File name:

6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe

Full analysis: https://app.any.run/tasks/1feae871-476c-4736-8b5b-693b7d5cf699
Verdict: Malicious activity
Threats:

A backdoor is a type of cybersecurity threat that allows attackers to secretly compromise a system and conduct malicious activities, such as stealing data and modifying files. Backdoors can be difficult to detect, as they often use legitimate system applications to evade defense mechanisms. Threat actors often utilize special malware, such as PlugX, to establish backdoors on target devices.

Analysis date: June 28, 2025, 10:14:37
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
python
payload
silverfox
backdoor
loader
uac
pyinstaller
valleyrat
winos
rat
arch-exec
advancedinstaller
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

39A27D859ECA3100263E76888BFBF34D

SHA1:

3B55F3C40FDD98ADE7E6736852410871F7D18327

SHA256:

6490A19D1B236722F4560E3C59722B16319FF3B4A425897B4C513F6AC8A7524C

SSDEEP:

98304:2C3CpA11ybhbLylu/ZUmTv4O+kzK/7ueSnKHddLO0Aq+a2kY/wUGIjgC/TJLKTnw:DTdw/881mwLNuEmxZVjg

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • SILVERFOX has been detected (SURICATA)

      • explorer.exe (PID: 4772)
      • colorcpl.exe (PID: 2696)
    • Bypass User Account Control (ComputerDefaults)

      • ComputerDefaults.exe (PID: 6284)
    • Runs injected code in another process

      • msiexec.exe (PID: 888)
    • Application was injected by another process

      • explorer.exe (PID: 4772)
    • Connects to the CnC server

      • explorer.exe (PID: 4772)
      • colorcpl.exe (PID: 2696)
    • Changes the autorun value in the registry

      • explorer.exe (PID: 4772)
      • colorcpl.exe (PID: 2696)
    • VALLEYRAT has been detected

      • colorcpl.exe (PID: 2696)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe (PID: 2076)
      • 6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe (PID: 3872)
      • colorcpl.exe (PID: 2696)
      • explorer.exe (PID: 4772)
    • Process drops python dynamic module

      • 6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe (PID: 2076)
    • Process drops legitimate windows executable

      • 6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe (PID: 2076)
    • The process drops C-runtime libraries

      • 6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe (PID: 2076)
    • Application launched itself

      • 6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe (PID: 2076)
      • msiexec.exe (PID: 5008)
    • Loads Python modules

      • 6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe (PID: 3872)
    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 888)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 5008)
    • Contacting a server suspected of hosting an CnC

      • explorer.exe (PID: 4772)
      • colorcpl.exe (PID: 2696)
    • There is functionality for taking screenshot (YARA)

      • 6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe (PID: 3872)
      • 6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe (PID: 2076)
    • Detects AdvancedInstaller (YARA)

      • msiexec.exe (PID: 5008)
    • Searches for installed software

      • explorer.exe (PID: 4772)
      • colorcpl.exe (PID: 2696)
    • Connects to the server without a host name

      • explorer.exe (PID: 4772)
      • colorcpl.exe (PID: 2696)
    • Process requests binary or script from the Internet

      • explorer.exe (PID: 4772)
      • colorcpl.exe (PID: 2696)
    • Connects to unusual port

      • explorer.exe (PID: 4772)
      • colorcpl.exe (PID: 2696)
    • Potential Corporate Privacy Violation

      • explorer.exe (PID: 4772)
      • colorcpl.exe (PID: 2696)
    • The process verifies whether the antivirus software is installed

      • explorer.exe (PID: 4772)
      • colorcpl.exe (PID: 2696)
  • INFO

    • Reads the computer name

      • 6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe (PID: 2076)
      • 6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe (PID: 3872)
      • msiexec.exe (PID: 5008)
      • msiexec.exe (PID: 888)
      • msiexec.exe (PID: 2292)
    • Create files in a temporary directory

      • 6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe (PID: 2076)
      • 6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe (PID: 3872)
    • The sample compiled with english language support

      • 6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe (PID: 2076)
      • msiexec.exe (PID: 5008)
    • Checks supported languages

      • 6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe (PID: 2076)
      • 6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe (PID: 3872)
      • msiexec.exe (PID: 888)
      • msiexec.exe (PID: 2292)
      • msiexec.exe (PID: 5008)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 5008)
    • Creates files or folders in the user directory

      • msiexec.exe (PID: 5008)
      • msiexec.exe (PID: 888)
    • Checks proxy server information

      • msiexec.exe (PID: 888)
      • explorer.exe (PID: 4772)
      • colorcpl.exe (PID: 2696)
    • Reads the machine GUID from the registry

      • msiexec.exe (PID: 888)
    • Reads the software policy settings

      • msiexec.exe (PID: 888)
    • Reads Environment values

      • msiexec.exe (PID: 2292)
    • Reads security settings of Internet Explorer

      • explorer.exe (PID: 4772)
      • colorcpl.exe (PID: 2696)
    • PyInstaller has been detected (YARA)

      • 6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe (PID: 2076)
      • 6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe (PID: 3872)
    • Creates files in the program directory

      • explorer.exe (PID: 4772)
      • colorcpl.exe (PID: 2696)
    • Launching a file from a Registry key

      • explorer.exe (PID: 4772)
      • colorcpl.exe (PID: 2696)
    • The sample compiled with chinese language support

      • colorcpl.exe (PID: 2696)
      • explorer.exe (PID: 4772)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | InstallShield setup (57.6)
.exe | Win64 Executable (generic) (36.9)
.exe | Generic Win/DOS Executable (2.6)
.exe | DOS Executable Generic (2.6)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:06:23 00:37:42+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.43
CodeSize: 174592
InitializedDataSize: 157184
UninitializedDataSize: -
EntryPoint: 0xd0d0
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
147
Monitored processes
11
Malicious processes
5
Suspicious processes
1

Behavior graph

Click at the process to see the details
start 6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe 6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe msiexec.exe no specs msiexec.exe msiexec.exe no specs msiexec.exe #SILVERFOX explorer.exe winver.exe no specs computerdefaults.exe #SILVERFOX colorcpl.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
888C:\Windows\System32\MsiExec.exe -Embedding AADD53499ED4F03597C797147C0CA20EC:\Windows\System32\msiexec.exe
msiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1984C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2076"C:\Users\admin\AppData\Local\Temp\6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe" C:\Users\admin\AppData\Local\Temp\6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
2292C:\Windows\syswow64\MsiExec.exe -Embedding A5AE4739F5DC144D1782E9845679F496C:\Windows\SysWOW64\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
2696C:\Windows\System32\colorcpl.exeC:\Windows\System32\colorcpl.exe
ComputerDefaults.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Color Control Panel
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\colorcpl.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\colorui.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
3584C:\WINDOWS\system32\winver.exeC:\Windows\System32\winver.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Version Reporter Applet
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\winver.exe
c:\windows\system32\ntdll.dll
3756msiexec /i C:\Users\admin\AppData\Local\Temp\tmpmtemjhtt\setup.msi /quiet /norestartC:\Windows\System32\msiexec.exe6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
3872"C:\Users\admin\AppData\Local\Temp\6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe" C:\Users\admin\AppData\Local\Temp\6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe
6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
4772C:\WINDOWS\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\shcore.dll
5008C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
Total events
3 878
Read events
3 816
Write events
45
Delete events
17

Modification events

(PID) Process:(5008) msiexec.exeKey:HKEY_USERS\S-1-5-21-1693682860-607145093-2874071422-1001\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Owner
Value:
90130000A3D6137815E8DB01
(PID) Process:(5008) msiexec.exeKey:HKEY_USERS\S-1-5-21-1693682860-607145093-2874071422-1001\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:SessionHash
Value:
3250D8D4688BCF562CA42E928CFDDE6300B183D1A9528C559247F5ACF9B7B686
(PID) Process:(5008) msiexec.exeKey:HKEY_USERS\S-1-5-21-1693682860-607145093-2874071422-1001\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Sequence
Value:
1
(PID) Process:(5008) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
Operation:writeName:C:\Config.Msi\
Value:
(PID) Process:(5008) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
Operation:writeName:C:\Config.Msi\175536.rbs
Value:
31189013
(PID) Process:(5008) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
Operation:writeName:C:\Config.Msi\175536.rbsLow
Value:
(PID) Process:(5008) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
Operation:writeName:C:\Users\admin\AppData\Roaming\Microsoft\Installer\
Value:
(PID) Process:(5008) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-1693682860-607145093-2874071422-1001\Components\D70586E5B837E4E4F8B914511DDC9F75
Operation:writeName:C325EE30E79D5A844B73D05B2D9A5B46
Value:
C:\Users\admin\AppData\Roaming\Setup\Setup\
(PID) Process:(5008) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-1693682860-607145093-2874071422-1001\Components\7A351B9CFFC2F034FA13676A66DA051E
Operation:writeName:C325EE30E79D5A844B73D05B2D9A5B46
Value:
01:\Software\Setup\Setup\Version
(PID) Process:(5008) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-1693682860-607145093-2874071422-1001\Components\EDA8B2A7860E42A43ACAF6D60A467759
Operation:writeName:C325EE30E79D5A844B73D05B2D9A5B46
Value:
C:\Users\admin\AppData\Roaming\Setup\Setup\gb.dll
Executable files
60
Suspicious files
21
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
20766490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exeC:\Users\admin\AppData\Local\Temp\_MEI20762\_bz2.pydexecutable
MD5:51CA0713F8FD5F142625A44DF7ED7100
SHA256:8768315B1E0E81CCD0D96C3D6A863803F5DD1DE6AF849285C439D61ABD32B647
20766490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exeC:\Users\admin\AppData\Local\Temp\_MEI20762\VCRUNTIME140.dllexecutable
MD5:32DA96115C9D783A0769312C0482A62D
SHA256:8B10C53241726B0ACC9F513157E67FCB01C166FEC69E5E38CA6AADA8F9A3619F
20766490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exeC:\Users\admin\AppData\Local\Temp\_MEI20762\api-ms-win-core-file-l1-1-0.dllexecutable
MD5:BCC620DCC9A3A9DFD38663A971B7044B
SHA256:F73000652CA7CA7468CA6134663C99CBAF7BD97740BDBDD5D1E1E23CCFD5DB75
20766490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exeC:\Users\admin\AppData\Local\Temp\_MEI20762\api-ms-win-core-console-l1-1-0.dllexecutable
MD5:1BEBD9B65ED18B680F7E39BEF09FE6CE
SHA256:E756F6970905657CF73ECB3F57BAE55A67BE29AFA75AE4D16046B0F7229708EB
20766490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exeC:\Users\admin\AppData\Local\Temp\_MEI20762\api-ms-win-core-file-l1-2-0.dllexecutable
MD5:8AD4771E23185CB7672F71EC16C580CF
SHA256:B153FF5D667C8297776F21C5F440CFF28C3E3A5B1F748FD4700306E1FB283ED8
20766490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exeC:\Users\admin\AppData\Local\Temp\_MEI20762\api-ms-win-core-errorhandling-l1-1-0.dllexecutable
MD5:A538B281F8E84CECDAC507C73A43D744
SHA256:45AFAF08D1CD7E43AC5DED47ED5FD708B86E835A9470C81E8130ED6955B84DB8
20766490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exeC:\Users\admin\AppData\Local\Temp\_MEI20762\api-ms-win-core-libraryloader-l1-1-0.dllexecutable
MD5:2A2E22F35B83AAB6DB3D7B27C5AF1953
SHA256:425E4EBEE71347295E36776D415611D451E2A51B451DF57DA23ED8F8FB4664E8
20766490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exeC:\Users\admin\AppData\Local\Temp\_MEI20762\api-ms-win-core-heap-l1-1-0.dllexecutable
MD5:CDD1EF7807185EEEE2D5AC3BAE51BDD5
SHA256:6D14B49E8E21DE08B9FA778F15C259DBD4FEB9B54EB628D69BD50E5C86AA65A5
20766490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exeC:\Users\admin\AppData\Local\Temp\_MEI20762\api-ms-win-core-handle-l1-1-0.dllexecutable
MD5:517B80A416198DCFC9A1572625819506
SHA256:2783B85D98F4A92FAF67A94FC04E9C2F6786627949984828D14DEAB1682BBE3F
20766490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exeC:\Users\admin\AppData\Local\Temp\_MEI20762\api-ms-win-core-fibers-l1-1-0.dllexecutable
MD5:824A1932C5C58891152AE1DE02EEF652
SHA256:3082B0E09DFAC27233B6DF097EE0C9A45D395ADEADC0026B157106424EA98389
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
16
TCP/UDP connections
34
DNS requests
22
Threats
38

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
888
msiexec.exe
GET
200
104.18.20.226:80
http://ocsp2.globalsign.com/rootr3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBT1nGh%2FJBjWKnkPdZIzB1bqhelHBwQUj%2FBLf6guRSSuTVD6Y5qL3uLdG7wCEQCB5auY5G81uRwv%2BheHGMha
unknown
whitelisted
888
msiexec.exe
GET
200
104.18.20.226:80
http://ocsp.globalsign.com/rootr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCDQHuXxad%2F5c1K2Rl1mo%3D
unknown
whitelisted
888
msiexec.exe
GET
200
104.18.20.226:80
http://ocsp.globalsign.com/gsgccr3ovtlsca2024/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBT%2BeHEVW1om2JjNh%2BetTEbfp%2BiVWQQU2tOoCEgMNDdY7uWndS5Z%2FNbcPDgCDGqKmk54oRJv16NLcw%3D%3D
unknown
whitelisted
1268
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1268
svchost.exe
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2552
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4772
explorer.exe
GET
200
8.134.199.119:80
http://8.134.199.119/dll.txt
unknown
malicious
4772
explorer.exe
GET
200
8.134.199.119:80
http://8.134.199.119/regname.txt
unknown
malicious
4772
explorer.exe
GET
200
8.134.199.119:80
http://8.134.199.119/wj/yjwjhr.zip
unknown
malicious
4772
explorer.exe
GET
200
8.134.199.119:80
http://8.134.199.119/wj/yjwj.exe
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
1520
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5944
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
888
msiexec.exe
8.138.53.61:443
gbcode.oss-cn-guangzhou.aliyuncs.com
SG
unknown
888
msiexec.exe
104.18.20.226:80
ocsp.globalsign.com
CLOUDFLARENET
whitelisted
4772
explorer.exe
47.238.152.36:7777
gb.epkogtzxs.cn
US
malicious
1268
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1268
svchost.exe
2.16.168.114:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
  • 40.127.240.158
whitelisted
google.com
  • 142.250.186.142
whitelisted
gbcode.oss-cn-guangzhou.aliyuncs.com
  • 8.138.53.61
unknown
ocsp.globalsign.com
  • 104.18.20.226
  • 104.18.21.226
whitelisted
ocsp2.globalsign.com
  • 104.18.20.226
  • 104.18.21.226
whitelisted
gb.epkogtzxs.cn
  • 47.238.152.36
unknown
crl.microsoft.com
  • 2.16.168.114
  • 2.16.168.124
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 184.30.21.171
whitelisted
login.live.com
  • 40.126.32.138
  • 20.190.160.22
  • 40.126.32.140
  • 20.190.160.132
  • 40.126.32.136
  • 20.190.160.66
  • 20.190.160.65
  • 20.190.160.131
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted

Threats

PID
Process
Class
Message
2200
svchost.exe
Misc activity
ET INFO DNS Query to Alibaba Cloud CDN Domain (aliyuncs .com)
888
msiexec.exe
Misc activity
ET INFO Observed Alibaba Cloud CDN Domain (aliyuncs .com in TLS SNI)
4772
explorer.exe
A Network Trojan was detected
ET MALWARE Win32/ProcessKiller CnC Initialization M2
4772
explorer.exe
Potentially Bad Traffic
PAYLOAD [ANY.RUN] XORed Windows executable has been loaded
4772
explorer.exe
Potentially Bad Traffic
PAYLOAD [ANY.RUN] XORed Windows executable has been loaded
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
4772
explorer.exe
Malware Command and Control Activity Detected
ET MALWARE Winos4.0 Framework CnC Login Message
4772
explorer.exe
Malware Command and Control Activity Detected
BACKDOOR [ANY.RUN] SilverFox TCP Init Packet
4772
explorer.exe
Malware Command and Control Activity Detected
ET MALWARE Winos4.0 Framework CnC Login Message CnC Server Response
4772
explorer.exe
Malware Command and Control Activity Detected
BACKDOOR [ANY.RUN] SilverFox Encrypted Client Packet
No debug info