File name:

8a31695612de1180b7075ffca55c188730252d30379161fd684af0d38fb120d0

Full analysis: https://app.any.run/tasks/d3ce9153-f557-455f-a5b9-0bb604738c14
Verdict: Malicious activity
Analysis date: November 07, 2024, 10:59:27
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
evasion
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 8 sections
MD5:

CE4ED31B17260979BAFE6132AEEAC66D

SHA1:

3B3E916D5229D865434A7BE44B0A7351E551E80C

SHA256:

8A31695612DE1180B7075FFCA55C188730252D30379161FD684AF0D38FB120D0

SSDEEP:

98304:GM0F9eRHDIO9Mp+wiRHDIO9Mp+wKG7+NwrLntIOsG46avviZ8CyZSfa6uTviVizG:twfrkDtbM65jq+25

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • 8a31695612de1180b7075ffca55c188730252d30379161fd684af0d38fb120d0.exe (PID: 2576)
      • XiaomiAnonymouseTool_Portable_V5.8.exe (PID: 5580)
    • Executable content was dropped or overwritten

      • 8a31695612de1180b7075ffca55c188730252d30379161fd684af0d38fb120d0.exe (PID: 2576)
    • Reads the date of Windows installation

      • 8a31695612de1180b7075ffca55c188730252d30379161fd684af0d38fb120d0.exe (PID: 2576)
    • Application launched itself

      • XiaomiAnonymouseTool_Portable_V5.8.exe (PID: 5580)
    • There is functionality for taking screenshot (YARA)

      • XiaomiAnonymouseTool_Portable_V5.8.exe (PID: 3848)
    • Checks for external IP

      • XiaomiAnonymouseTool_Portable_V5.8.exe (PID: 5580)
      • svchost.exe (PID: 2172)
      • XiaomiAnonymouseTool_Portable_V5.8.exe (PID: 3848)
  • INFO

    • Reads the computer name

      • 8a31695612de1180b7075ffca55c188730252d30379161fd684af0d38fb120d0.exe (PID: 2576)
      • XiaomiAnonymouseTool_Portable_V5.8.exe (PID: 5580)
    • Checks supported languages

      • 8a31695612de1180b7075ffca55c188730252d30379161fd684af0d38fb120d0.exe (PID: 2576)
      • XiaomiAnonymouseTool_Portable_V5.8.exe (PID: 5580)
    • The process uses the downloaded file

      • 8a31695612de1180b7075ffca55c188730252d30379161fd684af0d38fb120d0.exe (PID: 2576)
      • XiaomiAnonymouseTool_Portable_V5.8.exe (PID: 5580)
    • Process checks computer location settings

      • 8a31695612de1180b7075ffca55c188730252d30379161fd684af0d38fb120d0.exe (PID: 2576)
      • XiaomiAnonymouseTool_Portable_V5.8.exe (PID: 5580)
    • Create files in a temporary directory

      • 8a31695612de1180b7075ffca55c188730252d30379161fd684af0d38fb120d0.exe (PID: 2576)
    • Reads the machine GUID from the registry

      • XiaomiAnonymouseTool_Portable_V5.8.exe (PID: 5580)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:05:12 10:17:07+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.33
CodeSize: 288768
InitializedDataSize: 733184
UninitializedDataSize: -
EntryPoint: 0x32ee0
OSVersion: 5.2
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
148
Monitored processes
8
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 8a31695612de1180b7075ffca55c188730252d30379161fd684af0d38fb120d0.exe xiaomianonymousetool_portable_v5.8.exe THREAT xiaomianonymousetool_portable_v5.8.exe svchost.exe ucpdmgr.exe no specs conhost.exe no specs ucpdmgr.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1280\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeUCPDMgr.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2172C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2576"C:\Users\admin\AppData\Local\Temp\8a31695612de1180b7075ffca55c188730252d30379161fd684af0d38fb120d0.exe" C:\Users\admin\AppData\Local\Temp\8a31695612de1180b7075ffca55c188730252d30379161fd684af0d38fb120d0.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\8a31695612de1180b7075ffca55c188730252d30379161fd684af0d38fb120d0.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3848"C:\Users\admin\AppData\Local\Temp\RarSFX0\XiaomiAnonymouseTool_Portable_V5.8.exe" C:\Users\admin\AppData\Local\Temp\RarSFX0\XiaomiAnonymouseTool_Portable_V5.8.exe
XiaomiAnonymouseTool_Portable_V5.8.exe
User:
admin
Company:
Xiaomi Anonymouse Tool
Integrity Level:
HIGH
Description:
Xiaomi Anonymouse Tool
Version:
5.5.0.8
Modules
Images
c:\users\admin\appdata\local\temp\rarsfx0\xiaomianonymousetool_portable_v5.8.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
4568"C:\WINDOWS\system32\UCPDMgr.exe"C:\Windows\System32\UCPDMgr.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
User Choice Protection Manager
Exit code:
0
Version:
1.0.0.414301
Modules
Images
c:\windows\system32\ucpdmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
5460"C:\WINDOWS\system32\UCPDMgr.exe"C:\Windows\System32\UCPDMgr.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
User Choice Protection Manager
Exit code:
0
Version:
1.0.0.414301
Modules
Images
c:\windows\system32\ucpdmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
5580"C:\Users\admin\AppData\Local\Temp\RarSFX0\XiaomiAnonymouseTool_Portable_V5.8.exe" C:\Users\admin\AppData\Local\Temp\RarSFX0\XiaomiAnonymouseTool_Portable_V5.8.exe
8a31695612de1180b7075ffca55c188730252d30379161fd684af0d38fb120d0.exe
User:
admin
Company:
Xiaomi Anonymouse Tool
Integrity Level:
MEDIUM
Description:
Xiaomi Anonymouse Tool
Exit code:
0
Version:
5.5.0.8
Modules
Images
c:\users\admin\appdata\local\temp\rarsfx0\xiaomianonymousetool_portable_v5.8.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
5972\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeUCPDMgr.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
3 486
Read events
3 472
Write events
14
Delete events
0

Modification events

(PID) Process:(5580) XiaomiAnonymouseTool_Portable_V5.8.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\XiaomiAnonymouseTool_Portable_V5_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(5580) XiaomiAnonymouseTool_Portable_V5.8.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\XiaomiAnonymouseTool_Portable_V5_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(5580) XiaomiAnonymouseTool_Portable_V5.8.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\XiaomiAnonymouseTool_Portable_V5_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(5580) XiaomiAnonymouseTool_Portable_V5.8.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\XiaomiAnonymouseTool_Portable_V5_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(5580) XiaomiAnonymouseTool_Portable_V5.8.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\XiaomiAnonymouseTool_Portable_V5_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(5580) XiaomiAnonymouseTool_Portable_V5.8.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\XiaomiAnonymouseTool_Portable_V5_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(5580) XiaomiAnonymouseTool_Portable_V5.8.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\XiaomiAnonymouseTool_Portable_V5_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(5580) XiaomiAnonymouseTool_Portable_V5.8.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\XiaomiAnonymouseTool_Portable_V5_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(5580) XiaomiAnonymouseTool_Portable_V5.8.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\XiaomiAnonymouseTool_Portable_V5_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(5580) XiaomiAnonymouseTool_Portable_V5.8.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\XiaomiAnonymouseTool_Portable_V5_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
13
Suspicious files
1
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
25768a31695612de1180b7075ffca55c188730252d30379161fd684af0d38fb120d0.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\temp\data.ext
MD5:
SHA256:
25768a31695612de1180b7075ffca55c188730252d30379161fd684af0d38fb120d0.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\LibUsbDotNet.LibUsbDotNet.dllexecutable
MD5:D496CE3436511C6A4D826AB418CF8B6D
SHA256:B6DE87FF6FDDE6D0A245EF37FE81FAC49523C35115C61BC002E4935D99875508
25768a31695612de1180b7075ffca55c188730252d30379161fd684af0d38fb120d0.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\ICSharpCode.SharpZipLib.dllexecutable
MD5:0B3B4E8D1DE31F844E466D61CF7937B5
SHA256:CFC2A838569A48D16A15269BB701DE87B81B3D2BC303BB7C4C3724CC3BBA0C50
25768a31695612de1180b7075ffca55c188730252d30379161fd684af0d38fb120d0.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\MetroFramework.Fonts.dllexecutable
MD5:65EF4B23060128743CEF937A43B82AA3
SHA256:C843869AACA5135C2D47296985F35C71CA8AF4431288D04D481C4E46CC93EE26
25768a31695612de1180b7075ffca55c188730252d30379161fd684af0d38fb120d0.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\XiaomiAnonymouseTool_Portable_V5.8.exeexecutable
MD5:1ADDCF6BF5E92601D0572EEDE5DECC22
SHA256:21618F917B12866C5C4AAD0FEA31B4BB623854964AB648D5173C76FE03226BFC
25768a31695612de1180b7075ffca55c188730252d30379161fd684af0d38fb120d0.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\adb\adb.exeexecutable
MD5:F8AB944A579990572FB44141FC20D34C
SHA256:405852E9A59D31045B7E585BEF2609AE462E5D5ADE6CFEFA2E4FDA9B9C2987F3
25768a31695612de1180b7075ffca55c188730252d30379161fd684af0d38fb120d0.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\adb\AdbWinApi.DLL.datexecutable
MD5:ED5A809DC0024D83CBAB4FB9933D598D
SHA256:D60103A5E99BC9888F786EE916F5D6E45493C3247972CB053833803DE7E95CF9
25768a31695612de1180b7075ffca55c188730252d30379161fd684af0d38fb120d0.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\adb\AdbWinApi.dllexecutable
MD5:ED5A809DC0024D83CBAB4FB9933D598D
SHA256:D60103A5E99BC9888F786EE916F5D6E45493C3247972CB053833803DE7E95CF9
25768a31695612de1180b7075ffca55c188730252d30379161fd684af0d38fb120d0.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Newtonsoft.Json.xmlxml
MD5:D398FFE9FDAC6A53A8D8BB26F29BBB3C
SHA256:79EE87D4EDE8783461DE05B93379D576F6E8575D4AB49359F15897A854B643C4
25768a31695612de1180b7075ffca55c188730252d30379161fd684af0d38fb120d0.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\Guna.UI2.dllexecutable
MD5:C97F23B52087CFA97985F784EA83498F
SHA256:E658E8A5616245DBE655E194B59F1BB704AAEAFBD0925D6EEBBE70555A638CDD
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
58
DNS requests
27
Threats
8

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6944
svchost.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6944
svchost.exe
GET
200
23.32.185.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7056
SIHClient.exe
GET
200
23.37.237.227:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
4360
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
7056
SIHClient.exe
GET
200
23.37.237.227:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7028
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5980
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
6944
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1248
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5488
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6944
svchost.exe
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
6944
svchost.exe
23.32.185.131:80
www.microsoft.com
AKAMAI-AS
BR
whitelisted
5580
XiaomiAnonymouseTool_Portable_V5.8.exe
34.117.59.81:443
ipinfo.io
GOOGLE-CLOUD-PLATFORM
US
shared
5580
XiaomiAnonymouseTool_Portable_V5.8.exe
188.114.97.3:443
xiaomiauth.net
CLOUDFLARENET
NL
unknown
3848
XiaomiAnonymouseTool_Portable_V5.8.exe
188.114.97.3:443
xiaomiauth.net
CLOUDFLARENET
NL
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 4.231.128.59
  • 20.73.194.208
whitelisted
google.com
  • 142.250.184.206
whitelisted
crl.microsoft.com
  • 2.16.164.49
  • 2.16.164.9
whitelisted
www.microsoft.com
  • 23.32.185.131
  • 23.37.237.227
whitelisted
ipinfo.io
  • 34.117.59.81
shared
xiaomiauth.net
  • 188.114.97.3
  • 188.114.96.3
unknown
login.live.com
  • 40.126.32.136
  • 40.126.32.134
  • 40.126.32.68
  • 20.190.160.20
  • 40.126.32.72
  • 40.126.32.76
  • 20.190.160.17
  • 40.126.32.140
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
www.bing.com
  • 2.19.80.25
  • 2.19.80.43
  • 2.19.80.40
  • 2.19.80.67
  • 2.19.80.49
  • 2.19.80.33
  • 2.19.80.81
  • 2.19.80.56
  • 2.19.80.57
whitelisted
th.bing.com
  • 2.19.80.40
  • 2.19.80.130
  • 2.19.80.9
  • 2.19.80.128
  • 2.19.80.27
  • 2.19.80.33
  • 2.19.80.18
  • 2.19.80.25
  • 2.19.80.35
whitelisted

Threats

PID
Process
Class
Message
5580
XiaomiAnonymouseTool_Portable_V5.8.exe
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup SSL Cert Observed (ipinfo .io)
5580
XiaomiAnonymouseTool_Portable_V5.8.exe
Device Retrieving External IP Address Detected
ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)
2172
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ipinfo .io)
3848
XiaomiAnonymouseTool_Portable_V5.8.exe
Device Retrieving External IP Address Detected
ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)
3848
XiaomiAnonymouseTool_Portable_V5.8.exe
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup SSL Cert Observed (ipinfo .io)
2172
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ipinfo .io)
3848
XiaomiAnonymouseTool_Portable_V5.8.exe
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup SSL Cert Observed (ipinfo .io)
3848
XiaomiAnonymouseTool_Portable_V5.8.exe
Device Retrieving External IP Address Detected
ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io)
No debug info