File name:

dixen18-assassins-creed-unitytorrent_id398489ids1s.exe

Full analysis: https://app.any.run/tasks/aa0d8f2c-895f-4ba3-bbe7-49e23f855cac
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: April 04, 2025, 16:12:50
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
stealer
arch-doc
arch-html
bittorrent
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

A9D291B7640244FA347ACDDE042B0141

SHA1:

978875A000557AE9F592B07D3496CF0932C0AF80

SHA256:

C729612B7B9CA8B1EFA0A014DCC55BCB15228398907CA9746BFE6BE9AA0F1ACC

SSDEEP:

98304:Ns0dqFRzbbCJ2nEvjwQk3FznfVPp2+MQzzB5w/OY+/vgCbUfEuDPdp7ZXusY7IKl:KlIgwFdy

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • dixen18-assassins-creed-unitytorrent_id398489ids1s.exe (PID: 7180)
      • mediaget.exe (PID: 8180)
    • Changes the autorun value in the registry

      • mediaget.exe (PID: 8180)
      • inf_inst.tmp (PID: 5892)
    • BITTORRENT has been detected (SURICATA)

      • mediaget.exe (PID: 8180)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • dixen18-assassins-creed-unitytorrent_id398489ids1s.exe (PID: 7180)
    • Executable content was dropped or overwritten

      • dixen18-assassins-creed-unitytorrent_id398489ids1s.exe (PID: 7180)
      • inf_inst.exe (PID: 7156)
      • inf_inst.tmp (PID: 5892)
    • Creates a software uninstall entry

      • dixen18-assassins-creed-unitytorrent_id398489ids1s.exe (PID: 7180)
    • Reads Internet Explorer settings

      • dixen18-assassins-creed-unitytorrent_id398489ids1s.exe (PID: 7180)
    • The process drops C-runtime libraries

      • dixen18-assassins-creed-unitytorrent_id398489ids1s.exe (PID: 7180)
    • Potential Corporate Privacy Violation

      • mediaget.exe (PID: 8180)
    • Reads the Windows owner or organization settings

      • inf_inst.tmp (PID: 5892)
    • Reads security settings of Internet Explorer

      • mediaget.exe (PID: 8180)
      • dixen18-assassins-creed-unitytorrent_id398489ids1s.exe (PID: 7180)
    • Adds/modifies Windows certificates

      • QtWebEngineProcess.exe (PID: 3240)
    • Reads Microsoft Outlook installation path

      • dixen18-assassins-creed-unitytorrent_id398489ids1s.exe (PID: 7180)
    • Uses TASKKILL.EXE to kill process

      • mediaget.exe (PID: 8180)
  • INFO

    • The sample compiled with english language support

      • dixen18-assassins-creed-unitytorrent_id398489ids1s.exe (PID: 7180)
    • Checks supported languages

      • dixen18-assassins-creed-unitytorrent_id398489ids1s.exe (PID: 7180)
      • mediaget.exe (PID: 8180)
      • mediaget_crashpad_handler.exe (PID: 5024)
      • QtWebEngineProcess.exe (PID: 3240)
      • inf_inst.exe (PID: 7156)
      • inf_inst.tmp (PID: 5892)
      • QtWebEngineProcess.exe (PID: 6488)
      • QtWebEngineProcess.exe (PID: 4892)
      • infatica-service-app.exe (PID: 1760)
      • QtWebEngineProcess.exe (PID: 7496)
      • infatica-service-app.exe (PID: 1328)
    • Create files in a temporary directory

      • dixen18-assassins-creed-unitytorrent_id398489ids1s.exe (PID: 7180)
      • inf_inst.exe (PID: 7156)
      • inf_inst.tmp (PID: 5892)
    • Reads the computer name

      • mediaget.exe (PID: 8180)
      • QtWebEngineProcess.exe (PID: 3240)
      • inf_inst.tmp (PID: 5892)
      • QtWebEngineProcess.exe (PID: 6488)
      • QtWebEngineProcess.exe (PID: 4892)
      • dixen18-assassins-creed-unitytorrent_id398489ids1s.exe (PID: 7180)
      • QtWebEngineProcess.exe (PID: 7496)
    • Creates files or folders in the user directory

      • dixen18-assassins-creed-unitytorrent_id398489ids1s.exe (PID: 7180)
      • mediaget.exe (PID: 8180)
      • QtWebEngineProcess.exe (PID: 3240)
      • inf_inst.tmp (PID: 5892)
    • Process checks computer location settings

      • dixen18-assassins-creed-unitytorrent_id398489ids1s.exe (PID: 7180)
      • QtWebEngineProcess.exe (PID: 6488)
      • QtWebEngineProcess.exe (PID: 4892)
      • mediaget.exe (PID: 8180)
      • QtWebEngineProcess.exe (PID: 7496)
    • Reads the machine GUID from the registry

      • mediaget.exe (PID: 8180)
      • QtWebEngineProcess.exe (PID: 3240)
    • Checks proxy server information

      • mediaget.exe (PID: 8180)
      • QtWebEngineProcess.exe (PID: 3240)
      • dixen18-assassins-creed-unitytorrent_id398489ids1s.exe (PID: 7180)
    • Reads the software policy settings

      • QtWebEngineProcess.exe (PID: 3240)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:12:11 16:06:37+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.29
CodeSize: 2467328
InitializedDataSize: 2371072
UninitializedDataSize: -
EntryPoint: 0x229618
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: -
FileVersion: 1
InternalName: -
LegalCopyright: -
OriginalFileName: -
ProductName: -
ProductVersion: 1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
144
Monitored processes
16
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start dixen18-assassins-creed-unitytorrent_id398489ids1s.exe sppextcomobj.exe no specs slui.exe no specs #BITTORRENT mediaget.exe mediaget_crashpad_handler.exe no specs qtwebengineprocess.exe inf_inst.exe qtwebengineprocess.exe no specs inf_inst.tmp qtwebengineprocess.exe no specs infatica-service-app.exe no specs qtwebengineprocess.exe no specs taskkill.exe no specs conhost.exe no specs infatica-service-app.exe no specs dixen18-assassins-creed-unitytorrent_id398489ids1s.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1280"C:\Users\admin\AppData\Local\Temp\dixen18-assassins-creed-unitytorrent_id398489ids1s.exe" C:\Users\admin\AppData\Local\Temp\dixen18-assassins-creed-unitytorrent_id398489ids1s.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Version:
1.0
Modules
Images
c:\users\admin\appdata\local\temp\dixen18-assassins-creed-unitytorrent_id398489ids1s.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
1328C:\Users\admin\AppData\Local\Infatica-m\infatica-service-app.exe C:\Users\admin\AppData\Local\Infatica-m\infatica-service-app.exemediaget.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\infatica-m\infatica-service-app.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
1760"C:\Users\admin\AppData\Local\Infatica-m\infatica-service-app.exe"C:\Users\admin\AppData\Local\Infatica-m\infatica-service-app.exeinf_inst.tmp
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\infatica-m\infatica-service-app.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
3240"C:\Users\admin\MediaGet2\QtWebEngineProcess.exe" --type=utility --enable-features=AllowContentInitiatedDataUrlNavigations,TracingServiceInProcess --disable-features=BackgroundFetch,ConsolidatedMovementXY,DnsOverHttpsUpgrade,FormControlsRefresh,MojoVideoCapture,PictureInPicture,SmsReceiver,UseSkiaRenderer,WebPayments,WebUSB --lang=en-US --service-sandbox-type=network --application-name=MediaGet2 --webengine-schemes=qrc:sLV --mojo-platform-channel-handle=2960 /prefetch:8C:\Users\admin\MediaGet2\QtWebEngineProcess.exe
mediaget.exe
User:
admin
Company:
The Qt Company Ltd.
Integrity Level:
HIGH
Description:
C++ Application Development Framework
Version:
5.15.2.0
Modules
Images
c:\users\admin\mediaget2\qtwebengineprocess.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
4892"C:\Users\admin\MediaGet2\QtWebEngineProcess.exe" --type=renderer --disable-speech-api --enable-threaded-compositing --enable-features=AllowContentInitiatedDataUrlNavigations,TracingServiceInProcess --disable-features=BackgroundFetch,ConsolidatedMovementXY,DnsOverHttpsUpgrade,FormControlsRefresh,MojoVideoCapture,PictureInPicture,SmsReceiver,UseSkiaRenderer,WebPayments,WebUSB --disable-gpu-compositing --lang=en-US --webengine-schemes=qrc:sLV --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=4288 /prefetch:1C:\Users\admin\MediaGet2\QtWebEngineProcess.exemediaget.exe
User:
admin
Company:
The Qt Company Ltd.
Integrity Level:
LOW
Description:
C++ Application Development Framework
Version:
5.15.2.0
Modules
Images
c:\users\admin\mediaget2\qtwebengineprocess.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
5024C:\Users\admin\MediaGet2\mediaget_crashpad_handler.exe --no-rate-limit "--database=C:\Users\admin\AppData\Local\Media Get LLC\MediaGet2\crashdumps" "--metrics-dir=C:\Users\admin\AppData\Local\Media Get LLC\MediaGet2\crashdumps" "--attachment=C:/Users/admin/AppData/Local/Media Get LLC/MediaGet2/crashdumps/logs/log" "--attachment=C:\Users\admin\AppData\Local\Media Get LLC\MediaGet2\crashdumps\0a7eb4f2-9072-40b3-6afb-bdb6616f3d93.run\__sentry-event" "--attachment=C:\Users\admin\AppData\Local\Media Get LLC\MediaGet2\crashdumps\0a7eb4f2-9072-40b3-6afb-bdb6616f3d93.run\__sentry-breadcrumb1" "--attachment=C:\Users\admin\AppData\Local\Media Get LLC\MediaGet2\crashdumps\0a7eb4f2-9072-40b3-6afb-bdb6616f3d93.run\__sentry-breadcrumb2" --initial-client-data=0x6ac,0x6b0,0x6b4,0x670,0x6b8,0x6e887b7c,0x6e887b90,0x6e887ba0C:\Users\admin\MediaGet2\mediaget_crashpad_handler.exemediaget.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\mediaget2\mediaget_crashpad_handler.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
5892"C:\Users\admin\AppData\Local\Temp\is-F2O9L.tmp\inf_inst.tmp" /SL5="$30268,4562786,832512,C:\Users\admin\AppData\Local\Temp\infatica\inf_inst.exe" /verysilentC:\Users\admin\AppData\Local\Temp\is-F2O9L.tmp\inf_inst.tmp
inf_inst.exe
User:
admin
Company:
infatica
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-f2o9l.tmp\inf_inst.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comdlg32.dll
6488"C:\Users\admin\MediaGet2\QtWebEngineProcess.exe" --type=renderer --disable-speech-api --enable-threaded-compositing --enable-features=AllowContentInitiatedDataUrlNavigations,TracingServiceInProcess --disable-features=BackgroundFetch,ConsolidatedMovementXY,DnsOverHttpsUpgrade,FormControlsRefresh,MojoVideoCapture,PictureInPicture,SmsReceiver,UseSkiaRenderer,WebPayments,WebUSB --disable-gpu-compositing --lang=en-US --webengine-schemes=qrc:sLV --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=3 --mojo-platform-channel-handle=3776 /prefetch:1C:\Users\admin\MediaGet2\QtWebEngineProcess.exemediaget.exe
User:
admin
Company:
The Qt Company Ltd.
Integrity Level:
LOW
Description:
C++ Application Development Framework
Version:
5.15.2.0
Modules
Images
c:\users\admin\mediaget2\qtwebengineprocess.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
7156"C:\Users\admin\AppData\Local\Temp\infatica\inf_inst.exe" /verysilentC:\Users\admin\AppData\Local\Temp\infatica\inf_inst.exe
dixen18-assassins-creed-unitytorrent_id398489ids1s.exe
User:
admin
Company:
infatica
Integrity Level:
HIGH
Description:
infatica Setup
Exit code:
0
Version:
Modules
Images
c:\users\admin\appdata\local\temp\infatica\inf_inst.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comctl32.dll
7180"C:\Users\admin\AppData\Local\Temp\dixen18-assassins-creed-unitytorrent_id398489ids1s.exe" C:\Users\admin\AppData\Local\Temp\dixen18-assassins-creed-unitytorrent_id398489ids1s.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
1.0
Modules
Images
c:\users\admin\appdata\local\temp\dixen18-assassins-creed-unitytorrent_id398489ids1s.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
Total events
15 053
Read events
14 538
Write events
354
Delete events
161

Modification events

(PID) Process:(7180) dixen18-assassins-creed-unitytorrent_id398489ids1s.exeKey:HKEY_CURRENT_USER\SOFTWARE\Media Get LLC\MediaGet2-systemScope\mediaget_info
Operation:writeName:hasDownloadedUpdate
Value:
false
(PID) Process:(7180) dixen18-assassins-creed-unitytorrent_id398489ids1s.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(7180) dixen18-assassins-creed-unitytorrent_id398489ids1s.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(7180) dixen18-assassins-creed-unitytorrent_id398489ids1s.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(7180) dixen18-assassins-creed-unitytorrent_id398489ids1s.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch
Operation:writeName:Version
Value:
WS not running
(PID) Process:(7180) dixen18-assassins-creed-unitytorrent_id398489ids1s.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main
Operation:writeName:DisableFirstRunCustomize
Value:
1
(PID) Process:(7180) dixen18-assassins-creed-unitytorrent_id398489ids1s.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MediaGet
Operation:writeName:InstallLocation
Value:
C:\Users\admin\MediaGet2\
(PID) Process:(7180) dixen18-assassins-creed-unitytorrent_id398489ids1s.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MediaGet
Operation:writeName:DisplayName
Value:
MediaGet
(PID) Process:(7180) dixen18-assassins-creed-unitytorrent_id398489ids1s.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MediaGet
Operation:writeName:DisplayIcon
Value:
C:\Users\admin\MediaGet2\mediaget.exe
(PID) Process:(7180) dixen18-assassins-creed-unitytorrent_id398489ids1s.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MediaGet
Operation:writeName:UninstallString
Value:
C:\Users\admin\MediaGet2\mediaget-uninstaller.exe
Executable files
143
Suspicious files
100
Text files
177
Unknown types
0

Dropped files

PID
Process
Filename
Type
7180dixen18-assassins-creed-unitytorrent_id398489ids1s.exeC:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\bundles\bundle-anyip.htmlhtml
MD5:EA4801ED34FB540DEA52DA15043E288C
SHA256:6C70956180D700EF26FC4C5B57661353E4B04F8CFC90C90FA65E08B457460640
7180dixen18-assassins-creed-unitytorrent_id398489ids1s.exeC:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\bundles\bundle-infatica.htmlhtml
MD5:2E869FFBB8D98C14C36BBAF9BE3363E1
SHA256:29D547401B4746083E7418FF21A5CFA43F4F7E5CBC0CEE4DFA0629F240CF2793
7180dixen18-assassins-creed-unitytorrent_id398489ids1s.exeC:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\archive.7zcompressed
MD5:0DDACA5E36E0780E2B5621577B58357B
SHA256:A78A93D1D879E579482555D21699F7DA1AC3C47F500C0F1AEB326901100FD5A0
7180dixen18-assassins-creed-unitytorrent_id398489ids1s.exeC:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\bundles\bundle-neunative.htmlhtml
MD5:8282B7727FBADD4B5FCE569756F99001
SHA256:F34A7C91985801DD2EEB8FAA4D2CD4617D7483AE31EE64230F6BC12B1F996EF6
7180dixen18-assassins-creed-unitytorrent_id398489ids1s.exeC:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\bundles\bundle-coc.htmlhtml
MD5:9C040C5F4DB773934730C0471363B4A4
SHA256:794AA2B7DCC14CF1A7017A9568AB47A81DA2F2D81CE6DE5BB777EDAE21AEF189
7180dixen18-assassins-creed-unitytorrent_id398489ids1s.exeC:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\curl-ca-bundle.crttext
MD5:BE2B0736EA029FFF398559FA7DF4E646
SHA256:C05A79296D61E3B2A2EBAF5AF476839B976D69A5ACB6F581A667E60E681049A2
7180dixen18-assassins-creed-unitytorrent_id398489ids1s.exeC:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\bundles\bundle-ipgate.htmlhtml
MD5:489437B2E6C69D001ECFB3A873EB2B1C
SHA256:9FEA202F0DA3CF7468AD765FCF902885352426F57AE0695FEAB0C1253607E71D
7180dixen18-assassins-creed-unitytorrent_id398489ids1s.exeC:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\bundles\bundle-av360.htmlhtml
MD5:A57927C1723EA25FD20FE82369F0A000
SHA256:D07C58DC6C503AAEA6F0169531FEBEE0FAC6FCEBA60E67E144D7C4F16732A878
7180dixen18-assassins-creed-unitytorrent_id398489ids1s.exeC:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\bundles\bundle-fluke-start.htmlhtml
MD5:DBEAD75308BA47001C509F20DAF4D1B0
SHA256:334C82AFBD3FC4B063AE4C65AB13424D61CE9386EF5EC3512A55CAA8CD610F50
7180dixen18-assassins-creed-unitytorrent_id398489ids1s.exeC:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\bundles\bundle-pixel.htmlhtml
MD5:7CFE710FFB11E82D5EB017BBB9AD3A86
SHA256:28D3803DBE8D068857636A2F5FDE3A30CE546580666EC2466D16594359FE49DA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
49
DNS requests
24
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.155:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7912
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7912
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.155:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
3216
svchost.exe
172.172.255.217:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6544
svchost.exe
20.190.159.130:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
7180
dixen18-assassins-creed-unitytorrent_id398489ids1s.exe
51.158.227.48:443
mediaget.com
Online S.a.s.
FR
suspicious
2112
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 23.48.23.155
  • 23.48.23.162
  • 23.48.23.164
  • 23.48.23.141
  • 23.48.23.159
  • 23.48.23.161
  • 23.48.23.168
  • 23.48.23.149
  • 23.48.23.157
whitelisted
google.com
  • 172.217.18.14
whitelisted
client.wns.windows.com
  • 172.172.255.217
whitelisted
login.live.com
  • 20.190.159.130
  • 40.126.31.0
  • 20.190.159.23
  • 40.126.31.130
  • 20.190.159.73
  • 40.126.31.73
  • 40.126.31.129
  • 40.126.31.1
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
mediaget.com
  • 51.158.227.48
  • 51.158.129.110
unknown
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
www.microsoft.com
  • 2.16.253.202
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted

Threats

PID
Process
Class
Message
8180
mediaget.exe
Misc activity
INFO [ANY.RUN] P2P BitTorrent Protocol
8180
mediaget.exe
Potential Corporate Privacy Violation
ET P2P Vuze BT UDP Connection (5)
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 22
8180
mediaget.exe
Potential Corporate Privacy Violation
ET P2P BitTorrent Announce
8180
mediaget.exe
Potential Corporate Privacy Violation
GPL P2P BitTorrent announce request
No debug info