| File name: | Nurik.exe |
| Full analysis: | https://app.any.run/tasks/9a58fd07-9ce7-4e83-94e9-b1422f5c3c0e |
| Verdict: | Malicious activity |
| Threats: | DCrat, also known as Dark Crystal RAT, is a remote access trojan (RAT), which was first introduced in 2018. It is a modular malware that can be customized to perform different tasks. For instance, it can steal passwords, crypto wallet information, hijack Telegram and Steam accounts, and more. Attackers may use a variety of methods to distribute DCrat, but phishing email campaigns are the most common. |
| Analysis date: | April 05, 2025, 11:11:36 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections |
| MD5: | 6285A4AC33D0CA8703E199AB387BC1A5 |
| SHA1: | CA0542E5A066E1F4D4F871765ED6F0F0BA900D7B |
| SHA256: | 6DE483569C96166C4830BC0AC256FB31975A43D9AF1443F0E3E31FF31BA89F30 |
| SSDEEP: | 24576:HZPrK87M5rSv0lvPZYEI1+eI3GMHFG2agd6a01Iaq/W6C:HFrKj5G0lvhYQv3x6a0aaq/W6C |
| .exe | | | Win32 Executable (generic) (52.9) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (23.5) |
| .exe | | | DOS Executable Generic (23.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2020:12:01 18:00:55+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 14 |
| CodeSize: | 201216 |
| InitializedDataSize: | 255488 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x1ec40 |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 496 | schtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Chainproviderhost\OfficeClickToRun.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Task Scheduler Configuration Tool Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 516 | C:\WINDOWS\system32\cmd.exe /c ""C:\Chainproviderhost\D1lhFc.bat" " | C:\Windows\SysWOW64\cmd.exe | — | wscript.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 536 | schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Chainproviderhost\RuntimeBroker.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Task Scheduler Configuration Tool Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 536 | schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 7 /tr "'C:\Chainproviderhost\upfc.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Task Scheduler Configuration Tool Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 616 | "C:\Users\admin\AppData\Local\Temp\Nurik.exe" | C:\Users\admin\AppData\Local\Temp\Nurik.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 732 | schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 6 /tr "'C:\Chainproviderhost\dwm.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Task Scheduler Configuration Tool Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 744 | schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 10 /tr "'C:\Chainproviderhost\backgroundTaskHost.exe'" /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 812 | schtasks.exe /create /tn "bridgeserverBrowser" /sc ONLOGON /tr "'C:\Users\Default\Saved Games\bridgeserverBrowser.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Task Scheduler Configuration Tool Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 976 | schtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Chainproviderhost\backgroundTaskHost.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Task Scheduler Configuration Tool Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1012 | schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 6 /tr "'C:\Users\admin\3D Objects\conhost.exe'" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | WmiPrvSE.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Task Scheduler Configuration Tool Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (616) Nurik.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbe\OpenWithProgids |
| Operation: | write | Name: | VBEFile |
Value: | |||
| (PID) Process: | (5720) bridgeserverBrowser.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\3eeefbeda899c7772fa16b4834d96d3cdde52901 |
| Operation: | write | Name: | 13b5c2b2b60dd962f3b78122db7efc526c6d9abd |
Value: WyJDOlxcQ2hhaW5wcm92aWRlcmhvc3RcXGJyaWRnZXNlcnZlckJyb3dzZXIuZXhlIiwiQzpcXENoYWlucHJvdmlkZXJob3N0XFx3aW5pbml0LmV4ZSIsIkM6XFxDaGFpbnByb3ZpZGVyaG9zdFxcUnVudGltZUJyb2tlci5leGUiLCJDOlxcQ2hhaW5wcm92aWRlcmhvc3RcXGJhY2tncm91bmRUYXNrSG9zdC5leGUiLCJDOlxcQ2hhaW5wcm92aWRlcmhvc3RcXGRsbGhvc3QuZXhlIiwiQzpcXENoYWlucHJvdmlkZXJob3N0XFxkd20uZXhlIiwiQzpcXENoYWlucHJvdmlkZXJob3N0XFxNdXNOb3RpZmljYXRpb24uZXhlIiwiQzpcXENoYWlucHJvdmlkZXJob3N0XFx0YXNraG9zdHcuZXhlIiwiQzpcXFVzZXJzXFxEZWZhdWx0XFxGYXZvcml0ZXNcXFN5c3RlbVNldHRpbmdzLmV4ZSIsIkM6XFxVc2Vyc1xcYWRtaW5cXDNEIE9iamVjdHNcXGNvbmhvc3QuZXhlIiwiQzpcXENoYWlucHJvdmlkZXJob3N0XFxPZmZpY2VDbGlja1RvUnVuLmV4ZSIsIkM6XFxVc2Vyc1xcUHVibGljXFxWaWRlb3NcXHNpaG9zdC5leGUiLCJDOlxcV2luZG93c1xcVGVtcFxcYXVkaW9kZy5leGUiLCJDOlxcQ2hhaW5wcm92aWRlcmhvc3RcXHVwZmMuZXhlIiwiQzpcXFVzZXJzXFxEZWZhdWx0XFxNdXNpY1xcY3RmbW9uLmV4ZSIsIkM6XFxDaGFpbnByb3ZpZGVyaG9zdFxcZHdtLmV4ZSIsIkM6XFxDaGFpbnByb3ZpZGVyaG9zdFxcU3RhcnRNZW51RXhwZXJpZW5jZUhvc3QuZXhlIiwiQzpcXFVzZXJzXFxEZWZhdWx0XFxTYXZlZCBHYW1lc1xcYnJpZGdlc2VydmVyQnJvd3Nlci5leGUiLCJDOlxcQ2hhaW5wcm92aWRlcmhvc3RcXGNzcnNzLmV4ZSJd | |||
| (PID) Process: | (3268) upfc.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\upfc_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (3268) upfc.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\upfc_RASAPI32 |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (3268) upfc.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\upfc_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (3268) upfc.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\upfc_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (3268) upfc.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\upfc_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
| (PID) Process: | (3268) upfc.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\upfc_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (3268) upfc.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\upfc_RASAPI32 |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
| (PID) Process: | (3268) upfc.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\upfc_RASMANCS |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 5720 | bridgeserverBrowser.exe | C:\Chainproviderhost\backgroundTaskHost.exe | executable | |
MD5:FAE90016E2E07804EA1198833B8767EB | SHA256:E9371712DF288B3A83C54EA65A2D1B7A5703FE03DAD77816F5E7B4324A2F92CF | |||
| 5720 | bridgeserverBrowser.exe | C:\Chainproviderhost\wininit.exe | executable | |
MD5:FAE90016E2E07804EA1198833B8767EB | SHA256:E9371712DF288B3A83C54EA65A2D1B7A5703FE03DAD77816F5E7B4324A2F92CF | |||
| 616 | Nurik.exe | C:\Chainproviderhost\D1lhFc.bat | text | |
MD5:C8DE58F7423C160A925133CF4453B7A3 | SHA256:288AB26FDF73DC60FB46AC2793B9201C712836595032759FE1DC0DF35582E430 | |||
| 5720 | bridgeserverBrowser.exe | C:\Chainproviderhost\56085415360792 | text | |
MD5:73DDD74F91D1531FD3592E0B4B2B5A8B | SHA256:6FE5BE344811E031FDCB1F8DA17697A12E9D9338D8C3A6232ED530946195B0EC | |||
| 5720 | bridgeserverBrowser.exe | C:\Chainproviderhost\9e8d7a4ca61bd9 | text | |
MD5:BE340F07F527F50B5B74805D98E8821A | SHA256:72067B5506883ACEEDF6095CCA27D3885CCE77FD32C0D9ACC0080E62F772BCD9 | |||
| 5720 | bridgeserverBrowser.exe | C:\Chainproviderhost\6cb0b6c459d5d3 | text | |
MD5:D363B25112A6A669ACDF6773C4F37D38 | SHA256:C996F925F8AE3C4DF13D7C0F197C1D6AC090782A40502BA777610D83FE26D2CE | |||
| 5720 | bridgeserverBrowser.exe | C:\Chainproviderhost\RuntimeBroker.exe | executable | |
MD5:FAE90016E2E07804EA1198833B8767EB | SHA256:E9371712DF288B3A83C54EA65A2D1B7A5703FE03DAD77816F5E7B4324A2F92CF | |||
| 5720 | bridgeserverBrowser.exe | C:\Chainproviderhost\eddb19405b7ce1 | text | |
MD5:89D071CF882FE04669D60D157945DF2A | SHA256:B41875A9C7634C43AEFA58444905485A20FB132F262800FC907425994308999F | |||
| 5720 | bridgeserverBrowser.exe | C:\Chainproviderhost\dllhost.exe | executable | |
MD5:FAE90016E2E07804EA1198833B8767EB | SHA256:E9371712DF288B3A83C54EA65A2D1B7A5703FE03DAD77816F5E7B4324A2F92CF | |||
| 616 | Nurik.exe | C:\Chainproviderhost\44W6qETNWO8.vbe | binary | |
MD5:4A1B870A1892429AE4FAFF6C096FB552 | SHA256:64217936697CDBBE3FBD32A3EA3CF893CFB548EEC291F4EF38A24F5CEE8D3783 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
6544 | svchost.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
— | — | GET | 200 | 23.216.77.28:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
3268 | upfc.exe | GET | 200 | 5.101.152.39:80 | http://ilaila5b.beget.tech/L1nc0In.php?BPcuA4Zk5=6EZLwzcbqBk&NB8EPy5IE35CHIJ2pEG78sGMWXsf=5htpHCaw5olpwODIXEopkvm4m4f5vr&FZKIVLX9GtFuZfSLdDE9TE0XJ5zC=gfANwgPm&eb3e02aafb758aeb9a90c47bc15537b9=16a43f536c3fe0b2ac4d3b3192be64d2&88eb947e6952cd9a1c902d41737c10e1=QYhJmY0IDZ4UTZlVDOkdDZ3EmMzIDNlJzNkJGZjJDOzU2M5UGMxMmY&BPcuA4Zk5=6EZLwzcbqBk&NB8EPy5IE35CHIJ2pEG78sGMWXsf=5htpHCaw5olpwODIXEopkvm4m4f5vr&FZKIVLX9GtFuZfSLdDE9TE0XJ5zC=gfANwgPm | unknown | — | — | whitelisted |
3268 | upfc.exe | GET | 200 | 5.101.152.39:80 | http://ilaila5b.beget.tech/L1nc0In.php?s0jmCuWPDjuoWw=L9KRVr9BF389p62In&rPXXuGBe2qvgd2TXye=A1ttzdtDurTKbGGoh&xOEP1=TPiaGqRIYmnp8gh4BCQwjfUaWN&e44c84955770ba4dea01386fb157c5b8=ykTY5MzY5EDOlZWM3YDOiBTM3kTY1MzYyEWOiJGO1kDZzkDZ1YTYjhDN5gTNzADM1YTO5MjM&88eb947e6952cd9a1c902d41737c10e1=wNyMTNzYDZlZ2M1MTNhNWOlljM1cjYyEmZ2UmMyUGNlhDZxIDO5M2N&a4a6f298269db9e9972f8934db832b73=d1nIzgTZ4U2Y1ImZxkTYxYjNwMjNzQzNiRDZkJmZ5EjYwMTY3YjNwIDOzIiOiYzNmZWZ0YWOjRmZiRTZzYTO4YjZkFjMmRWZhRmZ2cjMiwiI5ETNyMGNjBDMjVjY3EzY4QWZhJ2NjZDN0UTZ4UDZ4IWYjBDZ5UWM5IiOikDOkNTO0QTY1YWN2YWMlBTYyQTN2MWY3MzM3kjM5ATZis3W&e82648b7e239fb037b863a234c855a0b=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 | unknown | — | — | whitelisted |
3268 | upfc.exe | GET | 200 | 5.101.152.39:80 | http://ilaila5b.beget.tech/L1nc0In.php?s0jmCuWPDjuoWw=L9KRVr9BF389p62In&rPXXuGBe2qvgd2TXye=A1ttzdtDurTKbGGoh&xOEP1=TPiaGqRIYmnp8gh4BCQwjfUaWN&e44c84955770ba4dea01386fb157c5b8=ykTY5MzY5EDOlZWM3YDOiBTM3kTY1MzYyEWOiJGO1kDZzkDZ1YTYjhDN5gTNzADM1YTO5MjM&88eb947e6952cd9a1c902d41737c10e1=wNyMTNzYDZlZ2M1MTNhNWOlljM1cjYyEmZ2UmMyUGNlhDZxIDO5M2N&e82648b7e239fb037b863a234c855a0b=0VfiIiOiEDZjNjZzUzNzUTM2MzN4YzY3QDMhJTOyYTO4YmNmlTZiwiIlVTYkVWOiRmYxMzYlBTOzI2M0MTMlljZ1U2YkJzM0EDOhRWYwIjNkJiOiYzNmZWZ0YWOjRmZiRTZzYTO4YjZkFjMmRWZhRmZ2cjMiwiI5ETNyMGNjBDMjVjY3EzY4QWZhJ2NjZDN0UTZ4UDZ4IWYjBDZ5UWM5IiOikDOkNTO0QTY1YWN2YWMlBTYyQTN2MWY3MzM3kjM5ATZis3W | unknown | — | — | whitelisted |
3268 | upfc.exe | GET | 200 | 5.101.152.39:80 | http://ilaila5b.beget.tech/L1nc0In.php?s0jmCuWPDjuoWw=L9KRVr9BF389p62In&rPXXuGBe2qvgd2TXye=A1ttzdtDurTKbGGoh&xOEP1=TPiaGqRIYmnp8gh4BCQwjfUaWN&e44c84955770ba4dea01386fb157c5b8=ykTY5MzY5EDOlZWM3YDOiBTM3kTY1MzYyEWOiJGO1kDZzkDZ1YTYjhDN5gTNzADM1YTO5MjM&88eb947e6952cd9a1c902d41737c10e1=wNyMTNzYDZlZ2M1MTNhNWOlljM1cjYyEmZ2UmMyUGNlhDZxIDO5M2N&d9da068033c99aa20cc01c6d3c438ff5=0VfikjSDRme5cUY5Z1RaBnWzIWeC5mYwZ0RhREeGhlNNtWS2k0QhBjRHVVa3lWS1R2MiVHdtJmVKl2Tpd2RkhmQGpVe5ITW6x2RSl2dplUavpWSvJFWZFVMXlVekdlWzZ1RWl2dplUavpWS6JESjJUMXlFbSNTVpdXaJVHZzIWd01mYWpUaPlWUVNVeWJzYWFzVZxmUzUVa3lWS1R2MiVHdtJmVKl2TplEWapnVWJGaWdEZUp0QMlGNyQmd1ITY1ZFbJZTS5pVdGdEV0Z0VaBjTsl0cJlmYzkTbiJXNXZVavpWSvJFWZFVMXlFbSNTVpdXaJZHbHpVMGVUSzsmeKRkRFlkcWdEZzZ0VaNlQTxUenNUS1xWRJxWNXFWT1cEW5hnVkJkQ55UNjlXUCJUehxmUIJGaW1WVnBTaN9WQTpVd5cUY3lTbjpGbXRVavpWS6ZVbiZHaHNmdKNTWwFzaJNXSplkNJl3Y0ZkMZlmVyYVa3lWS1hHbjNmRUdlQ4VUVUxWRSNGesx0Y4ZEWjpUaPlWTuJGbW12Yq5EbJNXS5tEN0MkTp9maJVXOXFmeKhlWXRXbjZHZYpFdG12YHpUelJiOiEDZjNjZzUzNzUTM2MzN4YzY3QDMhJTOyYTO4YmNmlTZiwiIlVTYkVWOiRmYxMzYlBTOzI2M0MTMlljZ1U2YkJzM0EDOhRWYwIjNkJiOiYzNmZWZ0YWOjRmZiRTZzYTO4YjZkFjMmRWZhRmZ2cjMiwiI5ETNyMGNjBDMjVjY3EzY4QWZhJ2NjZDN0UTZ4UDZ4IWYjBDZ5UWM5IiOikDOkNTO0QTY1YWN2YWMlBTYyQTN2MWY3MzM3kjM5ATZis3W | unknown | — | — | whitelisted |
3268 | upfc.exe | GET | 200 | 5.101.152.39:80 | http://ilaila5b.beget.tech/L1nc0In.php?s0jmCuWPDjuoWw=L9KRVr9BF389p62In&rPXXuGBe2qvgd2TXye=A1ttzdtDurTKbGGoh&xOEP1=TPiaGqRIYmnp8gh4BCQwjfUaWN&e44c84955770ba4dea01386fb157c5b8=ykTY5MzY5EDOlZWM3YDOiBTM3kTY1MzYyEWOiJGO1kDZzkDZ1YTYjhDN5gTNzADM1YTO5MjM&88eb947e6952cd9a1c902d41737c10e1=wNyMTNzYDZlZ2M1MTNhNWOlljM1cjYyEmZ2UmMyUGNlhDZxIDO5M2N&e82648b7e239fb037b863a234c855a0b=d1nIVtGVQJFMJJiOiEDZjNjZzUzNzUTM2MzN4YzY3QDMhJTOyYTO4YmNmlTZiwiIiZWO3cTM5EDZxcTO3EmYkNWO3UGZmRmY3MDOjRTOkNDO2UTMlFzMjJiOiYzNmZWZ0YWOjRmZiRTZzYTO4YjZkFjMmRWZhRmZ2cjMiwiI5ETNyMGNjBDMjVjY3EzY4QWZhJ2NjZDN0UTZ4UDZ4IWYjBDZ5UWM5IiOikDOkNTO0QTY1YWN2YWMlBTYyQTN2MWY3MzM3kjM5ATZis3W | unknown | — | — | whitelisted |
3268 | upfc.exe | POST | 200 | 5.101.152.39:80 | http://ilaila5b.beget.tech/L1nc0In.php?s0jmCuWPDjuoWw=L9KRVr9BF389p62In&rPXXuGBe2qvgd2TXye=A1ttzdtDurTKbGGoh&xOEP1=TPiaGqRIYmnp8gh4BCQwjfUaWN&e44c84955770ba4dea01386fb157c5b8=ykTY5MzY5EDOlZWM3YDOiBTM3kTY1MzYyEWOiJGO1kDZzkDZ1YTYjhDN5gTNzADM1YTO5MjM&88eb947e6952cd9a1c902d41737c10e1=wNyMTNzYDZlZ2M1MTNhNWOlljM1cjYyEmZ2UmMyUGNlhDZxIDO5M2N | unknown | — | — | whitelisted |
3268 | upfc.exe | POST | 200 | 5.101.152.39:80 | http://ilaila5b.beget.tech/L1nc0In.php?s0jmCuWPDjuoWw=L9KRVr9BF389p62In&rPXXuGBe2qvgd2TXye=A1ttzdtDurTKbGGoh&xOEP1=TPiaGqRIYmnp8gh4BCQwjfUaWN&e44c84955770ba4dea01386fb157c5b8=ykTY5MzY5EDOlZWM3YDOiBTM3kTY1MzYyEWOiJGO1kDZzkDZ1YTYjhDN5gTNzADM1YTO5MjM&88eb947e6952cd9a1c902d41737c10e1=wNyMTNzYDZlZ2M1MTNhNWOlljM1cjYyEmZ2UmMyUGNlhDZxIDO5M2N | unknown | — | — | whitelisted |
3268 | upfc.exe | GET | 200 | 5.101.152.39:80 | http://ilaila5b.beget.tech/L1nc0In.php?s0jmCuWPDjuoWw=L9KRVr9BF389p62In&rPXXuGBe2qvgd2TXye=A1ttzdtDurTKbGGoh&xOEP1=TPiaGqRIYmnp8gh4BCQwjfUaWN&e44c84955770ba4dea01386fb157c5b8=ykTY5MzY5EDOlZWM3YDOiBTM3kTY1MzYyEWOiJGO1kDZzkDZ1YTYjhDN5gTNzADM1YTO5MjM&88eb947e6952cd9a1c902d41737c10e1=wNyMTNzYDZlZ2M1MTNhNWOlljM1cjYyEmZ2UmMyUGNlhDZxIDO5M2N&a4a6f298269db9e9972f8934db832b73=d1nIzgTZ4U2Y1ImZxkTYxYjNwMjNzQzNiRDZkJmZ5EjYwMTY3YjNwIDOzIiOiYzNmZWZ0YWOjRmZiRTZzYTO4YjZkFjMmRWZhRmZ2cjMiwiI5ETNyMGNjBDMjVjY3EzY4QWZhJ2NjZDN0UTZ4UDZ4IWYjBDZ5UWM5IiOikDOkNTO0QTY1YWN2YWMlBTYyQTN2MWY3MzM3kjM5ATZis3W&e82648b7e239fb037b863a234c855a0b=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 | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
2104 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 23.216.77.28:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
3216 | svchost.exe | 20.7.2.167:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
6544 | svchost.exe | 20.190.159.2:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6544 | svchost.exe | 2.17.190.73:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
2104 | svchost.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
2112 | svchost.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
ilaila5b.beget.tech |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
3268 | upfc.exe | A Network Trojan was detected | ET MALWARE DCRAT Activity (GET) |
3268 | upfc.exe | Potential Corporate Privacy Violation | ET INFO PE EXE or DLL Windows file download HTTP |
3268 | upfc.exe | A Network Trojan was detected | ET MALWARE Possible Windows executable sent when remote host claims to send html content |
3268 | upfc.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |