File name:

HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.7z

Full analysis: https://app.any.run/tasks/723c8853-211a-42ff-b8ac-7bc715b92020
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: May 02, 2025, 17:17:22
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
ransomware
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

E8BB1B0A9D04FB2687429396F19DB263

SHA1:

A5FDB56256DB37B1B32894D4532F578A6F32C1DE

SHA256:

06E31DE9BC40E301B2FBE37177DC8D456EAB59DF6470B0072B1C037E5DD3AD96

SSDEEP:

12288:vRNtDZ9Qo6KblTwUxM35XvQANsqe04xEsXt6J2HW:vR/ZmexwUxMpXvHNsqe0WEsXt6J2HW

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 2568)
    • Deletes shadow copies

      • HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exe (PID: 1228)
      • HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exe (PID: 8140)
    • Connects to the CnC server

      • HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exe (PID: 1228)
      • HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exe (PID: 8140)
  • SUSPICIOUS

    • Creates a new Windows service

      • sc.exe (PID: 5772)
      • sc.exe (PID: 7944)
    • Starts SC.EXE for service management

      • HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exe (PID: 1228)
    • Starts CMD.EXE for commands execution

      • HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exe (PID: 1228)
      • HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exe (PID: 8140)
    • Executing commands from a ".bat" file

      • HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exe (PID: 1228)
      • HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exe (PID: 8140)
    • Executes as Windows Service

      • VSSVC.exe (PID: 7796)
      • HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exe (PID: 8140)
    • Contacting a server suspected of hosting an CnC

      • HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exe (PID: 1228)
      • HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exe (PID: 8140)
    • Windows service management via SC.EXE

      • sc.exe (PID: 8072)
  • INFO

    • Checks supported languages

      • HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exe (PID: 1228)
      • HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exe (PID: 8140)
    • Reads the computer name

      • HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exe (PID: 1228)
      • HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exe (PID: 8140)
    • Creates files in the program directory

      • HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exe (PID: 1228)
      • HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exe (PID: 8140)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2568)
    • Manual execution by a user

      • HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exe (PID: 1228)
    • Reads CPU info

      • HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exe (PID: 8140)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)

EXIF

ZIP

FileVersion: 7z v0.04
ModifyDate: 2021:04:10 12:15:42+00:00
ArchivedFileName: HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
150
Monitored processes
21
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe no specs heur-trojan-ransom.win32.generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exe conhost.exe no specs sc.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs vssadmin.exe no specs conhost.exe no specs vssvc.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs heur-trojan-ransom.win32.generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exe cmd.exe no specs vssadmin.exe no specs conhost.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
632\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1228"C:\Users\admin\Desktop\HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exe" C:\Users\admin\Desktop\HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\heur-trojan-ransom.win32.generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
2096C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
2568"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.7zC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
4068\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exevssadmin.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4620"c:\windows\system32\cmd.exe" /c c:\windows\logg.batC:\Windows\System32\cmd.exeHEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
4736\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exesc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5164\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeHEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5200"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5772"C:\windows\system32\sc.exe" create defragsrv binpath= "C:\Users\admin\Desktop\HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exe" start= autoC:\Windows\System32\sc.exeHEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Service Control Manager Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
Total events
2 145
Read events
2 126
Write events
19
Delete events
0

Modification events

(PID) Process:(2568) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(2568) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(2568) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(2568) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.7z
(PID) Process:(2568) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2568) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2568) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2568) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2568) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:name
Value:
256
(PID) Process:(2568) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:size
Value:
80
Executable files
1
Suspicious files
7
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
8140HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exeC:\$WinREAgent\Scratch\update.wim
MD5:
SHA256:
8140HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exeC:\$WinREAgent\Backup\Winre.wim
MD5:
SHA256:
8140HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exeC:\ProgramData\Adobe\ARM\Acrobat_23.001.20093\AcroRdrDCx64Upd2300820470_MUI.msp
MD5:
SHA256:
8140HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exeC:\Program Files\Adobe\Acrobat DC\Acrobat\plug_ins\AcroForm.api
MD5:
SHA256:
8140HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exeC:\Users\admin\AppData\Local\Comms\UnistoreDB\store.vol
MD5:
SHA256:
8140HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exeC:\ProgramData\dat\runs.txtbinary
MD5:7493D8CBB0315336E669479DE9481BF9
SHA256:045467A8279ABDF2244F3E8CBBA37B7C7E1ECA18AAB2B830FF45C0987C7BEBFC
1228HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exeC:\ProgramData\dat\hdstext
MD5:43B6F77AF7D8293027D5D9A6819714AD
SHA256:D9B43F0FF35A717A6F37874745BD5C7DCE3AC1BFD6106319C96131DE15238510
1228HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exeC:\Windows\logg.battext
MD5:DA3A9F2B2D2F3364662B9AAF6E201EBD
SHA256:C0850685E4D855A0D5E5753914627F0CA0D2DD69B89893C2F73542BD0F70D163
2568WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2568.6099\HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exeexecutable
MD5:289D4167DF85EDAECB94A98028335BF4
SHA256:668632DD546969DA7EB384C587BDA1A1D69DC7081A1C0F13DF7BCB9EB0E4A9A7
1228HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exeC:\Users\admin\Desktop\msvsc.dllbinary
MD5:1F28D1A2D94CA8D269FC198FBE60F620
SHA256:94E1D747A2174EC627D15C623394567BD5BEC63423A6074CBAEE83405B53244A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
31
DNS requests
13
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.164.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4944
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4944
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.16.164.120:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
23.219.150.101:80
www.microsoft.com
AKAMAI-AS
CL
whitelisted
4
System
192.168.100.255:137
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.0:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1228
HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exe
192.168.100.2:445
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 2.16.164.120
  • 2.16.164.49
whitelisted
www.microsoft.com
  • 23.219.150.101
  • 95.101.149.131
whitelisted
google.com
  • 142.250.186.46
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 20.190.159.0
  • 40.126.31.1
  • 40.126.31.3
  • 20.190.159.23
  • 40.126.31.0
  • 20.190.159.75
  • 20.190.159.129
  • 20.190.159.128
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

PID
Process
Class
Message
1228
HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exe
Malware Command and Control Activity Detected
ET MALWARE Teslarvng Ransomware CnC Activity M1
8140
HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exe
Malware Command and Control Activity Detected
ET MALWARE Teslarvng Ransomware CnC Activity M2
8140
HEUR-Trojan-Ransom.Win32.Generic-668632dd546969da7eb384c587bda1a1d69dc7081a1c0f13df7bcb9eb0e4a9a7.exe
Malware Command and Control Activity Detected
ET MALWARE Teslarvng Ransomware CnC Activity M3
No debug info