URL:

https://download.biz-assistant.net/1edf525a8c9a8b19?l=17

Full analysis: https://app.any.run/tasks/1e3c5143-3175-40e3-834f-8dec010fefd9
Verdict: Malicious activity
Analysis date: March 09, 2024, 04:03:50
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

8E6793A9CEBE8857F9BA4AC9C47A3FF5

SHA1:

88226260FFA016551E1539414B41F2260B70F991

SHA256:

DF849E135A8AE6B3FB919A41AE0B2E4BF268A8548FE79D7B7D87E38CA6523755

SSDEEP:

3:N8SElsfIEWLDlIKBW7wb:2SK3EqDlbEwb

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • jre-8u401-windows-au.exe (PID: 2956)
      • jucheck.exe (PID: 2060)
  • SUSPICIOUS

    • Checks for Java to be installed

      • jp2launcher.exe (PID: 2692)
      • javaw.exe (PID: 2908)
      • javaw.exe (PID: 3684)
      • javaw.exe (PID: 2000)
      • jucheck.exe (PID: 2060)
      • jp2launcher.exe (PID: 2744)
      • jp2launcher.exe (PID: 2404)
      • jre-8u401-windows-au.exe (PID: 3272)
    • Reads the Internet Settings

      • jucheck.exe (PID: 2060)
      • jp2launcher.exe (PID: 2744)
      • jre-8u401-windows-au.exe (PID: 3272)
    • Reads settings of System Certificates

      • jucheck.exe (PID: 2060)
      • jp2launcher.exe (PID: 2744)
      • jre-8u401-windows-au.exe (PID: 3272)
    • Reads security settings of Internet Explorer

      • jucheck.exe (PID: 2060)
      • jre-8u401-windows-au.exe (PID: 3272)
      • jp2launcher.exe (PID: 2744)
    • Checks Windows Trust Settings

      • jucheck.exe (PID: 2060)
      • jre-8u401-windows-au.exe (PID: 3272)
    • Reads Microsoft Outlook installation path

      • jucheck.exe (PID: 2060)
      • jre-8u401-windows-au.exe (PID: 3272)
    • Reads Internet Explorer settings

      • jucheck.exe (PID: 2060)
      • jre-8u401-windows-au.exe (PID: 3272)
    • Executable content was dropped or overwritten

      • jucheck.exe (PID: 2060)
      • jre-8u401-windows-au.exe (PID: 2956)
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 3864)
    • Reads the computer name

      • javaw.exe (PID: 2908)
      • javaw.exe (PID: 3684)
      • javaw.exe (PID: 2000)
      • jucheck.exe (PID: 2060)
      • jp2launcher.exe (PID: 2744)
      • jre-8u401-windows-au.exe (PID: 2956)
      • jre-8u401-windows-au.exe (PID: 3272)
    • Connects to unusual port

      • iexplore.exe (PID: 3952)
    • Creates files in the program directory

      • javaw.exe (PID: 2908)
    • Checks supported languages

      • jp2launcher.exe (PID: 2692)
      • javaw.exe (PID: 2908)
      • javaw.exe (PID: 3684)
      • javaw.exe (PID: 2000)
      • jucheck.exe (PID: 2060)
      • jp2launcher.exe (PID: 2744)
      • javaws.exe (PID: 1900)
      • jp2launcher.exe (PID: 2404)
      • jre-8u401-windows-au.exe (PID: 3272)
      • jre-8u401-windows-au.exe (PID: 2956)
    • Create files in a temporary directory

      • javaw.exe (PID: 2908)
      • javaw.exe (PID: 2000)
      • javaw.exe (PID: 3684)
      • jucheck.exe (PID: 2060)
      • jp2launcher.exe (PID: 2744)
      • jre-8u401-windows-au.exe (PID: 2956)
    • Reads the machine GUID from the registry

      • jucheck.exe (PID: 2060)
      • jp2launcher.exe (PID: 2744)
      • jre-8u401-windows-au.exe (PID: 3272)
    • Checks proxy server information

      • jucheck.exe (PID: 2060)
      • jp2launcher.exe (PID: 2744)
      • jre-8u401-windows-au.exe (PID: 3272)
    • Reads the software policy settings

      • jucheck.exe (PID: 2060)
      • jre-8u401-windows-au.exe (PID: 3272)
    • Creates files or folders in the user directory

      • jucheck.exe (PID: 2060)
      • jp2launcher.exe (PID: 2744)
      • jre-8u401-windows-au.exe (PID: 3272)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
57
Monitored processes
16
Malicious processes
8
Suspicious processes
3

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe jp2launcher.exe no specs jp2launcher.exe no specs javaw.exe no specs icacls.exe no specs javaw.exe no specs javaw.exe no specs jucheck.exe no specs jucheck.exe javaws.exe no specs jp2launcher.exe jp2launcher.exe no specs jp2launcher.exe no specs jre-8u401-windows-au.exe jre-8u401-windows-au.exe

Process information

PID
CMD
Path
Indicators
Parent process
1576"C:\Program Files\Common Files\Java\Java Update\jucheck.exe"C:\Program Files\Common Files\Java\Java Update\jucheck.exeiexplore.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
LOW
Description:
Java Update Checker
Exit code:
0
Version:
2.8.271.9
Modules
Images
c:\program files\common files\java\java update\jucheck.exe
c:\windows\system32\ntdll.dll
1900"C:\Program Files\Java\jre1.8.0_271\bin\javaws.exe" -J-Djdk.disableLastUsageTracking=true -SSVBaselineUpdateC:\Program Files\Java\jre1.8.0_271\bin\javaws.exejucheck.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Web Start Launcher
Exit code:
0
Version:
11.271.2.09
Modules
Images
c:\program files\java\jre1.8.0_271\bin\javaws.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
2000"C:\Program Files\Java\jre1.8.0_271\bin\javaw.exe" -cp "C:\PROGRA~1\Java\JRE18~1.0_2\lib\deploy.jar" com.sun.deploy.panel.ControlPanel -userConfig "deployment.expiration.decision.suppression.11.271.2" "false"C:\Program Files\Java\jre1.8.0_271\bin\javaw.exejp2launcher.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.2710.9
Modules
Images
c:\program files\java\jre1.8.0_271\bin\javaw.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2060"C:\Program Files\Common Files\Java\Java Update\jucheck.exe"C:\Program Files\Common Files\Java\Java Update\jucheck.exe
iexplore.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java Update Checker
Exit code:
0
Version:
2.8.271.9
Modules
Images
c:\program files\common files\java\java update\jucheck.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2064C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MC:\Windows\System32\icacls.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\icacls.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ntmarta.dll
2404"C:\PROGRA~1\Java\JRE18~1.0_2\bin\jp2launcher.exe" -sjedC:\Program Files\Java\jre1.8.0_271\bin\jp2launcher.exeiexplore.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Web Launcher
Exit code:
0
Version:
11.271.2.09
Modules
Images
c:\program files\java\jre1.8.0_271\bin\jp2launcher.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\java\jre1.8.0_271\bin\msvcp140.dll
c:\program files\java\jre1.8.0_271\bin\vcruntime140.dll
c:\program files\java\jre1.8.0_271\bin\api-ms-win-crt-runtime-l1-1-0.dll
c:\program files\java\jre1.8.0_271\bin\ucrtbase.dll
c:\program files\java\jre1.8.0_271\bin\api-ms-win-core-localization-l1-2-0.dll
c:\program files\java\jre1.8.0_271\bin\api-ms-win-core-processthreads-l1-1-1.dll
2560"C:\PROGRA~1\Java\JRE18~1.0_2\bin\jp2launcher.exe" -sjedC:\Program Files\Java\jre1.8.0_271\bin\jp2launcher.exeiexplore.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
LOW
Description:
Java(TM) Web Launcher
Exit code:
0
Version:
11.271.2.09
Modules
Images
c:\program files\java\jre1.8.0_271\bin\jp2launcher.exe
c:\windows\system32\ntdll.dll
2572"C:\PROGRA~1\Java\JRE18~1.0_2\bin\jp2launcher.exe" -sjedC:\Program Files\Java\jre1.8.0_271\bin\jp2launcher.exeiexplore.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
LOW
Description:
Java(TM) Web Launcher
Exit code:
0
Version:
11.271.2.09
Modules
Images
c:\program files\java\jre1.8.0_271\bin\jp2launcher.exe
c:\windows\system32\ntdll.dll
2692"C:\PROGRA~1\Java\JRE18~1.0_2\bin\jp2launcher.exe" -sjedC:\Program Files\Java\jre1.8.0_271\bin\jp2launcher.exeiexplore.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Web Launcher
Exit code:
1
Version:
11.271.2.09
Modules
Images
c:\program files\java\jre1.8.0_271\bin\jp2launcher.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\java\jre1.8.0_271\bin\msvcp140.dll
c:\program files\java\jre1.8.0_271\bin\vcruntime140.dll
c:\program files\java\jre1.8.0_271\bin\api-ms-win-crt-runtime-l1-1-0.dll
c:\program files\java\jre1.8.0_271\bin\ucrtbase.dll
c:\program files\java\jre1.8.0_271\bin\api-ms-win-core-localization-l1-2-0.dll
c:\program files\java\jre1.8.0_271\bin\api-ms-win-core-processthreads-l1-1-1.dll
2744"C:\Program Files\Java\jre1.8.0_271\bin\jp2launcher.exe" -secure -javaws -jre "C:\Program Files\Java\jre1.8.0_271" -vma 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 -ma LVNTVkJhc2VsaW5lVXBkYXRlAC1ub3RXZWJKYXZhC:\Program Files\Java\jre1.8.0_271\bin\jp2launcher.exe
javaws.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Web Launcher
Exit code:
0
Version:
11.271.2.09
Modules
Images
c:\program files\java\jre1.8.0_271\bin\jp2launcher.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\java\jre1.8.0_271\bin\msvcp140.dll
c:\program files\java\jre1.8.0_271\bin\vcruntime140.dll
c:\program files\java\jre1.8.0_271\bin\api-ms-win-crt-runtime-l1-1-0.dll
c:\program files\java\jre1.8.0_271\bin\ucrtbase.dll
c:\program files\java\jre1.8.0_271\bin\api-ms-win-core-localization-l1-2-0.dll
c:\program files\java\jre1.8.0_271\bin\api-ms-win-core-processthreads-l1-1-1.dll
Total events
40 924
Read events
40 309
Write events
516
Delete events
99

Modification events

(PID) Process:(3864) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(3864) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(3864) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
31093206
(PID) Process:(3864) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(3864) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
31093206
(PID) Process:(3864) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3864) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3864) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3864) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3864) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
4
Suspicious files
17
Text files
37
Unknown types
7

Dropped files

PID
Process
Filename
Type
3952iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62binary
MD5:3FEC781A37FD6100585A04D4BBBA33A3
SHA256:3F2DB1E75555CC19893FB62ED3E33037E9378B491978EF1EEE471FE2E40DC4AF
3952iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62binary
MD5:CC6929F1D4040566BBC3818B32B5C1DF
SHA256:39B362D50E5024ACAEAD9A50794D098FC0C87E6BFF310BD5D72CC1259C179D45
3952iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_645BC4A49DCDC40FE5917FA45C6D4517binary
MD5:5F0619373E824EACD5F329910CA8B4B2
SHA256:091A810EF87CD2D7E3FE952A2F5DC980B7D31068EEC1B03E22BEB7FB79EA21B0
3952iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\83D863F495E7D991917B3ABB3E1EB382_5D4D2219A09D2AC474D1CE08CC064873binary
MD5:FDDEC8E5FFA18A0AA4A76748CF09D032
SHA256:89FDECBC800D4078EB0B9DFFAD465ACCD2443460A6C8E53A004EEFE9EE094090
3952iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894der
MD5:431B0667BCCFB848F0E6A6C5497CAFC8
SHA256:511C82A86167EE1F83504F33DE106E1207CABE10AF2F176B883C8625F529E182
3952iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894binary
MD5:0C49A76329DBE056B760BDF422B0A4EF
SHA256:6CA0BE7467A89049E4A84BE36ECA17D5A247BB9E5CC4D8FA34A84B4B5D8DC731
3952iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\83D863F495E7D991917B3ABB3E1EB382_5D4D2219A09D2AC474D1CE08CC064873binary
MD5:07F2533BEF431CB3104E8C75515F21D8
SHA256:D02802B19BBA7A79ED8E79F39B3228169EE69AE2CB6E8972FD50793F822DB8FD
3952iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\75CA58072B9926F763A91F0CC2798706_B5D3A17E5BEDD2EDA793611A0A74E1E8binary
MD5:C677AC7BA211DAAE5D57177574DC1E58
SHA256:DC082A62C7BC9B0E65EB73003FBF7720AB890DE795860127F5DAFE07901A38D8
3952iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:57FBC630D5A9CA130265DA8D94E1C5AF
SHA256:E39CCBCBD7E7AF9BDA932609B261042E13771099AD9F82D48CB71CF1E8530E84
3952iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_645BC4A49DCDC40FE5917FA45C6D4517der
MD5:68E2995BE371AF7C256538A2F6D31DB9
SHA256:BA9435D8B4D09F42C1FE5B0A1CB8E0891DDC9B98436F8AEA2454ACE3EC0E78F0
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
18
TCP/UDP connections
56
DNS requests
28
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3952
iexplore.exe
GET
304
2.20.139.235:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?545e1839169dd0e6
unknown
unknown
3952
iexplore.exe
GET
304
2.20.139.235:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?f78d505714a595e3
unknown
unknown
3952
iexplore.exe
GET
200
108.138.2.10:80
http://o.ss2.us//MEowSDBGMEQwQjAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCCQCnDkpMNIK3fw%3D%3D
unknown
binary
2.02 Kb
unknown
3952
iexplore.exe
GET
200
18.245.39.64:80
http://ocsp.rootg2.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBSIfaREXmfqfJR3TkMYnD7O5MhzEgQUnF8A36oB1zArOIiiuG1KnPIRkYMCEwZ%2FlEoqJ83z%2BsKuKwH5CO65xMY%3D
unknown
binary
1.49 Kb
unknown
3952
iexplore.exe
GET
200
18.245.39.64:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwdzEkzUBtJnwJkc3SmanzgxeYU%3D
unknown
binary
1.37 Kb
unknown
3952
iexplore.exe
GET
200
18.245.65.219:80
http://ocsp.r2m03.amazontrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQqHI%2BsdmapawQncL1rpCEZZ8gTSAQUVdkYX9IczAHhWLS%2Bq9lVQgHXLgICEAjzn1qud%2B0HdyxuJABpqr4%3D
unknown
binary
471 b
unknown
3952
iexplore.exe
GET
200
18.245.39.64:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwdzEjgLnWaIozse2b%2BczaaODg8%3D
unknown
binary
1.37 Kb
unknown
3952
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbY2QTVWENG9oovp1QifsQ%3D
unknown
binary
471 b
unknown
3952
iexplore.exe
GET
200
18.245.65.219:80
http://ocsp.r2m01.amazontrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBShdVEFnSEQ0gG5CBtzM48cPMe9XwQUgbgOY4qJEhjl%2Bjs7UJWf5uWQE4UCEAttUCKs5pZVb8wIJ%2BugwJo%3D
unknown
binary
471 b
unknown
3864
iexplore.exe
GET
304
2.20.139.235:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?76ad697231f9b13b
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
unknown
4
System
192.168.100.255:137
whitelisted
224.0.0.252:5355
unknown
3952
iexplore.exe
3.105.83.130:443
download.biz-assistant.net
AMAZON-02
AU
unknown
3952
iexplore.exe
2.20.139.235:80
ctldl.windowsupdate.com
Akamai International B.V.
BR
unknown
3952
iexplore.exe
108.138.2.10:80
o.ss2.us
AMAZON-02
US
unknown
3952
iexplore.exe
18.245.39.64:80
ocsp.rootg2.amazontrust.com
US
unknown
3952
iexplore.exe
18.245.65.219:80
ocsp.r2m03.amazontrust.com
US
unknown
3952
iexplore.exe
3.105.83.130:49153
download.biz-assistant.net
AMAZON-02
AU
unknown
3952
iexplore.exe
52.217.120.81:443
tslp.s3.amazonaws.com
US
unknown

DNS requests

Domain
IP
Reputation
download.biz-assistant.net
  • 3.105.83.130
  • 3.106.49.189
unknown
ctldl.windowsupdate.com
  • 2.20.139.235
  • 2.20.139.231
whitelisted
o.ss2.us
  • 108.138.2.10
  • 108.138.2.107
  • 108.138.2.173
  • 108.138.2.195
whitelisted
ocsp.rootg2.amazontrust.com
  • 18.245.39.64
whitelisted
ocsp.rootca1.amazontrust.com
  • 18.245.39.64
shared
ocsp.r2m03.amazontrust.com
  • 18.245.65.219
unknown
tslp.s3.amazonaws.com
  • 52.217.120.81
  • 16.182.73.73
  • 3.5.10.154
  • 54.231.137.57
  • 52.216.41.9
  • 52.217.113.145
  • 52.216.54.25
  • 52.217.172.73
shared
java.com
  • 2.19.80.90
  • 2.19.80.91
whitelisted
d2wy8f7a9ursnm.cloudfront.net
  • 13.32.23.106
  • 13.32.23.168
  • 13.32.23.60
  • 13.32.23.123
shared
ocsp.digicert.com
  • 192.229.221.95
whitelisted

Threats

PID
Process
Class
Message
2744
jp2launcher.exe
Potentially Bad Traffic
ET POLICY Vulnerable Java Version 1.8.x Detected
2744
jp2launcher.exe
Potentially Bad Traffic
ET POLICY Vulnerable Java Version 1.8.x Detected
No debug info