File name:

3ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b

Full analysis: https://app.any.run/tasks/4c86ae4a-ee4d-410f-9cdd-8262b0234a60
Verdict: Malicious activity
Analysis date: January 31, 2025, 23:35:49
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
python
pyinstaller
fody
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

A79E4424116DC0A76A179507AC914578

SHA1:

66BD8DB40F4169C7F0FCA3D5D15C978EFE143CF8

SHA256:

3AB29BC71DDD272F33F17C5108C044A570610C06CCBA16CDE1A4AA67B1524A8B

SSDEEP:

98304:9v7dEWBmAzp2u/muRu6mB4MIZrjCK4aRlSYmRmzj4i1scTAelUu7zxdCAakA3H1c:GfSh0PuLEpijSem866oAl

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • 3ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exe (PID: 6876)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • 3ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exe (PID: 6816)
    • The process drops C-runtime libraries

      • 3ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exe (PID: 6816)
    • Process drops python dynamic module

      • 3ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exe (PID: 6816)
    • Executable content was dropped or overwritten

      • 3ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exe (PID: 6816)
      • 3ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exe (PID: 6876)
    • Application launched itself

      • 3ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exe (PID: 6816)
    • Loads Python modules

      • 3ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exe (PID: 6876)
    • Reads security settings of Internet Explorer

      • 3ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exe (PID: 6876)
      • WinRAR.exe (PID: 2356)
    • Reads the date of Windows installation

      • 3ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exe (PID: 6876)
    • There is functionality for taking screenshot (YARA)

      • 3ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exe (PID: 6876)
      • 3ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exe (PID: 6816)
  • INFO

    • Checks supported languages

      • 3ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exe (PID: 6816)
      • 3ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exe (PID: 6876)
      • VeeamUpdate.exe (PID: 6912)
    • Reads the computer name

      • 3ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exe (PID: 6816)
      • 3ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exe (PID: 6876)
      • VeeamUpdate.exe (PID: 6912)
    • The sample compiled with english language support

      • 3ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exe (PID: 6816)
    • Create files in a temporary directory

      • 3ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exe (PID: 6816)
      • 3ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exe (PID: 6876)
    • Creates files or folders in the user directory

      • 3ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exe (PID: 6876)
    • Creates files in the program directory

      • 3ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exe (PID: 6876)
    • Process checks computer location settings

      • 3ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exe (PID: 6876)
    • Reads security settings of Internet Explorer

      • OpenWith.exe (PID: 6840)
      • notepad.exe (PID: 1620)
      • notepad.exe (PID: 7004)
      • OpenWith.exe (PID: 5776)
      • notepad.exe (PID: 4976)
      • notepad.exe (PID: 6180)
      • notepad.exe (PID: 1476)
    • Reads the machine GUID from the registry

      • VeeamUpdate.exe (PID: 6912)
    • Disables trace logs

      • VeeamUpdate.exe (PID: 6912)
    • Checks proxy server information

      • VeeamUpdate.exe (PID: 6912)
    • Reads the software policy settings

      • VeeamUpdate.exe (PID: 6912)
    • PyInstaller has been detected (YARA)

      • 3ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exe (PID: 6816)
      • 3ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exe (PID: 6876)
    • Detects Fody packer (YARA)

      • VeeamUpdate.exe (PID: 6912)
    • Reads Microsoft Office registry keys

      • OpenWith.exe (PID: 6840)
      • OpenWith.exe (PID: 5776)
    • Manual execution by a user

      • WinRAR.exe (PID: 2356)
      • notepad.exe (PID: 4976)
      • notepad.exe (PID: 1476)
      • notepad.exe (PID: 6180)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | InstallShield setup (57.6)
.exe | Win64 Executable (generic) (36.9)
.exe | Generic Win/DOS Executable (2.6)
.exe | DOS Executable Generic (2.6)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:03:11 08:01:20+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.37
CodeSize: 171520
InitializedDataSize: 309760
UninitializedDataSize: -
EntryPoint: 0xc2f0
OSVersion: 5.2
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
140
Monitored processes
12
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 3ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exe 3ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exe veeamupdate.exe rundll32.exe no specs winrar.exe no specs openwith.exe no specs notepad.exe no specs openwith.exe no specs notepad.exe no specs notepad.exe no specs notepad.exe no specs notepad.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1476"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Local\Temp\_MEI68162\_socket.pydC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
1620"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Local\Temp\_MEI68162\select.pydC:\Windows\System32\notepad.exeOpenWith.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
2356"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\_MEI68162\base_library.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
4596C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
4976"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Local\Temp\_MEI68162\Pythonwin\win32ui.pydC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
5776C:\WINDOWS\system32\OpenWith.exe -EmbeddingC:\Windows\System32\OpenWith.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6180"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Local\Temp\_MEI68162\_decimal.pydC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
6816"C:\Users\admin\Desktop\3ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exe" C:\Users\admin\Desktop\3ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\3ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6840C:\WINDOWS\system32\OpenWith.exe -EmbeddingC:\Windows\System32\OpenWith.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Pick an app
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\openwith.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6876"C:\Users\admin\Desktop\3ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exe" C:\Users\admin\Desktop\3ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exe
3ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\desktop\3ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
9 547
Read events
9 506
Write events
41
Delete events
0

Modification events

(PID) Process:(6912) VeeamUpdate.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VeeamUpdate_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6912) VeeamUpdate.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VeeamUpdate_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6912) VeeamUpdate.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VeeamUpdate_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(6912) VeeamUpdate.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VeeamUpdate_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(6912) VeeamUpdate.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VeeamUpdate_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(6912) VeeamUpdate.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VeeamUpdate_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(6912) VeeamUpdate.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VeeamUpdate_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(6912) VeeamUpdate.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VeeamUpdate_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6912) VeeamUpdate.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VeeamUpdate_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6912) VeeamUpdate.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\VeeamUpdate_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
22
Suspicious files
3
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
68163ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exeC:\Users\admin\AppData\Local\Temp\_MEI68162\Pythonwin\win32ui.pydexecutable
MD5:0E96B5724C2213300864CEB36363097A
SHA256:85CF3081B0F1ADAFDBDCF164D7788A7F00E52BACDF02D1505812DE4FACFC962F
68163ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exeC:\Users\admin\AppData\Local\Temp\_MEI68162\VCRUNTIME140.dllexecutable
MD5:BE8DBE2DC77EBE7F88F910C61AEC691A
SHA256:4D292623516F65C80482081E62D5DADB759DC16E851DE5DB24C3CBB57B87DB83
68163ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exeC:\Users\admin\AppData\Local\Temp\_MEI68162\_ctypes.pydexecutable
MD5:A25CDCF630C024047A47A53728DC87CD
SHA256:3D43869A4507ED8ECE285AE85782D83BB16328CF636170ACB895C227EBB142AC
68163ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exeC:\Users\admin\AppData\Local\Temp\_MEI68162\_decimal.pydexecutable
MD5:E4E032221ACA4033F9D730F19DC3B21A
SHA256:23BDD07B84D2DBCB077624D6DCBFC66AB13A9EF5F9EEBE31DC0FFECE21B9E50C
68163ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exeC:\Users\admin\AppData\Local\Temp\_MEI68162\_socket.pydexecutable
MD5:485D998A2DE412206F04FA028FE6BA90
SHA256:8F9EDE5044643413C3B072CD31A565956498CA07CDD17FB6A04483D388FDAD76
68163ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exeC:\Users\admin\AppData\Local\Temp\_MEI68162\VCRUNTIME140_1.dllexecutable
MD5:F8DFA78045620CF8A732E67D1B1EB53D
SHA256:A113F192195F245F17389E6ECBED8005990BCB2476DDAD33F7C4C6C86327AFE5
68163ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exeC:\Users\admin\AppData\Local\Temp\_MEI68162\_bz2.pydexecutable
MD5:37EACE4B806B32F829DE08DB3803B707
SHA256:1BE51EF2B5ACBE490217AA1FF12618D24B95DF6136C6844714B9CA997B4C7F9B
68163ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exeC:\Users\admin\AppData\Local\Temp\_MEI68162\libcrypto-3.dllexecutable
MD5:E547CF6D296A88F5B1C352C116DF7C0C
SHA256:05FE080EAB7FC535C51E10C1BD76A2F3E6217F9C91A25034774588881C3F99DE
68163ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exeC:\Users\admin\AppData\Local\Temp\_MEI68162\_lzma.pydexecutable
MD5:3273720DDF2C5B75B072A1FB13476751
SHA256:663F1087C2ED664C5995A3FFA64546D2E33A0FCE8A9121B48CC7C056B74A2948
68163ab29bc71ddd272f33f17c5108c044a570610c06ccba16cde1a4aa67b1524a8b.exeC:\Users\admin\AppData\Local\Temp\_MEI68162\_hashlib.pydexecutable
MD5:BA682DFCDD600A4BB43A51A0D696A64C
SHA256:2AD55E11BDDB5B65CDF6E9E126D82A3B64551F7AD9D4CBF74A1058FD7E5993BD
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
33
DNS requests
22
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1380
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5988
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6448
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
5988
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
1380
svchost.exe
GET
200
95.101.78.32:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
104.126.37.136:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1380
svchost.exe
95.101.78.32:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
1380
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4712
MoUsoCoreWorker.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
1176
svchost.exe
40.126.31.3:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
www.bing.com
  • 104.126.37.136
  • 104.126.37.146
  • 104.126.37.139
  • 104.126.37.170
  • 104.126.37.154
  • 104.126.37.163
  • 104.126.37.153
  • 104.126.37.177
  • 104.126.37.178
whitelisted
google.com
  • 216.58.206.46
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
crl.microsoft.com
  • 95.101.78.32
  • 95.101.78.42
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
  • 40.127.240.158
  • 51.124.78.146
whitelisted
login.live.com
  • 40.126.31.3
  • 40.126.31.128
  • 20.190.159.128
  • 20.190.159.68
  • 40.126.31.129
  • 20.190.159.4
  • 20.190.159.130
  • 40.126.31.67
whitelisted
go.microsoft.com
  • 184.30.18.9
whitelisted
gov-iq.net
  • 87.120.87.162
malicious
_kerberos._tcp.dc._msdcs.comsec.gov.iq
unknown

Threats

No threats detected
No debug info