File name:

thepdfbox.msi

Full analysis: https://app.any.run/tasks/f104d802-3e82-4d39-962d-700f6bbb7291
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: March 11, 2025, 14:38:39
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
generated-doc
advancedinstaller
adware
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {18812351-7BCE-45CB-8659-D8D6C470EBD1}, Number of Words: 10, Subject: EPI PDF, Author: EPI Software, Name of Creating Application: EPI PDF, Template: ;1033, Comments: 20.1.2032.2, Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Tue Mar 4 05:38:24 2025, Last Saved Time/Date: Tue Mar 4 05:38:24 2025, Last Printed: Tue Mar 4 05:38:24 2025, Number of Pages: 450
MD5:

48B21D8D1DA8E64A18AA7ABA683B1F43

SHA1:

37C2E93DE7EB226CBDD52498D29C6FF3C4C60F95

SHA256:

DCF15B12CFCF0E065102B64ADC16999240C7BA0BB4FBD1C86CDABB2355EB58A1

SSDEEP:

49152:WAv9IfHToXiGrU0tnIWmY8ik7JQNRwg5zLSHxOUYHQOqz71r3MyGdY3xiv8:B9Iro3A0tItYwOq/1r3Mr

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • ADVANCEDINSTALLER has been detected (SURICATA)

      • msiexec.exe (PID: 6964)
  • SUSPICIOUS

    • Executes as Windows Service

      • VSSVC.exe (PID: 7500)
    • Detects AdvancedInstaller (YARA)

      • msiexec.exe (PID: 6476)
      • msiexec.exe (PID: 2800)
    • Potential Corporate Privacy Violation

      • msiexec.exe (PID: 6964)
    • Access to an unwanted program domain was detected

      • msiexec.exe (PID: 6964)
    • Executable content was dropped or overwritten

      • installer.exe (PID: 7428)
      • epibrowser.exe (PID: 7800)
      • setup.exe (PID: 4068)
    • Application launched itself

      • setup.exe (PID: 5416)
      • setup.exe (PID: 4068)
      • epibrowser.exe (PID: 3300)
    • Starts CMD.EXE for commands execution

      • msiexec.exe (PID: 4880)
  • INFO

    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 6476)
    • Creates files or folders in the user directory

      • msiexec.exe (PID: 6476)
    • An automatically generated document

      • msiexec.exe (PID: 6476)
    • Checks supported languages

      • msiexec.exe (PID: 4880)
      • msiexec.exe (PID: 2800)
    • Reads the computer name

      • msiexec.exe (PID: 4880)
      • msiexec.exe (PID: 2800)
    • Reads the software policy settings

      • msiexec.exe (PID: 6476)
    • Reads Environment values

      • msiexec.exe (PID: 4880)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 6476)
      • msiexec.exe (PID: 2800)
    • The sample compiled with english language support

      • msiexec.exe (PID: 6476)
      • msiexec.exe (PID: 2800)
      • installer.exe (PID: 7428)
      • setup.exe (PID: 4068)
      • epibrowser.exe (PID: 7800)
    • Manages system restore points

      • SrTasks.exe (PID: 8072)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msi | Microsoft Windows Installer (88.6)
.mst | Windows SDK Setup Transform Script (10)
.msi | Microsoft Installer (100)

EXIF

FlashPix

Security: None
CodePage: Windows Latin 1 (Western European)
RevisionNumber: {18812351-7BCE-45CB-8659-D8D6C470EBD1}
Words: 10
Subject: EPI PDF
Author: EPI Software
LastModifiedBy: -
Software: EPI PDF
Template: ;1033
Comments: 20.1.2032.2
Title: Installation Database
Keywords: Installer, MSI, Database
CreateDate: 2025:03:04 05:38:24
ModifyDate: 2025:03:04 05:38:24
LastPrinted: 2025:03:04 05:38:24
Pages: 450
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
175
Monitored processes
37
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start msiexec.exe msiexec.exe msiexec.exe no specs sppextcomobj.exe no specs slui.exe vssvc.exe no specs srtasks.exe no specs conhost.exe no specs #ADVANCEDINSTALLER msiexec.exe installer.exe setup.exe setup.exe no specs slui.exe no specs notification_helper.exe no specs chrome.exe no specs setup.exe no specs setup.exe no specs epibrowser.exe epibrowser.exe no specs cmd.exe no specs conhost.exe no specs epibrowser.exe no specs epibrowser.exe epibrowser.exe no specs epibrowser.exe epibrowser.exe no specs epibrowser.exe no specs epibrowser.exe no specs epibrowser.exe no specs epibrowser.exe no specs epibrowser.exe no specs epibrowser.exe no specs epibrowser.exe no specs epibrowser.exe no specs epibrowser.exe no specs epibrowser.exe no specs epibrowser.exe

Process information

PID
CMD
Path
Indicators
Parent process
644C:\Users\admin\AppData\Local\EPISoftware\EpiBrowser\Application\epibrowser.exe --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\EPISoftware\EpiBrowser\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\EPISoftware\EpiBrowser\User Data\Crashpad" --annotation=plat=Win64 --annotation=prod=EpiBrowser --annotation=ver=132.0.6834.202 --initial-client-data=0x12c,0x130,0x134,0x108,0x138,0x7ffc8953dcf8,0x7ffc8953dd04,0x7ffc8953dd10C:\Users\admin\AppData\Local\EPISoftware\EpiBrowser\Application\epibrowser.exeepibrowser.exe
User:
admin
Company:
EPI Software
Integrity Level:
MEDIUM
Description:
EpiBrowser
Version:
132.0.6834.202
Modules
Images
c:\users\admin\appdata\local\episoftware\epibrowser\application\epibrowser.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\ucrtbase.dll
c:\users\admin\appdata\local\episoftware\epibrowser\application\132.0.6834.202\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
1188"C:\Users\admin\AppData\Local\EPISoftware\EpiBrowser\Application\epibrowser.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=5768,i,8405923869144734219,13997808259819032239,262144 --variations-seed-version --mojo-platform-channel-handle=6300 /prefetch:8C:\Users\admin\AppData\Local\EPISoftware\EpiBrowser\Application\epibrowser.exeepibrowser.exe
User:
admin
Company:
EPI Software
Integrity Level:
LOW
Description:
EpiBrowser
Exit code:
0
Version:
132.0.6834.202
Modules
Images
c:\users\admin\appdata\local\episoftware\epibrowser\application\epibrowser.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\ucrtbase.dll
c:\users\admin\appdata\local\episoftware\epibrowser\application\132.0.6834.202\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
1324"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=122.0.6261.70 --initial-client-data=0x1f4,0x1f8,0x1fc,0x1d0,0x200,0x7ff7279a35f0,0x7ff7279a35fc,0x7ff7279a3608C:\Program Files\Google\Chrome\Application\chrome.exenotification_helper.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
2240"C:\Users\admin\AppData\Local\EPISoftware\EpiBrowser\Application\epibrowser.exe" --type=renderer --string-annotations --extension-process --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=6176,i,8405923869144734219,13997808259819032239,262144 --variations-seed-version --mojo-platform-channel-handle=6236 /prefetch:2C:\Users\admin\AppData\Local\EPISoftware\EpiBrowser\Application\epibrowser.exeepibrowser.exe
User:
admin
Company:
EPI Software
Integrity Level:
LOW
Description:
EpiBrowser
Version:
132.0.6834.202
Modules
Images
c:\users\admin\appdata\local\episoftware\epibrowser\application\epibrowser.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\ucrtbase.dll
c:\users\admin\appdata\local\episoftware\epibrowser\application\132.0.6834.202\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
2420"C:\Users\admin\AppData\Local\EPISoftware\EpiBrowser\Application\epibrowser.exe" --type=renderer --string-annotations --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=5172,i,8405923869144734219,13997808259819032239,262144 --variations-seed-version --mojo-platform-channel-handle=5240 /prefetch:1C:\Users\admin\AppData\Local\EPISoftware\EpiBrowser\Application\epibrowser.exeepibrowser.exe
User:
admin
Company:
EPI Software
Integrity Level:
LOW
Description:
EpiBrowser
Version:
132.0.6834.202
Modules
Images
c:\users\admin\appdata\local\episoftware\epibrowser\application\epibrowser.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\ucrtbase.dll
c:\users\admin\appdata\local\episoftware\epibrowser\application\132.0.6834.202\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
2800C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
3008C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
3024"C:\Users\admin\AppData\Local\EPISoftware\EpiBrowser\Application\epibrowser.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2452,i,8405923869144734219,13997808259819032239,262144 --variations-seed-version --mojo-platform-channel-handle=2472 /prefetch:8C:\Users\admin\AppData\Local\EPISoftware\EpiBrowser\Application\epibrowser.exeepibrowser.exe
User:
admin
Company:
EPI Software
Integrity Level:
LOW
Description:
EpiBrowser
Version:
132.0.6834.202
Modules
Images
c:\users\admin\appdata\local\episoftware\epibrowser\application\epibrowser.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\ucrtbase.dll
c:\users\admin\appdata\local\episoftware\epibrowser\application\132.0.6834.202\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
3300"C:\Users\admin\AppData\Local\EPISoftware\EpiBrowser\Application\epibrowser.exe" --from-installerC:\Users\admin\AppData\Local\EPISoftware\EpiBrowser\Application\epibrowser.exe
setup.exe
User:
admin
Company:
EPI Software
Integrity Level:
MEDIUM
Description:
EpiBrowser
Version:
132.0.6834.202
Modules
Images
c:\users\admin\appdata\local\episoftware\epibrowser\application\epibrowser.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\users\admin\appdata\local\episoftware\epibrowser\application\132.0.6834.202\chrome_elf.dll
c:\windows\system32\bcryptprimitives.dll
4068"C:\Users\admin\AppData\Local\EPISoftware\CR_C6D98.tmp\setup.exe" --install-archive="C:\Users\admin\AppData\Local\EPISoftware\CR_C6D98.tmp\EPIBROWSER.PACKED.7Z" --import C:\Users\admin\AppData\Local\EPISoftware\CR_C6D98.tmp\setup.exe
installer.exe
User:
admin
Company:
EPI Software
Integrity Level:
MEDIUM
Description:
EpiBrowser Installer
Exit code:
0
Version:
132.0.6834.202
Modules
Images
c:\users\admin\appdata\local\episoftware\cr_c6d98.tmp\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
Total events
16 382
Read events
16 048
Write events
313
Delete events
21

Modification events

(PID) Process:(2800) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
4800000000000000C2CCC3509392DB01F00A00003C1D0000D50700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(2800) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Enter)
Value:
4800000000000000C2CCC3509392DB01F00A00003C1D0000D20700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(2800) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Leave)
Value:
4800000000000000B866FF509392DB01F00A00003C1D0000D20700000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(2800) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Enter)
Value:
4800000000000000B866FF509392DB01F00A00003C1D0000D10700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(2800) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
4800000000000000BC2C04519392DB01F00A00003C1D0000D00700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(2800) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Leave)
Value:
480000000000000077C801519392DB01F00A00003C1D0000D10700000100000000000000010000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7500) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
Operation:writeName:IDENTIFY (Enter)
Value:
48000000000000001294DF519392DB014C1D0000E41D0000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7500) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
Operation:writeName:IDENTIFY (Enter)
Value:
48000000000000001294DF519392DB014C1D00006C1D0000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7500) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer
Operation:writeName:IDENTIFY (Enter)
Value:
48000000000000001294DF519392DB014C1D0000681D0000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(7500) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
Operation:writeName:IDENTIFY (Enter)
Value:
48000000000000001294DF519392DB014C1D0000EC1D0000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
Executable files
25
Suspicious files
146
Text files
80
Unknown types
2

Dropped files

PID
Process
Filename
Type
2800msiexec.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
6476msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B03113490075047F519A3F760F0FF379_EBBA28E9C87017B1304DDD420918A981binary
MD5:2A8A245CCE51FF284CCA769A5EEBDD7F
SHA256:C96C14ADDB9448FD08233E6D5DE0C48C880FE7D36BB83D9380A0FBBC52FEA137
6476msiexec.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B03113490075047F519A3F760F0FF379_EBBA28E9C87017B1304DDD420918A981binary
MD5:340C35326202EF1160128625B82DF112
SHA256:EF1C075545509972A64E539D796507A2D230FF6DB4A4883978E947F1644ED06B
6476msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIB8E3.tmpexecutable
MD5:2330EBBE491C6026AF5E8853F3692798
SHA256:3ADA2257732FAE73114BB6A5E082CEF4BD72C3D6842924BE6F22728C7D7CACC4
6476msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIB807.tmpexecutable
MD5:2330EBBE491C6026AF5E8853F3692798
SHA256:3ADA2257732FAE73114BB6A5E082CEF4BD72C3D6842924BE6F22728C7D7CACC4
6964msiexec.exeC:\Users\admin\AppData\Local\EPISoftware\installer.exe.part
MD5:
SHA256:
6964msiexec.exeC:\Users\admin\AppData\Local\EPISoftware\installer.exe
MD5:
SHA256:
6476msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIBBA3.tmpexecutable
MD5:2330EBBE491C6026AF5E8853F3692798
SHA256:3ADA2257732FAE73114BB6A5E082CEF4BD72C3D6842924BE6F22728C7D7CACC4
2800msiexec.exeC:\Windows\Installer\MSI2588.tmpexecutable
MD5:2330EBBE491C6026AF5E8853F3692798
SHA256:3ADA2257732FAE73114BB6A5E082CEF4BD72C3D6842924BE6F22728C7D7CACC4
6476msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIBC62.tmpexecutable
MD5:2330EBBE491C6026AF5E8853F3692798
SHA256:3ADA2257732FAE73114BB6A5E082CEF4BD72C3D6842924BE6F22728C7D7CACC4
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
73
DNS requests
60
Threats
35

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6476
msiexec.exe
GET
200
95.101.79.49:80
http://cevcsca2021.ocsp-certum.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBR2rKuShFxBxX%2BVZ%2F8jiOwbsyptXQQUrFfKCBbcP8UxHApN2%2Fvx3pknLTQCEDkJ2BxqOL%2F6yIfZbGWT9R0%3D
unknown
unknown
6476
msiexec.exe
GET
200
2.17.22.194:80
http://subca.ocsp-certum.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRIH1V64SBkA%2BzJQVQ6VFBAcvLB3wQUtqFUOQLDoD%2BOirz61PgcptE6Dv0CEQC78My1t7gx%2FSGuMneK5AyJ
unknown
whitelisted
4008
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
8060
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
8060
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
GET
52.85.65.100:80
http://resources.epibrowser.com/epibrowser_installer_132.0.6834.202.exe
unknown
unknown
7988
epibrowser.exe
GET
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/mfnf4w4aaa2rporuqgtjqv35v4_4.10.2891.0/oimompecagnajdejgnnjijobebaeigek_4.10.2891.0_win64_acwxtxt2znguar3w2o252umtomsq.crx3
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
6476
msiexec.exe
2.17.22.194:80
subca.ocsp-certum.com
AKAMAI-AS
GB
suspicious
6476
msiexec.exe
95.101.79.49:80
subca.ocsp-certum.com
Akamai International B.V.
NL
suspicious
3216
svchost.exe
40.115.3.253:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
20.190.159.4:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2112
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.206
whitelisted
settings-win.data.microsoft.com
  • 51.124.78.146
  • 51.104.136.2
whitelisted
subca.ocsp-certum.com
  • 2.17.22.194
  • 95.101.79.49
whitelisted
cevcsca2021.ocsp-certum.com
  • 95.101.79.49
  • 2.17.22.194
unknown
client.wns.windows.com
  • 40.115.3.253
whitelisted
login.live.com
  • 20.190.159.4
  • 20.190.159.71
  • 40.126.31.2
  • 40.126.31.131
  • 20.190.159.129
  • 20.190.159.130
  • 20.190.159.23
  • 20.190.159.73
whitelisted
ocsp.digicert.com
  • 2.23.77.188
  • 184.30.131.245
whitelisted
arc.msn.com
  • 20.223.36.55
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted

Threats

PID
Process
Class
Message
6964
msiexec.exe
Possibly Unwanted Program Detected
ADWARE [ANY.RUN] AdvancedInstaller User-Agent
6964
msiexec.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
Potentially Bad Traffic
ET INFO Executable served from Amazon S3
7988
epibrowser.exe
Not Suspicious Traffic
INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code .jquery .com)
7988
epibrowser.exe
Not Suspicious Traffic
INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code .jquery .com)
7988
epibrowser.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare content delivery network (cdnjs .cloudflare .com)
7988
epibrowser.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare content delivery network (cdnjs .cloudflare .com)
7988
epibrowser.exe
Not Suspicious Traffic
INFO [ANY.RUN] Requests to a free CDN for open source projects (jsdelivr .net)
7988
epibrowser.exe
Not Suspicious Traffic
INFO [ANY.RUN] Requests to a free CDN for open source projects (jsdelivr .net)
7988
epibrowser.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
No debug info