID: 904)
      • PDFFlex.exe (PID: 2768)
      • MSI6190.tmp (PID: 920)
      • PDFFlex.exe (PID: 3124)
    • Reads the computer name

      • wmpnscfg.exe (PID: 4060)
      • msiexec.exe (PID: 4088)
      • msiexec.exe (PID: 820)
      • msiexec.exe (PID: 1960)
      • MSI61C0.tmp (PID: 904)
      • MSI6190.tmp (PID: 920)
    • Create files in a temporary directory

      • msiexec.exe (PID: 3976)
      • powershell.exe (PID: 2044)
      • msiexec.exe (PID: 820)
      • powershell.exe (PID: 308)
      • msiexec.exe (PID: 1960)
      • powershell.exe (PID: 2460)
      • msiexec.exe (PID: 4088)
      • powershell.exe (PID: 2740)
    • Reads the machine GUID from the registry

      • msiexec.exe (PID: 4088)
      • msiexec.exe (PID: 820)
      • msiexec.exe (PID: 1960)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 4060)
      • PDFFlex.exe (PID: 3124)
      • WINWORD.EXE (PID: 2896)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 3976)
      • msiexec.exe (PID: 4088)
      • msiexec.exe (PID: 1960)
    • Drops the executable file immediately after the start

      • msiexec.exe (PID: 3976)
    • Application launched itself

      • msiexec.exe (PID: 4088)
    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 3976)
      • powershell.exe (PID: 2044)
      • powershell.exe (PID: 308)
      • powershell.exe (PID: 2460)
      • powershell.exe (PID: 2740)
    • Uses string replace method (POWERSHELL)

      • powershell.exe (PID: 2044)
      • powershell.exe (PID: 308)
      • powershell.exe (PID: 2460)
      • powershell.exe (PID: 2740)
    • Reads Environment values

      • msiexec.exe (PID: 820)
      • msiexec.exe (PID: 1960)
    • Checks proxy server information

      • msiexec.exe (PID: 1960)
    • Disables trace logs

      • powershell.exe (PID: 2460)
      • powershell.exe (PID: 2740)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 4088)
    • Starts application with an unusual extension

      • msiexec.exe (PID: 4088)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msi | Microsoft Windows Installer (81.9)
.mst | Windows SDK Setup Transform Script (9.2)
.msp | Windows Installer Patch (7.6)
.msi | Microsoft Installer (100)

EXIF

FlashPix

Security: None
CodePage: Windows Latin 1 (Western European)
RevisionNumber: {5CC5243C-3A9A-4868-90C3-9CEA3AEEFCAF}
Words: 10
Subject: PDFFlex
Author: PDFFlex.io
LastModifiedBy: -
Software: PDFFlex
Template: ;1033,1046,3082,1055
Comments: PDFFlex 3.202.1208.0
Title: Installation Database
Keywords: Installer, MSI, Database
CreateDate: 2024:05:03 06:40:36
ModifyDate: 2024:05:03 06:40:36
LastPrinted: 2024:05:03 06:40:36
Pages: 450
Characters: 63
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
59
Monitored processes
16
Malicious processes
3
Suspicious processes
2

Behavior graph

Click at the process to see the details
start msiexec.exe wmpnscfg.exe no specs msiexec.exe msiexec.exe no specs powershell.exe no specs powershell.exe no specs vssvc.exe no specs msiexec.exe powershell.exe msi6190.tmp no specs msi61c0.tmp no specs pdfflex.exe powershell.exe cmd.exe no specs winword.exe no specs pdfflex.exe

Process information

PID
CMD
Path
Indicators
Parent process
308 -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\admin\AppData\Local\Temp\pss8FB7.ps1" -propFile "C:\Users\admin\AppData\Local\Temp\msi8F95.txt" -scriptFile "C:\Users\admin\AppData\Local\Temp\scr8F96.ps1" -scriptArgsFile "C:\Users\admin\AppData\Local\Temp\scr8F97.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
820C:\Windows\system32\MsiExec.exe -Embedding D00E9F43C9B738D917C0DB1CF3852424 CC:\Windows\System32\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
904"C:\Windows\Installer\MSI61C0.tmp" /HideWindow /dir "C:\Users\admin\AppData\Local\PDFFlex\installer\" "C:\Users\admin\AppData\Local\PDFFlex\installer\OperaSetup.exe" --silent --allusers=0C:\Windows\Installer\MSI61C0.tmpmsiexec.exe
User:
admin
Company:
Caphyon LTD
Integrity Level:
MEDIUM
Description:
File that launches another file
Exit code:
4294967295
Version:
21.5.1.0
Modules
Images
c:\windows\installer\msi61c0.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
920"C:\Windows\Installer\MSI6190.tmp" /DontWait /dir "C:\Users\admin\AppData\Local\PDFFlex\" "C:\Users\admin\AppData\Local\PDFFlex\PDFFlex.exe"C:\Windows\Installer\MSI6190.tmpmsiexec.exe
User:
admin
Company:
Caphyon LTD
Integrity Level:
MEDIUM
Description:
File that launches another file
Exit code:
0
Version:
21.5.1.0
Modules
Images
c:\windows\installer\msi6190.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
1424C:\Windows\system32\vssvc.exeC:\Windows\System32\VSSVC.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1960C:\Windows\system32\MsiExec.exe -Embedding DD8170338927C06E523C1890B296C1ADC:\Windows\System32\msiexec.exe
msiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2044 -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\admin\AppData\Local\Temp\pss8997.ps1" -propFile "C:\Users\admin\AppData\Local\Temp\msi8985.txt" -scriptFile "C:\Users\admin\AppData\Local\Temp\scr8986.ps1" -scriptArgsFile "C:\Users\admin\AppData\Local\Temp\scr8987.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
2460 -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\admin\AppData\Local\Temp\pssE8FD.ps1" -propFile "C:\Users\admin\AppData\Local\Temp\msiE8DB.txt" -scriptFile "C:\Users\admin\AppData\Local\Temp\scrE8DC.ps1" -scriptArgsFile "C:\Users\admin\AppData\Local\Temp\scrE8DD.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
msiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
2740 -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\admin\AppData\Local\PDFFlex\pss6306.ps1" -propFile "C:\Users\admin\AppData\Local\PDFFlex\msi62E3.txt" -scriptFile "C:\Users\admin\AppData\Local\PDFFlex\scr62E4.ps1" -scriptArgsFile "C:\Users\admin\AppData\Local\PDFFlex\scr62E5.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
msiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
2768"C:\Users\admin\AppData\Local\PDFFlex\PDFFlex.exe" C:\Users\admin\AppData\Local\PDFFlex\PDFFlex.exe
MSI6190.tmp
User:
admin
Integrity Level:
MEDIUM
Version:
3.202.1208.0
Modules
Images
c:\users\admin\appdata\local\pdfflex\pdfflex.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\local\pdfflex\webview2loader.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
Total events
40 337
Read events
39 501
Write events
500
Delete events
336

Modification events

(PID) Process:(3976) msiexec.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(4088) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
40000000000000001C987414C8AADA01F80F000004050000D5070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(4088) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
40000000000000001C987414C8AADA01F80F000004050000D0070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(4088) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
Operation:writeName:LastIndex
Value:
75
(PID) Process:(4088) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
Operation:writeName:SppGatherWriterMetadata (Enter)
Value:
40000000000000005461C215C8AADA01F80F000004050000D3070000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(4088) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
Operation:writeName:IDENTIFY (Enter)
Value:
40000000000000005461C215C8AADA01F80F0000FC060000E80300000100000000000000000000004BE094B6A388A941BA2B5DE8EA85931C0000000000000000
(PID) Process:(1424) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\ASR Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4000000000000000164DCE15C8AADA0190050000EC080000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1424) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4000000000000000164DCE15C8AADA01900500003C090000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1424) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4000000000000000164DCE15C8AADA0190050000E8080000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1424) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer
Operation:writeName:IDENTIFY (Enter)
Value:
400000000000000070AFD015C8AADA019005000004080000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
Executable files
25
Suspicious files
55
Text files
23
Unknown types
3

Dropped files

PID
Process
Filename
Type
820msiexec.exeC:\Users\admin\AppData\Local\Temp\msi8985.txt
MD5:
SHA256:
820msiexec.exeC:\Users\admin\AppData\Local\Temp\scr8986.ps1
MD5:
SHA256:
820msiexec.exeC:\Users\admin\AppData\Local\Temp\scr8987.txt
MD5:
SHA256:
820msiexec.exeC:\Users\admin\AppData\Local\Temp\pss8997.ps1
MD5:
SHA256:
820msiexec.exeC:\Users\admin\AppData\Local\Temp\msi8F95.txt
MD5:
SHA256:
820msiexec.exeC:\Users\admin\AppData\Local\Temp\scr8F96.ps1
MD5:
SHA256:
820msiexec.exeC:\Users\admin\AppData\Local\Temp\scr8F97.txt
MD5:
SHA256:
820msiexec.exeC:\Users\admin\AppData\Local\Temp\pss8FB7.ps1
MD5:
SHA256:
3976msiexec.exeC:\Users\admin\AppData\Local\Temp\MSI892C.tmpexecutable
MD5:A2317EBF66616E3B13218B2B9739CF74
SHA256:D6A3C9C614FA4491A1BD988D86687515E15EDF7E0CFDE2159D0850BF2C5C7C89
4088msiexec.exeC:\System Volume Information\SPP\snapshot-2
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
14
DNS requests
9
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3976
msiexec.exe
GET
200
95.101.24.221:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?3629dbdebe228fb8
unknown
unknown
3976
msiexec.exe
GET
200
104.18.21.226:80
http://secure.globalsign.com/cacert/codesigningrootr45.crt
unknown
unknown
1960
msiexec.exe
GET
304
95.101.24.221:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?a396313ffb81f6dc
unknown
unknown
1960
msiexec.exe
GET
200
18.245.39.64:80
http://ocsp.rootg2.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBSIfaREXmfqfJR3TkMYnD7O5MhzEgQUnF8A36oB1zArOIiiuG1KnPIRkYMCEwZ%2FlEoqJ83z%2BsKuKwH5CO65xMY%3D
unknown
unknown
1960
msiexec.exe
GET
200
108.138.2.195:80
http://o.ss2.us//MEowSDBGMEQwQjAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCCQCnDkpMNIK3fw%3D%3D
unknown
unknown
1960
msiexec.exe
GET
200
18.245.39.64:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwdzEjgLnWaIozse2b%2BczaaODg8%3D
unknown
unknown
1088
svchost.exe
GET
304
95.101.24.197:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?90076af29193d397
unknown
unknown
2460
powershell.exe
POST
200
18.66.107.187:80
http://d1jorhhovk7rc8.cloudfront.net/
unknown
unknown
2740
powershell.exe
POST
200
18.66.107.187:80
http://d1jorhhovk7rc8.cloudfront.net/
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
unknown
224.0.0.252:5355
unknown
4
System
192.168.100.255:138
unknown
3976
msiexec.exe
104.18.21.226:80
secure.globalsign.com
CLOUDFLARENET
shared
3976
msiexec.exe
95.101.24.221:80
ctldl.windowsupdate.com
Akamai International B.V.
AR
unknown
2460
powershell.exe
18.66.107.187:80
d1jorhhovk7rc8.cloudfront.net
AMAZON-02
US
unknown
1960
msiexec.exe
18.66.92.89:443
dn0diw4x4ljz4.cloudfront.net
US
unknown
1960
msiexec.exe
95.101.24.221:80
ctldl.windowsupdate.com
Akamai International B.V.
AR
unknown
1960
msiexec.exe
108.138.2.195:80
o.ss2.us
AMAZON-02
US
unknown
1960
msiexec.exe
18.245.39.64:80
ocsp.rootg2.amazontrust.com
US
unknown

DNS requests

Domain
IP
Reputation
secure.globalsign.com
  • 104.18.21.226
  • 104.18.20.226
whitelisted
ctldl.windowsupdate.com
  • 95.101.24.221
  • 95.101.24.197
whitelisted
d1jorhhovk7rc8.cloudfront.net
  • 18.66.107.187
  • 18.66.107.68
  • 18.66.107.107
  • 18.66.107.193
unknown
dn0diw4x4ljz4.cloudfront.net
  • 18.66.92.89
  • 18.66.92.74
  • 18.66.92.169
  • 18.66.92.91
unknown
o.ss2.us
  • 108.138.2.195
  • 108.138.2.10
  • 108.138.2.107
  • 108.138.2.173
whitelisted
ocsp.rootg2.amazontrust.com
  • 18.245.39.64
whitelisted
ocsp.rootca1.amazontrust.com
  • 18.245.39.64
shared

Threats

No threats detected
Process
Message
PDFFlex.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.
PDFFlex.exe
WebView2: Failed to find an installed WebView2 runtime or non-stable Microsoft Edge installation.