File name:

ZAMÓWIENIE_NR.25051911739820011.IMG

Full analysis: https://app.any.run/tasks/97ab7182-551d-42ab-8692-da15c8649002
Verdict: Malicious activity
Threats:

Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.

Analysis date: May 19, 2025, 08:03:39
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
stealer
ftp
agenttesla
exfiltration
Indicators:
MIME: application/x-iso9660-image
File info: UDF filesystem data (version 1.5) 'DATA_ENCONDER_CRYPTED'
MD5:

FFF5BCD01A32758EB18B49AC207C3159

SHA1:

9E050FF34C8AC4537DCECF9E283DEEAEC81380F3

SHA256:

375436EC14B6521D25EFC2708546BB59D22080A53F4759A90631C45914180FF4

SSDEEP:

49152:447BPdtw/4EvQ2Z+LakqW6uWLKCnODHsCDrfqXI+D+Cg2BXwLqqMTQR3yV1fZxuA:447BPdtw/4Eo20LavWK4DsCDmb+721wG

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • ZAMÓWIENIE_NR.25051911739820011.exe (PID: 8024)
    • Actions looks like stealing of personal data

      • msiexec.exe (PID: 5800)
    • AGENTTESLA has been detected (SURICATA)

      • msiexec.exe (PID: 5800)
    • AGENTTESLA has been detected (YARA)

      • msiexec.exe (PID: 5800)
    • Steals credentials from Web Browsers

      • msiexec.exe (PID: 5800)
  • SUSPICIOUS

    • Image mount has been detect

      • explorer.exe (PID: 5492)
    • Application launched itself

      • explorer.exe (PID: 5492)
    • Loading modules from mounted disk drive

      • ZAMÓWIENIE_NR.25051911739820011.exe (PID: 8024)
    • Reads security settings of Internet Explorer

      • ZAMÓWIENIE_NR.25051911739820011.exe (PID: 8024)
    • Starts POWERSHELL.EXE for commands execution

      • ZAMÓWIENIE_NR.25051911739820011.exe (PID: 8024)
    • Converts a specified value to a byte (POWERSHELL)

      • powershell.exe (PID: 8112)
    • Connects to FTP

      • msiexec.exe (PID: 5800)
    • Connects to unusual port

      • msiexec.exe (PID: 5800)
  • INFO

    • Reads security settings of Internet Explorer

      • explorer.exe (PID: 5492)
      • msiexec.exe (PID: 5800)
    • Manual execution by a user

      • ZAMÓWIENIE_NR.25051911739820011.exe (PID: 8024)
    • Checks supported languages

      • ZAMÓWIENIE_NR.25051911739820011.exe (PID: 8024)
    • Create files in a temporary directory

      • ZAMÓWIENIE_NR.25051911739820011.exe (PID: 8024)
    • Reads the computer name

      • ZAMÓWIENIE_NR.25051911739820011.exe (PID: 8024)
    • Creates files or folders in the user directory

      • ZAMÓWIENIE_NR.25051911739820011.exe (PID: 8024)
      • msiexec.exe (PID: 5800)
    • Process checks computer location settings

      • ZAMÓWIENIE_NR.25051911739820011.exe (PID: 8024)
    • Gets data length (POWERSHELL)

      • powershell.exe (PID: 8112)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 8112)
    • Checks whether the specified file exists (POWERSHELL)

      • powershell.exe (PID: 8112)
    • Converts byte array into ASCII string (POWERSHELL)

      • powershell.exe (PID: 8112)
    • Uses string split method (POWERSHELL)

      • powershell.exe (PID: 8112)
    • Checks proxy server information

      • msiexec.exe (PID: 5800)
      • slui.exe (PID: 904)
    • Reads the software policy settings

      • msiexec.exe (PID: 5800)
      • slui.exe (PID: 7804)
      • slui.exe (PID: 904)
    • Disables trace logs

      • msiexec.exe (PID: 5800)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.iso | ISO 9660 CD image (27.6)
.atn | Photoshop Action (27.1)
.gmc | Game Music Creator Music (6.1)

EXIF

ISO

VolumeName: DATA_ENCONDER_CRYPTED
VolumeBlockCount: 820
VolumeBlockSize: 2048
RootDirectoryCreateDate: 2025:05:19 09:33:19+03:00
VolumeSetName: UNDEFINED
Software: IMGBURN V2.5.8.0 - THE ULTIMATE IMAGE BURNER!
VolumeCreateDate: 2025:05:19 09:33:19.00+03:00
VolumeModifyDate: 2025:05:19 09:33:19.00+03:00

Composite

VolumeSize: 1679 kB
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
144
Monitored processes
10
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start explorer.exe no specs sppextcomobj.exe no specs slui.exe zamówienie_nr.25051911739820011.exe no specs powershell.exe no specs conhost.exe no specs #AGENTTESLA msiexec.exe slui.exe svchost.exe explorer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
904C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
5492C:\WINDOWS\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\dui70.dll
c:\windows\system32\duser.dll
c:\windows\system32\msftedit.dll
c:\windows\system32\windows.globalization.dll
c:\windows\system32\globinputhost.dll
c:\program files\common files\microsoft shared\ink\tiptsf.dll
c:\windows\system32\uiribbon.dll
c:\windows\system32\bluetoothapis.dll
c:\windows\system32\drprov.dll
c:\windows\system32\ntlanman.dll
5800"C:\WINDOWS\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\mshtml.dll
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
7432"C:\WINDOWS\Explorer.exe" C:\Windows\explorer.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\twinapi.dll
7772C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7804"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
8024"D:\ZAMÓWIENIE_NR.25051911739820011.exe" D:\ZAMÓWIENIE_NR.25051911739820011.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
interaural niter
Exit code:
1
Modules
Images
d:\zamówienie_nr.25051911739820011.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
8112"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Appellant=GC -raw 'C:\Users\admin\AppData\Local\boglusen\resharpen\Bopladsen\compromiser.leo';$Dirtied=$Appellant.SubString(51144,3);.$Dirtied($Appellant)"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeZAMÓWIENIE_NR.25051911739820011.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
8120\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
20 242
Read events
20 161
Write events
79
Delete events
2

Modification events

(PID) Process:(5492) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:NodeSlots
Value:
02020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202
(PID) Process:(5492) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:MRUListEx
Value:
04000000030000000E00000000000000100000000F0000000C0000000D0000000B000000050000000A000000090000000800000001000000070000000600000002000000FFFFFFFF
(PID) Process:(5492) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\4
Operation:writeName:MRUListEx
Value:
020000000000000004000000050000000100000003000000FFFFFFFF
(PID) Process:(5492) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar
Operation:writeName:Locked
Value:
1
(PID) Process:(7432) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
(PID) Process:(5492) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
Operation:writeName:IconLayouts
Value:
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
(PID) Process:(5492) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
Operation:writeName:IconNameVersion
Value:
1
(PID) Process:(5492) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
Operation:writeName:LastUpdate
Value:
E2E52A6800000000
(PID) Process:(5492) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
Operation:writeName:CheckSetting
Value:
23004100430042006C006F00620000000000000000000000010000000000000000000000
(PID) Process:(5492) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:MRUListEx
Value:
03000000040000000E00000000000000100000000F0000000C0000000D0000000B000000050000000A000000090000000800000001000000070000000600000002000000FFFFFFFF
Executable files
0
Suspicious files
13
Text files
12
Unknown types
0

Dropped files

PID
Process
Filename
Type
8024ZAMÓWIENIE_NR.25051911739820011.exeC:\Users\admin\AppData\Local\boglusen\resharpen\Bopladsen\Omophagist\Rectitic\morforldre.unr
MD5:
SHA256:
8024ZAMÓWIENIE_NR.25051911739820011.exeC:\Users\admin\AppData\Local\Temp\nswDFF3.tmp
MD5:
SHA256:
5492explorer.exeC:\Users\admin\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.datbinary
MD5:E49C56350AEDF784BFE00E444B879672
SHA256:A8BD235303668981563DFB5AAE338CB802817C4060E2C199B7C84901D57B7E1E
8024ZAMÓWIENIE_NR.25051911739820011.exeC:\Users\admin\AppData\Local\boglusen\resharpen\Bopladsen\Epigrafikerens.jpgbinary
MD5:B0F9C998AAA685751E77F2B4C6BDF880
SHA256:5076C7C45B6F617FE298E14EE1098E670A863152073E8976727DEE74E52AEB25
8024ZAMÓWIENIE_NR.25051911739820011.exeC:\Users\admin\AppData\Local\boglusen\resharpen\Bopladsen\Omophagist\computate.jpgbinary
MD5:AFF1A5EBD11438F491A6311E9A52E798
SHA256:C4BE53D1D1863579134EB637409DC3EA4C9227112BC830044F7DBC2A34D7A931
8024ZAMÓWIENIE_NR.25051911739820011.exeC:\Users\admin\AppData\Local\boglusen\resharpen\Bopladsen\compromiser.leotext
MD5:B1E357E849D1506CAB456C1635ADC9C8
SHA256:3CC66A8B2C2B1E2DCEFD9F9F5A395C27893F997A2DDEDC912F66A172A0EAD252
8024ZAMÓWIENIE_NR.25051911739820011.exeC:\Users\admin\AppData\Local\boglusen\resharpen\Bopladsen\Omophagist\dejunkerize.initext
MD5:495FBE3E4867B6F0C6816DBD1B7D9F72
SHA256:7AD83843DBB2BA10328630E0D9B32D9846340A8CFBAE510CD22CFD59F9594013
8024ZAMÓWIENIE_NR.25051911739820011.exeC:\Users\admin\AppData\Local\boglusen\resharpen\Bopladsen\Omophagist\Rectitic\reflektantens.jpgbinary
MD5:C9EDC2BA48E6590C99726236B0FB53BE
SHA256:D78663F7AF69D8E53C34F78D6CC1441386A6F756B90F81E67965C520FCC71E1A
8024ZAMÓWIENIE_NR.25051911739820011.exeC:\Users\admin\AppData\Local\boglusen\resharpen\Bopladsen\Omophagist\embattles.initext
MD5:5EF45F5BE0B374320FF9ECBB33A6244E
SHA256:9885A8F649FD2571FAF9D20F8B7A13D1521C42E6AFD67014EBA989E2FFA8784E
8024ZAMÓWIENIE_NR.25051911739820011.exeC:\Users\admin\AppData\Local\boglusen\resharpen\Bopladsen\Omophagist\falsummerne.initext
MD5:DFF4D0A9335F95E98FBCA78392A30EB4
SHA256:ABB72148E38AA3E6A2E161613E75A0AA4E9D52B2F869AE505887D6552045F31F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
42
DNS requests
26
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.6:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
536
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
536
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7660
backgroundTaskHost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D
unknown
whitelisted
5800
msiexec.exe
GET
200
2.19.105.127:80
http://x1.c.lencr.org/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.6:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
7568
svchost.exe
23.35.238.131:443
go.microsoft.com
AKAMAI-AS
DE
whitelisted
6544
svchost.exe
20.190.160.14:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 23.216.77.6
  • 23.216.77.28
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
google.com
  • 142.250.186.142
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
login.live.com
  • 20.190.160.14
  • 20.190.160.131
  • 20.190.160.130
  • 20.190.160.3
  • 40.126.32.140
  • 20.190.160.66
  • 20.190.160.64
  • 20.190.160.128
  • 20.190.159.129
  • 40.126.31.71
  • 20.190.159.64
  • 40.126.31.0
  • 20.190.159.130
  • 40.126.31.67
  • 20.190.159.0
  • 40.126.31.1
whitelisted
ocsp.digicert.com
  • 2.17.190.73
  • 2.23.77.188
whitelisted
settings-win.data.microsoft.com
  • 51.124.78.146
  • 20.73.194.208
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted

Threats

PID
Process
Class
Message
5800
msiexec.exe
Misc activity
INFO [ANY.RUN] FTP protocol command for uploading a file
5800
msiexec.exe
A Network Trojan was detected
STEALER [ANY.RUN] AgentTesla Exfiltration (raw TCP)
5800
msiexec.exe
A Network Trojan was detected
ET MALWARE AgentTesla Exfil via FTP
5800
msiexec.exe
A Network Trojan was detected
STEALER [ANY.RUN] AgentTesla Exfiltration (raw TCP)
5800
msiexec.exe
Misc activity
INFO [ANY.RUN] FTP server is ready for the new user
No debug info