File name:

ki.exe

Full analysis: https://app.any.run/tasks/b72f0a2b-aa95-4aa6-8db8-035199176bdf
Verdict: Malicious activity
Threats:

FormBook is a data stealer that is being distributed as a MaaS. FormBook differs from a lot of competing malware by its extreme ease of use that allows even the unexperienced threat actors to use FormBook virus.

Analysis date: April 29, 2025, 06:40:42
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
formbook
stealer
xloader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 3 sections
MD5:

0C33FC07A7CD2B37DF70EBDE7A18282F

SHA1:

15D10E25D12BD8F45CA49FD8771F513D4E602EE5

SHA256:

BA8DB59040F89E13A3164F5A2F0A5C3297E221B79EF057922E86FA49A6F99C21

SSDEEP:

6144:fFjhm37fID6Pxdvn0s1AXIvsw+OGB/hZUbBg:lhm382PxdP1vv18Z8g

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • FORMBOOK has been detected

      • cmd.exe (PID: 7980)
      • systray.exe (PID: 2560)
    • FORMBOOK has been detected (YARA)

      • cmd.exe (PID: 7980)
    • Actions looks like stealing of personal data

      • cmd.exe (PID: 7980)
    • Connects to the CnC server

      • explorer.exe (PID: 5492)
    • FORMBOOK has been detected (SURICATA)

      • explorer.exe (PID: 5492)
  • SUSPICIOUS

    • Application launched itself

      • ki.exe (PID: 7544)
      • cmd.exe (PID: 7980)
      • nfih7ba8tp0xbp.exe (PID: 2852)
    • Starts CMD.EXE for commands execution

      • explorer.exe (PID: 5492)
      • cmd.exe (PID: 7980)
    • Executable content was dropped or overwritten

      • explorer.exe (PID: 5492)
      • dllhost.exe (PID: 4696)
    • Contacting a server suspected of hosting an CnC

      • explorer.exe (PID: 5492)
  • INFO

    • Reads the computer name

      • ki.exe (PID: 7952)
      • ki.exe (PID: 7544)
      • nfih7ba8tp0xbp.exe (PID: 2852)
      • nfih7ba8tp0xbp.exe (PID: 1052)
    • The sample compiled with english language support

      • ki.exe (PID: 7544)
      • explorer.exe (PID: 5492)
      • dllhost.exe (PID: 4696)
    • Checks supported languages

      • ki.exe (PID: 7544)
      • ki.exe (PID: 7952)
      • nfih7ba8tp0xbp.exe (PID: 2852)
      • nfih7ba8tp0xbp.exe (PID: 1052)
    • Manual execution by a user

      • cmd.exe (PID: 7980)
    • Create files in a temporary directory

      • cmd.exe (PID: 4208)
      • explorer.exe (PID: 5492)
    • Checks proxy server information

      • slui.exe (PID: 1348)
    • Reads the software policy settings

      • slui.exe (PID: 1348)
      • slui.exe (PID: 7608)
    • Creates files in the program directory

      • dllhost.exe (PID: 4696)
    • Checks transactions between databases Windows and Oracle

      • explorer.exe (PID: 5492)
    • Reads security settings of Internet Explorer

      • dllhost.exe (PID: 4696)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Formbook

(PID) Process(7980) cmd.exe
C2www.wayyout.info/ch27/
Strings (79)USERNAME
LOCALAPPDATA
USERPROFILE
APPDATA
TEMP
ProgramFiles
CommonProgramFiles
ALLUSERSPROFILE
/c copy "
/c del "
\Run
\Policies
\Explorer
\Registry\User
\Registry\Machine
\SOFTWARE\Microsoft\Windows\CurrentVersion
Office\15.0\Outlook\Profiles\Outlook\
NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\
\SOFTWARE\Mozilla\Mozilla
\Mozilla
Username:
Password:
formSubmitURL
usernameField
encryptedUsername
encryptedPassword
\logins.json
\signons.sqlite
\Microsoft\Vault\
SELECT encryptedUsername, encryptedPassword, formSubmitURL FROM moz_logins
\Google\Chrome\User Data\Default\Login Data
SELECT origin_url, username_value, password_value FROM logins
.exe
.com
.scr
.pif
.cmd
.bat
ms
win
gdi
mfc
vga
igfx
user
help
config
update
regsvc
chkdsk
systray
audiodg
certmgr
autochk
taskhost
colorcpl
services
IconCache
ThumbCache
Cookies
SeDebugPrivilege
SeShutdownPrivilege
\BaseNamedObjects
config.php
POST
HTTP/1.1
Host:
Connection: close
Content-Length:
Cache-Control: no-cache
Origin: http://
User-Agent: Mozilla Firefox/4.0
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://
Accept-Language: en-US
Accept-Encoding: gzip, deflate dat=
f-start
f-end
Decoy C2 (64)lijianfans.net
keziamandelin.com
goldenoceanoutdoor.com
isilvaphotography.com
cindypantoja.com
animalfriendsllc.com
diikey.com
trainerpoqe.men
berastours.com
pagelink.info
lemsinternetbiz.site
cervezascolder.com
bombom.site
heromorfin.com
eltirachinasasturiano.com
spacity.biz
microbladingshop.net
tfworkstation.com
mengxiaoxi.net
ggg585.com
thrivemediadesigns.com
yzlaw120.com
grademg.com
chundanfood.com
taibeiai.com
quistock.com
wxm119.com
manbet507.com
553413.top
crete-exhibitions.com
meinvmote.com
ddluav95.com
86photos.com
reslimited.net
intrumpwetrust.loan
kbmuonline.com
lampung.email
samdismore.co.uk
ngc.gold
onlydebauchery.com
getonlinefree.com
wilsonsprom.cruises
beoyafushi.com
exxonmobileofp.com
meiluhome.com
pprproducts.com
xn--q3cjk0g0c2ad.net
megalegenda.com
umnyash.com
oobin.info
idaho25.com
vmetric.com
arbetekraft.com
annaossanna.com
xn--74q37fh5e728f.com
fihdal.men
madzanimations.com
strongbelly.com
ylpzt.loan
ap17-09-07.com
nogikeya.net
spaceoperakaraoke.com
ymaiul.com
271simsroad.com
No Malware configuration.

TRiD

.exe | Win32 Executable Microsoft Visual Basic 6 (90.6)
.exe | Win32 Executable (generic) (4.9)
.exe | Generic Win/DOS Executable (2.2)
.exe | DOS Executable Generic (2.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2017:12:12 21:07:53+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 430080
InitializedDataSize: 8192
UninitializedDataSize: -
EntryPoint: 0x1324
OSVersion: 4
ImageVersion: 6.4
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 6.4.0.9
ProductVersionNumber: 6.4.0.9
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: epson
FileDescription: cheat engine
LegalCopyright: mALWAREbYTes cORPORAtion
LegalTrademarks: laSTPASS
ProductName: CHECKSUMcALCUlATOR.COm
FileVersion: 6.04.0009
ProductVersion: 6.04.0009
InternalName: Fabulize5
OriginalFileName: Fabulize5.exe
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
144
Monitored processes
17
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start ki.exe no specs sppextcomobj.exe no specs slui.exe ki.exe no specs #FORMBOOK cmd.exe cmd.exe no specs conhost.exe no specs #FORMBOOK explorer.exe cmd.exe no specs conhost.exe no specs firefox.exe no specs slui.exe Copy/Move/Rename/Delete/Link Object nfih7ba8tp0xbp.exe no specs nfih7ba8tp0xbp.exe no specs #FORMBOOK systray.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
1052"C:\Program Files (x86)\I3fxdtxc8\nfih7ba8tp0xbp.exe"C:\Program Files (x86)\I3fxdtxc8\nfih7ba8tp0xbp.exenfih7ba8tp0xbp.exe
User:
admin
Company:
epson
Integrity Level:
MEDIUM
Description:
cheat engine
Exit code:
0
Version:
6.04.0009
Modules
Images
c:\program files (x86)\i3fxdtxc8\nfih7ba8tp0xbp.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
1348C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2560"C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Systray .exe stub
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\systray.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
2852"C:\Program Files (x86)\I3fxdtxc8\nfih7ba8tp0xbp.exe"C:\Program Files (x86)\I3fxdtxc8\nfih7ba8tp0xbp.exeexplorer.exe
User:
admin
Company:
epson
Integrity Level:
MEDIUM
Description:
cheat engine
Exit code:
0
Version:
6.04.0009
Modules
Images
c:\program files (x86)\i3fxdtxc8\nfih7ba8tp0xbp.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvbvm60.dll
2908\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4208/c copy "C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\admin\AppData\Local\Temp\DB1" /VC:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
4696C:\WINDOWS\system32\DllHost.exe /Processid:{3AD05575-8857-4850-9277-11B85BDB8E09}C:\Windows\System32\dllhost.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
5492C:\WINDOWS\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\shcore.dll
7504"C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\firefox.execmd.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
3221225534
Version:
123.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
Total events
8 802
Read events
8 798
Write events
4
Delete events
0

Modification events

(PID) Process:(7980) cmd.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:WD-TIV_H1XI
Value:
C:\Program Files (x86)\I3fxdtxc8\nfih7ba8tp0xbp.exe
(PID) Process:(7980) cmd.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(7980) cmd.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(7980) cmd.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
2
Suspicious files
7
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
7980cmd.exeC:\Users\admin\AppData\Roaming\L80NC3D5\L80logri.inibinary
MD5:D63A82E5D81E02E399090AF26DB0B9CB
SHA256:EAECE2EBA6310253249603033C744DD5914089B0BB26BDE6685EC9813611BAAE
4208cmd.exeC:\Users\admin\AppData\Local\Temp\DB1binary
MD5:A45465CDCDC6CB30C8906F3DA4EC114C
SHA256:4412319EF944EBCCA9581CBACB1D4E1DC614C348D1DFC5D2FAAAAD863D300209
7980cmd.exeC:\Users\admin\AppData\Roaming\L80NC3D5\L80logim.jpegbinary
MD5:447A4F4AD97A6EFC75F7BBF4C2966C12
SHA256:FA8E51AF91BAE6489666C12148A18D9F49A4F7B347B299F0EA5777AE2A3DE3C1
7980cmd.exeC:\Users\admin\AppData\Roaming\L80NC3D5\L80logrg.iniimage
MD5:4AADF49FED30E4C9B3FE4A3DD6445EBE
SHA256:75034BEB7BDED9AEAB5748F4592B9E1419256CAEC474065D43E531EC5CC21C56
7980cmd.exeC:\Users\admin\AppData\Roaming\L80NC3D5\L80logrc.inibinary
MD5:E03F207A7B9CFC4D877ED2EC64BE028E
SHA256:B17183098B6E349844A3151456EDF62C8E41B2348D2445A610C0FF1E29963067
5492explorer.exeC:\Users\admin\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.datbinary
MD5:E49C56350AEDF784BFE00E444B879672
SHA256:A8BD235303668981563DFB5AAE338CB802817C4060E2C199B7C84901D57B7E1E
4696dllhost.exeC:\Program Files (x86)\I3fxdtxc8\nfih7ba8tp0xbp.exeexecutable
MD5:0C33FC07A7CD2B37DF70EBDE7A18282F
SHA256:BA8DB59040F89E13A3164F5A2F0A5C3297E221B79EF057922E86FA49A6F99C21
4696dllhost.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\f01b4d95cf55d32a.automaticDestinations-msbinary
MD5:AFA0F404C77D0F93B7F78E38C523C054
SHA256:A9AF5A9243539C45189EDBD6161588D1C366BB70C111883F238549B47203BF41
7980cmd.exeC:\Users\admin\AppData\Roaming\L80NC3D5\L80logrv.inibinary
MD5:BA3B6BC807D4F76794C4B81B09BB9BA5
SHA256:6EEBF968962745B2E9DE2CA969AF7C424916D4E3FE3CC0BB9B3D414ABFCE9507
5492explorer.exeC:\Users\admin\AppData\Local\Temp\I3fxdtxc8\nfih7ba8tp0xbp.exeexecutable
MD5:0C33FC07A7CD2B37DF70EBDE7A18282F
SHA256:BA8DB59040F89E13A3164F5A2F0A5C3297E221B79EF057922E86FA49A6F99C21
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
25
TCP/UDP connections
88
DNS requests
30
Threats
40

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5492
explorer.exe
GET
404
49.13.77.253:80
http://www.spaceoperakaraoke.com/ch27/?id=8HUxrycu3b05YNtpepS4NLm8XudK+qcFcBCRm4BRzWlijBpQZljNx+ANpxg+lcmTd3fD&Txo8nd=llUP2ba8BXTHz
unknown
malicious
5492
explorer.exe
POST
404
49.13.77.253:80
http://www.spaceoperakaraoke.com/ch27/
unknown
malicious
5492
explorer.exe
GET
404
49.13.77.253:80
http://www.553413.top/ch27/?id=moxTJh9bQs2imCKqW0UERCyq8R6Jgy7/8RxCnjWkgSYepuAak7hbWtWBETi+4FBaD461&Txo8nd=llUP2ba8BXTHz
unknown
malicious
5492
explorer.exe
POST
404
49.13.77.253:80
http://www.berastours.com/ch27/
unknown
malicious
5492
explorer.exe
POST
404
49.13.77.253:80
http://www.553413.top/ch27/
unknown
malicious
5492
explorer.exe
POST
404
49.13.77.253:80
http://www.megalegenda.com/ch27/
unknown
malicious
5492
explorer.exe
GET
404
49.13.77.253:80
http://www.megalegenda.com/ch27/?id=75UwsvqF6x3W+lchmMI0owRjryAgb3IfEO9x89oPiACqg3+AfgjlClTsM9KiyPf9aqZN&Txo8nd=llUP2ba8BXTHz
unknown
malicious
5492
explorer.exe
GET
404
49.13.77.253:80
http://www.berastours.com/ch27/?id=+6cyqb8DBSO1jwskP49oYhX8GQMgBgX8n9cmvTiMQosHpw7KExDSYOYnTflt53fByF0H&Txo8nd=llUP2ba8BXTHz
unknown
malicious
5492
explorer.exe
GET
404
49.13.77.253:80
http://www.xn--q3cjk0g0c2ad.net/ch27/?id=QkbB1w6nMOcgCjJNtNWI+TOq/ZUioY1Tu8Ig+CSBve79BW9iVSixwBwrLMVzfQ2wcU6g&Txo8nd=llUP2ba8BXTHz
unknown
malicious
5492
explorer.exe
POST
404
49.13.77.253:80
http://www.xn--q3cjk0g0c2ad.net/ch27/
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
192.168.100.255:137
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.130:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2112
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.124.78.146
whitelisted
google.com
  • 142.250.185.142
whitelisted
client.wns.windows.com
  • 172.211.123.249
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.159.130
  • 20.190.159.75
  • 40.126.31.73
  • 40.126.31.71
  • 20.190.159.73
  • 20.190.159.131
  • 40.126.31.69
  • 20.190.159.4
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
  • 2603:1030:800:5::bfee:a08d
whitelisted
15.164.165.52.in-addr.arpa
unknown
d.8.0.a.e.e.f.b.0.0.0.0.0.0.0.0.5.0.0.0.0.0.8.0.0.3.0.1.3.0.6.2.ip6.arpa
unknown
www.taibeiai.com
  • 49.13.77.253
malicious
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

PID
Process
Class
Message
5492
explorer.exe
Malware Command and Control Activity Detected
ET MALWARE FormBook CnC Checkin (GET)
5492
explorer.exe
Malware Command and Control Activity Detected
ET MALWARE Formbook 0.3 Checkin
5492
explorer.exe
Malware Command and Control Activity Detected
ET MALWARE Formbook 0.3 Checkin
5492
explorer.exe
Malware Command and Control Activity Detected
ET MALWARE FormBook CnC Checkin (GET)
5492
explorer.exe
Malware Command and Control Activity Detected
ET MALWARE Formbook 0.3 Checkin
5492
explorer.exe
Potentially Bad Traffic
ET INFO HTTP Request to a *.top domain
2196
svchost.exe
Potentially Bad Traffic
ET DNS Query to a *.top domain - Likely Hostile
5492
explorer.exe
Malware Command and Control Activity Detected
ET MALWARE FormBook CnC Checkin (GET)
5492
explorer.exe
Malware Command and Control Activity Detected
ET MALWARE Formbook 0.3 Checkin
5492
explorer.exe
Malware Command and Control Activity Detected
ET MALWARE Formbook 0.3 Checkin
No debug info