File name:

GoToWebinar Opener.exe

Full analysis: https://app.any.run/tasks/81d54aa6-1f53-4559-9839-dbb5718db0f1
Verdict: Malicious activity
Analysis date: May 14, 2021, 15:43:03
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
MD5:

65C81C6F65F5BB5E5D108CAD30FC3C49

SHA1:

B58AADD49DF604DD2ABCF37F738AC4D2609131DF

SHA256:

CE4A960A6DF4FF384DD1B32188235423C52D9DB317E54B7840B264CBBCCB1AE1

SSDEEP:

6144:Dd7CQ/BmTtno7QgD3MQFAy8aMLTMRGZTjjOLhZb+yJp2brWO9UCSVzy0oSIw6BLZ:DtITtno0C3XzMLTgW0hZjV2ZSVz/oSI3

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • G2MCoreInstExtractor.exe (PID: 2564)
      • G2MInstaller.exe (PID: 4008)
      • G2MInstaller.exe (PID: 2196)
      • g2mstart.exe (PID: 920)
      • g2mlauncher.exe (PID: 4004)
      • g2mcomm.exe (PID: 680)
      • g2mvideoconference.exe (PID: 3268)
      • g2mui.exe (PID: 2960)
    • Loads the Task Scheduler DLL interface

      • G2MInstaller.exe (PID: 4008)
    • Loads dropped or rewritten executable

      • rundll32.exe (PID: 2768)
      • g2mlauncher.exe (PID: 4004)
    • Steals credentials from Web Browsers

      • g2mcomm.exe (PID: 680)
    • Actions looks like stealing of personal data

      • g2mcomm.exe (PID: 680)
    • Registers / Runs the DLL via REGSVR32.EXE

      • g2mlauncher.exe (PID: 4004)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • GoToWebinar Opener.exe (PID: 988)
      • G2MInstaller.exe (PID: 4008)
      • G2MCoreInstExtractor.exe (PID: 2564)
    • Drops a file with a compile date too recent

      • G2MCoreInstExtractor.exe (PID: 2564)
      • G2MInstaller.exe (PID: 4008)
    • Drops a file that was compiled in debug mode

      • G2MInstaller.exe (PID: 4008)
      • G2MCoreInstExtractor.exe (PID: 2564)
    • Creates files in the Windows directory

      • G2MInstaller.exe (PID: 4008)
    • Starts itself from another location

      • G2MInstaller.exe (PID: 4008)
    • Creates a software uninstall entry

      • G2MInstaller.exe (PID: 4008)
    • Changes default file association

      • G2MInstaller.exe (PID: 4008)
    • Starts Microsoft Installer

      • GoToWebinar Opener.exe (PID: 988)
    • Uses RUNDLL32.EXE to load library

      • G2MInstaller.exe (PID: 4008)
    • Changes IE settings (feature browser emulation)

      • g2mlauncher.exe (PID: 4004)
      • g2mui.exe (PID: 2960)
    • Creates/Modifies COM task schedule object

      • g2mlauncher.exe (PID: 4004)
    • Reads internet explorer settings

      • g2mui.exe (PID: 2960)
    • Starts CMD.EXE for commands execution

      • GoToWebinar Opener.exe (PID: 988)
  • INFO

    • Reads settings of System Certificates

      • GoToWebinar Opener.exe (PID: 988)
      • g2mcomm.exe (PID: 680)
    • Dropped object may contain Bitcoin addresses

      • G2MCoreInstExtractor.exe (PID: 2564)
      • G2MInstaller.exe (PID: 4008)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (30.7)
.exe | UPX compressed Win32 Executable (30.1)
.exe | Win32 EXE Yoda's Crypter (29.5)
.exe | Win32 Executable (generic) (5)
.exe | Generic Win/DOS Executable (2.2)

EXIF

EXE

ProductVersion: 1.0.0.539
FileVersion: 1.0.0.539
OriginalFileName: GoToOpener.exe
InternalName: GoToOpener
FileDescription: GoTo Opener
ProductName: GoTo Opener
LegalCopyright: Copyright © 2012-2020 LogMeIn, Inc.
CompanyName: LogMeIn, Inc.
CharacterSet: Windows, Latin1
LanguageCode: English (U.S.)
FileSubtype: -
ObjectFileType: Dynamic link library
FileOS: Windows NT 32-bit
FileFlags: (none)
FileFlagsMask: 0x003f
ProductVersionNumber: 1.0.0.539
FileVersionNumber: 1.0.0.539
Subsystem: Windows GUI
SubsystemVersion: 5.1
ImageVersion: -
OSVersion: 5.1
EntryPoint: 0x111850
UninitializedDataSize: 823296
InitializedDataSize: 73728
CodeSize: 299008
LinkerVersion: 12
PEType: PE32
TimeStamp: 2020:11:24 15:40:08+01:00
MachineType: Intel 386 or later, and compatibles

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 24-Nov-2020 14:40:08
Detected languages:
  • Chinese - Taiwan
  • Czech - Czech Republic
  • English - United States
  • Polish - Poland
  • Russian - Russia
  • Turkish - Turkey
CompanyName: LogMeIn, Inc.
LegalCopyright: Copyright © 2012-2020 LogMeIn, Inc.
ProductName: GoTo Opener
FileDescription: GoTo Opener
InternalName: GoToOpener
OriginalFilename: GoToOpener.exe
FileVersion: 1.0.0.539
ProductVersion: 1.0.0.539

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000100

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 3
Time date stamp: 24-Nov-2020 14:40:08
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
UPX0
0x00001000
0x000C9000
0x00000000
IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
UPX1
0x000CA000
0x00049000
0x00048600
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.9981
.rsrc
0x00113000
0x00012000
0x00011400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
6.86178

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.10999
2016
Latin 1 / Western European
English - United States
RT_MANIFEST
2
2.83509
744
Latin 1 / Western European
UNKNOWN
RT_ICON
3
3.72476
296
Latin 1 / Western European
UNKNOWN
RT_ICON
4
4.94788
3752
Latin 1 / Western European
UNKNOWN
RT_ICON
5
5.01628
2216
Latin 1 / Western European
UNKNOWN
RT_ICON
6
4.26294
1384
Latin 1 / Western European
UNKNOWN
RT_ICON
7
7.97457
36411
Latin 1 / Western European
UNKNOWN
RT_ICON
8
4.14254
9640
Latin 1 / Western European
UNKNOWN
RT_ICON
9
4.08107
4264
Latin 1 / Western European
UNKNOWN
RT_ICON
10
5.49055
1128
Latin 1 / Western European
UNKNOWN
RT_ICON

Imports

COMCTL32.dll
KERNEL32.DLL
urlmon.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
51
Monitored processes
13
Malicious processes
5
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start drop and start gotowebinar opener.exe msiexec.exe no specs g2mcoreinstextractor.exe g2minstaller.exe g2minstaller.exe no specs g2mstart.exe no specs rundll32.exe no specs g2mcomm.exe g2mlauncher.exe no specs regsvr32.exe no specs g2mui.exe no specs g2mvideoconference.exe cmd.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
680"C:\Users\admin\AppData\Local\GoToMeeting\19598\g2mcomm.exe" "Action=Join&betaEnabled=true&BrokerServiceSuffix=@ISL1&buildNumber=19598&colClientUiReadyEvent=Global\E11C1BE9-5590-44B2-A319-271B4A4D1C8D&DidInstall=True&Digest=3ece63c60d1328d9e180022add67e065&Dir=C:\Users\admin\AppData\Local\GoToMeeting\19598\&EGWAddress=216.115.208.230&EGWDNS=egwglobal.gotomeeting.com&EGWPort=8200,80,443&LoaderPath=C:\Users\admin\AppData\Local\GoToMeeting\19598\g2mstart.exe&locale=en&LogName=c:\users\admin\appdata\local\temp\logmeinlogs\gotomeeting\19598\2021-05-14_16.43.59.826\GoToMeeting.log&MeetingID=806036459&Mode=terse&Path=g2mlauncher.exe&Plugin=G2MLauncher&productName=g2m&sessionTrackingId=e0-EuwaTw-2PkAPJFcl9_KSgST8-vR7D&theme=g2w&UniqueId=398&UserID=8262696157276314127&UserRole=attendee"C:\Users\admin\AppData\Local\GoToMeeting\19598\g2mcomm.exe
g2mstart.exe
User:
admin
Company:
LogMeIn, Inc.
Integrity Level:
MEDIUM
Description:
GoToMeeting
Exit code:
0
Version:
10.16.0 Build 19598
Modules
Images
c:\users\admin\appdata\local\gotomeeting\19598\g2mcomm.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\users\admin\appdata\local\gotomeeting\19598\g2m.dll
920"C:\Users\admin\AppData\Local\GoToMeeting\19598\g2mstart.exe" "/Action Join" "/BrokerServiceSuffix @ISL1" "/DidInstall True" "/EGWAddress 216.115.208.230" "/EGWDNS egwglobal.gotomeeting.com" "/EGWPort 8200,80,443" "/MeetingID 806036459" "/Mode terse" "/UserID 8262696157276314127" "/UserRole attendee" "/betaEnabled true" "/buildNumber 19598" "/colClientUiReadyEvent Global\E11C1BE9-5590-44B2-A319-271B4A4D1C8D" "/locale en" "/productName g2m" "/sessionTrackingId e0-EuwaTw-2PkAPJFcl9_KSgST8-vR7D" "/theme g2w"C:\Users\admin\AppData\Local\GoToMeeting\19598\g2mstart.exeG2MInstaller.exe
User:
admin
Company:
LogMeIn, Inc.
Integrity Level:
MEDIUM
Description:
GoToMeeting
Exit code:
0
Version:
10.16.0 Build 19598
Modules
Images
c:\users\admin\appdata\local\gotomeeting\19598\g2mstart.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
c:\users\admin\appdata\local\gotomeeting\19598\g2m.dll
988"C:\Users\admin\AppData\Local\Temp\GoToWebinar Opener.exe" C:\Users\admin\AppData\Local\Temp\GoToWebinar Opener.exe
explorer.exe
User:
admin
Company:
LogMeIn, Inc.
Integrity Level:
MEDIUM
Description:
GoTo Opener
Exit code:
0
Version:
1.0.0.539
Modules
Images
c:\users\admin\appdata\local\temp\gotowebinar opener.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2196"C:\Users\admin\AppData\Local\GoToMeeting\19598\G2MInstaller.exe" -noopC:\Users\admin\AppData\Local\GoToMeeting\19598\G2MInstaller.exeG2MInstaller.exe
User:
admin
Company:
LogMeIn, Inc.
Integrity Level:
MEDIUM
Description:
GoToMeeting
Exit code:
0
Version:
10.16.0 Build 19598
Modules
Images
c:\users\admin\appdata\local\gotomeeting\19598\g2minstaller.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\users\admin\appdata\local\gotomeeting\19598\g2m.dll
2348cmd /c ""C:\Users\admin\AppData\Local\Temp\1B793C84-3E2D-433B-9F65-1F6F33CBFE85.bat" "C:\Users\admin\AppData\Local\Temp\GoToWebinar Opener.exe""C:\Windows\system32\cmd.exeGoToWebinar Opener.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2564"C:\Users\admin\AppData\Local\Temp\21F52A68-22CE-42E6-BD1D-6777023AB0AF\G2MCoreInstExtractor.exe" "/Action Join" "/BrokerServiceSuffix @ISL1" "/EGWAddress 216.115.208.230" "/EGWDNS egwglobal.gotomeeting.com" "/EGWPort 8200,80,443" "/MeetingID 806036459" "/Mode terse" "/UserID 8262696157276314127" "/UserRole attendee" "/betaEnabled true" "/buildNumber 19598" "/colClientUiReadyEvent Global\E11C1BE9-5590-44B2-A319-271B4A4D1C8D" "/locale en" "/productName g2m" "/sessionTrackingId e0-EuwaTw-2PkAPJFcl9_KSgST8-vR7D" "/theme g2w"C:\Users\admin\AppData\Local\Temp\21F52A68-22CE-42E6-BD1D-6777023AB0AF\G2MCoreInstExtractor.exe
GoToWebinar Opener.exe
User:
admin
Company:
LogMeIn, Inc.
Integrity Level:
MEDIUM
Description:
GoToMeeting Installer Extractor
Exit code:
0
Version:
10.16.0 Build 19598
Modules
Images
c:\users\admin\appdata\local\temp\21f52a68-22ce-42e6-bd1d-6777023ab0af\g2mcoreinstextractor.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
2768rundll32.exe "C:\Users\admin\AppData\Local\Temp\21F52A68-22CE-42E6-BD1D-6777023AB0AF\uninshlp.dll",DeleteExeAndDeleteSelf ce8685bd-24be-4c15-8f19-aee0dbff4f63C:\Windows\system32\rundll32.exeG2MInstaller.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
2892"C:\Windows\system32\msiexec.exe" /i "C:\Users\admin\AppData\Local\Temp\30BA4C47-5DA5-4633-942E-232519AEA5AE\GoToOpener.msi" /q /lvx "C:\Users\admin\AppData\Local\Temp\LogMeInLogs\GoToOpenerMsi\390D2365-2794-4690-89BB-4EFA869E5A1A.log"C:\Windows\system32\msiexec.exeGoToWebinar Opener.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2960C:\Windows\system32\regsvr32.exe -s "C:\Users\admin\AppData\Local\GoToMeeting\19598\G2MOutlookAddin64.dll"C:\Windows\system32\regsvr32.exeg2mlauncher.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft(C) Register Server
Exit code:
3
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2960"C:\Users\admin\AppData\Local\GoToMeeting\19598\g2mui.exe" "StartID={ED2EF039-2D47-4F73-998C-062015EB5CCC}&Debug=Off&Stat=On&StatDb=On&Index=0"C:\Users\admin\AppData\Local\GoToMeeting\19598\g2mui.exeg2mcomm.exe
User:
admin
Company:
LogMeIn, Inc.
Integrity Level:
MEDIUM
Description:
GoToMeeting
Exit code:
0
Version:
10.16.0 Build 19598
Modules
Images
c:\windows\system32\msctf.dll
c:\windows\system32\regsvr32.exe
c:\windows\system32\wininet.dll
c:\windows\system32\normaliz.dll
c:\windows\system32\api-ms-win-downlevel-version-l1-1-0.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\api-ms-win-downlevel-ole32-l1-1-0.dll
c:\windows\system32\devobj.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\profapi.dll
Total events
3 690
Read events
3 446
Write events
238
Delete events
6

Modification events

(PID) Process:(988) GoToWebinar Opener.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(988) GoToWebinar Opener.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
46000000A5000000010000000000000000000000000000000000000000000000C0E333BBEAB1D301000000000000000000000000020000001700000000000000FE800000000000007D6CB050D9C573F70B000000000000006D00330032005C004D00530049004D004700330032002E0064006C000100000004AA400014AA4000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000C0A8016400000000000000000000000000000000000000000800000000000000805D3F00983740000008000002000000000000600000002060040000B8A94000020000008802000060040000B8A9400004000000F8010000B284000088B64000B84B400043003A000000000000000000000000000000000000000000
(PID) Process:(988) GoToWebinar Opener.exeKey:HKEY_CURRENT_USER\Software\LogMeInInc\GoTo Opener
Operation:writeName:UUID
Value:
{7143A087-56E0-45D0-99D8-6B8437CEA808}
(PID) Process:(988) GoToWebinar Opener.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(988) GoToWebinar Opener.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(988) GoToWebinar Opener.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(988) GoToWebinar Opener.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(988) GoToWebinar Opener.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(988) GoToWebinar Opener.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\13D\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2564) G2MCoreInstExtractor.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
Executable files
49
Suspicious files
16
Text files
5
Unknown types
10

Dropped files

PID
Process
Filename
Type
988GoToWebinar Opener.exeC:\Users\admin\AppData\Local\Temp\Cab2A8E.tmp
MD5:
SHA256:
988GoToWebinar Opener.exeC:\Users\admin\AppData\Local\Temp\Tar2A8F.tmp
MD5:
SHA256:
988GoToWebinar Opener.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\GoToOpener[1].msi
MD5:
SHA256:
988GoToWebinar Opener.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\6Z2BCOUL\G2MCoreInstExtractor[1].exe
MD5:
SHA256:
988GoToWebinar Opener.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_D975BBA8033175C8D112023D8A7A8AD6binary
MD5:
SHA256:
2892msiexec.exeC:\Users\admin\AppData\Local\Temp\LogMeInLogs\GoToOpenerMsi\390D2365-2794-4690-89BB-4EFA869E5A1A.logtext
MD5:
SHA256:
988GoToWebinar Opener.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6A2279C2CA42EBEE26F14589F0736E50binary
MD5:
SHA256:
988GoToWebinar Opener.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894der
MD5:
SHA256:
988GoToWebinar Opener.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_93E4B2BA79A897B3100CCB27F2D3BF4Fbinary
MD5:
SHA256:
2564G2MCoreInstExtractor.exeC:\Users\admin\AppData\Local\Temp\21F52A68-22CE-42E6-BD1D-6777023AB0AF\G2M.Dll
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
33
DNS requests
12
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
680
g2mcomm.exe
CONNECT
216.115.208.230:80
http://216.115.208.230:443
US
suspicious
988
GoToWebinar Opener.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAH9o%2BtuynXIiEOLckvPvJE%3D
US
der
471 b
whitelisted
988
GoToWebinar Opener.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAH9o%2BtuynXIiEOLckvPvJE%3D
US
der
471 b
whitelisted
988
GoToWebinar Opener.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQQX6Z6gAidtSefNc6DC0OInqPHDQQUD4BhHIIxYdUvKOeNRji0LOHG2eICEAjxiGvEfPLY66okJRLHuBs%3D
US
der
471 b
whitelisted
988
GoToWebinar Opener.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQQX6Z6gAidtSefNc6DC0OInqPHDQQUD4BhHIIxYdUvKOeNRji0LOHG2eICEAjxiGvEfPLY66okJRLHuBs%3D
US
der
471 b
whitelisted
988
GoToWebinar Opener.exe
GET
200
13.225.84.172:80
http://s.ss2.us/r.crl
US
der
434 b
whitelisted
GET
200
13.32.23.134:80
http://ocsp.sca1b.amazontrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQz9arGHWbnBV0DFzpNHz4YcTiFDQQUWaRmBlKge5WSPKOUByeWdFv5PdACEAoDSjvsQrLi1xmfp9BW6aU%3D
US
der
471 b
whitelisted
GET
200
13.32.23.134:80
http://ocsp.sca1b.amazontrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQz9arGHWbnBV0DFzpNHz4YcTiFDQQUWaRmBlKge5WSPKOUByeWdFv5PdACEAqRHSb5jtUYxaLbZpUerdw%3D
US
der
471 b
whitelisted
988
GoToWebinar Opener.exe
GET
200
143.204.101.42:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwZ%2FlFeFh%2Bisd96yUzJbvJmLVg0%3D
US
der
1.39 Kb
shared
988
GoToWebinar Opener.exe
GET
200
13.32.23.104:80
http://o.ss2.us//MEowSDBGMEQwQjAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCCQCnDkpMNIK3fw%3D%3D
US
der
1.70 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
988
GoToWebinar Opener.exe
78.108.120.31:443
launch.getgo.com
Mobility Apps division
unknown
988
GoToWebinar Opener.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
988
GoToWebinar Opener.exe
13.32.25.116:443
builds.cdn.getgo.com
Amazon.com, Inc.
US
unknown
988
GoToWebinar Opener.exe
13.225.84.172:80
s.ss2.us
US
unknown
988
GoToWebinar Opener.exe
143.204.101.124:80
ocsp.rootg2.amazontrust.com
US
whitelisted
988
GoToWebinar Opener.exe
143.204.101.42:80
ocsp.rootg2.amazontrust.com
US
whitelisted
680
g2mcomm.exe
216.115.208.230:443
egwglobal.gotomeeting.com
Mobility Apps division
US
suspicious
988
GoToWebinar Opener.exe
13.32.23.104:80
o.ss2.us
Amazon.com, Inc.
US
unknown
13.32.25.116:443
builds.cdn.getgo.com
Amazon.com, Inc.
US
unknown
680
g2mcomm.exe
13.32.25.116:443
builds.cdn.getgo.com
Amazon.com, Inc.
US
unknown

DNS requests

Domain
IP
Reputation
launch.getgo.com
  • 78.108.120.31
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
builds.cdn.getgo.com
  • 13.32.25.116
  • 13.32.25.120
  • 13.32.25.107
  • 13.32.25.55
shared
o.ss2.us
  • 13.32.23.16
  • 13.32.23.104
  • 13.32.23.215
  • 13.32.23.96
whitelisted
s.ss2.us
  • 13.225.84.172
  • 13.225.84.92
  • 13.225.84.53
  • 13.225.84.50
whitelisted
ocsp.rootg2.amazontrust.com
  • 143.204.101.124
  • 143.204.101.74
  • 143.204.101.42
  • 143.204.101.190
whitelisted
ocsp.rootca1.amazontrust.com
  • 143.204.101.42
  • 143.204.101.74
  • 143.204.101.190
  • 143.204.101.124
shared
egwglobal.gotomeeting.com
  • 216.115.208.230
whitelisted
clientstream.launchdarkly.com
  • 13.248.151.210
  • 76.223.31.44
whitelisted
ocsp.sca1b.amazontrust.com
  • 13.32.23.134
  • 13.32.23.197
  • 13.32.23.140
  • 13.32.23.35
whitelisted

Threats

No threats detected
No debug info