File name:

VER_041159253_2025-24-05-1113564896_2052T7H4.vbs

Full analysis: https://app.any.run/tasks/269c49c9-71f0-4605-badc-83e5fec35463
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: March 25, 2025, 07:49:54
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
evasion
stealer
delphi
Indicators:
MIME: text/plain
File info: ASCII text, with very long lines (4860), with CRLF line terminators
MD5:

C8EE509A00416DEAFAFA9E2A6EFAB5D5

SHA1:

FBCA87223DF644FBC0B8AF5C777CF4559E46520F

SHA256:

4A71A5F71BFC9C8AFBE5A5346BCEE5D798FF1200BCB33F410082768A44C96CE7

SSDEEP:

49152:yWF3d9OYEUjPBbJgcIKJKrvX3vXU+DTbysTO6sOn6oL5L+Ig8Qnc:VN61W8Qnc

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Uses base64 encoding (SCRIPT)

      • wscript.exe (PID: 4300)
    • Deletes a file (SCRIPT)

      • wscript.exe (PID: 4300)
    • Actions looks like stealing of personal data

      • qKcVOgxGXjjIwQGthknUjnQEl.exe (PID: 5528)
  • SUSPICIOUS

    • Creates FileSystem object to access computer's file system (SCRIPT)

      • wscript.exe (PID: 4300)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 4300)
    • Saves data to a binary file (SCRIPT)

      • wscript.exe (PID: 4300)
    • Sets XML DOM element text (SCRIPT)

      • wscript.exe (PID: 4300)
    • Creates a Stream, which may work with files, input/output devices, pipes, or TCP/IP sockets (SCRIPT)

      • wscript.exe (PID: 4300)
    • Writes binary data to a Stream object (SCRIPT)

      • wscript.exe (PID: 4300)
    • Likely accesses (executes) a file from the Public directory

      • qKcVOgxGXjjIwQGthknUjnQEl.exe (PID: 5528)
    • Reads the date of Windows installation

      • qKcVOgxGXjjIwQGthknUjnQEl.exe (PID: 5528)
    • Read disk information to detect sandboxing environments

      • qKcVOgxGXjjIwQGthknUjnQEl.exe (PID: 5528)
    • Checks for external IP

      • svchost.exe (PID: 2196)
      • qKcVOgxGXjjIwQGthknUjnQEl.exe (PID: 5528)
    • There is functionality for communication over UDP network (YARA)

      • qKcVOgxGXjjIwQGthknUjnQEl.exe (PID: 5528)
    • Connects to unusual port

      • qKcVOgxGXjjIwQGthknUjnQEl.exe (PID: 5528)
    • There is functionality for taking screenshot (YARA)

      • qKcVOgxGXjjIwQGthknUjnQEl.exe (PID: 5528)
  • INFO

    • The sample compiled with english language support

      • wscript.exe (PID: 4300)
    • Reads the computer name

      • qKcVOgxGXjjIwQGthknUjnQEl.exe (PID: 5528)
    • Checks supported languages

      • qKcVOgxGXjjIwQGthknUjnQEl.exe (PID: 5528)
    • Reads Environment values

      • qKcVOgxGXjjIwQGthknUjnQEl.exe (PID: 5528)
    • Reads product name

      • qKcVOgxGXjjIwQGthknUjnQEl.exe (PID: 5528)
    • Reads security settings of Internet Explorer

      • BackgroundTransferHost.exe (PID: 5376)
      • BackgroundTransferHost.exe (PID: 6652)
      • BackgroundTransferHost.exe (PID: 2340)
      • BackgroundTransferHost.exe (PID: 5552)
      • BackgroundTransferHost.exe (PID: 2268)
    • Reads the software policy settings

      • qKcVOgxGXjjIwQGthknUjnQEl.exe (PID: 5528)
      • BackgroundTransferHost.exe (PID: 6652)
      • slui.exe (PID: 2384)
    • Checks proxy server information

      • BackgroundTransferHost.exe (PID: 6652)
      • qKcVOgxGXjjIwQGthknUjnQEl.exe (PID: 5528)
    • Creates files or folders in the user directory

      • BackgroundTransferHost.exe (PID: 6652)
    • Compiled with Borland Delphi (YARA)

      • qKcVOgxGXjjIwQGthknUjnQEl.exe (PID: 5528)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.cnt | Help File Contents (100)
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
144
Monitored processes
12
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start wscript.exe no specs sppextcomobj.exe no specs slui.exe qkcvogxgxjjiwqgthknujnqel.exe svchost.exe backgroundtransferhost.exe no specs backgroundtransferhost.exe backgroundtransferhost.exe no specs backgroundtransferhost.exe no specs backgroundtransferhost.exe no specs slui.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2268"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1C:\Windows\System32\BackgroundTransferHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Download/Upload Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\backgroundtransferhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\bcryptprimitives.dll
2340"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1C:\Windows\System32\BackgroundTransferHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Download/Upload Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\backgroundtransferhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\bcryptprimitives.dll
2384"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4300"C:\WINDOWS\System32\WScript.exe" C:\Users\admin\AppData\Local\Temp\VER_041159253_2025-24-05-1113564896_2052T7H4.vbsC:\Windows\System32\wscript.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4688C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5376"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1C:\Windows\System32\BackgroundTransferHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Download/Upload Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\backgroundtransferhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\bcryptprimitives.dll
5528"C:\Users\Public\qKcVOgxGXjjIwQGthknUjnQEl.exe" C:\Users\Public\qKcVOgxGXjjIwQGthknUjnQEl.exe
wscript.exe
User:
admin
Company:
CloudBridge Solutions 410067 Inc.
Integrity Level:
MEDIUM
Description:
Advanced Data Protection Management 410067, 53012.56040.61052.55319, V881.
Exit code:
0
Version:
53012.56040.61052.55319
Modules
Images
c:\users\public\qkcvogxgxjjiwqgthknujnqel.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\shell32.dll
c:\windows\syswow64\msvcp_win.dll
5552"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1C:\Windows\System32\BackgroundTransferHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Download/Upload Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\backgroundtransferhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\bcryptprimitives.dll
6544C:\WINDOWS\system32\svchost.exe -k netsvcs -p -s wlidsvcC:\Windows\System32\svchost.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
Total events
4 542
Read events
4 501
Write events
41
Delete events
0

Modification events

(PID) Process:(4300) wscript.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
Operation:writeName:{2781761E-28E0-4109-99FE-B9D127C57AFE} {56FFCC30-D398-11D0-B2AE-00A0C908FA49} 0xFFFF
Value:
0100000000000000D1EF3A845A9DDB01
(PID) Process:(6544) svchost.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\IdentityCRL\ExtendedProperties
Operation:writeName:LID
Value:
0018001399B923AF
(PID) Process:(6544) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
Operation:writeName:ClockTimeSeconds
Value:
2E60E26700000000
(PID) Process:(6544) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
Operation:writeName:TickCount
Value:
35CD100000000000
(PID) Process:(6544) svchost.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02vomrtdzuvrmjqc
Operation:writeName:AppIdList
Value:
(PID) Process:(6544) svchost.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02vomrtdzuvrmjqc
Operation:writeName:Reason
Value:
(PID) Process:(6544) svchost.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18
Operation:writeName:ValidDeviceId
Value:
(PID) Process:(6544) svchost.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-1693682860-607145093-2874071422-1001\02lovhkbrcdhdqxh
Operation:writeName:AppIdList
Value:
(PID) Process:(6544) svchost.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-1693682860-607145093-2874071422-1001\02lovhkbrcdhdqxh
Operation:writeName:Reason
Value:
(PID) Process:(6544) svchost.exeKey:HKEY_USERS\.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-1693682860-607145093-2874071422-1001
Operation:writeName:ValidDeviceId
Value:
Executable files
0
Suspicious files
9
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
4300wscript.exeC:\Users\Public\SYJLIBvtjp2I14MB550IR1Z0YNCCBGOKctem.qpf
MD5:
SHA256:
4300wscript.exeC:\Users\Public\qKcVOgxGXjjIwQGthknUjnQEl.exe
MD5:
SHA256:
6652BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\6e5a1cec-af3d-4618-8879-7ba83ae1b1bc.down_data
MD5:
SHA256:
4300wscript.exeC:\Users\Public\izEjRNmeOjjBfqXIhBLX.txttext
MD5:978F299146517B99ACCE094C2DC54F46
SHA256:3667B69A215401F1E56BB8ABFE543012944AC24783DB511CBBA3F18496C1E8C8
6544svchost.exeC:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776binary
MD5:9D4E976D5EF164D4385E87BCC5D617CE
SHA256:C90172DC217A0086AFFD7A6294FC91A2ECE0D87271E5476C4465776B9A5258C3
6544svchost.exeC:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776binary
MD5:6CE6C0133386265A89393A619294B3ED
SHA256:26EB98D4619F3D99EE9F9D5F3ABF65C999F20F3561903814962D94CB21881A56
6652BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\af7cb19c-9f37-4024-ad13-ae06b67d059d.1eb03069-647e-4bc3-8b1e-1b2bbe9145c0.down_metabinary
MD5:A2FB3076038E91385CE360C95C0867AF
SHA256:991F409671DAB4823B022F9A591A8ABD3E73E01B2EAEA086A233F5A4A1A8DDC7
6652BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\af7cb19c-9f37-4024-ad13-ae06b67d059d.up_meta_securebinary
MD5:CFBF8A818A63BBFAD84AA6AA23D03F87
SHA256:9EF74B641F1C46A1D0BB80C3DBF899E333871E17107F98937E099E6D6132258A
6652BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\6e5a1cec-af3d-4618-8879-7ba83ae1b1bc.1eb03069-647e-4bc3-8b1e-1b2bbe9145c0.down_metabinary
MD5:A2FB3076038E91385CE360C95C0867AF
SHA256:991F409671DAB4823B022F9A591A8ABD3E73E01B2EAEA086A233F5A4A1A8DDC7
6652BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\Microsoft\CryptnetUrlCache\Content\26C212D9399727259664BDFCA073966E_F9F7D6A7ECE73106D2A8C63168CDA10Dbinary
MD5:4872BABAF39AA62B8D32695EBB7E9173
SHA256:2EE85DF86EE29BBEB3DCA81AA29B6DE204F605A2769B84C728A329178A2D0999
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
34
DNS requests
19
Threats
16

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5528
qKcVOgxGXjjIwQGthknUjnQEl.exe
GET
200
208.95.112.1:80
http://ip-api.com/json
unknown
whitelisted
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
208.95.112.1:80
http://ip-api.com/json
unknown
whitelisted
GET
200
2.16.164.72:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7000
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
5528
qKcVOgxGXjjIwQGthknUjnQEl.exe
GET
200
208.95.112.1:80
http://ip-api.com/json
unknown
whitelisted
5528
qKcVOgxGXjjIwQGthknUjnQEl.exe
GET
200
208.95.112.1:80
http://ip-api.com/json
unknown
whitelisted
5528
qKcVOgxGXjjIwQGthknUjnQEl.exe
GET
200
208.95.112.1:80
http://ip-api.com/json
unknown
whitelisted
6652
BackgroundTransferHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1072
SIHClient.exe
GET
200
92.123.22.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2.16.164.72:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
20.198.162.76:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
SG
whitelisted
6544
svchost.exe
40.126.32.140:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
2112
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7000
backgroundTaskHost.exe
20.31.169.57:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.104.136.2
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 2.16.164.72
  • 2.16.164.120
whitelisted
google.com
  • 172.217.18.14
whitelisted
client.wns.windows.com
  • 20.198.162.76
whitelisted
login.live.com
  • 40.126.32.140
  • 20.190.160.22
  • 40.126.32.76
  • 40.126.32.134
  • 20.190.160.4
  • 20.190.160.65
  • 20.190.160.14
  • 20.190.160.20
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
arc.msn.com
  • 20.31.169.57
whitelisted
ip-api.com
  • 208.95.112.1
whitelisted
dns.google
  • 8.8.4.4
  • 8.8.8.8
whitelisted
www.bing.com
  • 104.126.37.130
  • 104.126.37.123
  • 104.126.37.145
  • 104.126.37.139
  • 104.126.37.146
  • 104.126.37.129
  • 104.126.37.131
  • 104.126.37.144
  • 104.126.37.154
whitelisted

Threats

PID
Process
Class
Message
5528
qKcVOgxGXjjIwQGthknUjnQEl.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup ip-api.com
5528
qKcVOgxGXjjIwQGthknUjnQEl.exe
A Network Trojan was detected
ET USER_AGENTS Suspicious User-Agent (Clever Internet Suite)
2196
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
2196
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
5528
qKcVOgxGXjjIwQGthknUjnQEl.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup ip-api.com
5528
qKcVOgxGXjjIwQGthknUjnQEl.exe
A Network Trojan was detected
ET USER_AGENTS Suspicious User-Agent (Clever Internet Suite)
5528
qKcVOgxGXjjIwQGthknUjnQEl.exe
A Network Trojan was detected
ET USER_AGENTS Suspicious User-Agent (Clever Internet Suite)
5528
qKcVOgxGXjjIwQGthknUjnQEl.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup ip-api.com
5528
qKcVOgxGXjjIwQGthknUjnQEl.exe
A Network Trojan was detected
ET USER_AGENTS Suspicious User-Agent (Clever Internet Suite)
5528
qKcVOgxGXjjIwQGthknUjnQEl.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup ip-api.com
No debug info