File name:

TeamViewer.7z

Full analysis: https://app.any.run/tasks/15f9d084-00f6-4fb9-9d72-d9c7e0be3368
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: March 26, 2025, 23:23:34
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
teamviewer
rmm-tool
stealer
ultraviewer
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

2D1F03C0AD0133D8A82FE1D7F85A9B1D

SHA1:

0D70F34BDE35D52FB26C3E2FC9CF57B5A53529BC

SHA256:

24D38BFB501EA49A351211DAD23F81510B97632D7D50AABFF22AC673EAC0CFBC

SSDEEP:

49152:uekmUUSJQcgxK8w+3sgoJd+ncPBfKmjgbvnWvGiw+jYhYaCc0L3wK5BLgwOeYNX+:2bCcgx5w+3Ho3gcPBymgbPl+jYhYlcC1

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • TeamViewer.exe (PID: 7580)
    • Steals credentials from Web Browsers

      • TeamViewer.exe (PID: 7580)
    • Actions looks like stealing of personal data

      • TeamViewer.exe (PID: 7580)
    • TEAMVIEWER has been detected (SURICATA)

      • TeamViewer.exe (PID: 7580)
  • SUSPICIOUS

    • Possibly malicious use of IEX has been detected

      • TeamViewer.exe (PID: 7580)
    • The process executes Powershell scripts

      • TeamViewer.exe (PID: 7580)
    • Starts POWERSHELL.EXE for commands execution

      • TeamViewer.exe (PID: 7580)
    • Reads security settings of Internet Explorer

      • TeamViewer.exe (PID: 7580)
    • Potential Corporate Privacy Violation

      • TeamViewer.exe (PID: 7580)
    • Gets content of a file (POWERSHELL)

      • powershell.exe (PID: 7796)
    • There is functionality for taking screenshot (YARA)

      • TeamViewer.exe (PID: 7580)
  • INFO

    • The sample compiled with english language support

      • WinRAR.exe (PID: 7448)
    • Creates files or folders in the user directory

      • BackgroundTransferHost.exe (PID: 1660)
      • TeamViewer.exe (PID: 7580)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7448)
    • Reads security settings of Internet Explorer

      • BackgroundTransferHost.exe (PID: 1660)
      • BackgroundTransferHost.exe (PID: 7228)
      • BackgroundTransferHost.exe (PID: 7440)
      • BackgroundTransferHost.exe (PID: 1568)
      • BackgroundTransferHost.exe (PID: 8156)
    • Checks proxy server information

      • BackgroundTransferHost.exe (PID: 1660)
      • TeamViewer.exe (PID: 7580)
    • Reads the software policy settings

      • BackgroundTransferHost.exe (PID: 1660)
      • TeamViewer.exe (PID: 7580)
      • slui.exe (PID: 7752)
    • Reads Microsoft Office registry keys

      • OpenWith.exe (PID: 3096)
    • Manual execution by a user

      • TeamViewer.exe (PID: 7580)
    • Checks supported languages

      • TeamViewer.exe (PID: 7580)
      • ShellExperienceHost.exe (PID: 7212)
    • Reads the computer name

      • TeamViewer.exe (PID: 7580)
      • ShellExperienceHost.exe (PID: 7212)
    • TeamViewer related mutex has been found

      • TeamViewer.exe (PID: 7580)
    • Reads the machine GUID from the registry

      • TeamViewer.exe (PID: 7580)
    • ULTRAVIEWER has been detected

      • TeamViewer.exe (PID: 7580)
    • Process checks computer location settings

      • TeamViewer.exe (PID: 7580)
    • TEAMVIEWER has been detected

      • TeamViewer.exe (PID: 7580)
      • TeamViewer.exe (PID: 7580)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 7796)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)

EXIF

ZIP

FileVersion: 7z v0.04
ModifyDate: 2025:03:24 01:47:15+00:00
ArchivedFileName: TeamViewer
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
151
Monitored processes
15
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe backgroundtransferhost.exe no specs backgroundtransferhost.exe openwith.exe no specs backgroundtransferhost.exe no specs backgroundtransferhost.exe no specs backgroundtransferhost.exe no specs #TEAMVIEWER teamviewer.exe powershell.exe no specs conhost.exe no specs slui.exe no specs shellexperiencehost.exe no specs openwith.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1568"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1C:\Windows\System32\BackgroundTransferHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Download/Upload Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\backgroundtransferhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\bcryptprimitives.dll
1660"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1C:\Windows\System32\BackgroundTransferHost.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Download/Upload Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\backgroundtransferhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\bcryptprimitives.dll
2392C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
3096C:\WINDOWS\system32\OpenWith.exe -EmbeddingC:\Windows\System32\OpenWith.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7212"C:\WINDOWS\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mcaC:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Shell Experience Host
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\systemapps\shellexperiencehost_cw5n1h2txyewy\shellexperiencehost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\wincorlib.dll
7228"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1C:\Windows\System32\BackgroundTransferHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Download/Upload Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\backgroundtransferhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\bcryptprimitives.dll
7440"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1C:\Windows\System32\BackgroundTransferHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Download/Upload Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\backgroundtransferhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\bcryptprimitives.dll
7448"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\TeamViewer.7zC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7580"C:\Users\admin\Desktop\TeamViewer.exe" C:\Users\admin\Desktop\TeamViewer.exe
explorer.exe
User:
admin
Company:
TeamViewer GmbH
Integrity Level:
MEDIUM
Description:
TeamViewer
Version:
5.0.7478.0
Modules
Images
c:\users\admin\desktop\teamviewer.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
7596\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
14 472
Read events
14 418
Write events
45
Delete events
9

Modification events

(PID) Process:(7448) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7448) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7448) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7448) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\TeamViewer.7z
(PID) Process:(7448) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7448) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7448) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7448) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7448) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:name
Value:
256
(PID) Process:(7448) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:size
Value:
80
Executable files
3
Suspicious files
10
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
1660BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\f5425164-4d8d-48af-8ffe-15cd6db83c95.down_data
MD5:
SHA256:
7448WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7448.24433\TV.dllexecutable
MD5:66AF1C986968E3BF2A35791E8B55581F
SHA256:3448DA03808F24568E6181011F8521C0713EA6160EFD05BFF20C43B091FF59F7
1660BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\Content\26C212D9399727259664BDFCA073966E_F9F7D6A7ECE73106D2A8C63168CDA10Dbinary
MD5:FA6095A37891A45F775E9A21DDAA863A
SHA256:9D7DF71A8C9E60562B699363C26409853C04962CEA5482CD56835B600A7CFA7C
7448WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7448.24433\Teamviewer_Resource_fr.dllexecutable
MD5:35FA2CE449DEB8B93B8BA73BF35E5E7B
SHA256:9634ECAF469149379BBA80A745F53D823948C41CE4E347860701CBDFF6935192
1660BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\f5425164-4d8d-48af-8ffe-15cd6db83c95.0345c734-a17a-4cfd-a9f5-3bd46e1a7282.down_metabinary
MD5:36728328DFD8660544CD19627C43B210
SHA256:5174E464F9553751BEB57571E4C9A8A86C86FC6D747F01058A345E301FE259F7
7448WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7448.24433\TeamViewerexecutable
MD5:9DFA2BD6BDDC746ACEA981DA411D59D3
SHA256:904280F20D697D876AB90A1B74C0F22A83B859E8B0519CB411FDA26F1642F53E
1660BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\61adcec5-9ede-4c7c-9405-16a4d8fe9edb.0345c734-a17a-4cfd-a9f5-3bd46e1a7282.down_metabinary
MD5:36728328DFD8660544CD19627C43B210
SHA256:5174E464F9553751BEB57571E4C9A8A86C86FC6D747F01058A345E301FE259F7
1660BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\MetaData\26C212D9399727259664BDFCA073966E_F9F7D6A7ECE73106D2A8C63168CDA10Dbinary
MD5:124FBACC874AFBB9908133DA390ED5D4
SHA256:670F73835181451587542E6352B9E0427FE2F4B2F431373E8F5E77FA09EF34C0
1660BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\61adcec5-9ede-4c7c-9405-16a4d8fe9edb.up_meta_securebinary
MD5:60A70FF770E20F669EE5478F0354695C
SHA256:195EE5AF92720E5DFFA1C3F528583A5EF3593076B97C78D6EBCE13A71452530A
7580TeamViewer.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C3948BE6E525B8A8CEE9FAC91C9E392_EEB8C7E9A435DC539B7A34AD155842C4binary
MD5:CCDF36C07DA64CC1DCC6CDE2551020AF
SHA256:C8A76FECC7AB8A2B5A46BB2344D55324FFE8BAA46BB318B7F463A96DE3D35D61
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
29
TCP/UDP connections
39
DNS requests
28
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.17.189.192:80
http://ocsp.verisign.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ%2FxkCfyHfJr7GQ6M658NRZ4SHo%2FAQUCPVR6Pv%2BPT1kNnxoz1t4qN%2B5xTcCECXJAtAm4xJEwSWZZ3HJ3AE%3D
unknown
whitelisted
7580
TeamViewer.exe
GET
200
185.188.32.5:80
http://master5.teamviewer.com/din.aspx?s=00000000&id=0&client=DynGate&rnd=249488639&p=10000001
unknown
unknown
7580
TeamViewer.exe
GET
200
185.188.32.5:80
http://master5.teamviewer.com/dout.aspx?s=28449696&p=10000001&client=DynGate&data=FyQSkQCjHqkys5MkoZ6ZGpoYGpmYHJwTJKIemBMmN7OztLcznpiTJqChnpg8MJwymhkZmzMYnLIcL5iyGrCxsjKxnBsZGhixMq+bGhyamxsbmJoTJqSiHpg8MJwymhkZmzMYnLIcL5iyGrCxsjKxnBsZGhixMq+bGhyamxsbmJoTJ6meq7S3G5MrHpqXGBcbmhucECip
unknown
unknown
7580
TeamViewer.exe
GET
200
185.188.32.5:80
http://master5.teamviewer.com/din.aspx?s=28449696&id=0&client=DynGate&p=10000002
unknown
unknown
7580
TeamViewer.exe
GET
200
185.188.32.5:80
http://master5.teamviewer.com/din.aspx?s=00000000&id=0&client=DynGate&rnd=249488639&p=10000001
unknown
unknown
7580
TeamViewer.exe
GET
200
185.188.32.5:80
http://master5.teamviewer.com/din.aspx?s=00000000&id=0&client=DynGate&rnd=249488639&p=10000001
unknown
unknown
7580
TeamViewer.exe
GET
400
185.188.32.5:80
http://master5.teamviewer.com/din.aspx?s=28449696&id=0&client=DynGate&p=10000002
unknown
unknown
7580
TeamViewer.exe
GET
200
185.188.32.5:80
http://master5.teamviewer.com/dout.aspx?s=28449697&p=10000001&client=DynGate&data=FyQSkQCjHqkys5MkoZ6ZGpoYGpmYHJwTJKIemBMmN7OztLcznpiTJqChnpg8MJwymhkZmzMYnLIcL5iyGrCxsjKxnBsZGhixMq+bGhyamxsbmJoTJqSiHpg8MJwymhkZmzMYnLIcL5iyGrCxsjKxnBsZGhixMq+bGhyamxsbmJoTJ6meq7S3G5MrHpqXGBcbmhucECip
unknown
unknown
7580
TeamViewer.exe
GET
200
185.188.32.5:80
http://master5.teamviewer.com/din.aspx?s=28449697&id=0&client=DynGate&p=10000002
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
6544
svchost.exe
20.190.160.132:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:137
whitelisted
3216
svchost.exe
20.198.162.76:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
SG
whitelisted
7560
backgroundTaskHost.exe
20.199.58.43:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
7560
backgroundTaskHost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 20.73.194.208
whitelisted
google.com
  • 142.250.185.238
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.166
  • 23.48.23.143
whitelisted
login.live.com
  • 20.190.160.132
  • 40.126.32.74
  • 20.190.160.22
  • 40.126.32.72
  • 40.126.32.76
  • 20.190.160.128
  • 40.126.32.138
  • 20.190.160.14
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
client.wns.windows.com
  • 20.198.162.76
whitelisted
arc.msn.com
  • 20.199.58.43
whitelisted
www.bing.com
  • 104.126.37.178
  • 104.126.37.139
  • 104.126.37.131
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted

Threats

PID
Process
Class
Message
7580
TeamViewer.exe
Potential Corporate Privacy Violation
ET INFO TeamViewer Dyngate User-Agent
2196
svchost.exe
Misc activity
ET REMOTE_ACCESS TeamViewer RMM Domain (teamviewer .com) in DNS Lookup
No debug info