File name:

locksystem.exe

Full analysis: https://app.any.run/tasks/7347fa37-1fb1-4c14-94e1-fad4e338dfcf
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: July 09, 2024, 17:29:24
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
susp-powershell
ransomware
Indicators:
MIME: application/x-dosexec
File info: PE32+ executable (console) x86-64, for MS Windows
MD5:

667B3DB774BB33D876E637BFCA19A0FA

SHA1:

2F596E9711C157F49A0A233DFCC23196A719B8A3

SHA256:

67ED147F0EBAFB0391627D1C22B7666387B3C1693C5D8E9A590AF3C89DF0EF44

SSDEEP:

49152:M6HBuAYhUYLsV/b66066dTQ98rqqII+ke5F:9YwpeqqII+ke5F

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • locksystem.exe (PID: 2204)
      • csc.exe (PID: 2968)
    • Run PowerShell with an invisible window

      • powershell.exe (PID: 936)
      • powershell.exe (PID: 6708)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 936)
      • powershell.exe (PID: 6708)
    • Changes powershell execution policy (Bypass)

      • cmd.exe (PID: 5420)
      • powershell.exe (PID: 936)
    • Gets or sets the symmetric key that is used for encryption and decryption (POWERSHELL)

      • powershell.exe (PID: 936)
    • Gets or sets the initialization vector for the symmetric algorithm (POWERSHELL)

      • powershell.exe (PID: 936)
    • Uses AES cipher (POWERSHELL)

      • powershell.exe (PID: 936)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • locksystem.exe (PID: 2204)
    • Base64-obfuscated command line is found

      • cmd.exe (PID: 5420)
    • Starts POWERSHELL.EXE for commands execution

      • powershell.exe (PID: 936)
      • cmd.exe (PID: 5420)
    • BASE64 encoded PowerShell command has been detected

      • cmd.exe (PID: 5420)
    • Application launched itself

      • powershell.exe (PID: 936)
    • Gets or sets the security protocol (POWERSHELL)

      • powershell.exe (PID: 936)
    • Creates files like ransomware instruction

      • powershell.exe (PID: 936)
    • Executable content was dropped or overwritten

      • csc.exe (PID: 2968)
    • Uses base64 encoding (POWERSHELL)

      • powershell.exe (PID: 936)
  • INFO

    • Checks supported languages

      • locksystem.exe (PID: 2204)
      • csc.exe (PID: 2968)
      • cvtres.exe (PID: 1120)
    • Create files in a temporary directory

      • locksystem.exe (PID: 2204)
      • csc.exe (PID: 2968)
      • cvtres.exe (PID: 1120)
    • Found Base64 encoded text manipulation via PowerShell (YARA)

      • locksystem.exe (PID: 2204)
    • Found Base64 encoded network access via PowerShell (YARA)

      • locksystem.exe (PID: 2204)
    • Found Base64 encoded file access via PowerShell (YARA)

      • locksystem.exe (PID: 2204)
    • Disables trace logs

      • powershell.exe (PID: 936)
    • Found Base64 encoded reflection usage via PowerShell (YARA)

      • locksystem.exe (PID: 2204)
    • Checks proxy server information

      • powershell.exe (PID: 936)
    • Found Base64 encoded access to BitConverter class via PowerShell (YARA)

      • locksystem.exe (PID: 2204)
    • Reads the machine GUID from the registry

      • csc.exe (PID: 2968)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 936)
    • Manual execution by a user

      • notepad.exe (PID: 5464)
      • notepad.exe (PID: 3932)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 5464)
      • notepad.exe (PID: 3932)
    • Found Base64 encoded access to Marshal class via PowerShell (YARA)

      • locksystem.exe (PID: 2204)
    • Found Base64 encoded encryption-related PowerShell classes (YARA)

      • locksystem.exe (PID: 2204)
    • Gets data length (POWERSHELL)

      • powershell.exe (PID: 936)
    • Uses string replace method (POWERSHELL)

      • powershell.exe (PID: 936)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.2)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:07:09 17:28:17+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, Large address aware
PEType: PE32+
LinkerVersion: 2.24
CodeSize: 462336
InitializedDataSize: 790016
UninitializedDataSize: 6144
EntryPoint: 0x1500
OSVersion: 4
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
139
Monitored processes
9
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start THREAT locksystem.exe no specs conhost.exe no specs cmd.exe no specs powershell.exe powershell.exe no specs csc.exe cvtres.exe no specs notepad.exe no specs notepad.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
244\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exelocksystem.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
936powershell -ExecutionPolicy Bypass -win hidden -e JABjAG8AbQBtAGEAbgBkAD0AZwBjACAAJABlAG4AdgA6AHQAbQBwAFwAXABNAGkAYwByAG8AcwBvAGYAdABTAGUAcgB2AGkAYwBlAEMAcgBlAGEAdABpAG8AbgAuAHAAcwAxAA0ACgBbAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBuAGkAYwBvAGQAZQAuAEcAZQB0AFMAdAByAGkAbgBnACgAWwBDAG8AbgB2AGUAcgB0AF0AOgA6AEYAcgBvAG0AQgBhAHMAZQA2ADQAUwB0AHIAaQBuAGcAKAAkAGMAbwBtAG0AYQBuAGQAKQApACAAfAAgAGkAZQB4AA==C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
1120C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RES2964.tmp" "c:\Users\admin\AppData\Local\Temp\CSCDF01E716FA7C498FABFEB11F3A5C11D5.TMP"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
14.32.31326.0
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\cvtres.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\vcruntime140_1_clr0400.dll
2204"C:\Users\admin\AppData\Local\Temp\locksystem.exe" C:\Users\admin\AppData\Local\Temp\locksystem.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\locksystem.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
2968"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\onmfpkue.cmdline"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
powershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\csc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ole32.dll
3932"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\Read_Me_Encrypted.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
5420C:\WINDOWS\system32\cmd.exe /c cd %temp% && powershell -ExecutionPolicy Bypass -win hidden -e JABjAG8AbQBtAGEAbgBkAD0AZwBjACAAJABlAG4AdgA6AHQAbQBwAFwAXABNAGkAYwByAG8AcwBvAGYAdABTAGUAcgB2AGkAYwBlAEMAcgBlAGEAdABpAG8AbgAuAHAAcwAxAA0ACgBbAFQAZQB4AHQALgBFAG4AYwBvAGQAaQBuAGcAXQA6ADoAVQBuAGkAYwBvAGQAZQAuAEcAZQB0AFMAdAByAGkAbgBnACgAWwBDAG8AbgB2AGUAcgB0AF0AOgA6AEYAcgBvAG0AQgBhAHMAZQA2ADQAUwB0AHIAaQBuAGcAKAAkAGMAbwBtAG0AYQBuAGQAKQApACAAfAAgAGkAZQB4AA==C:\Windows\System32\cmd.exelocksystem.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
5464"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\Read_Me_Encrypted.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
6708"C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy bypass -win hidden -c echo I Am RunningC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
16 257
Read events
16 243
Write events
14
Delete events
0

Modification events

(PID) Process:(936) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(936) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(936) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(936) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(936) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(936) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(936) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(936) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(936) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(936) powershell.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
1
Suspicious files
264
Text files
10
Unknown types
0

Dropped files

PID
Process
Filename
Type
2204locksystem.exeC:\Users\admin\AppData\Local\Temp\MicrosoftServiceCreation.ps1text
MD5:217E98B850FC355FF6745DA692CA3365
SHA256:3145464A0E496AAFE40BF05EA421985BFCAF242CD08FF208CAB11E508C82B1F4
936powershell.exeC:\Users\admin\Desktop\aborn.png..LOCKSYSTEMbinary
MD5:24747FA11D47E685D346ED050D56515A
SHA256:685C8EBECEC5773F4C34D2B0A07521C34A417F5AE75857646156E8BC969BF8E9
936powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_iznjq2fr.vgn.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
936powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_imrsci0y.4rj.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
936powershell.exeC:\Users\admin\Desktop\loanduring.rtf..LOCKSYSTEMbinary
MD5:DAE40EC931250577D8E84B593F475A79
SHA256:FCD41FF4294F2983DE45022B615D8AF602DBE19B28D3E4AD421DBCE88BE0BE7B
936powershell.exeC:\Users\admin\AppData\Local\Temp\image_cg.jpgimage
MD5:0D65D002A9948F2D9E96312D100D05CD
SHA256:C158F0E4C90837B93D5B6E498DB6737F56A5AA020EC38D0ECC9DD7E47D731C1F
936powershell.exeC:\Users\admin\Desktop\aidhard.png..LOCKSYSTEMbinary
MD5:C53A42B1F1ED9695C508EC12A909AB87
SHA256:827CB85993482846E146AF8CBB8123082F8B1D2533DB90DB5C0C608242BB1DD4
6708powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_21do1wkg.gil.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6708powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_00vly1rk.nlo.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
6708powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:7421CE7FEA242E7E80D8819932334003
SHA256:20CF238F50F6805F88F9E451CF18ACBBAB029BC7B34BBC480581F22886715BF5
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
30
DNS requests
11
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
unknown
6360
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
unknown
4152
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
unknown
4152
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1972
svchost.exe
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
2052
RUXIMICS.exe
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6004
svchost.exe
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4032
svchost.exe
239.255.255.250:1900
whitelisted
20.190.159.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
104.126.37.136:443
www.bing.com
Akamai International B.V.
DE
unknown
1060
svchost.exe
23.35.238.131:443
go.microsoft.com
AKAMAI-AS
DE
unknown
3040
OfficeClickToRun.exe
52.111.243.31:443
nexusrules.officeapps.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
192.229.221.95:80
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
login.live.com
  • 20.190.159.71
  • 20.190.159.4
  • 20.190.159.0
  • 20.190.159.64
  • 40.126.31.71
  • 20.190.159.68
  • 40.126.31.67
  • 40.126.31.73
whitelisted
www.bing.com
  • 104.126.37.136
  • 104.126.37.128
  • 104.126.37.185
  • 104.126.37.138
  • 104.126.37.171
  • 104.126.37.153
  • 104.126.37.177
  • 104.126.37.129
  • 104.126.37.139
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted
nexusrules.officeapps.live.com
  • 52.111.243.31
whitelisted
i.ibb.co.com
  • 162.19.58.159
  • 162.19.58.161
  • 162.19.58.158
  • 162.19.58.157
  • 162.19.58.160
  • 162.19.58.156
unknown
arc.msn.com
  • 20.223.35.26
whitelisted
slscr.update.microsoft.com
  • 40.127.169.103
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

PID
Process
Class
Message
936
powershell.exe
Not Suspicious Traffic
INFO [ANY.RUN] Image hosting service ImgBB
No debug info