File name:

dixen18-assassins-creed-unitytorrent_id398489ids1s.exe

Full analysis: https://app.any.run/tasks/aa0d8f2c-895f-4ba3-bbe7-49e23f855cac
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: April 04, 2025, 16:12:50
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
stealer
arch-doc
arch-html
bittorrent
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

A9D291B7640244FA347ACDDE042B0141

SHA1:

978875A000557AE9F592B07D3496CF0932C0AF80

SHA256:

C729612B7B9CA8B1EFA0A014DCC55BCB15228398907CA9746BFE6BE9AA0F1ACC

SSDEEP:

98304:Ns0dqFRzbbCJ2nEvjwQk3FznfVPp2+MQzzB5w/OY+/vgCbUfEuDPdp7ZXusY7IKl:KlIgwFdy

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • dixen18-assassins-creed-unitytorrent_id398489ids1s.exe (PID: 7180)
      • mediaget.exe (PID: 8180)
    • Changes the autorun value in the registry

      • mediaget.exe (PID: 8180)
      • inf_inst.tmp (PID: 5892)
    • BITTORRENT has been detected (SURICATA)

      • mediaget.exe (PID: 8180)
  • SUSPICIOUS

    • Reads Internet Explorer settings

      • dixen18-assassins-creed-unitytorrent_id398489ids1s.exe (PID: 7180)
    • Process drops legitimate windows executable

      • dixen18-assassins-creed-unitytorrent_id398489ids1s.exe (PID: 7180)
    • Creates a software uninstall entry

      • dixen18-assassins-creed-unitytorrent_id398489ids1s.exe (PID: 7180)
    • Reads Microsoft Outlook installation path

      • dixen18-assassins-creed-unitytorrent_id398489ids1s.exe (PID: 7180)
    • The process drops C-runtime libraries

      • dixen18-assassins-creed-unitytorrent_id398489ids1s.exe (PID: 7180)
    • Reads security settings of Internet Explorer

      • dixen18-assassins-creed-unitytorrent_id398489ids1s.exe (PID: 7180)
      • mediaget.exe (PID: 8180)
    • Executable content was dropped or overwritten

      • dixen18-assassins-creed-unitytorrent_id398489ids1s.exe (PID: 7180)
      • inf_inst.exe (PID: 7156)
      • inf_inst.tmp (PID: 5892)
    • Potential Corporate Privacy Violation

      • mediaget.exe (PID: 8180)
    • Reads the Windows owner or organization settings

      • inf_inst.tmp (PID: 5892)
    • Adds/modifies Windows certificates

      • QtWebEngineProcess.exe (PID: 3240)
    • Uses TASKKILL.EXE to kill process

      • mediaget.exe (PID: 8180)
  • INFO

    • Create files in a temporary directory

      • dixen18-assassins-creed-unitytorrent_id398489ids1s.exe (PID: 7180)
      • inf_inst.tmp (PID: 5892)
      • inf_inst.exe (PID: 7156)
    • The sample compiled with english language support

      • dixen18-assassins-creed-unitytorrent_id398489ids1s.exe (PID: 7180)
    • Checks supported languages

      • dixen18-assassins-creed-unitytorrent_id398489ids1s.exe (PID: 7180)
      • mediaget_crashpad_handler.exe (PID: 5024)
      • QtWebEngineProcess.exe (PID: 3240)
      • inf_inst.tmp (PID: 5892)
      • QtWebEngineProcess.exe (PID: 4892)
      • infatica-service-app.exe (PID: 1760)
      • QtWebEngineProcess.exe (PID: 7496)
      • infatica-service-app.exe (PID: 1328)
      • mediaget.exe (PID: 8180)
      • inf_inst.exe (PID: 7156)
      • QtWebEngineProcess.exe (PID: 6488)
    • Checks proxy server information

      • dixen18-assassins-creed-unitytorrent_id398489ids1s.exe (PID: 7180)
      • QtWebEngineProcess.exe (PID: 3240)
      • mediaget.exe (PID: 8180)
    • Reads the computer name

      • dixen18-assassins-creed-unitytorrent_id398489ids1s.exe (PID: 7180)
      • mediaget.exe (PID: 8180)
      • QtWebEngineProcess.exe (PID: 3240)
      • inf_inst.tmp (PID: 5892)
      • QtWebEngineProcess.exe (PID: 6488)
      • QtWebEngineProcess.exe (PID: 4892)
      • QtWebEngineProcess.exe (PID: 7496)
    • Creates files or folders in the user directory

      • dixen18-assassins-creed-unitytorrent_id398489ids1s.exe (PID: 7180)
      • QtWebEngineProcess.exe (PID: 3240)
      • inf_inst.tmp (PID: 5892)
      • mediaget.exe (PID: 8180)
    • Reads the machine GUID from the registry

      • mediaget.exe (PID: 8180)
      • QtWebEngineProcess.exe (PID: 3240)
    • Process checks computer location settings

      • QtWebEngineProcess.exe (PID: 6488)
      • QtWebEngineProcess.exe (PID: 4892)
      • mediaget.exe (PID: 8180)
      • QtWebEngineProcess.exe (PID: 7496)
      • dixen18-assassins-creed-unitytorrent_id398489ids1s.exe (PID: 7180)
    • Reads the software policy settings

      • QtWebEngineProcess.exe (PID: 3240)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:12:11 16:06:37+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.29
CodeSize: 2467328
InitializedDataSize: 2371072
UninitializedDataSize: -
EntryPoint: 0x229618
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: -
FileVersion: 1
InternalName: -
LegalCopyright: -
OriginalFileName: -
ProductName: -
ProductVersion: 1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
144
Monitored processes
16
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start dixen18-assassins-creed-unitytorrent_id398489ids1s.exe sppextcomobj.exe no specs slui.exe no specs #BITTORRENT mediaget.exe mediaget_crashpad_handler.exe no specs qtwebengineprocess.exe inf_inst.exe qtwebengineprocess.exe no specs inf_inst.tmp qtwebengineprocess.exe no specs infatica-service-app.exe no specs qtwebengineprocess.exe no specs taskkill.exe no specs conhost.exe no specs infatica-service-app.exe no specs dixen18-assassins-creed-unitytorrent_id398489ids1s.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1280"C:\Users\admin\AppData\Local\Temp\dixen18-assassins-creed-unitytorrent_id398489ids1s.exe" C:\Users\admin\AppData\Local\Temp\dixen18-assassins-creed-unitytorrent_id398489ids1s.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Version:
1.0
Modules
Images
c:\users\admin\appdata\local\temp\dixen18-assassins-creed-unitytorrent_id398489ids1s.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
1328C:\Users\admin\AppData\Local\Infatica-m\infatica-service-app.exe C:\Users\admin\AppData\Local\Infatica-m\infatica-service-app.exemediaget.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\appdata\local\infatica-m\infatica-service-app.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
1760"C:\Users\admin\AppData\Local\Infatica-m\infatica-service-app.exe"C:\Users\admin\AppData\Local\Infatica-m\infatica-service-app.exeinf_inst.tmp
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\infatica-m\infatica-service-app.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
3240"C:\Users\admin\MediaGet2\QtWebEngineProcess.exe" --type=utility --enable-features=AllowContentInitiatedDataUrlNavigations,TracingServiceInProcess --disable-features=BackgroundFetch,ConsolidatedMovementXY,DnsOverHttpsUpgrade,FormControlsRefresh,MojoVideoCapture,PictureInPicture,SmsReceiver,UseSkiaRenderer,WebPayments,WebUSB --lang=en-US --service-sandbox-type=network --application-name=MediaGet2 --webengine-schemes=qrc:sLV --mojo-platform-channel-handle=2960 /prefetch:8C:\Users\admin\MediaGet2\QtWebEngineProcess.exe
mediaget.exe
User:
admin
Company:
The Qt Company Ltd.
Integrity Level:
HIGH
Description:
C++ Application Development Framework
Version:
5.15.2.0
Modules
Images
c:\users\admin\mediaget2\qtwebengineprocess.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
4892"C:\Users\admin\MediaGet2\QtWebEngineProcess.exe" --type=renderer --disable-speech-api --enable-threaded-compositing --enable-features=AllowContentInitiatedDataUrlNavigations,TracingServiceInProcess --disable-features=BackgroundFetch,ConsolidatedMovementXY,DnsOverHttpsUpgrade,FormControlsRefresh,MojoVideoCapture,PictureInPicture,SmsReceiver,UseSkiaRenderer,WebPayments,WebUSB --disable-gpu-compositing --lang=en-US --webengine-schemes=qrc:sLV --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=4288 /prefetch:1C:\Users\admin\MediaGet2\QtWebEngineProcess.exemediaget.exe
User:
admin
Company:
The Qt Company Ltd.
Integrity Level:
LOW
Description:
C++ Application Development Framework
Version:
5.15.2.0
Modules
Images
c:\users\admin\mediaget2\qtwebengineprocess.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
5024C:\Users\admin\MediaGet2\mediaget_crashpad_handler.exe --no-rate-limit "--database=C:\Users\admin\AppData\Local\Media Get LLC\MediaGet2\crashdumps" "--metrics-dir=C:\Users\admin\AppData\Local\Media Get LLC\MediaGet2\crashdumps" "--attachment=C:/Users/admin/AppData/Local/Media Get LLC/MediaGet2/crashdumps/logs/log" "--attachment=C:\Users\admin\AppData\Local\Media Get LLC\MediaGet2\crashdumps\0a7eb4f2-9072-40b3-6afb-bdb6616f3d93.run\__sentry-event" "--attachment=C:\Users\admin\AppData\Local\Media Get LLC\MediaGet2\crashdumps\0a7eb4f2-9072-40b3-6afb-bdb6616f3d93.run\__sentry-breadcrumb1" "--attachment=C:\Users\admin\AppData\Local\Media Get LLC\MediaGet2\crashdumps\0a7eb4f2-9072-40b3-6afb-bdb6616f3d93.run\__sentry-breadcrumb2" --initial-client-data=0x6ac,0x6b0,0x6b4,0x670,0x6b8,0x6e887b7c,0x6e887b90,0x6e887ba0C:\Users\admin\MediaGet2\mediaget_crashpad_handler.exemediaget.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\mediaget2\mediaget_crashpad_handler.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
5892"C:\Users\admin\AppData\Local\Temp\is-F2O9L.tmp\inf_inst.tmp" /SL5="$30268,4562786,832512,C:\Users\admin\AppData\Local\Temp\infatica\inf_inst.exe" /verysilentC:\Users\admin\AppData\Local\Temp\is-F2O9L.tmp\inf_inst.tmp
inf_inst.exe
User:
admin
Company:
infatica
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-f2o9l.tmp\inf_inst.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comdlg32.dll
6488"C:\Users\admin\MediaGet2\QtWebEngineProcess.exe" --type=renderer --disable-speech-api --enable-threaded-compositing --enable-features=AllowContentInitiatedDataUrlNavigations,TracingServiceInProcess --disable-features=BackgroundFetch,ConsolidatedMovementXY,DnsOverHttpsUpgrade,FormControlsRefresh,MojoVideoCapture,PictureInPicture,SmsReceiver,UseSkiaRenderer,WebPayments,WebUSB --disable-gpu-compositing --lang=en-US --webengine-schemes=qrc:sLV --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=3 --mojo-platform-channel-handle=3776 /prefetch:1C:\Users\admin\MediaGet2\QtWebEngineProcess.exemediaget.exe
User:
admin
Company:
The Qt Company Ltd.
Integrity Level:
LOW
Description:
C++ Application Development Framework
Version:
5.15.2.0
Modules
Images
c:\users\admin\mediaget2\qtwebengineprocess.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
7156"C:\Users\admin\AppData\Local\Temp\infatica\inf_inst.exe" /verysilentC:\Users\admin\AppData\Local\Temp\infatica\inf_inst.exe
dixen18-assassins-creed-unitytorrent_id398489ids1s.exe
User:
admin
Company:
infatica
Integrity Level:
HIGH
Description:
infatica Setup
Exit code:
0
Version:
Modules
Images
c:\users\admin\appdata\local\temp\infatica\inf_inst.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comctl32.dll
7180"C:\Users\admin\AppData\Local\Temp\dixen18-assassins-creed-unitytorrent_id398489ids1s.exe" C:\Users\admin\AppData\Local\Temp\dixen18-assassins-creed-unitytorrent_id398489ids1s.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Version:
1.0
Modules
Images
c:\users\admin\appdata\local\temp\dixen18-assassins-creed-unitytorrent_id398489ids1s.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ws2_32.dll
Total events
15 053
Read events
14 538
Write events
354
Delete events
161

Modification events

(PID) Process:(7180) dixen18-assassins-creed-unitytorrent_id398489ids1s.exeKey:HKEY_CURRENT_USER\SOFTWARE\Media Get LLC\MediaGet2-systemScope\mediaget_info
Operation:writeName:hasDownloadedUpdate
Value:
false
(PID) Process:(7180) dixen18-assassins-creed-unitytorrent_id398489ids1s.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(7180) dixen18-assassins-creed-unitytorrent_id398489ids1s.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(7180) dixen18-assassins-creed-unitytorrent_id398489ids1s.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(7180) dixen18-assassins-creed-unitytorrent_id398489ids1s.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch
Operation:writeName:Version
Value:
WS not running
(PID) Process:(7180) dixen18-assassins-creed-unitytorrent_id398489ids1s.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main
Operation:writeName:DisableFirstRunCustomize
Value:
1
(PID) Process:(7180) dixen18-assassins-creed-unitytorrent_id398489ids1s.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MediaGet
Operation:writeName:InstallLocation
Value:
C:\Users\admin\MediaGet2\
(PID) Process:(7180) dixen18-assassins-creed-unitytorrent_id398489ids1s.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MediaGet
Operation:writeName:DisplayName
Value:
MediaGet
(PID) Process:(7180) dixen18-assassins-creed-unitytorrent_id398489ids1s.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MediaGet
Operation:writeName:DisplayIcon
Value:
C:\Users\admin\MediaGet2\mediaget.exe
(PID) Process:(7180) dixen18-assassins-creed-unitytorrent_id398489ids1s.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MediaGet
Operation:writeName:UninstallString
Value:
C:\Users\admin\MediaGet2\mediaget-uninstaller.exe
Executable files
143
Suspicious files
100
Text files
177
Unknown types
0

Dropped files

PID
Process
Filename
Type
7180dixen18-assassins-creed-unitytorrent_id398489ids1s.exeC:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\page-wait.pngimage
MD5:A8210694C45753A7A027296EF745E316
SHA256:14DE6662062ADC45202E2021AA4D60E98637DC892A22ACB2C7CC16DA3344C14D
7180dixen18-assassins-creed-unitytorrent_id398489ids1s.exeC:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\preloader.htmlhtml
MD5:A03BFDC6FBC9F051E37F8050E0E6B305
SHA256:93295EF076AD43849ED5A4389990C86002B7ECD78C675EEB62932809A8B9248F
7180dixen18-assassins-creed-unitytorrent_id398489ids1s.exeC:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\translations.jsonbinary
MD5:28AA84D5ACDFF22EA8F5834721E78FF7
SHA256:DB24A9E9715861D73106D3B36D93EB2C38E04934BBDA559F747F1C253241691F
7180dixen18-assassins-creed-unitytorrent_id398489ids1s.exeC:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\curl-ca-bundle.crttext
MD5:BE2B0736EA029FFF398559FA7DF4E646
SHA256:C05A79296D61E3B2A2EBAF5AF476839B976D69A5ACB6F581A667E60E681049A2
7180dixen18-assassins-creed-unitytorrent_id398489ids1s.exeC:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\bundles\bundle-fluke.htmlhtml
MD5:6C5756D5961BCE348DD05730D1FC4FAD
SHA256:4DE619F9F6734103D90A4EB3265961F67C6BFE6CD76DDB1C789460090CE326D4
7180dixen18-assassins-creed-unitytorrent_id398489ids1s.exeC:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\bundles\bundle-anyip.htmlhtml
MD5:EA4801ED34FB540DEA52DA15043E288C
SHA256:6C70956180D700EF26FC4C5B57661353E4B04F8CFC90C90FA65E08B457460640
7180dixen18-assassins-creed-unitytorrent_id398489ids1s.exeC:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\archive.7zcompressed
MD5:0DDACA5E36E0780E2B5621577B58357B
SHA256:A78A93D1D879E579482555D21699F7DA1AC3C47F500C0F1AEB326901100FD5A0
7180dixen18-assassins-creed-unitytorrent_id398489ids1s.exeC:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\bundles\bundle-opera.htmlhtml
MD5:B31480745C6BE119F21381BB223D6C06
SHA256:31E2F5C2C37BDA4E907C9AB540398235052AD69FE0E96A5B126559E198983292
7180dixen18-assassins-creed-unitytorrent_id398489ids1s.exeC:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\bundles\bundle-coc.htmlhtml
MD5:9C040C5F4DB773934730C0471363B4A4
SHA256:794AA2B7DCC14CF1A7017A9568AB47A81DA2F2D81CE6DE5BB777EDAE21AEF189
7180dixen18-assassins-creed-unitytorrent_id398489ids1s.exeC:\Users\admin\AppData\Local\Temp\mediaget-installer-tmp\bundles\bundle-opera-friendly.htmlhtml
MD5:DA6B491A758335157691DF55815F6B58
SHA256:80143C5A05CDC5129B4E701D7E80525E74C64FF5C35DA11C727F19A014E858E4
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
49
DNS requests
24
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7912
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7912
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.155:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.155:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
3216
svchost.exe
172.172.255.217:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6544
svchost.exe
20.190.159.130:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
7180
dixen18-assassins-creed-unitytorrent_id398489ids1s.exe
51.158.227.48:443
mediaget.com
Online S.a.s.
FR
suspicious
2112
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 23.48.23.155
  • 23.48.23.162
  • 23.48.23.164
  • 23.48.23.141
  • 23.48.23.159
  • 23.48.23.161
  • 23.48.23.168
  • 23.48.23.149
  • 23.48.23.157
whitelisted
google.com
  • 172.217.18.14
whitelisted
client.wns.windows.com
  • 172.172.255.217
whitelisted
login.live.com
  • 20.190.159.130
  • 40.126.31.0
  • 20.190.159.23
  • 40.126.31.130
  • 20.190.159.73
  • 40.126.31.73
  • 40.126.31.129
  • 40.126.31.1
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
mediaget.com
  • 51.158.227.48
  • 51.158.129.110
unknown
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
www.microsoft.com
  • 2.16.253.202
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted

Threats

PID
Process
Class
Message
8180
mediaget.exe
Misc activity
INFO [ANY.RUN] P2P BitTorrent Protocol
8180
mediaget.exe
Potential Corporate Privacy Violation
ET P2P Vuze BT UDP Connection (5)
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 22
8180
mediaget.exe
Potential Corporate Privacy Violation
ET P2P BitTorrent Announce
8180
mediaget.exe
Potential Corporate Privacy Violation
GPL P2P BitTorrent announce request
No debug info