File name:

Potassium.exe

Full analysis: https://app.any.run/tasks/f6c53b2e-eed1-4a05-8176-8184c17d0247
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: February 19, 2026, 11:48:22
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
uac
evasion
anti-evasion
auto-reg
stealer
skuld
screenshot
generic
crypto-regex
upx
susp-powershell
golang
ip-check
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 4 sections
MD5:

5523F5BE8C91C83A5D22941A56FD1AEE

SHA1:

5279260D2671690BA6CCA6C178E6407FDD22671D

SHA256:

8E498E961D7880F15553AC9B761BA9AFB9B887150590C87556C3A8F92B00C3DE

SSDEEP:

98304:vguFniM88l/JOV/8nxVRX63gECgkQQGNfA7HNhfY+SXwtgnVavUcWZHrjmaoxeMn:y35nluN

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Bypass User Account Control (Modify registry)

      • Potassium.exe (PID: 8060)
      • SecurityHealthSystray.exe (PID: 6948)
    • Bypass User Account Control (fodhelper)

      • fodhelper.exe (PID: 7088)
    • Changes the autorun value in the registry

      • Potassium.exe (PID: 7772)
    • Steals credentials from Web Browsers

      • Potassium.exe (PID: 7772)
    • Changes Windows Defender settings

      • Potassium.exe (PID: 7772)
    • Adds path to the Windows Defender exclusion list

      • Potassium.exe (PID: 7772)
    • Actions looks like stealing of personal data

      • Potassium.exe (PID: 7772)
    • SKULD has been detected

      • Potassium.exe (PID: 7772)
    • Changes powershell execution policy (Bypass)

      • Potassium.exe (PID: 7772)
    • Changes settings for checking scripts for malicious actions

      • powershell.exe (PID: 6108)
    • Changes settings for sending potential threat samples to Microsoft servers

      • powershell.exe (PID: 6108)
    • Changes settings for real-time protection

      • powershell.exe (PID: 6108)
    • Changes antivirus protection settings for downloading files from the Internet (IOAVProtection)

      • powershell.exe (PID: 6108)
    • Changes settings for reporting to Microsoft Active Protection Service (MAPS)

      • powershell.exe (PID: 6108)
    • SKULD has been detected (YARA)

      • Potassium.exe (PID: 7772)
    • Changes settings for protection against network attacks (IPS)

      • powershell.exe (PID: 6108)
    • Changes Controlled Folder Access settings

      • powershell.exe (PID: 6108)
    • Steals Discord credentials and data (YARA)

      • Potassium.exe (PID: 7772)
  • SUSPICIOUS

    • Changes default file association

      • Potassium.exe (PID: 8060)
      • SecurityHealthSystray.exe (PID: 6948)
    • Creates or modifies Windows services

      • Potassium.exe (PID: 7772)
    • Starts CMD.EXE for commands execution

      • Potassium.exe (PID: 8060)
      • SecurityHealthSystray.exe (PID: 6948)
    • Delegate execute modification

      • Potassium.exe (PID: 8060)
      • SecurityHealthSystray.exe (PID: 6948)
    • Executable content was dropped or overwritten

      • Potassium.exe (PID: 7772)
    • Uses ATTRIB.EXE to modify file attributes

      • Potassium.exe (PID: 7772)
    • Accesses video controller name via WMI (SCRIPT)

      • WMIC.exe (PID: 9004)
      • WMIC.exe (PID: 5708)
    • Uses WMIC.EXE to obtain Windows Installer data

      • Potassium.exe (PID: 7772)
    • Accesses product unique identifier via WMI (SCRIPT)

      • WMIC.exe (PID: 132)
      • WMIC.exe (PID: 2872)
    • Read disk information to detect sandboxing environments

      • Potassium.exe (PID: 7772)
    • Uses WMIC.EXE to obtain a list of video controllers

      • Potassium.exe (PID: 7772)
    • Checks for external IP

      • svchost.exe (PID: 2292)
      • Potassium.exe (PID: 7772)
    • Script adds exclusion path to Windows Defender

      • Potassium.exe (PID: 7772)
    • Possible stealing from crypto wallets

      • Potassium.exe (PID: 7772)
    • Starts POWERSHELL.EXE for commands execution

      • Potassium.exe (PID: 7772)
    • Uses WMIC.EXE to obtain operating system information

      • Potassium.exe (PID: 7772)
    • Possible stealing of email data

      • Potassium.exe (PID: 7772)
    • Uses WMIC.EXE to obtain CPU information

      • Potassium.exe (PID: 7772)
    • The process bypasses the loading of PowerShell profile settings

      • Potassium.exe (PID: 7772)
    • Uses NETSH.EXE to obtain data on the network

      • Potassium.exe (PID: 7772)
    • Accesses operating system name via WMI (SCRIPT)

      • WMIC.exe (PID: 4036)
    • BASE64 encoded PowerShell command has been detected

      • Potassium.exe (PID: 7772)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 8176)
    • Possible stealing of messenger data

      • Potassium.exe (PID: 7772)
    • CSC.EXE is used to compile C# code

      • csc.exe (PID: 5528)
    • Captures screenshot (POWERSHELL)

      • powershell.exe (PID: 8176)
    • Base64-obfuscated command line is found

      • Potassium.exe (PID: 7772)
    • Script disables Windows Defender's IPS

      • Potassium.exe (PID: 7772)
    • Script disables Windows Defender's real-time protection

      • Potassium.exe (PID: 7772)
    • Modifies hosts file to alter network resolution

      • Potassium.exe (PID: 7772)
    • There is functionality for capture public ip (YARA)

      • Potassium.exe (PID: 7772)
    • Found regular expressions for crypto-addresses (YARA)

      • Potassium.exe (PID: 7772)
    • Multiple wallet extension IDs have been found

      • Potassium.exe (PID: 7772)
  • INFO

    • Drops script file

      • Potassium.exe (PID: 8060)
      • Potassium.exe (PID: 7772)
      • powershell.exe (PID: 7764)
      • SecurityHealthSystray.exe (PID: 6948)
      • powershell.exe (PID: 8176)
      • powershell.exe (PID: 6108)
    • Reads the computer name

      • Potassium.exe (PID: 7772)
      • Potassium.exe (PID: 8060)
      • SecurityHealthSystray.exe (PID: 6948)
    • Reads security settings of Internet Explorer

      • fodhelper.exe (PID: 7088)
      • WMIC.exe (PID: 132)
      • WMIC.exe (PID: 9004)
      • WMIC.exe (PID: 5708)
      • WMIC.exe (PID: 8356)
      • WMIC.exe (PID: 2872)
      • WMIC.exe (PID: 4036)
    • Checks supported languages

      • Potassium.exe (PID: 8060)
      • Potassium.exe (PID: 7772)
      • SecurityHealthSystray.exe (PID: 6948)
      • csc.exe (PID: 5528)
      • cvtres.exe (PID: 5736)
    • Drops encrypted JS script (Microsoft Script Encoder)

      • Potassium.exe (PID: 7772)
      • Potassium.exe (PID: 8060)
      • SecurityHealthSystray.exe (PID: 6948)
    • Launching a file from a Registry key

      • Potassium.exe (PID: 7772)
    • Creates files or folders in the user directory

      • Potassium.exe (PID: 7772)
    • Reads the machine GUID from the registry

      • Potassium.exe (PID: 7772)
      • csc.exe (PID: 5528)
    • Create files in a temporary directory

      • Potassium.exe (PID: 7772)
      • cvtres.exe (PID: 5736)
      • csc.exe (PID: 5528)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 7764)
      • powershell.exe (PID: 6108)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 7764)
      • powershell.exe (PID: 6108)
    • Manual execution by a user

      • SecurityHealthSystray.exe (PID: 6948)
    • There is functionality for taking screenshot (YARA)

      • Potassium.exe (PID: 7772)
    • Application based on Golang

      • Potassium.exe (PID: 7772)
    • Detects GO elliptic curve encryption (YARA)

      • Potassium.exe (PID: 7772)
    • Found Base64 encoded reflection usage via PowerShell (YARA)

      • Potassium.exe (PID: 7772)
    • Checks proxy server information

      • slui.exe (PID: 6488)
    • UPX packer has been detected

      • Potassium.exe (PID: 7772)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (87.1)
.exe | Generic Win/DOS Executable (6.4)
.exe | DOS Executable Generic (6.4)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 0000:00:00 00:00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 3
CodeSize: 3444736
InitializedDataSize: 3527168
UninitializedDataSize: 7888896
EntryPoint: 0xacf1e0
OSVersion: 6.1
ImageVersion: 1
SubsystemVersion: 6.1
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
187
Monitored processes
42
Malicious processes
6
Suspicious processes
1

Behavior graph

Click at the process to see the details
start potassium.exe no specs cmd.exe no specs conhost.exe no specs fodhelper.exe no specs fodhelper.exe no specs fodhelper.exe #SKULD potassium.exe attrib.exe no specs conhost.exe no specs attrib.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs svchost.exe wmic.exe no specs conhost.exe no specs powershell.exe no specs wmic.exe no specs conhost.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs netsh.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs securityhealthsystray.exe no specs cmd.exe no specs conhost.exe no specs csc.exe no specs cvtres.exe no specs powershell.exe no specs conhost.exe no specs attrib.exe no specs conhost.exe no specs attrib.exe no specs conhost.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
132wmic csproduct get UUIDC:\Windows\System32\wbem\WMIC.exePotassium.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\framedynos.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
752\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeWMIC.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2212\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeWMIC.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2228\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeWMIC.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2292C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2372netsh wlan show profilesC:\Windows\System32\netsh.exePotassium.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\netsh.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2564"C:\WINDOWS\system32\fodhelper.exe" C:\Windows\System32\fodhelper.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Features On Demand Helper
Exit code:
3221226540
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\fodhelper.exe
c:\windows\system32\ntdll.dll
2868\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeattrib.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2872wmic csproduct get UUIDC:\Windows\System32\wbem\WMIC.exePotassium.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\framedynos.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
3652cmd.exe /C fodhelperC:\Windows\System32\cmd.exePotassium.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
Total events
28 358
Read events
28 348
Write events
8
Delete events
2

Modification events

(PID) Process:(8060) Potassium.exeKey:HKEY_CLASSES_ROOT\ms-settings\shell\open\command
Operation:writeName:DelegateExecute
Value:
(PID) Process:(7088) fodhelper.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
(PID) Process:(7088) fodhelper.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(7088) fodhelper.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(7088) fodhelper.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(8060) Potassium.exeKey:HKEY_CLASSES_ROOT\ms-settings\shell\open\command
Operation:delete valueName:DelegateExecute
Value:
(PID) Process:(7772) Potassium.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\partmgr
Operation:writeName:EnableCounterForIoctl
Value:
1
(PID) Process:(7772) Potassium.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Realtek HD Audio Universal Service
Value:
C:\Users\admin\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe
(PID) Process:(6948) SecurityHealthSystray.exeKey:HKEY_CLASSES_ROOT\ms-settings\shell\open\command
Operation:writeName:DelegateExecute
Value:
(PID) Process:(6948) SecurityHealthSystray.exeKey:HKEY_CLASSES_ROOT\ms-settings\shell\open\command
Operation:delete valueName:DelegateExecute
Value:
Executable files
1
Suspicious files
0
Text files
0
Unknown types
25

Dropped files

PID
Process
Filename
Type
7772Potassium.exeC:\Users\admin\AppData\Local\Temp\commonfiles-temp\admin\authorityold.pngbinary
MD5:AD11202A3D47DC4A2D3940387ADA880A
SHA256:9B97CE9B55E2EA1B55C6FC9DACA8C90CCD7B907EB431D833A75089A04AEABFD2
7772Potassium.exeC:\Users\admin\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exeexecutable
MD5:5523F5BE8C91C83A5D22941A56FD1AEE
SHA256:8E498E961D7880F15553AC9B761BA9AFB9B887150590C87556C3A8F92B00C3DE
7772Potassium.exeC:\Users\admin\AppData\Local\Temp\browsers.zipbinary
MD5:8C16FD6B5F381CECC3D3CFC9FC45E366
SHA256:21C3B30456E6058F939E1E4DFF081353B835C48CE145C4CBD25D4F6A7B472373
7772Potassium.exeC:\Users\admin\AppData\Local\Temp\commonfiles.zipbinary
MD5:C69F76E87B7A47201636F21AA8C453D6
SHA256:9B1D2531AB3C54CD05605C1FDA855CEDD40EB87B910FC6F913022C7285BDA845
7764powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_tfqxwe4u.wmf.ps1binary
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
7772Potassium.exeC:\Users\admin\AppData\Local\Temp\browsers-temp\admin\Firefox\9kie7cg6.default-release\logins.txtbinary
MD5:3ABC2B9ECCDC1C9E0199A80659C0090F
SHA256:8ED25C40A8274013F5EC722DE7B1306751426F04FD138944FE2DBD083AD802DA
7772Potassium.exeC:\Users\admin\AppData\Local\Temp\browsers-temp\admin\Chrome\Default\cookies.txtbinary
MD5:FD4D39FE316347DE6E94DD9E83F0265A
SHA256:FED1778AAE8DC01846880F2E8242D7CECED0824AF6A8AA295C9508FEA6DD616C
7764powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_abe5vpeu.rvb.ps1binary
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
8176powershell.exeC:\Users\admin\AppData\Local\Temp\hiqzykro\hiqzykro.0.csbinary
MD5:C76055A0388B713A1EABE16130684DC3
SHA256:8A3CD008E86A3D835F55F8415F5FD264C6DACDF0B7286E6854EA3F5A363390E7
8176powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_0mxtnk23.2y2.psm1binary
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
61
TCP/UDP connections
52
DNS requests
27
Threats
18

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7004
svchost.exe
GET
200
23.216.77.13:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
POST
200
40.126.32.76:443
https://login.live.com/RST2.srf
unknown
whitelisted
356
svchost.exe
POST
200
20.190.159.64:443
https://login.live.com/RST2.srf
unknown
11.1 Kb
whitelisted
6768
MoUsoCoreWorker.exe
GET
200
23.216.77.13:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
8568
RUXIMICS.exe
GET
200
23.216.77.13:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7004
svchost.exe
GET
200
23.59.18.102:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
8568
RUXIMICS.exe
GET
200
23.59.18.102:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6768
MoUsoCoreWorker.exe
GET
200
23.59.18.102:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6348
SIHClient.exe
GET
304
74.178.240.61:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
whitelisted
POST
200
20.190.160.128:443
https://login.live.com/RST2.srf
unknown
binary
11.1 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
Not routed
whitelisted
7004
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
8568
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6768
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:138
Not routed
whitelisted
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
8568
RUXIMICS.exe
23.216.77.13:80
crl.microsoft.com
AKAMAI-ASN1
NL
whitelisted
7004
svchost.exe
23.216.77.13:80
crl.microsoft.com
AKAMAI-ASN1
NL
whitelisted
6768
MoUsoCoreWorker.exe
23.216.77.13:80
crl.microsoft.com
AKAMAI-ASN1
NL
whitelisted
7004
svchost.exe
23.59.18.102:80
www.microsoft.com
AKAMAI-AS
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 20.73.194.208
  • 4.231.128.59
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
google.com
  • 192.178.203.101
  • 192.178.203.100
  • 192.178.203.139
  • 192.178.203.138
  • 192.178.203.102
  • 192.178.203.113
whitelisted
crl.microsoft.com
  • 23.216.77.13
  • 23.216.77.42
  • 23.216.77.41
  • 23.216.77.25
  • 23.216.77.18
  • 23.216.77.20
  • 23.216.77.28
  • 23.216.77.19
  • 23.216.77.6
whitelisted
www.microsoft.com
  • 23.59.18.102
  • 88.221.169.152
whitelisted
login.live.com
  • 40.126.31.73
  • 40.126.31.2
  • 40.126.31.129
  • 40.126.31.71
  • 40.126.31.0
  • 40.126.31.131
  • 40.126.31.3
  • 20.190.159.64
whitelisted
api.ipify.org
  • 172.67.74.152
  • 104.26.12.205
  • 104.26.13.205
whitelisted
ip-api.com
  • 208.95.112.1
whitelisted
api.gofile.io
  • 45.112.123.126
  • 51.159.107.119
  • 51.75.242.210
whitelisted
paste-dark-type-project.trycloudflare.com
unknown

Threats

PID
Process
Class
Message
2292
svchost.exe
Misc activity
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
7772
Potassium.exe
Misc activity
ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI
Device Retrieving External IP Address Detected
ET INFO External IP Lookup api.ipify.org
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External IP Lookup by HTTP (api .ipify .org)
Misc activity
ET INFO Go-http-client User-Agent Observed Outbound
Misc activity
ET USER_AGENTS Go HTTP Client User-Agent
2292
svchost.exe
Misc activity
INFO [ANY.RUN] External IP Check (ip-api .com)
2292
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
7772
Potassium.exe
Misc activity
ET INFO Go-http-client User-Agent Observed Outbound
7772
Potassium.exe
Misc activity
ET USER_AGENTS Go HTTP Client User-Agent
Process
Message
Potassium.exe
h
Potassium.exe
%
Potassium.exe
h
Potassium.exe
%
Potassium.exe
h
Potassium.exe
%
Potassium.exe
h
Potassium.exe
%
Potassium.exe
h
Potassium.exe
%