File name:

USDT Crypto Token Flasher v1.0.zip

Full analysis: https://app.any.run/tasks/d9a16629-6050-451f-b794-4b283c0c62a8
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: March 22, 2025, 02:55:08
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
stealer
python
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

F9D88C300BE4EA75AE7DA144BF0B3576

SHA1:

69DA2EA2745C7734C15CA2C78A8EDE0C9C99FAC1

SHA256:

A48484BCE7C7C8C2AA9E98742B24CD42C7DB17113ED382B2EF284C8E3292F86F

SSDEEP:

98304:EEWIiUI8YjDB89p4VCJXFQ7vn55waQpdTXMZNRHOSiChlS2L9XX7LJ8pjGkW2fIV:be0+ND1NmjNIWoakzWs

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Runs injected code in another process

      • trtrtrf.exe (PID: 4724)
    • Application was injected by another process

      • explorer.exe (PID: 5492)
    • Changes the autorun value in the registry

      • trtrtrf.exe (PID: 4724)
    • Actions looks like stealing of personal data

      • hghghvb.exe (PID: 4452)
    • Loads dropped or rewritten executable

      • backgroundTaskHost.exe (PID: 6740)
      • conhost.exe (PID: 4892)
      • trtrtrf.exe (PID: 4724)
      • hghghvb.exe (PID: 4452)
      • backgroundTaskHost.exe (PID: 920)
      • WaaSMedicAgent.exe (PID: 660)
      • rererdd.exe (PID: 1012)
      • RuntimeBroker.exe (PID: 5008)
      • WinRAR.exe (PID: 4688)
      • rererdd.exe (PID: 3900)
      • backgroundTaskHost.exe (PID: 5244)
      • SIHClient.exe (PID: 2984)
      • svchost.exe (PID: 2552)
      • slui.exe (PID: 6272)
      • svchost.exe (PID: 4180)
      • WmiPrvSE.exe (PID: 1128)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 4688)
      • rererdd.exe (PID: 3900)
    • Reads the date of Windows installation

      • USDT Flasher.exe (PID: 6184)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 4688)
      • USDT Flasher.exe (PID: 6184)
      • hghghvb.exe (PID: 4452)
    • Executable content was dropped or overwritten

      • USDT Flasher.exe (PID: 6184)
      • trtrtrf.exe (PID: 4724)
      • rererdd.exe (PID: 3900)
    • The process drops C-runtime libraries

      • rererdd.exe (PID: 3900)
    • Process drops python dynamic module

      • rererdd.exe (PID: 3900)
    • Creates file in the systems drive root

      • rererdd.exe (PID: 1012)
    • Loads Python modules

      • rererdd.exe (PID: 1012)
    • Application launched itself

      • rererdd.exe (PID: 3900)
    • Connects to the server without a host name

      • hghghvb.exe (PID: 4452)
    • Potential Corporate Privacy Violation

      • hghghvb.exe (PID: 4452)
  • INFO

    • Reads the software policy settings

      • backgroundTaskHost.exe (PID: 6740)
      • WaaSMedicAgent.exe (PID: 660)
      • SIHClient.exe (PID: 2984)
      • slui.exe (PID: 6272)
    • Reads security settings of Internet Explorer

      • backgroundTaskHost.exe (PID: 920)
      • backgroundTaskHost.exe (PID: 6740)
      • backgroundTaskHost.exe (PID: 5244)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 4688)
      • rererdd.exe (PID: 3900)
    • Creates files or folders in the user directory

      • backgroundTaskHost.exe (PID: 6740)
      • hghghvb.exe (PID: 4452)
      • backgroundTaskHost.exe (PID: 5244)
    • Checks proxy server information

      • backgroundTaskHost.exe (PID: 6740)
      • hghghvb.exe (PID: 4452)
      • slui.exe (PID: 6272)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 4688)
    • Checks supported languages

      • USDT Flasher.exe (PID: 6184)
      • hghghvb.exe (PID: 4452)
      • rererdd.exe (PID: 3900)
      • trtrtrf.exe (PID: 4724)
      • rererdd.exe (PID: 1012)
    • Reads the computer name

      • USDT Flasher.exe (PID: 6184)
      • rererdd.exe (PID: 3900)
      • hghghvb.exe (PID: 4452)
    • Creates files in the program directory

      • USDT Flasher.exe (PID: 6184)
      • trtrtrf.exe (PID: 4724)
      • hghghvb.exe (PID: 4452)
    • Process checks computer location settings

      • USDT Flasher.exe (PID: 6184)
    • Create files in a temporary directory

      • hghghvb.exe (PID: 4452)
      • rererdd.exe (PID: 3900)
    • Reads the machine GUID from the registry

      • trtrtrf.exe (PID: 4724)
      • rererdd.exe (PID: 1012)
    • Loads dropped or rewritten executable

      • USDT Flasher.exe (PID: 6184)
    • Reads the time zone

      • WmiPrvSE.exe (PID: 1128)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2025:01:27 09:57:58
ZipCRC: 0x452c5954
ZipCompressedSize: 81797
ZipUncompressedSize: 186928
ZipFileName: msvcp140_2.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
140
Monitored processes
18
Malicious processes
6
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe usdt flasher.exe hghghvb.exe trtrtrf.exe rererdd.exe rererdd.exe no specs waasmedicagent.exe no specs backgroundtaskhost.exe no specs wmiprvse.exe no specs conhost.exe no specs runtimebroker.exe no specs backgroundtaskhost.exe sihclient.exe backgroundtaskhost.exe no specs slui.exe svchost.exe no specs svchost.exe no specs explorer.exe

Process information

PID
CMD
Path
Indicators
Parent process
660C:\WINDOWS\System32\WaaSMedicAgent.exe b571fe334cf92eb0d52e38f16aebba91 Yma4oQVbDUaXGi0FF+dvuQ.0.1.0.0.0C:\Windows\System32\WaaSMedicAgent.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
WaasMedic Agent Exe
Exit code:
0
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\waasmedicagent.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\combase.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcrypt.dll
920"C:\WINDOWS\system32\BackgroundTaskHost.exe" -ServerName:BackgroundTaskHost.WebAccountProviderC:\Windows\System32\backgroundTaskHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Background Task Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\backgroundtaskhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
1012"C:\ProgramData\rererdd.exe" C:\ProgramData\rererdd.exerererdd.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\programdata\rererdd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
1128C:\WINDOWS\system32\wbem\wmiprvse.exe -secured -EmbeddingC:\Windows\System32\wbem\WmiPrvSE.exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
WMI Provider Host
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\wbem\wmiprvse.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ncobjapi.dll
c:\windows\system32\wbemcomn.dll
c:\windows\system32\wbem\fastprox.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
2552C:\WINDOWS\system32\svchost.exe -k netsvcs -p -s wuauservC:\Windows\System32\svchost.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2984C:\WINDOWS\System32\sihclient.exe /cv Yma4oQVbDUaXGi0FF+dvuQ.0.2C:\Windows\System32\SIHClient.exe
upfc.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
SIH Client
Exit code:
2379777
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sihclient.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\combase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\oleaut32.dll
3900"C:\ProgramData\rererdd.exe" C:\ProgramData\rererdd.exe
USDT Flasher.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\programdata\rererdd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
4180C:\WINDOWS\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvcC:\Windows\System32\svchost.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
4452"C:\ProgramData\hghghvb.exe" C:\ProgramData\hghghvb.exe
USDT Flasher.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\programdata\hghghvb.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
4688"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\USDT Crypto Token Flasher v1.0.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
69 210
Read events
68 877
Write events
299
Delete events
34

Modification events

(PID) Process:(4688) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(4688) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(4688) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(4688) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\USDT Crypto Token Flasher v1.0.zip
(PID) Process:(4688) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(4688) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(4688) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(4688) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6740) backgroundTaskHost.exeKey:\REGISTRY\A\{d93cf09b-8d94-8367-7587-7c7579bb58c1}\LocalState\Common
Operation:writeName:TaskExecutionCountLastResetTime
Value:
288E4ED9D59ADB01288E4ED9D59ADB01
(PID) Process:(6740) backgroundTaskHost.exeKey:\REGISTRY\A\{d93cf09b-8d94-8367-7587-7c7579bb58c1}\LocalState\Common
Operation:writeName:TaskExecutionCountSinceLastReset
Value:
00000000288E4ED9D59ADB01
Executable files
61
Suspicious files
28
Text files
6
Unknown types
0

Dropped files

PID
Process
Filename
Type
6740backgroundTaskHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\LocalState\ContentManagementSDK\Creatives\310091\imprbeacons.dat
MD5:
SHA256:
6740backgroundTaskHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\LocalState\ContentManagementSDK\Creatives\88000045\imprbeacons.dat
MD5:
SHA256:
6740backgroundTaskHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\LocalState\ContentManagementSDK\Creatives\280815\imprbeacons.dat
MD5:
SHA256:
6740backgroundTaskHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\LocalState\ContentManagementSDK\Creatives\310091\eventbeacons.dat
MD5:
SHA256:
6740backgroundTaskHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\LocalState\ContentManagementSDK\Creatives\280815\eventbeacons.dat
MD5:
SHA256:
6740backgroundTaskHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\LocalState\ContentManagementSDK\Creatives\88000045\eventbeacons.dat
MD5:
SHA256:
6740backgroundTaskHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\LocalState\ContentManagementSDK\Creatives\310091\1742612122~RF10d004.TMP
MD5:
SHA256:
6740backgroundTaskHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\LocalState\ContentManagementSDK\Creatives\280815\1742612123~RF10d582.TMP
MD5:
SHA256:
6740backgroundTaskHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\LocalState\ContentManagementSDK\Creatives\88000045\1742612124~RF10d747.TMP
MD5:
SHA256:
5492explorer.exeC:\Users\admin\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.datbinary
MD5:E49C56350AEDF784BFE00E444B879672
SHA256:A8BD235303668981563DFB5AAE338CB802817C4060E2C199B7C84901D57B7E1E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
26
DNS requests
15
Threats
6

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6740
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
4452
hghghvb.exe
POST
200
185.81.68.156:80
http://185.81.68.156/svcstealer/get.php
unknown
malicious
4452
hghghvb.exe
POST
200
185.81.68.156:80
http://185.81.68.156/svcstealer/get.php
unknown
malicious
2984
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
2984
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4452
hghghvb.exe
POST
200
185.81.68.156:80
http://185.81.68.156/svcstealer/get.php
unknown
malicious
4452
hghghvb.exe
POST
200
185.81.68.156:80
http://185.81.68.156/svcstealer/get.php
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
3216
svchost.exe
40.113.110.67:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
20.190.159.4:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
6740
backgroundTaskHost.exe
20.31.169.57:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6740
backgroundTaskHost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 4.231.128.59
whitelisted
google.com
  • 172.217.16.206
whitelisted
crl.microsoft.com
  • 23.216.77.19
  • 23.216.77.25
whitelisted
client.wns.windows.com
  • 40.113.110.67
whitelisted
login.live.com
  • 20.190.159.4
  • 20.190.159.75
  • 20.190.159.0
  • 40.126.31.0
  • 40.126.31.3
  • 20.190.159.68
  • 40.126.31.131
  • 20.190.159.73
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
arc.msn.com
  • 20.31.169.57
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted

Threats

PID
Process
Class
Message
4452
hghghvb.exe
Misc activity
INFO [ANY.RUN] USER_AGENTS Suspicious User-Agent (Mozilla/5.0)
4452
hghghvb.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 30
4452
hghghvb.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] Sending Screenshot in Archive via POST Request
4452
hghghvb.exe
Misc activity
INFO [ANY.RUN] USER_AGENTS Suspicious User-Agent (Mozilla/5.0)
4452
hghghvb.exe
Misc activity
INFO [ANY.RUN] USER_AGENTS Suspicious User-Agent (Mozilla/5.0)
4452
hghghvb.exe
Misc activity
INFO [ANY.RUN] USER_AGENTS Suspicious User-Agent (Mozilla/5.0)
No debug info