File name:

Lost in the World of Succubi_hyQ-OB1.exe

Full analysis: https://app.any.run/tasks/5aa7bb86-386a-45c1-b7a4-2ecec9d8568f
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: December 04, 2024, 20:44:35
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
bittorrent
arch-html
stealer
ip-check
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 10 sections
MD5:

36F8ADB499E6F6F9318F7BDB1D2BBD75

SHA1:

709296223EBC2A31C0F0D37B535B62431C4E5991

SHA256:

A7D9BB906FBFF13C6D394325E32A77D6286711E74611BFC993FC9A48507906DD

SSDEEP:

98304:u+QqZ8fuGyoeb3aupzRjCqsa2hZYoKRP7TR4a6Sizb8Te7uuXM4cw/3qiYiXBgkm:eRkun5v9iN57CC/ra0

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • BITTORRENT has been detected (SURICATA)

      • qbittorrent.exe (PID: 3564)
    • Actions looks like stealing of personal data

      • servicehost.exe (PID: 6556)
      • uihost.exe (PID: 4160)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Lost in the World of Succubi_hyQ-OB1.exe (PID: 6288)
      • installer.exe (PID: 2612)
      • installer.exe (PID: 4320)
      • saBSI.exe (PID: 7032)
      • Purble Place.exe (PID: 4684)
    • Reads security settings of Internet Explorer

      • saBSI.exe (PID: 7032)
      • installer.exe (PID: 4320)
      • uihost.exe (PID: 4160)
      • qbittorrent.exe (PID: 3564)
      • Purble Place.exe (PID: 4684)
      • WinRAR.exe (PID: 4764)
      • Purble Place.exe (PID: 1344)
    • Checks Windows Trust Settings

      • saBSI.exe (PID: 7032)
      • servicehost.exe (PID: 6556)
      • uihost.exe (PID: 4160)
      • installer.exe (PID: 4320)
      • updater.exe (PID: 1916)
    • The process verifies whether the antivirus software is installed

      • saBSI.exe (PID: 7032)
      • installer.exe (PID: 2612)
      • uihost.exe (PID: 4160)
      • servicehost.exe (PID: 6556)
      • installer.exe (PID: 4320)
      • cmd.exe (PID: 6888)
      • cmd.exe (PID: 5616)
      • cmd.exe (PID: 6492)
      • updater.exe (PID: 1916)
    • Adds/modifies Windows certificates

      • saBSI.exe (PID: 7032)
      • servicehost.exe (PID: 6556)
    • The process creates files with name similar to system file names

      • installer.exe (PID: 4320)
      • servicehost.exe (PID: 6556)
    • Executes as Windows Service

      • servicehost.exe (PID: 6556)
    • Creates/Modifies COM task schedule object

      • installer.exe (PID: 4320)
    • Process drops legitimate windows executable

      • installer.exe (PID: 4320)
    • There is functionality for capture public ip (YARA)

      • qbittorrent.exe (PID: 3564)
    • Creates a software uninstall entry

      • installer.exe (PID: 4320)
      • servicehost.exe (PID: 6556)
    • Reads Mozilla Firefox installation path

      • servicehost.exe (PID: 6556)
      • uihost.exe (PID: 4160)
    • Hides command output

      • cmd.exe (PID: 6888)
    • Starts CMD.EXE for commands execution

      • servicehost.exe (PID: 6556)
      • updater.exe (PID: 1916)
    • Searches for installed software

      • updater.exe (PID: 1916)
    • Connects to unusual port

      • qbittorrent.exe (PID: 3564)
  • INFO

    • Create files in a temporary directory

      • Lost in the World of Succubi_hyQ-OB1.exe (PID: 6288)
      • installer.exe (PID: 4320)
      • saBSI.exe (PID: 7032)
    • Checks supported languages

      • Lost in the World of Succubi_hyQ-OB1.tmp (PID: 6308)
      • Lost in the World of Succubi_hyQ-OB1.exe (PID: 6288)
      • saBSI.exe (PID: 7032)
      • installer.exe (PID: 2612)
      • installer.exe (PID: 4320)
      • qbittorrent.exe (PID: 3564)
      • servicehost.exe (PID: 6556)
      • uihost.exe (PID: 4160)
      • updater.exe (PID: 1916)
      • Purble Place.exe (PID: 4684)
      • PurblePlace.exe (PID: 2728)
      • Purble Place.exe (PID: 3524)
      • PurblePlace.exe (PID: 6720)
      • PurblePlace.exe (PID: 5544)
      • Purble Place.exe (PID: 1344)
    • Reads the computer name

      • Lost in the World of Succubi_hyQ-OB1.tmp (PID: 6308)
      • saBSI.exe (PID: 7032)
      • installer.exe (PID: 4320)
      • qbittorrent.exe (PID: 3564)
      • servicehost.exe (PID: 6556)
      • uihost.exe (PID: 4160)
      • updater.exe (PID: 1916)
      • Purble Place.exe (PID: 4684)
    • Creates files in the program directory

      • saBSI.exe (PID: 7032)
      • installer.exe (PID: 2612)
      • installer.exe (PID: 4320)
      • servicehost.exe (PID: 6556)
      • uihost.exe (PID: 4160)
      • Purble Place.exe (PID: 4684)
    • Sends debugging messages

      • saBSI.exe (PID: 7032)
      • installer.exe (PID: 4320)
      • qbittorrent.exe (PID: 3564)
    • Reads the machine GUID from the registry

      • saBSI.exe (PID: 7032)
      • servicehost.exe (PID: 6556)
      • installer.exe (PID: 4320)
      • qbittorrent.exe (PID: 3564)
      • uihost.exe (PID: 4160)
      • updater.exe (PID: 1916)
    • Checks proxy server information

      • saBSI.exe (PID: 7032)
    • Reads the software policy settings

      • saBSI.exe (PID: 7032)
      • servicehost.exe (PID: 6556)
      • uihost.exe (PID: 4160)
      • installer.exe (PID: 4320)
      • updater.exe (PID: 1916)
    • Creates files or folders in the user directory

      • qbittorrent.exe (PID: 3564)
      • Purble Place.exe (PID: 4684)
    • Process checks computer location settings

      • servicehost.exe (PID: 6556)
      • Purble Place.exe (PID: 4684)
      • Purble Place.exe (PID: 1344)
      • uihost.exe (PID: 4160)
    • Manual execution by a user

      • WinRAR.exe (PID: 4764)
      • Purble Place.exe (PID: 6772)
      • Purble Place.exe (PID: 3524)
      • Purble Place.exe (PID: 1344)
      • Purble Place.exe (PID: 6652)
    • The process uses the downloaded file

      • WinRAR.exe (PID: 4764)
      • Purble Place.exe (PID: 3524)
      • Purble Place.exe (PID: 1344)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 4764)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (51.8)
.exe | InstallShield setup (20.3)
.exe | Win32 EXE PECompact compressed (generic) (19.6)
.dll | Win32 Dynamic Link Library (generic) (3.1)
.exe | Win32 Executable (generic) (2.1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2020:11:15 09:48:30+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 741376
InitializedDataSize: 38400
UninitializedDataSize: -
EntryPoint: 0xb5eec
OSVersion: 6.1
ImageVersion: 6
SubsystemVersion: 6.1
Subsystem: Windows GUI
FileVersionNumber: 3.334.90.0
ProductVersionNumber: 3.334.90.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription: Axium Audit, OOO Download Manager
FileVersion: 3.334.90
LegalCopyright: © Axium Audit
OriginalFileName:
ProductName: Axium Audit, OOO
ProductVersion: 3.334.90
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
158
Monitored processes
29
Malicious processes
9
Suspicious processes
1

Behavior graph

Click at the process to see the details
start lost in the world of succubi_hyq-ob1.exe lost in the world of succubi_hyq-ob1.tmp no specs lost in the world of succubi_hyq-ob1.exe sabsi.exe netsh.exe no specs conhost.exe no specs #BITTORRENT qbittorrent.exe installer.exe installer.exe servicehost.exe uihost.exe updater.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs rundll32.exe no specs winrar.exe purble place.exe no specs purble place.exe purbleplace.exe no specs purble place.exe no specs purble place.exe purbleplace.exe no specs purble place.exe no specs purble place.exe purbleplace.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
628\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1344"C:\Users\admin\Desktop\Purble Place.exe" C:\Users\admin\Desktop\Purble Place.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\purble place.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
1520\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1916"C:\Program Files\McAfee\WebAdvisor\updater.exe" C:\Program Files\McAfee\WebAdvisor\updater.exe
servicehost.exe
User:
SYSTEM
Company:
McAfee, LLC
Integrity Level:
SYSTEM
Description:
McAfee WebAdvisor(updater)
Exit code:
0
Version:
4,1,1,990
Modules
Images
c:\program files\mcafee\webadvisor\updater.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
2612"C:\Users\admin\AppData\Local\Temp\is-UAT0L.tmp\prod0_extract\\installer.exe" /setOem:Affid=91088 /s /thirdparty /upgrade C:\Users\admin\AppData\Local\Temp\is-UAT0L.tmp\prod0_extract\installer.exe
saBSI.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\is-uat0l.tmp\prod0_extract\installer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
2728"C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe" C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exePurble Place.exe
User:
admin
Integrity Level:
HIGH
Exit code:
3221225781
Modules
Images
c:\program files\microsoft games\purble place\purbleplace.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
2796"C:\Users\admin\AppData\Local\Temp\Rar$EXa4764.47951\Purble Place.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa4764.47951\Purble Place.exeWinRAR.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa4764.47951\purble place.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
3524"C:\Users\admin\Desktop\Purble Place.exe" C:\Users\admin\Desktop\Purble Place.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\purble place.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
3564"C:\Users\admin\AppData\Local\Temp\is-UAT0L.tmp\qbittorrent.exe" magnet:?xt=urn:btih:BFF18AF5608F9196CF05BF0C1F0B54A18C3F0A77C:\Users\admin\AppData\Local\Temp\is-UAT0L.tmp\qbittorrent.exe
Lost in the World of Succubi_hyQ-OB1.tmp
User:
admin
Company:
The qBittorrent Project
Integrity Level:
HIGH
Description:
qBittorrent - A Bittorrent Client
Version:
v4.4.2
Modules
Images
c:\users\admin\appdata\local\temp\is-uat0l.tmp\qbittorrent.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
3736\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
29 676
Read events
29 400
Write events
265
Delete events
11

Modification events

(PID) Process:(7032) saBSI.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\McAfee\WebAdvisor
Operation:writeName:UUID
Value:
{EA515A12-D4F7-4531-A5A3-6408AC9561F4}
(PID) Process:(7032) saBSI.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\McAfee\WebAdvisor
Operation:writeName:InstallerFlags
Value:
1
(PID) Process:(7032) saBSI.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\McAfee\WebAdvisor\Settings
Operation:writeName:*Affid
Value:
SYSTEM,STR,91088
(PID) Process:(7032) saBSI.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\McAfee\WebAdvisor
Operation:writeName:InstallationStatus
Value:
PENDING
(PID) Process:(7032) saBSI.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\McAfee\WebAdvisor
Operation:writeName:InstallationID
Value:
UNDEFINED
(PID) Process:(7032) saBSI.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\McAfee\WebAdvisor
Operation:writeName:CountryCode
Value:
US
(PID) Process:(7032) saBSI.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\McAfee\WebAdvisor
Operation:writeName:NEW_USER_STATE
Value:
EXPIRED
(PID) Process:(7032) saBSI.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\McAfee\WebAdvisor\Settings
Operation:writeName:NEW_USER_ABTEST
Value:
SYSTEM,STR,TRUE
(PID) Process:(7032) saBSI.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\McAfee\WebAdvisor\Settings
Operation:writeName:NEW_USER_ANY_FLOW
Value:
SYSTEM,STR,TRUE
(PID) Process:(7032) saBSI.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\McAfee\WebAdvisor\Settings
Operation:writeName:affid_override_disabled
Value:
SYSTEM,BOOL,TRUE
Executable files
27
Suspicious files
219
Text files
821
Unknown types
8

Dropped files

PID
Process
Filename
Type
3564qbittorrent.exeC:\Users\admin\AppData\Local\qBittorrent\GeoDB\dbip-country-lite.mmdb.gXpHFI
MD5:
SHA256:
3564qbittorrent.exeC:\Users\admin\AppData\Local\qBittorrent\GeoDB\dbip-country-lite.mmdb
MD5:
SHA256:
2612installer.exeC:\Program Files\McAfee\Temp1569545497\browserplugin.cab
MD5:
SHA256:
3564qbittorrent.exeC:\Users\admin\AppData\Roaming\qBittorrent\watched_folders.jsonbinary
MD5:5B76B0EEF9AF8A2300673E0553F609F9
SHA256:D914176FD50BD7F565700006A31AA97B79D3AD17CEE20C8E5FF2061D5CB74817
2612installer.exeC:\Program Files\McAfee\Temp1569545497\icon_complete.pngimage
MD5:4A09448B224F83F4E6D36AEC9FF4DA1E
SHA256:911215D1ADA8D78A33F6ED9A3740A0652BE74EFA34ED22AE569D143F9B3B5040
2612installer.exeC:\Program Files\McAfee\Temp1569545497\analyticsmanager.cabcompressed
MD5:810DAEEFAD613A912649A3425B4D636A
SHA256:5FD68AD36C32B9A3A68DCD924EE0E7171522EF1FFC52B97FBD055F827B734653
3564qbittorrent.exeC:\Users\admin\AppData\Roaming\qBittorrent\categories.jsonbinary
MD5:5B76B0EEF9AF8A2300673E0553F609F9
SHA256:D914176FD50BD7F565700006A31AA97B79D3AD17CEE20C8E5FF2061D5CB74817
7032saBSI.exeC:\Users\admin\AppData\Local\Temp\is-UAT0L.tmp\prod0_extract\installer.exeexecutable
MD5:E3DB62C623FB8033B1B92925318EE723
SHA256:D76730796BDF9C1410FF15047451B601173AE8020B7059587ED2C971AE81F039
2612installer.exeC:\Program Files\McAfee\Temp1569545497\analyticstelemetry.cabcompressed
MD5:36F84E289F15529B655020B883956988
SHA256:33C82FEB75874011D5D15DFD9B2F6C357EA50E2ADB35ECE046F0E909E31A7481
2612installer.exeC:\Program Files\McAfee\Temp1569545497\browserhost.cabcompressed
MD5:1F6A606D5869F31743A8ECF97B11EA9D
SHA256:CDF70EFDC2B9EA46770BE71901B22A19AB9488BE8FB8803C0800FA8E6AE0F6DB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
720
DNS requests
45
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5720
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
3524
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
3524
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
900
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
2.23.209.149:443
www.bing.com
Akamai International B.V.
GB
whitelisted
5064
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
1176
svchost.exe
20.190.159.64:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1176
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
whitelisted
google.com
  • 216.58.206.78
whitelisted
crl.microsoft.com
  • 2.16.241.12
  • 2.16.241.19
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 88.221.169.152
whitelisted
www.bing.com
  • 2.23.209.149
  • 2.23.209.179
  • 2.23.209.176
  • 2.23.209.130
  • 2.23.209.189
  • 2.23.209.133
  • 2.23.209.185
  • 2.23.209.148
  • 2.23.209.177
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.159.64
  • 40.126.31.73
  • 20.190.159.73
  • 40.126.31.69
  • 20.190.159.2
  • 20.190.159.4
  • 40.126.31.67
  • 40.126.31.71
whitelisted
go.microsoft.com
  • 23.32.186.57
whitelisted
d3st27td9yruau.cloudfront.net
  • 3.160.156.141
  • 3.160.156.128
  • 3.160.156.230
  • 3.160.156.207
whitelisted
analytics.apis.mcafee.com
  • 35.162.223.47
  • 44.232.89.17
  • 54.202.77.110
  • 35.83.76.254
  • 35.155.91.46
  • 54.213.99.133
  • 54.188.204.96
  • 52.88.145.95
  • 52.33.145.189
  • 52.32.201.108
  • 52.33.48.154
  • 35.80.123.228
  • 52.40.75.238
  • 34.214.96.183
  • 35.162.25.202
unknown

Threats

PID
Process
Class
Message
3564
qbittorrent.exe
Misc activity
INFO [ANY.RUN] P2P BitTorrent Protocol
3564
qbittorrent.exe
Misc activity
INFO [ANY.RUN] P2P BitTorrent Protocol
Process
Message
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in current directory
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in EXE directory
saBSI.exe
NotComDllGetInterface: C:\Users\admin\AppData\Local\Temp\is-UAT0L.tmp\prod0_extract\saBSI.exe loading C:\Users\admin\AppData\Local\Temp\is-UAT0L.tmp\prod0_extract\mfeaaca.dll, WinVerifyTrust failed with 80092003
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in current directory
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in EXE directory
saBSI.exe
NotComDllGetInterface: C:\Users\admin\AppData\Local\Temp\is-UAT0L.tmp\prod0_extract\saBSI.exe loading C:\Users\admin\AppData\Local\Temp\is-UAT0L.tmp\prod0_extract\mfeaaca.dll, WinVerifyTrust failed with 80092003
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in current directory
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in EXE directory
saBSI.exe
NotComDllGetInterface: C:\Users\admin\AppData\Local\Temp\is-UAT0L.tmp\prod0_extract\saBSI.exe loading C:\Users\admin\AppData\Local\Temp\is-UAT0L.tmp\prod0_extract\mfeaaca.dll, WinVerifyTrust failed with 80092003
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in current directory