File name:

554c8bd941da8940587e7801d17b3beb46c77b955720e11f792a9e07c1b2d2b3.7z

Full analysis: https://app.any.run/tasks/946f8cb8-248e-4344-a595-85ec37b83b98
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: April 16, 2025, 13:53:05
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
ransomware
alphacrypt
evasion
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

39A1B88433385FF32FA6F0F136CF52BD

SHA1:

916E6EE28C82CF47D09B34E2B241AB13992A3CD7

SHA256:

A7F94CA661C47B2C3BEC6A05EAD70B6AD5F77A873A1ACF7FDC8EF334F687B2EF

SSDEEP:

12288:kATNfoKGeMMVVwikUlxvS+M48bLmeLV3X1F6G:9TNAloVwikUlxvSB4mLmeLNX1F6G

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • vcwyhu.exe (PID: 4108)
    • Connects to the CnC server

      • vcwyhu.exe (PID: 4108)
    • Deletes shadow copies

      • vcwyhu.exe (PID: 4108)
    • ALPHACRYPT has been detected (SURICATA)

      • vcwyhu.exe (PID: 4108)
  • SUSPICIOUS

    • Starts itself from another location

      • 554c8bd941da8940587e7801d17b3beb46c77b955720e11f792a9e07c1b2d2b3.exe (PID: 7456)
    • Executable content was dropped or overwritten

      • 554c8bd941da8940587e7801d17b3beb46c77b955720e11f792a9e07c1b2d2b3.exe (PID: 7456)
    • Reads security settings of Internet Explorer

      • 554c8bd941da8940587e7801d17b3beb46c77b955720e11f792a9e07c1b2d2b3.exe (PID: 7456)
      • vcwyhu.exe (PID: 4108)
    • Hides command output

      • cmd.exe (PID: 5972)
    • Starts CMD.EXE for commands execution

      • 554c8bd941da8940587e7801d17b3beb46c77b955720e11f792a9e07c1b2d2b3.exe (PID: 7456)
    • Contacting a server suspected of hosting an CnC

      • vcwyhu.exe (PID: 4108)
    • Executes as Windows Service

      • VSSVC.exe (PID: 5504)
    • Checks for external IP

      • vcwyhu.exe (PID: 4108)
  • INFO

    • Manual execution by a user

      • 554c8bd941da8940587e7801d17b3beb46c77b955720e11f792a9e07c1b2d2b3.exe (PID: 7456)
    • Creates files or folders in the user directory

      • 554c8bd941da8940587e7801d17b3beb46c77b955720e11f792a9e07c1b2d2b3.exe (PID: 7456)
      • vcwyhu.exe (PID: 4108)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7572)
    • Reads the computer name

      • 554c8bd941da8940587e7801d17b3beb46c77b955720e11f792a9e07c1b2d2b3.exe (PID: 7456)
      • vcwyhu.exe (PID: 4108)
    • Checks supported languages

      • 554c8bd941da8940587e7801d17b3beb46c77b955720e11f792a9e07c1b2d2b3.exe (PID: 7456)
      • vcwyhu.exe (PID: 4108)
    • Process checks computer location settings

      • 554c8bd941da8940587e7801d17b3beb46c77b955720e11f792a9e07c1b2d2b3.exe (PID: 7456)
      • vcwyhu.exe (PID: 4108)
    • Reads the machine GUID from the registry

      • vcwyhu.exe (PID: 4108)
    • Creates files in the program directory

      • vcwyhu.exe (PID: 4108)
    • Checks proxy server information

      • vcwyhu.exe (PID: 4108)
    • Reads the software policy settings

      • vcwyhu.exe (PID: 4108)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)

EXIF

ZIP

FileVersion: 7z v0.04
ModifyDate: 2015:09:14 21:32:03+00:00
ArchivedFileName: 554c8bd941da8940587e7801d17b3beb46c77b955720e11f792a9e07c1b2d2b3.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
140
Monitored processes
11
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe no specs 554c8bd941da8940587e7801d17b3beb46c77b955720e11f792a9e07c1b2d2b3.exe #ALPHACRYPT vcwyhu.exe cmd.exe no specs conhost.exe no specs vssadmin.exe no specs conhost.exe no specs vssvc.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
1324"C:\Windows\System32\vssadmin.exe" delete shadows /all /Quiet C:\Windows\System32\vssadmin.exevcwyhu.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Command Line Interface for Microsoft® Volume Shadow Copy Service
Exit code:
2
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\vssadmin.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
2108\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exevssadmin.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
4108C:\Users\admin\AppData\Roaming\vcwyhu.exeC:\Users\admin\AppData\Roaming\vcwyhu.exe
554c8bd941da8940587e7801d17b3beb46c77b955720e11f792a9e07c1b2d2b3.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\roaming\vcwyhu.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
5504C:\WINDOWS\system32\vssvc.exeC:\Windows\System32\VSSVC.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5972"C:\WINDOWS\system32\cmd.exe" /c del C:\Users\admin\Desktop\554C8B~1.EXE >> NULC:\Windows\SysWOW64\cmd.exe554c8bd941da8940587e7801d17b3beb46c77b955720e11f792a9e07c1b2d2b3.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
6028\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7456"C:\Users\admin\Desktop\554c8bd941da8940587e7801d17b3beb46c77b955720e11f792a9e07c1b2d2b3.exe" C:\Users\admin\Desktop\554c8bd941da8940587e7801d17b3beb46c77b955720e11f792a9e07c1b2d2b3.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\users\admin\desktop\554c8bd941da8940587e7801d17b3beb46c77b955720e11f792a9e07c1b2d2b3.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
7572"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\554c8bd941da8940587e7801d17b3beb46c77b955720e11f792a9e07c1b2d2b3.7zC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7704C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
Total events
5 438
Read events
5 411
Write events
27
Delete events
0

Modification events

(PID) Process:(7572) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7572) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7572) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7572) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\554c8bd941da8940587e7801d17b3beb46c77b955720e11f792a9e07c1b2d2b3.7z
(PID) Process:(7572) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7572) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7572) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7572) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7572) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(7572) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000
Executable files
2
Suspicious files
728
Text files
269
Unknown types
2

Dropped files

PID
Process
Filename
Type
7572WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb7572.40655\554c8bd941da8940587e7801d17b3beb46c77b955720e11f792a9e07c1b2d2b3.exeexecutable
MD5:075B54BA497D5563B221B30B139C159F
SHA256:554C8BD941DA8940587E7801D17B3BEB46C77B955720E11F792A9E07C1B2D2B3
4108vcwyhu.exeC:\$Recycle.Bin\S-1-5-18\howto_recover_files_oictf.htmlhtml
MD5:EE67E9CDD060865674FD9CC128930652
SHA256:3229F8A1AB7026C2B0859EA5209F752EEA554939E2930C666054DFFF03CFB8A2
4108vcwyhu.exeC:\Users\admin\Documents\recover_file_xjyvhtbsv.txttext
MD5:0D1708B8E98393C5FBC23976229922D1
SHA256:76AD55CAEFCE4F1B5DBC824DE6568385FFF2FAA36E325076EB818C7077FC2708
4108vcwyhu.exeC:\$Recycle.Bin\howto_recover_files_oictf.txttext
MD5:11B76CE972836F9E86423BE2D7EB5EC6
SHA256:76047B157AD961F9F94CE7C9FF1ED6E9C715DC6D3B8B5F5885784AF3BDF14D8F
4108vcwyhu.exeC:\$Recycle.Bin\howto_recover_files_oictf.htmlhtml
MD5:EE67E9CDD060865674FD9CC128930652
SHA256:3229F8A1AB7026C2B0859EA5209F752EEA554939E2930C666054DFFF03CFB8A2
4108vcwyhu.exeC:\$WinREAgent\Backup\howto_recover_files_oictf.txttext
MD5:11B76CE972836F9E86423BE2D7EB5EC6
SHA256:76047B157AD961F9F94CE7C9FF1ED6E9C715DC6D3B8B5F5885784AF3BDF14D8F
4108vcwyhu.exeC:\$WinREAgent\Backup\location.txtbinary
MD5:FBC530CE78CE845EBD6240E9FC0B9AA9
SHA256:6F542D449550D89116EDC38190770BE64F21B40CD78BDE0A756D528D1D40F529
4108vcwyhu.exeC:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\howto_recover_files_oictf.txttext
MD5:11B76CE972836F9E86423BE2D7EB5EC6
SHA256:76047B157AD961F9F94CE7C9FF1ED6E9C715DC6D3B8B5F5885784AF3BDF14D8F
4108vcwyhu.exeC:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1000\howto_recover_files_oictf.htmlhtml
MD5:EE67E9CDD060865674FD9CC128930652
SHA256:3229F8A1AB7026C2B0859EA5209F752EEA554939E2930C666054DFFF03CFB8A2
4108vcwyhu.exeC:\$Recycle.Bin\S-1-5-18\howto_recover_files_oictf.txttext
MD5:11B76CE972836F9E86423BE2D7EB5EC6
SHA256:76047B157AD961F9F94CE7C9FF1ED6E9C715DC6D3B8B5F5885784AF3BDF14D8F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
24
DNS requests
22
Threats
9

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.172:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.172:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4108
vcwyhu.exe
GET
301
178.33.113.20:80
http://myconsulting.es/wp-content/plugins/post-notification/misc.php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
unknown
malicious
4108
vcwyhu.exe
GET
302
178.33.113.20:80
http://www.myconsulting.es/wp-content/plugins/post-notification/misc.php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
unknown
malicious
4108
vcwyhu.exe
GET
200
34.160.111.145:80
http://myexternalip.com/raw
unknown
shared
4108
vcwyhu.exe
GET
200
69.192.161.44:80
http://x1.c.lencr.org/
unknown
whitelisted
4108
vcwyhu.exe
GET
200
184.24.77.78:80
http://r10.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRpD%2BQVZ%2B1vf7U0RGQGBm8JZwdxcgQUdKR2KRcYVIUxN75n5gZYwLzFBXICEgOgcLJL%2BvvImwJd7PK8q4xwFg%3D%3D
unknown
whitelisted
4108
vcwyhu.exe
GET
2.57.138.61:80
http://prettybaked.pl/wp-content/plugins/share-buttons-wp/misc.php?D2894C0091A97F5799ACB600A8D58990D05147576D8FC97E68C8BEFAF2985B687779CF69D558E3CBA09B3DE1D8F8BE9C5A067305B6326CB8A0AD998D218393FD0114761A45ECE0F98E37E3DB4B245437DAABB4AF644717578D75FA357F6F1CEEA76E952B8D357EEA5820CA30AC067BC88C59F289D539AF6A6DCA133B9E8106C7F6E66BA0E88E6DED16D1694CD5A4FE82B952270A9EA51969F6FDAC3CDBB912EDF59B26A2CAF8C3B4F719429068E0DC5941B742C7964019F8DEDB92CAF40E06387CDA411D6F5335F5E0129A03F6253D704EA149E9545066C150B8D1DB7E7ECEB73DDF37999A6055FC9752635C6508F4CA38D27B35D6C04AC5660D96372F9E8C7BDF8B2D3A8BC7BB0D1F949ECAFDFF114AE1540FE49B7F51D633FD076DB63DA8C02B28381C4F4AF22A690BEBFF331D153642548DE8F433627CC0606D09C09E3D78A2DE04F491908DC6DE0053BC0DBD9F538D40631D578E3D43AC2E3F1459D22B36
unknown
malicious
7260
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
23.48.23.172:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.172:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.31.73:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4108
vcwyhu.exe
34.160.111.145:80
myexternalip.com
GOOGLE
US
shared

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 23.48.23.172
  • 23.48.23.184
  • 23.48.23.183
  • 23.48.23.173
  • 23.48.23.171
  • 23.48.23.178
  • 23.48.23.185
  • 23.48.23.181
  • 23.48.23.175
whitelisted
settings-win.data.microsoft.com
  • 51.124.78.146
  • 4.231.128.59
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 40.126.31.73
  • 20.190.159.130
  • 40.126.31.129
  • 40.126.31.1
  • 40.126.31.69
  • 40.126.31.2
  • 20.190.159.129
  • 40.126.31.130
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
myexternalip.com
  • 34.160.111.145
shared
majowy.info
unknown
iepsicoanalisis.com.ar
unknown
myconsulting.es
  • 178.33.113.20
malicious
www.myconsulting.es
  • 178.33.113.20
malicious

Threats

PID
Process
Class
Message
4108
vcwyhu.exe
A Network Trojan was detected
ET MALWARE AlphaCrypt Connectivity Check 1
4108
vcwyhu.exe
Device Retrieving External IP Address Detected
ET INFO External IP Check myexternalip.com
4108
vcwyhu.exe
Malware Command and Control Activity Detected
ET MALWARE AlphaCrypt CnC Beacon 5
4108
vcwyhu.exe
Malware Command and Control Activity Detected
ET MALWARE AlphaCrypt CnC Beacon 5
2196
svchost.exe
A Network Trojan was detected
ET MALWARE TeslaCrypt/AlphaCrypt Variant .onion Proxy Domain
2196
svchost.exe
Potentially Bad Traffic
ET DNS Query for .to TLD
4108
vcwyhu.exe
Malware Command and Control Activity Detected
ET MALWARE AlphaCrypt CnC Beacon 5
2196
svchost.exe
Potentially Bad Traffic
ET INFO DNS Query to .onion proxy Domain (onion.to)
4108
vcwyhu.exe
Device Retrieving External IP Address Detected
SUSPICIOUS [ANY.RUN] An IP address was received from the server as a result of an HTTP request
No debug info