File name:

Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.7z

Full analysis: https://app.any.run/tasks/f83d50e7-6b7f-4e1b-8b36-a8c882d5ccf5
Verdict: Malicious activity
Analysis date: April 17, 2025, 20:21:59
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
evasion
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

C3CCAA86D40D6472153D95F6182B3B5B

SHA1:

06CE970D11C42088AB21EB6238AA1B6FFC66A514

SHA256:

C34D0E92C98F9A12C463F2A7BE29CADC9F7FB0A3CD750F48CCDACE12C5348017

SSDEEP:

24576:WGtCI/xphWKC8imvuu5GZLj3idFH6niOFvK0NTt9gf+S+xSLxzqmQaUxyLl0Feqy:WGtCI/xphWKC8im95GZLj3idFH6niOFK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 6436)
    • Changes the autorun value in the registry

      • Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe (PID: 5116)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe (PID: 5116)
      • Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe (PID: 5736)
    • Executable content was dropped or overwritten

      • Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe (PID: 5116)
    • Uses ICACLS.EXE to modify access control lists

      • Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe (PID: 5116)
    • Checks for external IP

      • svchost.exe (PID: 2196)
      • Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe (PID: 5116)
      • Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe (PID: 5736)
    • Application launched itself

      • Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe (PID: 5116)
    • Executes application which crashes

      • Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe (PID: 5116)
  • INFO

    • Checks supported languages

      • Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe (PID: 5116)
      • Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe (PID: 5736)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6436)
    • Manual execution by a user

      • Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe (PID: 5116)
    • Reads the computer name

      • Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe (PID: 5116)
      • Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe (PID: 5736)
    • Reads the software policy settings

      • Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe (PID: 5116)
      • Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe (PID: 5736)
    • Reads the machine GUID from the registry

      • Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe (PID: 5116)
      • Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe (PID: 5736)
    • Checks proxy server information

      • Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe (PID: 5116)
      • Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe (PID: 5736)
    • Creates files or folders in the user directory

      • Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe (PID: 5116)
      • WerFault.exe (PID: 5008)
      • Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe (PID: 5736)
    • Process checks computer location settings

      • Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe (PID: 5116)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)

EXIF

ZIP

FileVersion: 7z v0.04
ModifyDate: 2019:11:20 19:29:48+00:00
ArchivedFileName: Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
137
Monitored processes
8
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe no specs trojan-ransom.win32.stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe svchost.exe icacls.exe no specs trojan-ransom.win32.stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe werfault.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1244"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
1812icacls "C:\Users\admin\AppData\Local\48a6c82c-c9cb-455b-8c49-e8f899595e45" /deny *S-1-1-0:(OI)(CI)(DE,DC)C:\Windows\SysWOW64\icacls.exeTrojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\icacls.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
2136C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
5008C:\WINDOWS\SysWOW64\WerFault.exe -u -p 5116 -s 1640C:\Windows\SysWOW64\WerFault.exeTrojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
5116"C:\Users\admin\Desktop\Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe" C:\Users\admin\Desktop\Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
3221225477
Modules
Images
c:\users\admin\desktop\trojan-ransom.win32.stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
5736"C:\Users\admin\Desktop\Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe" --Admin IsNotAutoStart IsNotTaskC:\Users\admin\Desktop\Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe
Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\trojan-ransom.win32.stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6436"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.7zC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
4 381
Read events
4 348
Write events
30
Delete events
3

Modification events

(PID) Process:(6436) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6436) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6436) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6436) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.7z
(PID) Process:(6436) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6436) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6436) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6436) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6436) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(6436) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000
Executable files
2
Suspicious files
9
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
5008WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Trojan-Ransom.Wi_687acb3e7522fbc11ba5d3d2a926dfa9e9cfaa19_d5fe5d0e_4bcd8185-8f7b-44a3-ae11-42413beb6959\Report.wer
MD5:
SHA256:
5116Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exeC:\Users\admin\AppData\Local\48a6c82c-c9cb-455b-8c49-e8f899595e45\Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exeexecutable
MD5:EB36F7ABEC3745B20571F5101CB0EB7F
SHA256:ED3B70E7DC29EED106FDAF36979D41353CCE4FF5AF00196BC49FECBDAB2C5B37
5008WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER321B.tmp.xmlxml
MD5:A18F7CFA36FCA544E7A5C028F908F749
SHA256:5602DE98235A46035B280EC3171589CDC1FD829151D9CB363112FF54CADADF3E
5116Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12binary
MD5:4A90329071AE30B759D279CCA342B0A6
SHA256:4F544379EDA8E2653F71472AB968AEFD6B5D1F4B3CE28A5EDB14196184ED3B60
6436WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb6436.13939\Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exeexecutable
MD5:EB36F7ABEC3745B20571F5101CB0EB7F
SHA256:ED3B70E7DC29EED106FDAF36979D41353CCE4FF5AF00196BC49FECBDAB2C5B37
5008WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER2FE7.tmp.dmpbinary
MD5:32428F3B1F5BA5E4650DCFF67D64C3D8
SHA256:BDE0E9F516BB8CF7C18694D316347FE988D8AB97EEFB9D31A9AED198D7C11FBE
5116Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\geo[1].jsonbinary
MD5:4C68F72BB7093BD6E358E3C3BB808F93
SHA256:7C23ACEADEBFA36CE0A8385AFF22A3E9572B27BD38C01EB9D91953E195B42808
5116Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8binary
MD5:1FBB37F79B317A9A248E7C4CE4F5BAC5
SHA256:9BF639C595FE335B6F694EE35990BEFD2123F5E07FD1973FF619E3FC88F5F49F
5008WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER31DC.tmp.WERInternalMetadata.xmlbinary
MD5:4FB2BCB238BAB7BD7B0D0FFE97EAA9A8
SHA256:DAA32B8B2F9C5C9338CC7F6485D0CB0F238593C5EBC5D44732A84EBF061B3112
5008WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe.5116.dmpbinary
MD5:0FE6053272C15443BD80ABAE51E95B9D
SHA256:0F3A65CD5E4BFCB575EB71A06A202D702720201007C521918BD2EDAA6C66D958
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
22
DNS requests
17
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5260
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
GET
200
23.216.77.32:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5260
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5116
Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe
GET
200
142.250.185.99:80
http://c.pki.goog/r/r4.crl
unknown
whitelisted
5116
Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe
GET
200
142.250.185.99:80
http://c.pki.goog/r/gsr1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.216.77.32:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:137
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.75:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2112
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 172.217.16.142
whitelisted
crl.microsoft.com
  • 23.216.77.32
  • 23.216.77.41
  • 23.216.77.35
  • 23.216.77.37
  • 23.216.77.29
  • 23.216.77.38
  • 23.216.77.43
  • 23.216.77.30
  • 23.216.77.34
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.159.75
  • 40.126.31.67
  • 40.126.31.131
  • 40.126.31.0
  • 20.190.159.2
  • 20.190.159.4
  • 40.126.31.129
  • 20.190.159.23
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
  • 51.104.136.2
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
www.microsoft.com
  • 2.16.253.202
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted
api.2ip.ua
  • 104.21.16.1
  • 104.21.96.1
  • 104.21.112.1
  • 104.21.48.1
  • 104.21.80.1
  • 104.21.64.1
  • 104.21.32.1
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Address Lookup DNS Query (2ip .ua)
5116
Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe
Potentially Bad Traffic
ET INFO Observed External IP Lookup Domain (api .2ip .ua in TLS SNI)
5736
Trojan-Ransom.Win32.Stop.ed-ed3b70e7dc29eed106fdaf36979d41353cce4ff5af00196bc49fecbdab2c5b37.exe
Potentially Bad Traffic
ET INFO Observed External IP Lookup Domain (api .2ip .ua in TLS SNI)
No debug info