File name:

PI-52-2025.tar.001

Full analysis: https://app.any.run/tasks/fda32ce1-dd22-4556-be85-1c8bd7617a6c
Verdict: Malicious activity
Threats:

A keylogger is a type of spyware that infects a system and has the ability to record every keystroke made on the device. This lets attackers collect personal information of victims, which may include their online banking credentials, as well as personal conversations. The most widespread vector of attack leading to a keylogger infection begins with a phishing email or link. Keylogging is also often present in remote access trojans as part of an extended set of malicious tools.

Analysis date: March 25, 2025, 04:25:04
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
evasion
snake
keylogger
purecrypter
netreactor
telegram
stealer
Indicators:
MIME: application/x-tar
File info: POSIX tar archive (GNU)
MD5:

C38450DD91EF1081CE4B6F17FDFBEB54

SHA1:

1D48B4A677503A423D92CE5DAFFAE12E25581E83

SHA256:

3BD81E69DD4D484DD8D83D7C89B144793C257A338341E324D11C8601214BDA3E

SSDEEP:

49152:TBo7UYu/WcmOwh8gud+QggjYAm7nBftvQS1NW/wFPXwYtQE8/bp2hODssJr7nXMT:a9uOFOwhtu8QBmJuaWItwY+E8/AOQshu

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 1348)
    • PURECRYPTER has been detected (YARA)

      • PI-52-2025.exe (PID: 7020)
    • Create files in the Startup directory

      • PI-52-2025.exe (PID: 7020)
    • SNAKEKEYLOGGER has been detected (SURICATA)

      • InstallUtil.exe (PID: 7376)
      • InstallUtil.exe (PID: 6736)
    • Actions looks like stealing of personal data

      • InstallUtil.exe (PID: 6736)
      • InstallUtil.exe (PID: 7376)
    • SNAKE has been detected (YARA)

      • InstallUtil.exe (PID: 6736)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • WinRAR.exe (PID: 1348)
    • Executing commands from a ".bat" file

      • WinRAR.exe (PID: 1348)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 1348)
    • Executable content was dropped or overwritten

      • PI-52-2025.exe (PID: 7020)
    • Checks for external IP

      • svchost.exe (PID: 2196)
      • InstallUtil.exe (PID: 7376)
      • InstallUtil.exe (PID: 6736)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 6048)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • InstallUtil.exe (PID: 6736)
      • InstallUtil.exe (PID: 7376)
    • Connects to SMTP port

      • InstallUtil.exe (PID: 6736)
      • InstallUtil.exe (PID: 7376)
  • INFO

    • Manual execution by a user

      • PI-52-2025.exe (PID: 7020)
      • InstallUtil.exe (PID: 6736)
      • wscript.exe (PID: 6048)
      • InstallUtil.exe (PID: 7376)
    • Reads security settings of Internet Explorer

      • BackgroundTransferHost.exe (PID: 7360)
      • BackgroundTransferHost.exe (PID: 7664)
      • BackgroundTransferHost.exe (PID: 7796)
      • BackgroundTransferHost.exe (PID: 8024)
      • BackgroundTransferHost.exe (PID: 7200)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 1348)
    • Reads the computer name

      • PI-52-2025.exe (PID: 7020)
      • MpCmdRun.exe (PID: 7684)
      • InstallUtil.exe (PID: 6736)
      • InstallUtil.exe (PID: 7376)
      • SyncRoot.exe (PID: 7328)
    • Checks supported languages

      • PI-52-2025.exe (PID: 7020)
      • MpCmdRun.exe (PID: 7684)
      • InstallUtil.exe (PID: 6736)
      • SyncRoot.exe (PID: 7328)
      • InstallUtil.exe (PID: 7376)
    • Create files in a temporary directory

      • MpCmdRun.exe (PID: 7684)
    • Checks proxy server information

      • BackgroundTransferHost.exe (PID: 7664)
      • InstallUtil.exe (PID: 6736)
      • InstallUtil.exe (PID: 7376)
    • Reads the machine GUID from the registry

      • PI-52-2025.exe (PID: 7020)
      • InstallUtil.exe (PID: 6736)
      • InstallUtil.exe (PID: 7376)
      • SyncRoot.exe (PID: 7328)
    • Reads the software policy settings

      • BackgroundTransferHost.exe (PID: 7664)
      • InstallUtil.exe (PID: 6736)
      • InstallUtil.exe (PID: 7376)
      • slui.exe (PID: 5204)
    • Creates files or folders in the user directory

      • BackgroundTransferHost.exe (PID: 7664)
      • PI-52-2025.exe (PID: 7020)
    • Autorun file from Startup directory

      • PI-52-2025.exe (PID: 7020)
    • .NET Reactor protector has been detected

      • PI-52-2025.exe (PID: 7020)
    • Disables trace logs

      • InstallUtil.exe (PID: 6736)
      • InstallUtil.exe (PID: 7376)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

SnakeKeylogger

(PID) Process(6736) InstallUtil.exe
Keys
DES6fc98cd68a1aab8b
Options
SMTP Userbank@iaa-airferight.com
SMTP Passwordmoneyismade22
SMTP Hostmail.iaa-airferight.com
SMTP SendTobank@iaa-airferight.com
SMTP Port25
No Malware configuration.

TRiD

.tar | TAR - Tape ARchive (100)
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
151
Monitored processes
18
Malicious processes
3
Suspicious processes
2

Behavior graph

Click at the process to see the details
start winrar.exe #PURECRYPTER pi-52-2025.exe sppextcomobj.exe no specs slui.exe backgroundtransferhost.exe no specs cmd.exe no specs conhost.exe no specs backgroundtransferhost.exe mpcmdrun.exe no specs backgroundtransferhost.exe no specs backgroundtransferhost.exe no specs backgroundtransferhost.exe no specs #SNAKE installutil.exe wscript.exe no specs svchost.exe syncroot.exe no specs #SNAKEKEYLOGGER installutil.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1348"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\PI-52-2025.tar.001.tarC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
1672C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
5204"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5436C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6048"C:\WINDOWS\System32\WScript.exe" "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SyncRoot.vbs"C:\Windows\System32\wscript.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6736"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
.NET Framework installation utility
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\installutil.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
SnakeKeylogger
(PID) Process(6736) InstallUtil.exe
Keys
DES6fc98cd68a1aab8b
Options
SMTP Userbank@iaa-airferight.com
SMTP Passwordmoneyismade22
SMTP Hostmail.iaa-airferight.com
SMTP SendTobank@iaa-airferight.com
SMTP Port25
7020"C:\Users\admin\Desktop\PI-52-2025.exe" C:\Users\admin\Desktop\PI-52-2025.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Cbzsppnp
Exit code:
4294967295
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\pi-52-2025.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
7200"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1C:\Windows\System32\BackgroundTransferHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Download/Upload Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\backgroundtransferhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\bcryptprimitives.dll
7328"C:\Users\admin\AppData\Roaming\SyncRoot.exe" C:\Users\admin\AppData\Roaming\SyncRoot.exewscript.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Cbzsppnp
Exit code:
4294967295
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\roaming\syncroot.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
Total events
7 322
Read events
7 284
Write events
38
Delete events
0

Modification events

(PID) Process:(1348) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(1348) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(1348) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(1348) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\PI-52-2025.tar.001.tar
(PID) Process:(1348) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1348) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1348) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1348) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7360) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(7360) BackgroundTransferHost.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
Executable files
2
Suspicious files
6
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
7664BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\88c40343-0d06-4fb8-bbda-0894e95b9698.down_data
MD5:
SHA256:
1348WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR1348.2981\PI-52-2025.tar.001.tar\PI-52-2025.exeexecutable
MD5:8AED9B5244D017DF5E006B51F1BE3A62
SHA256:AF5E834D991974E9FEFB6FD302023242B289F01FB82F8961182540D4C6B9786D
7020PI-52-2025.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SyncRoot.vbstext
MD5:51FA879C7DDD38E6CA3BE6D6C6810573
SHA256:A81FC2091D7DE90FF46BC39B40463EFD3349CE27E218C8277EC09841CA7F5944
7664BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\88c40343-0d06-4fb8-bbda-0894e95b9698.3910cd9d-8be3-4b6b-b764-ee421037709c.down_metabinary
MD5:F5C94B0E61E187C9039065297A25FA17
SHA256:20AA16FC44990B371AD96CBBD37AF6D5CAC2104E2963211B83EB96509B381206
7684MpCmdRun.exeC:\Users\admin\AppData\Local\Temp\MpCmdRun.logbinary
MD5:7EFBC9D764A6C9A8732612EBDD186CB4
SHA256:6FC6F8CC96F15865B3605817946F1F6A4606F4EEB51EC61431F84D67964C5DA7
1348WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$VR1348.2981\Rar$Scan10377.battext
MD5:C032D730530184B2EB8664A3BA0BDF43
SHA256:A3057DFECD0026B01CB0D5B72FD25B81754284432BBCE49A965720108B304458
7664BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\MetaData\26C212D9399727259664BDFCA073966E_F9F7D6A7ECE73106D2A8C63168CDA10Dbinary
MD5:55D81D94FC87CD4FAA5D399F66C96463
SHA256:2CD330391EECA64BDC95842CE2F18DE3FA114FA78B44099C7234FB3C2D303A0A
7664BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\b753563f-1b81-4bc0-a39a-27c83c05df17.up_meta_securebinary
MD5:72C283C49B2511368375929DA9118882
SHA256:60879B1057CC07D63DFDEC4983B6D21F71E7E942D0205216448E617E295327BC
7664BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\Content\26C212D9399727259664BDFCA073966E_F9F7D6A7ECE73106D2A8C63168CDA10Dbinary
MD5:4872BABAF39AA62B8D32695EBB7E9173
SHA256:2EE85DF86EE29BBEB3DCA81AA29B6DE204F605A2769B84C728A329178A2D0999
7020PI-52-2025.exeC:\Users\admin\AppData\Roaming\SyncRoot.exeexecutable
MD5:8AED9B5244D017DF5E006B51F1BE3A62
SHA256:AF5E834D991974E9FEFB6FD302023242B289F01FB82F8961182540D4C6B9786D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
26
TCP/UDP connections
35
DNS requests
21
Threats
33

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.6:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
3900
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
7664
BackgroundTransferHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6736
InstallUtil.exe
GET
200
132.226.8.169:80
http://checkip.dyndns.org/
unknown
whitelisted
6736
InstallUtil.exe
GET
200
132.226.8.169:80
http://checkip.dyndns.org/
unknown
whitelisted
6736
InstallUtil.exe
GET
200
132.226.8.169:80
http://checkip.dyndns.org/
unknown
whitelisted
6736
InstallUtil.exe
GET
200
132.226.8.169:80
http://checkip.dyndns.org/
unknown
whitelisted
6736
InstallUtil.exe
GET
200
132.226.8.169:80
http://checkip.dyndns.org/
unknown
whitelisted
6736
InstallUtil.exe
GET
200
132.226.8.169:80
http://checkip.dyndns.org/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.6:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
40.113.110.67:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
40.126.31.0:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
2112
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3900
backgroundTaskHost.exe
20.31.169.57:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 172.217.16.206
whitelisted
crl.microsoft.com
  • 23.216.77.6
  • 23.216.77.28
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
whitelisted
client.wns.windows.com
  • 40.113.110.67
whitelisted
login.live.com
  • 40.126.31.0
  • 20.190.159.23
  • 20.190.159.130
  • 40.126.31.131
  • 40.126.31.129
  • 20.190.159.131
  • 20.190.159.2
  • 40.126.31.69
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
arc.msn.com
  • 20.31.169.57
whitelisted
www.bing.com
  • 104.126.37.139
  • 104.126.37.131
whitelisted
checkip.dyndns.org
  • 132.226.8.169
  • 132.226.247.73
  • 193.122.6.168
  • 158.101.44.242
  • 193.122.130.0
whitelisted
reallyfreegeoip.org
  • 104.21.32.1
  • 104.21.64.1
  • 104.21.112.1
  • 104.21.16.1
  • 104.21.96.1
  • 104.21.80.1
  • 104.21.48.1
malicious

Threats

PID
Process
Class
Message
2196
svchost.exe
Device Retrieving External IP Address Detected
ET DYN_DNS External IP Lookup Domain in DNS Query (checkip .dyndns .org)
6736
InstallUtil.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup - checkip.dyndns.org
6736
InstallUtil.exe
Device Retrieving External IP Address Detected
ET INFO 404/Snake/Matiex Keylogger Style External IP Check
2196
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Address Lookup Domain (reallyfreegeoip .org)
2196
svchost.exe
Misc activity
ET INFO External IP Address Lookup Domain in DNS Lookup (reallyfreegeoip .org)
6736
InstallUtil.exe
Misc activity
ET INFO External IP Lookup Service Domain (reallyfreegeoip .org) in TLS SNI
6736
InstallUtil.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup - checkip.dyndns.org
6736
InstallUtil.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup - checkip.dyndns.org
6736
InstallUtil.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup - checkip.dyndns.org
6736
InstallUtil.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup - checkip.dyndns.org
No debug info