File name:

molodenkaya_18_let_mamka_soblaznila_synamkufk.exe

Full analysis: https://app.any.run/tasks/a62b3f1a-a213-4bc9-8b7d-7015953ae57d
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: August 26, 2024, 09:07:32
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
pua
adware
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

10DB6B05447D2113EB89E12B9FE581A6

SHA1:

FF028ED75B423F9C53B54663B7D06CC55B0BBC51

SHA256:

D5CB13947FFBD289D977FD7F80BFC2219B2980F2E62D9563CC80F18202F2329A

SSDEEP:

24576:xtd1NzJjwfyvya1xNs8vzWNo/rUx1tiH6wl9:t15r1xNs8vzWN8ro1tiak9

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • ADWARE has been detected (SURICATA)

      • molodenkaya_18_let_mamka_soblaznila_synamkufk.exe (PID: 1656)
  • SUSPICIOUS

    • Drops the executable file immediately after the start

      • molodenkaya_18_let_mamka_soblaznila_synamkufk.exe (PID: 6852)
      • molodenkaya_18_let_mamka_soblaznila_synamkufk.exe (PID: 1656)
      • Zona.exe (PID: 7016)
    • Reads the date of Windows installation

      • molodenkaya_18_let_mamka_soblaznila_synamkufk.exe (PID: 6852)
    • Reads security settings of Internet Explorer

      • molodenkaya_18_let_mamka_soblaznila_synamkufk.exe (PID: 6852)
      • molodenkaya_18_let_mamka_soblaznila_synamkufk.exe (PID: 1656)
      • Zona.exe (PID: 7016)
    • Application launched itself

      • molodenkaya_18_let_mamka_soblaznila_synamkufk.exe (PID: 6852)
    • Access to an unwanted program domain was detected

      • molodenkaya_18_let_mamka_soblaznila_synamkufk.exe (PID: 1656)
    • Process drops legitimate windows executable

      • molodenkaya_18_let_mamka_soblaznila_synamkufk.exe (PID: 1656)
      • Zona.exe (PID: 7016)
    • Executable content was dropped or overwritten

      • molodenkaya_18_let_mamka_soblaznila_synamkufk.exe (PID: 1656)
      • Zona.exe (PID: 7016)
    • Process requests binary or script from the Internet

      • molodenkaya_18_let_mamka_soblaznila_synamkufk.exe (PID: 1656)
      • Zona.exe (PID: 7016)
    • The process drops C-runtime libraries

      • molodenkaya_18_let_mamka_soblaznila_synamkufk.exe (PID: 1656)
      • Zona.exe (PID: 7016)
  • INFO

    • Checks supported languages

      • molodenkaya_18_let_mamka_soblaznila_synamkufk.exe (PID: 6852)
      • molodenkaya_18_let_mamka_soblaznila_synamkufk.exe (PID: 1656)
      • java.exe (PID: 7072)
      • javaw.exe (PID: 2228)
      • javaw.exe (PID: 5372)
      • Zona.exe (PID: 7016)
      • java.exe (PID: 2640)
      • javaw.exe (PID: 6796)
      • javaw.exe (PID: 1608)
    • Reads the computer name

      • molodenkaya_18_let_mamka_soblaznila_synamkufk.exe (PID: 6852)
      • molodenkaya_18_let_mamka_soblaznila_synamkufk.exe (PID: 1656)
      • Zona.exe (PID: 7016)
    • Create files in a temporary directory

      • molodenkaya_18_let_mamka_soblaznila_synamkufk.exe (PID: 6852)
      • molodenkaya_18_let_mamka_soblaznila_synamkufk.exe (PID: 1656)
      • javaw.exe (PID: 5372)
      • javaw.exe (PID: 2228)
      • java.exe (PID: 2640)
      • java.exe (PID: 7072)
      • javaw.exe (PID: 6796)
      • javaw.exe (PID: 1608)
    • Process checks computer location settings

      • molodenkaya_18_let_mamka_soblaznila_synamkufk.exe (PID: 6852)
    • Checks proxy server information

      • molodenkaya_18_let_mamka_soblaznila_synamkufk.exe (PID: 1656)
      • Zona.exe (PID: 7016)
    • Creates files in the program directory

      • molodenkaya_18_let_mamka_soblaznila_synamkufk.exe (PID: 1656)
      • java.exe (PID: 7072)
      • Zona.exe (PID: 7016)
    • Creates files or folders in the user directory

      • molodenkaya_18_let_mamka_soblaznila_synamkufk.exe (PID: 1656)
      • Zona.exe (PID: 7016)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2020:10:01 06:46:54+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 10
CodeSize: 471552
InitializedDataSize: 308224
UninitializedDataSize: -
EntryPoint: 0x51004
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 2.0.4.5
ProductVersionNumber: 2.0.4.5
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Unknown (0019)
CharacterSet: Unicode
CompanyName: 4th generation
FileDescription: Zona installer
FileVersion: 2.0.4.5
InternalName: ZonaInstaller.exe
LegalCopyright: Copyright (C) 2017
ProductName: Zona installer
ProductVersion: 2.0.4.5
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
13
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start molodenkaya_18_let_mamka_soblaznila_synamkufk.exe no specs #ADWARE molodenkaya_18_let_mamka_soblaznila_synamkufk.exe java.exe no specs conhost.exe no specs icacls.exe no specs conhost.exe no specs javaw.exe no specs javaw.exe no specs zona.exe java.exe no specs conhost.exe no specs javaw.exe no specs javaw.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1608"C:\PROGRA~2\Zona\jre\bin\javaw.exe" -classpath "C:\PROGRA~2\Zona\Zona.jar" org.gudy.azureus2.core3.util.ConstantsC:\Program Files (x86)\Zona\jre\bin\javaw.exeZona.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
HIGH
Description:
Java(TM) Platform SE binary
Exit code:
2103
Version:
8.0.2120.10
Modules
Images
c:\program files (x86)\zona\jre\bin\javaw.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
1656"C:\Users\admin\Desktop\MOLODE~1.EXE" /secondInstance /logPath "C:\Users\admin\AppData\Local\Temp\ZonaInstall.log"C:\Users\admin\Desktop\molodenkaya_18_let_mamka_soblaznila_synamkufk.exe
molodenkaya_18_let_mamka_soblaznila_synamkufk.exe
User:
admin
Company:
4th generation
Integrity Level:
HIGH
Description:
Zona installer
Version:
2.0.4.5
Modules
Images
c:\users\admin\desktop\molodenkaya_18_let_mamka_soblaznila_synamkufk.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
2228"C:\PROGRA~2\Zona\jre\bin\javaw.exe" -classpath "C:\PROGRA~2\Zona\utils.jar" ru.megamakc.core.JavaArchC:\Program Files (x86)\Zona\jre\bin\javaw.exemolodenkaya_18_let_mamka_soblaznila_synamkufk.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
HIGH
Description:
Java(TM) Platform SE binary
Exit code:
32
Version:
8.0.2120.10
Modules
Images
c:\program files (x86)\zona\jre\bin\javaw.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
2640"C:\PROGRA~2\Zona\jre\bin\java.exe" -versionC:\Program Files (x86)\Zona\jre\bin\java.exeZona.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
HIGH
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.2120.10
Modules
Images
c:\program files (x86)\zona\jre\bin\java.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
4824C:\WINDOWS\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MC:\Windows\SysWOW64\icacls.exejava.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\icacls.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
5372"C:\PROGRA~2\Zona\jre\bin\javaw.exe" -classpath "C:\PROGRA~2\Zona\Zona.jar" org.gudy.azureus2.core3.util.ConstantsC:\Program Files (x86)\Zona\jre\bin\javaw.exemolodenkaya_18_let_mamka_soblaznila_synamkufk.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
HIGH
Description:
Java(TM) Platform SE binary
Exit code:
2103
Version:
8.0.2120.10
Modules
Images
c:\program files (x86)\zona\jre\bin\javaw.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
5796\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exejava.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6396\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeicacls.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6796"C:\PROGRA~2\Zona\jre\bin\javaw.exe" -classpath "C:\PROGRA~2\Zona\utils.jar" ru.megamakc.core.JavaArchC:\Program Files (x86)\Zona\jre\bin\javaw.exeZona.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
HIGH
Description:
Java(TM) Platform SE binary
Exit code:
32
Version:
8.0.2120.10
Modules
Images
c:\program files (x86)\zona\jre\bin\javaw.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6852"C:\Users\admin\Desktop\molodenkaya_18_let_mamka_soblaznila_synamkufk.exe" C:\Users\admin\Desktop\molodenkaya_18_let_mamka_soblaznila_synamkufk.exeexplorer.exe
User:
admin
Company:
4th generation
Integrity Level:
MEDIUM
Description:
Zona installer
Exit code:
0
Version:
2.0.4.5
Modules
Images
c:\users\admin\desktop\molodenkaya_18_let_mamka_soblaznila_synamkufk.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
Total events
3 743
Read events
3 710
Write events
33
Delete events
0

Modification events

(PID) Process:(6852) molodenkaya_18_let_mamka_soblaznila_synamkufk.exeKey:HKEY_CURRENT_USER\SOFTWARE\Pinstall
Operation:writeName:i_user_id
Value:
416A524F-32DF-4DF9-88D6-B909BE671D7D
(PID) Process:(6852) molodenkaya_18_let_mamka_soblaznila_synamkufk.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(6852) molodenkaya_18_let_mamka_soblaznila_synamkufk.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(6852) molodenkaya_18_let_mamka_soblaznila_synamkufk.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(6852) molodenkaya_18_let_mamka_soblaznila_synamkufk.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(1656) molodenkaya_18_let_mamka_soblaznila_synamkufk.exeKey:HKEY_CURRENT_USER\SOFTWARE\Zona
Operation:writeName:exec
Value:
C:\Program Files (x86)\Zona\Zona.exe
(PID) Process:(1656) molodenkaya_18_let_mamka_soblaznila_synamkufk.exeKey:HKEY_CURRENT_USER\SOFTWARE\Zona
Operation:writeName:DownloadsDir
Value:
C:\Users\admin\Documents\Zona Downloads
(PID) Process:(1656) molodenkaya_18_let_mamka_soblaznila_synamkufk.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1656) molodenkaya_18_let_mamka_soblaznila_synamkufk.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1656) molodenkaya_18_let_mamka_soblaznila_synamkufk.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
158
Suspicious files
34
Text files
76
Unknown types
14

Dropped files

PID
Process
Filename
Type
1656molodenkaya_18_let_mamka_soblaznila_synamkufk.exeC:\Users\admin\AppData\Roaming\Zona\tmp\248AED4A-209D-40AD-8F00-8062128CAD99Zona.ebz
MD5:
SHA256:
1656molodenkaya_18_let_mamka_soblaznila_synamkufk.exeC:\Users\admin\AppData\Local\Temp\jreC461.tmp
MD5:
SHA256:
1656molodenkaya_18_let_mamka_soblaznila_synamkufk.exeC:\Program Files (x86)\Zona\jre\bin\api-ms-win-core-errorhandling-l1-1-0.dllexecutable
MD5:6D778E83F74A4C7FE4C077DC279F6867
SHA256:A97DCCA76CDB12E985DFF71040815F28508C655AB2B073512E386DD63F4DA325
1656molodenkaya_18_let_mamka_soblaznila_synamkufk.exeC:\Program Files (x86)\Zona\jre\bin\api-ms-win-core-file-l1-2-0.dllexecutable
MD5:E2F648AE40D234A3892E1455B4DBBE05
SHA256:C8C499B012D0D63B7AFC8B4CA42D6D996B2FCF2E8B5F94CACFBEC9E6F33E8A03
1656molodenkaya_18_let_mamka_soblaznila_synamkufk.exeC:\Program Files (x86)\Zona\jre\bin\api-ms-win-core-debug-l1-1-0.dllexecutable
MD5:88FF191FD8648099592ED28EE6C442A5
SHA256:C310CC91464C9431AB0902A561AF947FA5C973925FF70482D3DE017ED3F73B7D
1656molodenkaya_18_let_mamka_soblaznila_synamkufk.exeC:\Program Files (x86)\Zona\License_ru.rtftext
MD5:F4FC6DB44D17CC884476B416F1BA4EE4
SHA256:9F869CF989B0CEC4C6CDBB84DA9B72AAA45EA18E63C1F1148F0377BB1641F46C
1656molodenkaya_18_let_mamka_soblaznila_synamkufk.exeC:\Program Files (x86)\Zona\jre\bin\api-ms-win-core-heap-l1-1-0.dllexecutable
MD5:2EA3901D7B50BF6071EC8732371B821C
SHA256:44F6DF4280C8ECC9C6E609B1A4BFEE041332D337D84679CFE0D6678CE8F2998A
1656molodenkaya_18_let_mamka_soblaznila_synamkufk.exeC:\Program Files (x86)\Zona\License_en.rtftext
MD5:F679F81D4E993CB9254CBDE1EDEEF70E
SHA256:049F0B3B01B6C521ADCE2FCE937D3430AED6FE46C83C536D05A3493207B775D0
1656molodenkaya_18_let_mamka_soblaznila_synamkufk.exeC:\Program Files (x86)\Zona\jre\bin\api-ms-win-core-datetime-l1-1-0.dllexecutable
MD5:CB978304B79EF53962408C611DFB20F5
SHA256:90FAE0E7C3644A6754833C42B0AC39B6F23859F9A7CF4B6C8624820F59B9DAD3
1656molodenkaya_18_let_mamka_soblaznila_synamkufk.exeC:\Program Files (x86)\Zona\jre\bin\api-ms-win-core-console-l1-1-0.dllexecutable
MD5:502263C56F931DF8440D7FD2FA7B7C00
SHA256:94A5DF1227818EDBFD0D5091C6A48F86B4117C38550343F780C604EEE1CD6231
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
26
TCP/UDP connections
26
DNS requests
6
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1656
molodenkaya_18_let_mamka_soblaznila_synamkufk.exe
GET
46.254.18.90:80
http://dl.zonainst.com/Zona.ebz
unknown
unknown
1656
molodenkaya_18_let_mamka_soblaznila_synamkufk.exe
GET
200
185.22.235.16:80
http://dl.upzona.net/java.json
unknown
unknown
1656
molodenkaya_18_let_mamka_soblaznila_synamkufk.exe
GET
46.254.18.90:80
http://dl.zonainst.com/appdata.ebz
unknown
unknown
1656
molodenkaya_18_let_mamka_soblaznila_synamkufk.exe
GET
206
46.254.18.90:80
http://dl.zonainst.com/Zona.ebz
unknown
unknown
1656
molodenkaya_18_let_mamka_soblaznila_synamkufk.exe
GET
206
185.22.235.16:80
http://dl.upzona.net/java.json
unknown
unknown
1656
molodenkaya_18_let_mamka_soblaznila_synamkufk.exe
HEAD
200
185.22.235.16:80
http://dl.upzona.net/jre_packed.ebz
unknown
unknown
1656
molodenkaya_18_let_mamka_soblaznila_synamkufk.exe
GET
206
46.254.18.90:80
http://dl.zonainst.com/Zona.ebz
unknown
unknown
1656
molodenkaya_18_let_mamka_soblaznila_synamkufk.exe
GET
185.22.235.16:80
http://dl.upzona.net/jre_packed.ebz
unknown
unknown
1656
molodenkaya_18_let_mamka_soblaznila_synamkufk.exe
GET
185.22.235.16:80
http://dl.upzona.net/jre_packed.ebz
unknown
unknown
1656
molodenkaya_18_let_mamka_soblaznila_synamkufk.exe
GET
46.254.18.90:80
http://dl.zonainst.com/appdata.ebz
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2120
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
192.168.100.255:138
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2120
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6232
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
1656
molodenkaya_18_let_mamka_soblaznila_synamkufk.exe
185.22.235.93:80
install.zonastat.com
EuroByte LLC
RU
unknown
1656
molodenkaya_18_let_mamka_soblaznila_synamkufk.exe
185.22.235.16:80
dl.upzona.net
EuroByte LLC
RU
unknown
1656
molodenkaya_18_let_mamka_soblaznila_synamkufk.exe
46.254.18.90:80
dl.zonainst.com
EuroByte LLC
RU
suspicious

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 51.104.136.2
whitelisted
google.com
  • 142.250.186.78
whitelisted
install.zonastat.com
  • 185.22.235.93
unknown
dl.zonainst.com
  • 46.254.18.90
unknown
dl.upzona.net
  • 185.22.235.16
unknown

Threats

Found threats are available for the paid subscriptions
1 ETPRO signatures available at the full report
No debug info