File name:

Marvel Rivals Executor.exe

Full analysis: https://app.any.run/tasks/b3aedd20-cece-4d06-9f0d-ac7f1d07d09f
Verdict: Malicious activity
Threats:

DCrat, also known as Dark Crystal RAT, is a remote access trojan (RAT), which was first introduced in 2018. It is a modular malware that can be customized to perform different tasks. For instance, it can steal passwords, crypto wallet information, hijack Telegram and Steam accounts, and more. Attackers may use a variety of methods to distribute DCrat, but phishing email campaigns are the most common.

Analysis date: January 20, 2025, 00:21:27
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
rat
dcrat
remote
darkcrystal
stealer
exfiltration
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

B01F60EB9F3D1BB4E0E7674C95FBBC53

SHA1:

44DD0FDC5B2A1A9FBA9208EFF91296B6C1555F15

SHA256:

9787C91D7F8732CEBADC7047BC6775ABC062260E456E00BF95B6FD4D37D4A068

SSDEEP:

98304:0yi3eaYRaDqp4+aEc7xPFPHlt8YOesmZ9tWDp9XZy2QG82UpxLgHczYm:SRZ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Uses sleep, probably for evasion detection (SCRIPT)

      • wscript.exe (PID: 6184)
    • Connects to the CnC server

      • wininit.exe (PID: 5892)
    • DARKCRYSTAL has been detected (SURICATA)

      • wininit.exe (PID: 5892)
    • Actions looks like stealing of personal data

      • wininit.exe (PID: 5892)
    • Steals credentials from Web Browsers

      • wininit.exe (PID: 5892)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • Marvel Rivals Executor.exe (PID: 244)
      • SessionCrtmonitor.exe (PID: 7148)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 6184)
    • Executable content was dropped or overwritten

      • SessionCrtmonitor.exe (PID: 7148)
      • Marvel Rivals Executor.exe (PID: 244)
      • wininit.exe (PID: 5892)
    • The process creates files with name similar to system file names

      • SessionCrtmonitor.exe (PID: 7148)
    • Executing commands from a ".bat" file

      • wscript.exe (PID: 6184)
      • SessionCrtmonitor.exe (PID: 7148)
    • Starts CMD.EXE for commands execution

      • wscript.exe (PID: 6184)
      • SessionCrtmonitor.exe (PID: 7148)
    • Reads the date of Windows installation

      • SessionCrtmonitor.exe (PID: 7148)
    • Starts application with an unusual extension

      • cmd.exe (PID: 3172)
    • Loads DLL from Mozilla Firefox

      • wininit.exe (PID: 5892)
    • Connects to the server without a host name

      • wininit.exe (PID: 5892)
    • Probably delay the execution using 'w32tm.exe'

      • cmd.exe (PID: 3172)
  • INFO

    • Reads the computer name

      • Marvel Rivals Executor.exe (PID: 244)
      • SessionCrtmonitor.exe (PID: 7148)
      • wininit.exe (PID: 5892)
    • Checks supported languages

      • SessionCrtmonitor.exe (PID: 7148)
      • Marvel Rivals Executor.exe (PID: 244)
      • chcp.com (PID: 6208)
      • wininit.exe (PID: 5892)
    • The process uses the downloaded file

      • Marvel Rivals Executor.exe (PID: 244)
      • wscript.exe (PID: 6184)
      • SessionCrtmonitor.exe (PID: 7148)
    • Reads Environment values

      • SessionCrtmonitor.exe (PID: 7148)
      • wininit.exe (PID: 5892)
    • Failed to create an executable file in Windows directory

      • SessionCrtmonitor.exe (PID: 7148)
    • Reads the machine GUID from the registry

      • SessionCrtmonitor.exe (PID: 7148)
      • wininit.exe (PID: 5892)
    • Drops encrypted VBS script (Microsoft Script Encoder)

      • wscript.exe (PID: 6184)
      • Marvel Rivals Executor.exe (PID: 244)
      • wininit.exe (PID: 5892)
    • Process checks computer location settings

      • Marvel Rivals Executor.exe (PID: 244)
      • SessionCrtmonitor.exe (PID: 7148)
    • Create files in a temporary directory

      • SessionCrtmonitor.exe (PID: 7148)
      • wininit.exe (PID: 5892)
    • Changes the display of characters in the console

      • cmd.exe (PID: 3172)
    • Disables trace logs

      • wininit.exe (PID: 5892)
    • Checks proxy server information

      • wininit.exe (PID: 5892)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:03:03 13:15:57+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.3
CodeSize: 203776
InitializedDataSize: 488960
UninitializedDataSize: -
EntryPoint: 0x1f530
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
136
Monitored processes
11
Malicious processes
6
Suspicious processes
0

Behavior graph

Click at the process to see the details
start marvel rivals executor.exe wscript.exe no specs cmd.exe no specs conhost.exe no specs sessioncrtmonitor.exe cmd.exe no specs conhost.exe no specs chcp.com no specs w32tm.exe no specs #DARKCRYSTAL wininit.exe rundll32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
244"C:\Users\admin\AppData\Local\Temp\Marvel Rivals Executor.exe" C:\Users\admin\AppData\Local\Temp\Marvel Rivals Executor.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\marvel rivals executor.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
3172C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\VvxuVq60pw.bat" "C:\Windows\System32\cmd.exeSessionCrtmonitor.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
3640w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 C:\Windows\System32\w32tm.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Time Service Diagnostic Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\w32tm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\advapi32.dll
4816C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
5892"C:\BlockAgentProviderInto\wininit.exe" C:\BlockAgentProviderInto\wininit.exe
cmd.exe
User:
admin
Integrity Level:
MEDIUM
Version:
16.10.31418.88
Modules
Images
c:\blockagentproviderinto\wininit.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
6176\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6184"C:\WINDOWS\System32\WScript.exe" "C:\BlockAgentProviderInto\PjnstjcvPY7Lzl6nvMIVWIEKqqKpxghO5JeSx3djwQLOxG0mHAk0HXCLi6.vbe" C:\Windows\SysWOW64\wscript.exeMarvel Rivals Executor.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\syswow64\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
6208chcp 65001C:\Windows\System32\chcp.comcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Change CodePage Utility
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\chcp.com
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\fsutilext.dll
7084C:\WINDOWS\system32\cmd.exe /c ""C:\BlockAgentProviderInto\9gPeLytJW1s8p3jUCK.bat" "C:\Windows\SysWOW64\cmd.exewscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
7096\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
4 098
Read events
4 081
Write events
17
Delete events
0

Modification events

(PID) Process:(244) Marvel Rivals Executor.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbe\OpenWithProgids
Operation:writeName:VBEFile
Value:
(PID) Process:(7148) SessionCrtmonitor.exeKey:HKEY_CURRENT_USER\SOFTWARE\dc755e20c3956ce10dc5d57983d393828798e0c2
Operation:writeName:6ce49301ab1c54f5abffd003b557929649d95134
Value:
H4sIAAAAAAAEAI3MsQ7CMAwE0H/pjPgAttKJDSlIDJihSkwTldqV7ab07xsxMaHohlve3aPpTgDnN/uxHZDsKpxTQLmQMYDDXnxs5/mIH2wOf+0SVbOvgC8mC5Ijq/3oe6LAqwLceh1LuU0NJ4dmiQatuF0TlViFdKiamDqxicuC5bt57of9rawLAQAA
(PID) Process:(5892) wininit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wininit_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(5892) wininit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wininit_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(5892) wininit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wininit_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(5892) wininit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wininit_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(5892) wininit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wininit_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(5892) wininit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wininit_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(5892) wininit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wininit_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(5892) wininit.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\wininit_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
Executable files
12
Suspicious files
24
Text files
9
Unknown types
0

Dropped files

PID
Process
Filename
Type
244Marvel Rivals Executor.exeC:\BlockAgentProviderInto\9gPeLytJW1s8p3jUCK.battext
MD5:8C3BF6186F713EE49D532A73CCB90E3F
SHA256:77ED1C1EBAF014D5F0D8857215E7DF2531F6DBF8C9ABCB4AFCBE6307BE24CF39
7148SessionCrtmonitor.exeC:\Users\admin\Desktop\WafQqdye.logexecutable
MD5:2D6975FD1CC3774916D8FF75C449EE7B
SHA256:75CE6EB6CDDD67D47FB7C5782F45FDC497232F87A883650BA98679F92708A986
7148SessionCrtmonitor.exeC:\Users\admin\Desktop\FCITIUYN.logexecutable
MD5:91FB2078C1DD5D8307149D9EA288FFF9
SHA256:80E1A5E95A2412691095F76C4E812CF623C3C63AE5A79545C99745F27E023050
7148SessionCrtmonitor.exeC:\BlockAgentProviderInto\SearchApp.exeexecutable
MD5:3008B3A2D8FA96CD7B26B6DEEE1E3CED
SHA256:B6608D50DDCC1DBEDA65F37E65D9AB565DA1511292D0EC26CF9C63C45D75C9C5
244Marvel Rivals Executor.exeC:\BlockAgentProviderInto\SessionCrtmonitor.exeexecutable
MD5:3008B3A2D8FA96CD7B26B6DEEE1E3CED
SHA256:B6608D50DDCC1DBEDA65F37E65D9AB565DA1511292D0EC26CF9C63C45D75C9C5
244Marvel Rivals Executor.exeC:\BlockAgentProviderInto\PjnstjcvPY7Lzl6nvMIVWIEKqqKpxghO5JeSx3djwQLOxG0mHAk0HXCLi6.vbebinary
MD5:D87DEB22F708BEDB00EF3D8EC13E99C9
SHA256:C262F37A9599F8D97B352BDD622E9446B0AF66C141A894E5ABCF7A8275C1BB96
7148SessionCrtmonitor.exeC:\Windows\Tasks\SystemSettings.exeexecutable
MD5:3008B3A2D8FA96CD7B26B6DEEE1E3CED
SHA256:B6608D50DDCC1DBEDA65F37E65D9AB565DA1511292D0EC26CF9C63C45D75C9C5
5892wininit.exeC:\Users\admin\Desktop\unfUvkXP.logexecutable
MD5:F4B38D0F95B7E844DD288B441EBC9AAF
SHA256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
7148SessionCrtmonitor.exeC:\Windows\Tasks\9e60a5f7a3bd80text
MD5:0F010200F3E4D9564EC82FE2288A5574
SHA256:765AF5DA8194F200C2A244DA0EEC15F95D87DBD8152912CED5D40EF59C2F5BDD
7148SessionCrtmonitor.exeC:\Users\admin\AppData\Local\Temp\VvxuVq60pw.battext
MD5:2E473B60507E4AEBD06CA5C5FF79CD53
SHA256:314BB62BFBEF5A05996CA540CFA1CD2AC4E0D5682A41DA8A38A36433CA8E24E4
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
85
TCP/UDP connections
30
DNS requests
15
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5856
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5064
SearchApp.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
5892
wininit.exe
POST
200
176.123.1.211:80
http://176.123.1.211/dbDatalifeprivatecdn.php
unknown
malicious
6524
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
5892
wininit.exe
POST
200
176.123.1.211:80
http://176.123.1.211/dbDatalifeprivatecdn.php
unknown
malicious
5892
wininit.exe
POST
200
176.123.1.211:80
http://176.123.1.211/dbDatalifeprivatecdn.php
unknown
malicious
6908
SIHClient.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6908
SIHClient.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5892
wininit.exe
POST
200
176.123.1.211:80
http://176.123.1.211/dbDatalifeprivatecdn.php
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5856
svchost.exe
95.101.149.131:80
Akamai International B.V.
NL
unknown
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
5856
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5064
SearchApp.exe
2.23.227.215:443
www.bing.com
Ooredoo Q.S.C.
QA
whitelisted
5064
SearchApp.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1176
svchost.exe
20.190.159.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1176
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1076
svchost.exe
184.28.89.167:443
go.microsoft.com
AKAMAI-AS
US
whitelisted
4
System
192.168.100.255:137
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.174
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
www.bing.com
  • 2.23.227.215
  • 2.23.227.208
whitelisted
ocsp.digicert.com
  • 2.17.190.73
  • 184.30.131.245
whitelisted
login.live.com
  • 20.190.159.71
  • 40.126.31.71
  • 40.126.31.69
  • 20.190.159.2
  • 40.126.31.67
  • 20.190.159.75
  • 20.190.159.4
  • 20.190.159.73
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
www.microsoft.com
  • 2.23.181.156
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted
arc.msn.com
  • 20.223.36.55
whitelisted

Threats

PID
Process
Class
Message
5892
wininit.exe
A Network Trojan was detected
ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)
5892
wininit.exe
A Network Trojan was detected
REMOTE [ANY.RUN] DarkCrystal Rat Check-in (POST)
5892
wininit.exe
A Network Trojan was detected
ET MALWARE [ANY.RUN] DarkCrystal Rat Exfiltration (POST)
5892
wininit.exe
A Network Trojan was detected
REMOTE [ANY.RUN] DarkCrystal Rat Exfiltration (POST)
No debug info