File name:

IMPORTANT.exe

Full analysis: https://app.any.run/tasks/63586dcd-b949-4ebf-a09a-5d5c58ee66ad
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: May 17, 2025, 01:13:35
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto-startup
auto-reg
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 19 sections
MD5:

3275C1CE921D0A0742F0EC2E4E9ED198

SHA1:

DE47F72C6436B7F3207EB047296031A17302A992

SHA256:

0D95F1F14981BA2FD325E198C7A0B081EFB270A6BCA8CFBC44C4124FEE128E93

SSDEEP:

49152:G/kg0/Em8tRL18wvUvP02P2Q3jUqV0G5GsGbvB:GzNG5GsGbvB

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • IMPORTANT.exe (PID: 1672)
    • Changes the autorun value in the registry

      • IMPORTANT.exe (PID: 1672)
      • IMPORTANT.exe (PID: 1244)
      • IMPORTANT.exe (PID: 1180)
      • IMPORTANT.exe (PID: 1280)
    • Actions looks like stealing of personal data

      • IMPORTANT.exe (PID: 1672)
      • IMPORTANT.exe (PID: 1180)
  • SUSPICIOUS

    • Reads the date of Windows installation

      • IMPORTANT.exe (PID: 516)
    • Executable content was dropped or overwritten

      • IMPORTANT.exe (PID: 1672)
    • Reads security settings of Internet Explorer

      • IMPORTANT.exe (PID: 516)
    • Application launched itself

      • IMPORTANT.exe (PID: 516)
      • IMPORTANT.exe (PID: 7452)
      • IMPORTANT.exe (PID: 7480)
      • IMPORTANT.exe (PID: 7468)
  • INFO

    • Reads the computer name

      • IMPORTANT.exe (PID: 516)
    • Checks supported languages

      • IMPORTANT.exe (PID: 516)
      • IMPORTANT.exe (PID: 1672)
      • IMPORTANT.exe (PID: 1280)
      • IMPORTANT.exe (PID: 1180)
      • IMPORTANT.exe (PID: 1244)
    • Creates files or folders in the user directory

      • IMPORTANT.exe (PID: 1672)
      • IMPORTANT.exe (PID: 1244)
      • IMPORTANT.exe (PID: 1180)
      • IMPORTANT.exe (PID: 1280)
    • Creates files in the program directory

      • IMPORTANT.exe (PID: 1672)
      • IMPORTANT.exe (PID: 1244)
      • IMPORTANT.exe (PID: 1280)
      • IMPORTANT.exe (PID: 1180)
    • Auto-launch of the file from Registry key

      • IMPORTANT.exe (PID: 1244)
      • IMPORTANT.exe (PID: 1672)
      • IMPORTANT.exe (PID: 1180)
      • IMPORTANT.exe (PID: 1280)
    • Reads the machine GUID from the registry

      • IMPORTANT.exe (PID: 1244)
      • IMPORTANT.exe (PID: 1672)
      • IMPORTANT.exe (PID: 1180)
      • IMPORTANT.exe (PID: 1280)
    • Auto-launch of the file from Startup directory

      • IMPORTANT.exe (PID: 1672)
    • Process checks computer location settings

      • IMPORTANT.exe (PID: 516)
    • Manual execution by a user

      • IMPORTANT.exe (PID: 7452)
      • IMPORTANT.exe (PID: 7468)
      • IMPORTANT.exe (PID: 7480)
      • OpenWith.exe (PID: 7408)
      • OpenWith.exe (PID: 8436)
      • OpenWith.exe (PID: 7260)
      • OpenWith.exe (PID: 6572)
      • OpenWith.exe (PID: 7876)
      • OpenWith.exe (PID: 8020)
      • OpenWith.exe (PID: 9312)
      • OpenWith.exe (PID: 9248)
      • OpenWith.exe (PID: 1276)
      • OpenWith.exe (PID: 7716)
      • OpenWith.exe (PID: 7664)
      • OpenWith.exe (PID: 8152)
      • OpenWith.exe (PID: 8764)
      • OpenWith.exe (PID: 6752)
      • OpenWith.exe (PID: 3012)
      • OpenWith.exe (PID: 3796)
      • OpenWith.exe (PID: 8592)
      • OpenWith.exe (PID: 8456)
      • OpenWith.exe (PID: 5364)
      • OpenWith.exe (PID: 736)
      • OpenWith.exe (PID: 9500)
      • OpenWith.exe (PID: 9508)
      • OpenWith.exe (PID: 9664)
      • OpenWith.exe (PID: 9628)
      • OpenWith.exe (PID: 9532)
      • OpenWith.exe (PID: 9724)
      • OpenWith.exe (PID: 9764)
      • OpenWith.exe (PID: 9908)
      • OpenWith.exe (PID: 9952)
      • OpenWith.exe (PID: 10104)
      • OpenWith.exe (PID: 10128)
      • OpenWith.exe (PID: 10144)
      • OpenWith.exe (PID: 7740)
      • OpenWith.exe (PID: 9324)
      • OpenWith.exe (PID: 9364)
      • OpenWith.exe (PID: 9372)
      • OpenWith.exe (PID: 9988)
      • OpenWith.exe (PID: 5332)
      • OpenWith.exe (PID: 10268)
      • OpenWith.exe (PID: 8548)
      • OpenWith.exe (PID: 10328)
      • OpenWith.exe (PID: 10384)
      • OpenWith.exe (PID: 10400)
      • OpenWith.exe (PID: 10436)
      • OpenWith.exe (PID: 11104)
      • OpenWith.exe (PID: 10952)
      • OpenWith.exe (PID: 10944)
      • OpenWith.exe (PID: 10960)
      • OpenWith.exe (PID: 10968)
      • OpenWith.exe (PID: 10976)
      • OpenWith.exe (PID: 4932)
      • OpenWith.exe (PID: 2664)
      • OpenWith.exe (PID: 4980)
      • OpenWith.exe (PID: 8092)
      • OpenWith.exe (PID: 10000)
      • OpenWith.exe (PID: 9688)
      • OpenWith.exe (PID: 7272)
      • OpenWith.exe (PID: 7828)
      • OpenWith.exe (PID: 7744)
      • OpenWith.exe (PID: 9836)
      • OpenWith.exe (PID: 8716)
      • OpenWith.exe (PID: 11328)
      • OpenWith.exe (PID: 11288)
      • OpenWith.exe (PID: 10288)
      • OpenWith.exe (PID: 10304)
      • OpenWith.exe (PID: 8264)
      • OpenWith.exe (PID: 10824)
      • OpenWith.exe (PID: 7896)
      • OpenWith.exe (PID: 5548)
      • OpenWith.exe (PID: 11376)
      • OpenWith.exe (PID: 12272)
      • OpenWith.exe (PID: 6032)
      • OpenWith.exe (PID: 4016)
      • OpenWith.exe (PID: 11348)
      • OpenWith.exe (PID: 10888)
      • OpenWith.exe (PID: 11944)
      • OpenWith.exe (PID: 8516)
      • OpenWith.exe (PID: 11840)
      • OpenWith.exe (PID: 11876)
      • OpenWith.exe (PID: 5796)
      • OpenWith.exe (PID: 12532)
      • OpenWith.exe (PID: 12636)
      • OpenWith.exe (PID: 12688)
      • OpenWith.exe (PID: 12752)
      • OpenWith.exe (PID: 13220)
      • OpenWith.exe (PID: 13056)
      • OpenWith.exe (PID: 12908)
      • OpenWith.exe (PID: 12848)
      • OpenWith.exe (PID: 13004)
      • OpenWith.exe (PID: 12912)
      • OpenWith.exe (PID: 12996)
      • OpenWith.exe (PID: 13048)
      • OpenWith.exe (PID: 13180)
      • OpenWith.exe (PID: 5072)
      • OpenWith.exe (PID: 2084)
      • OpenWith.exe (PID: 3968)
      • OpenWith.exe (PID: 12424)
      • OpenWith.exe (PID: 12492)
      • OpenWith.exe (PID: 8528)
      • OpenWith.exe (PID: 8968)
      • OpenWith.exe (PID: 11796)
      • OpenWith.exe (PID: 9672)
      • OpenWith.exe (PID: 7148)
      • OpenWith.exe (PID: 13024)
      • OpenWith.exe (PID: 8488)
      • OpenWith.exe (PID: 13416)
      • OpenWith.exe (PID: 8272)
      • OpenWith.exe (PID: 13356)
      • OpenWith.exe (PID: 13500)
      • OpenWith.exe (PID: 13564)
      • OpenWith.exe (PID: 13636)
      • OpenWith.exe (PID: 13780)
      • OpenWith.exe (PID: 13740)
      • OpenWith.exe (PID: 13912)
      • OpenWith.exe (PID: 13948)
      • OpenWith.exe (PID: 12652)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:05:17 01:10:00+00:00
ImageFileCharacteristics: Executable, No line numbers, Large address aware
PEType: PE32+
LinkerVersion: 2.41
CodeSize: 858624
InitializedDataSize: 1083392
UninitializedDataSize: 3584
EntryPoint: 0x13e0
OSVersion: 4
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
423
Monitored processes
210
Malicious processes
3
Suspicious processes
2

Behavior graph

Click at the process to see the details
start important.exe no specs important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe no specs important.exe no specs important.exe no specs important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe slui.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe important.exe openwith.exe no specs important.exe openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs important.exe openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs important.exe openwith.exe no specs important.exe openwith.exe no specs openwith.exe no specs important.exe openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs important.exe openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs important.exe openwith.exe no specs openwith.exe no specs important.exe openwith.exe no specs important.exe important.exe openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs important.exe openwith.exe no specs important.exe important.exe openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs important.exe openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs important.exe important.exe openwith.exe no specs openwith.exe no specs openwith.exe no specs important.exe openwith.exe no specs important.exe openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs openwith.exe no specs important.exe openwith.exe no specs openwith.exe no specs important.exe

Process information

PID
CMD
Path
Indicators
Parent process
516"C:\Users\admin\Desktop\IMPORTANT.exe" C:\Users\admin\Desktop\IMPORTANT.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\important.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
668"C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMPORTANT.exe" C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IMPORTANT.exe
IMPORTANT.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\important.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
736"C:\WINDOWS\System32\OpenWith.exe" C:\Users\admin\Downloads\canadamortgage.jpg.enc.enc.encC:\Windows\System32\OpenWith.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
1116"C:\Users\admin\AppData\Roaming\IMPORTANT.exe" C:\Users\admin\AppData\Roaming\IMPORTANT.exe
IMPORTANT.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\roaming\important.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1180"C:\Users\admin\Desktop\IMPORTANT.exe" C:\Users\admin\Desktop\IMPORTANT.exe
IMPORTANT.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\important.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1184"C:\Users\admin\Desktop\IMPORTANT.exe" C:\Users\admin\Desktop\IMPORTANT.exe
IMPORTANT.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\important.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1244"C:\Users\admin\Desktop\IMPORTANT.exe" C:\Users\admin\Desktop\IMPORTANT.exe
IMPORTANT.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\important.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1276"C:\WINDOWS\System32\OpenWith.exe" C:\Users\admin\Downloads\pleasevalues.png.encC:\Windows\System32\OpenWith.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
1280"C:\Users\admin\Desktop\IMPORTANT.exe" C:\Users\admin\Desktop\IMPORTANT.exe
IMPORTANT.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\important.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1388"C:\Users\admin\AppData\Roaming\IMPORTANT.exe" C:\Users\admin\AppData\Roaming\IMPORTANT.exe
IMPORTANT.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\roaming\important.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
422 466
Read events
422 453
Write events
13
Delete events
0

Modification events

(PID) Process:(1672) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(1180) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(1244) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(1280) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(6392) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(6560) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(6132) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(1184) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(2284) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
(PID) Process:(2096) IMPORTANT.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MyClone
Value:
C:\Users\admin\AppData\Roaming\IMPORTANT.exe
Executable files
20
Suspicious files
4 141
Text files
8
Unknown types
1

Dropped files

PID
Process
Filename
Type
1672IMPORTANT.exeC:\Users\admin\AppData\Local\ElevatedDiagnostics\3243677927\2021090614.000\ResultReport.xml.encbinary
MD5:0B0B2AECC373646A91E536BF49BADFFF
SHA256:DBDA478BA126E8F44D435BAD9712130E164A2BE2B3D07F3525CAE0B4D46DB977
1672IMPORTANT.exeC:\Users\Public\Desktop\Microsoft Edge.lnk.encbinary
MD5:6B2489AFF070F23A62581D57F0FD9E62
SHA256:2BF86F76656E38C92BA35B1ED6C29B09B4466185DA974B6826D9D156D53F6B5B
1672IMPORTANT.exeC:\ProgramData\Microsoft\ClickToRun\DeploymentConfig.1.xml.encbinary
MD5:385779990297D47D280FA70ED8D634A3
SHA256:1EFCD6753CA46FE7A276191758AD13D0719198FCB1A58BD74BDF3EF13F678703
1672IMPORTANT.exeC:\Users\Public\Desktop\Google Chrome.lnk.encbinary
MD5:5DABFD9F3C7D71E5D7DF617F2A4C1CD1
SHA256:59838B0BAE446F9AC346A0528A19E098A366035AA30BD7922AFB13DA78FAA2A2
1672IMPORTANT.exeC:\Users\Default\AppData\Local\Microsoft\Windows\Shell\DefaultLayouts.xml.encbinary
MD5:B98340927370CF5250F9017BF9BEACE9
SHA256:4F7262296196B7E739F119D1B973997CBBE37D7293DD982074701A369D617D73
1672IMPORTANT.exeC:\Users\Administrator\AppData\Local\Microsoft\Internet Explorer\IECompatData\iecompatdata.xml.encbinary
MD5:8DCD0122BA9FCEE30DEAD776AF82B7B4
SHA256:57661A40780F14960375ACA4C27C7E41050053D980A99C2C1F6C503EC827CB45
1672IMPORTANT.exeC:\ProgramData\Microsoft\ClickToRun\DeploymentConfig.0.xml.encbinary
MD5:70342E0F4DE257D5A55A89EC8159D8EC
SHA256:58F22FC0C70896568210E6164273858FBE3D9F9CBB6FC416122CE018012E14CA
1672IMPORTANT.exeC:\Users\Public\Desktop\desktop.ini.encbinary
MD5:69A738B144B40B33DF39D9CDCD59982C
SHA256:43759FD8C626AF96B2DDDA3557870FE32971C48FB06518EDF6F0310EF8F40612
1672IMPORTANT.exeC:\Users\admin\AppData\Local\ElevatedDiagnostics\3243677927\2021090614.000\results.xml.encbinary
MD5:564BA0A27FBF0ACA74A3ABA40E3A49EE
SHA256:CB7794AE434D4DA4C2B238522C3035C0ED7C23F572242A1DB74BE7895DD4F9E9
1672IMPORTANT.exeC:\Users\Public\Desktop\CCleaner.lnk.encbinary
MD5:F683C19F0A266F996E577A80B953D815
SHA256:E456EDF4694F77AB4F5D21545AE2F445709951C8F3482698987DD2F5DE7BC4C8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
36
DNS requests
20
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
1132
SIHClient.exe
20.109.210.53:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
1132
SIHClient.exe
13.95.31.18:443
fe3cr.delivery.mp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4428
slui.exe
20.83.72.98:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
1132
SIHClient.exe
52.149.20.212:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6544
svchost.exe
40.126.32.140:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
40.126.32.140:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
google.com
  • 142.250.184.238
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted
nexusrules.officeapps.live.com
  • 52.111.227.13
whitelisted
login.live.com
  • 40.126.32.140
  • 40.126.32.76
  • 40.126.32.138
  • 20.190.160.132
  • 20.190.160.128
  • 20.190.160.4
  • 40.126.32.68
  • 20.190.160.64
whitelisted

Threats

No threats detected
No debug info