File name:

New Order RFQ- 19A20060.exe

Full analysis: https://app.any.run/tasks/5efab34f-48f1-4764-b98c-94b5ec36bfd3
Verdict: Malicious activity
Threats:

A keylogger is a type of spyware that infects a system and has the ability to record every keystroke made on the device. This lets attackers collect personal information of victims, which may include their online banking credentials, as well as personal conversations. The most widespread vector of attack leading to a keylogger infection begins with a phishing email or link. Keylogging is also often present in remote access trojans as part of an extended set of malicious tools.

Analysis date: March 25, 2025, 05:39:11
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
snake
keylogger
evasion
telegram
stealer
ims-api
generic
smtp
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

9D6F9F1D730E8E3FFE2DA1C598159E28

SHA1:

675C426BEC20CCC885BF4E61FD4C0EBD6D8CD5BB

SHA256:

1FE6D2A8589D9B58DB52CCE910E7F3118D284548B53EFD2A04CA290CF4784960

SSDEEP:

49152:KHlGAXWQkC2R/QORBt7QjFtmcaTH/vU4do9Pcjq1GvXB1sgPR8N32+Rr181vWDZU:bAGQX21RBt7QjTmcaTH/vU4do9Pcjq1/

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • meshuggenah.exe (PID: 2136)
    • SNAKEKEYLOGGER has been detected (SURICATA)

      • RegSvcs.exe (PID: 4892)
      • RegSvcs.exe (PID: 7908)
    • Actions looks like stealing of personal data

      • RegSvcs.exe (PID: 4892)
      • RegSvcs.exe (PID: 7908)
    • SNAKE has been detected (YARA)

      • RegSvcs.exe (PID: 4892)
      • RegSvcs.exe (PID: 7908)
    • Steals credentials from Web Browsers

      • RegSvcs.exe (PID: 4892)
      • RegSvcs.exe (PID: 7908)
  • SUSPICIOUS

    • Starts itself from another location

      • New Order RFQ- 19A20060.exe (PID: 4976)
    • Executable content was dropped or overwritten

      • New Order RFQ- 19A20060.exe (PID: 4976)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 7832)
    • Checks for external IP

      • svchost.exe (PID: 2196)
      • RegSvcs.exe (PID: 4892)
      • RegSvcs.exe (PID: 7908)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • RegSvcs.exe (PID: 4892)
      • RegSvcs.exe (PID: 7908)
    • The process verifies whether the antivirus software is installed

      • RegSvcs.exe (PID: 4892)
      • RegSvcs.exe (PID: 7908)
    • Possible usage of Discord/Telegram API has been detected (YARA)

      • RegSvcs.exe (PID: 4892)
    • Connects to SMTP port

      • RegSvcs.exe (PID: 4892)
      • RegSvcs.exe (PID: 7908)
  • INFO

    • The sample compiled with english language support

      • New Order RFQ- 19A20060.exe (PID: 4976)
    • Reads mouse settings

      • New Order RFQ- 19A20060.exe (PID: 4976)
      • meshuggenah.exe (PID: 2136)
      • meshuggenah.exe (PID: 7884)
    • Create files in a temporary directory

      • meshuggenah.exe (PID: 2136)
      • meshuggenah.exe (PID: 7884)
      • New Order RFQ- 19A20060.exe (PID: 4976)
    • Creates files or folders in the user directory

      • meshuggenah.exe (PID: 2136)
      • New Order RFQ- 19A20060.exe (PID: 4976)
    • Reads the machine GUID from the registry

      • New Order RFQ- 19A20060.exe (PID: 4976)
      • RegSvcs.exe (PID: 4892)
      • RegSvcs.exe (PID: 7908)
    • Checks supported languages

      • RegSvcs.exe (PID: 4892)
      • meshuggenah.exe (PID: 7884)
      • RegSvcs.exe (PID: 7908)
      • New Order RFQ- 19A20060.exe (PID: 4976)
      • meshuggenah.exe (PID: 2136)
    • Checks proxy server information

      • RegSvcs.exe (PID: 4892)
      • RegSvcs.exe (PID: 7908)
    • Autorun file from Startup directory

      • meshuggenah.exe (PID: 2136)
    • Reads the computer name

      • RegSvcs.exe (PID: 4892)
      • RegSvcs.exe (PID: 7908)
    • Disables trace logs

      • RegSvcs.exe (PID: 4892)
      • RegSvcs.exe (PID: 7908)
    • Manual execution by a user

      • wscript.exe (PID: 7832)
    • Reads the software policy settings

      • RegSvcs.exe (PID: 7908)
      • RegSvcs.exe (PID: 4892)
      • slui.exe (PID: 7212)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

SnakeKeylogger

(PID) Process(4892) RegSvcs.exe
Keys
DES6fc98cd68a1aab8b
Options
SMTP Usersales-nguyen@vvtrade.vn
SMTP PasswordqVyP6qyv6MQCmZJBRs4t
SMTP Hostmail.vvtrade.vn
SMTP SendTosaleseuropower@yandex.com
SMTP Port587
Telegram Bot Token7323823089:AAFBRsTW94zIpSoDS8yfGsotlQLqF2I6TU0
Telegram Chat ID5013849544
(PID) Process(7908) RegSvcs.exe
Keys
DES6fc98cd68a1aab8b
Options
SMTP Usersales-nguyen@vvtrade.vn
SMTP PasswordqVyP6qyv6MQCmZJBRs4t
SMTP Hostmail.vvtrade.vn
SMTP SendTosaleseuropower@yandex.com
SMTP Port587
Telegram Bot Token7323823089:AAFBRsTW94zIpSoDS8yfGsotlQLqF2I6TU0
Telegram Chat ID5013849544
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:03:22 04:33:12+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 12
CodeSize: 581120
InitializedDataSize: 434688
UninitializedDataSize: -
EntryPoint: 0x27dcd
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (British)
CharacterSet: Unicode
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
142
Monitored processes
10
Malicious processes
6
Suspicious processes
0

Behavior graph

Click at the process to see the details
start new order rfq- 19a20060.exe meshuggenah.exe #SNAKE regsvcs.exe sppextcomobj.exe no specs slui.exe svchost.exe wscript.exe no specs meshuggenah.exe no specs #SNAKE regsvcs.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1228C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2136"C:\Users\admin\AppData\Local\Temp\New Order RFQ- 19A20060.exe" C:\Users\admin\AppData\Local\soliloquise\meshuggenah.exe
New Order RFQ- 19A20060.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\soliloquise\meshuggenah.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
4892"C:\Users\admin\AppData\Local\Temp\New Order RFQ- 19A20060.exe" C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
meshuggenah.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\regsvcs.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
SnakeKeylogger
(PID) Process(4892) RegSvcs.exe
Keys
DES6fc98cd68a1aab8b
Options
SMTP Usersales-nguyen@vvtrade.vn
SMTP PasswordqVyP6qyv6MQCmZJBRs4t
SMTP Hostmail.vvtrade.vn
SMTP SendTosaleseuropower@yandex.com
SMTP Port587
Telegram Bot Token7323823089:AAFBRsTW94zIpSoDS8yfGsotlQLqF2I6TU0
Telegram Chat ID5013849544
4976"C:\Users\admin\AppData\Local\Temp\New Order RFQ- 19A20060.exe" C:\Users\admin\AppData\Local\Temp\New Order RFQ- 19A20060.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\new order rfq- 19a20060.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
7172C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7212"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7832"C:\WINDOWS\System32\WScript.exe" "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\meshuggenah.vbs"C:\Windows\System32\wscript.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7884"C:\Users\admin\AppData\Local\soliloquise\meshuggenah.exe" C:\Users\admin\AppData\Local\soliloquise\meshuggenah.exewscript.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\soliloquise\meshuggenah.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\psapi.dll
c:\windows\syswow64\user32.dll
7908"C:\Users\admin\AppData\Local\soliloquise\meshuggenah.exe" C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
meshuggenah.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\regsvcs.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
SnakeKeylogger
(PID) Process(7908) RegSvcs.exe
Keys
DES6fc98cd68a1aab8b
Options
SMTP Usersales-nguyen@vvtrade.vn
SMTP PasswordqVyP6qyv6MQCmZJBRs4t
SMTP Hostmail.vvtrade.vn
SMTP SendTosaleseuropower@yandex.com
SMTP Port587
Telegram Bot Token7323823089:AAFBRsTW94zIpSoDS8yfGsotlQLqF2I6TU0
Telegram Chat ID5013849544
Total events
3 705
Read events
3 691
Write events
14
Delete events
0

Modification events

(PID) Process:(4892) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4892) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(4892) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(4892) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(4892) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(4892) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(4892) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(4892) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4892) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(4892) RegSvcs.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegSvcs_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
1
Suspicious files
5
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
4976New Order RFQ- 19A20060.exeC:\Users\admin\AppData\Local\Temp\myriopodousbinary
MD5:DCA974F87DA06ECE1A5DFE729C8653C5
SHA256:166488B1F292B81719A270001C254D109822936C9DD27E3EA2AF504B171C3585
2136meshuggenah.exeC:\Users\admin\AppData\Local\Temp\autCE6D.tmpbinary
MD5:EF32C3406CAE41B4B905BF5AFC27A991
SHA256:4A2A2FB326BB8C69AC3CBDAFD1DF61DD8951FC66F8FE237043C47FFEA8D74A6B
7884meshuggenah.exeC:\Users\admin\AppData\Local\Temp\autF32C.tmpbinary
MD5:EF32C3406CAE41B4B905BF5AFC27A991
SHA256:4A2A2FB326BB8C69AC3CBDAFD1DF61DD8951FC66F8FE237043C47FFEA8D74A6B
2136meshuggenah.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\meshuggenah.vbsbinary
MD5:0AFF8E500BC282D6BDC1E595D83338A4
SHA256:442F33EC285DC25E1B82B721EBFEE9F28E09177D9E3D57C8DD67A1283825F67A
4976New Order RFQ- 19A20060.exeC:\Users\admin\AppData\Local\Temp\autCAF3.tmpbinary
MD5:EF32C3406CAE41B4B905BF5AFC27A991
SHA256:4A2A2FB326BB8C69AC3CBDAFD1DF61DD8951FC66F8FE237043C47FFEA8D74A6B
4976New Order RFQ- 19A20060.exeC:\Users\admin\AppData\Local\soliloquise\meshuggenah.exeexecutable
MD5:9D6F9F1D730E8E3FFE2DA1C598159E28
SHA256:1FE6D2A8589D9B58DB52CCE910E7F3118D284548B53EFD2A04CA290CF4784960
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
25
TCP/UDP connections
33
DNS requests
20
Threats
35

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4892
RegSvcs.exe
GET
200
132.226.8.169:80
http://checkip.dyndns.org/
unknown
whitelisted
4892
RegSvcs.exe
GET
200
132.226.8.169:80
http://checkip.dyndns.org/
unknown
whitelisted
4892
RegSvcs.exe
GET
200
132.226.8.169:80
http://checkip.dyndns.org/
unknown
whitelisted
4892
RegSvcs.exe
GET
200
132.226.8.169:80
http://checkip.dyndns.org/
unknown
whitelisted
4892
RegSvcs.exe
GET
200
132.226.8.169:80
http://checkip.dyndns.org/
unknown
whitelisted
7908
RegSvcs.exe
GET
200
132.226.8.169:80
http://checkip.dyndns.org/
unknown
whitelisted
4892
RegSvcs.exe
GET
200
132.226.8.169:80
http://checkip.dyndns.org/
unknown
whitelisted
4892
RegSvcs.exe
GET
200
132.226.8.169:80
http://checkip.dyndns.org/
unknown
whitelisted
7908
RegSvcs.exe
GET
200
132.226.8.169:80
http://checkip.dyndns.org/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
6544
svchost.exe
20.190.160.14:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3216
svchost.exe
40.113.110.67:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
5496
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4892
RegSvcs.exe
132.226.8.169:80
checkip.dyndns.org
ORACLE-BMC-31898
JP
whitelisted
4892
RegSvcs.exe
104.21.64.1:443
reallyfreegeoip.org
CLOUDFLARENET
malicious
1812
backgroundTaskHost.exe
20.31.169.57:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
google.com
  • 142.250.181.238
whitelisted
crl.microsoft.com
  • 23.53.40.178
  • 23.53.40.176
whitelisted
login.live.com
  • 20.190.160.14
  • 40.126.32.140
  • 20.190.160.130
  • 20.190.160.17
  • 20.190.160.131
  • 40.126.32.76
  • 20.190.160.64
  • 20.190.160.128
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
client.wns.windows.com
  • 40.113.110.67
  • 40.115.3.253
whitelisted
checkip.dyndns.org
  • 132.226.8.169
  • 193.122.6.168
  • 132.226.247.73
  • 193.122.130.0
  • 158.101.44.242
whitelisted
reallyfreegeoip.org
  • 104.21.64.1
  • 104.21.80.1
  • 104.21.16.1
  • 104.21.48.1
  • 104.21.32.1
  • 104.21.112.1
  • 104.21.96.1
malicious
arc.msn.com
  • 20.31.169.57
whitelisted
api.telegram.org
  • 149.154.167.220
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Device Retrieving External IP Address Detected
ET DYN_DNS External IP Lookup Domain in DNS Query (checkip .dyndns .org)
4892
RegSvcs.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup - checkip.dyndns.org
4892
RegSvcs.exe
Device Retrieving External IP Address Detected
ET INFO 404/Snake/Matiex Keylogger Style External IP Check
4892
RegSvcs.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup - checkip.dyndns.org
2196
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Address Lookup Domain (reallyfreegeoip .org)
2196
svchost.exe
Misc activity
ET INFO External IP Address Lookup Domain in DNS Lookup (reallyfreegeoip .org)
4892
RegSvcs.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup - checkip.dyndns.org
4892
RegSvcs.exe
Misc activity
ET INFO External IP Lookup Service Domain (reallyfreegeoip .org) in TLS SNI
4892
RegSvcs.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup - checkip.dyndns.org
4892
RegSvcs.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup - checkip.dyndns.org
No debug info