File name:

Accoutn GeneratorBooty Ticklet.rar

Full analysis: https://app.any.run/tasks/12980177-7809-4cba-bf5b-f57618b53891
Verdict: Malicious activity
Analysis date: April 17, 2025, 20:13:49
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

2D9CC5E1D9F9B48645189E664B5F3C73

SHA1:

B0D013EDFBAC23205E8502921D45C54ACAD89AC0

SHA256:

E9DC12CEBAA917571CD72741C4702B6490BDC10BC164D424BBF71C53EF37C234

SSDEEP:

98304:oclDJ8i7+NsH90CrhhaG+TVd8xbxxn7Z2CTqO6A2eiG75WYRDAmaAHz/s7NoBQR1:x84QSKOXHL8eptqCoT1

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Read disk information to detect sandboxing environments

      • BootyTickle Account Generator V4.4-VM.exe (PID: 7984)
      • BootyTickle Account Generator V4.4-VM.exe (PID: 5048)
      • BootyTickle Account Generator V4.4-VM.exe (PID: 5204)
      • BootyTickle Account Generator V4.4-VM.exe (PID: 664)
      • BootyTickle Account Generator V4.4-VM.exe (PID: 7380)
    • The process checks if it is being run in the virtual environment

      • BootyTickle Account Generator V4.4-VM.exe (PID: 7984)
      • BootyTickle Account Generator V4.4-VM.exe (PID: 5048)
      • BootyTickle Account Generator V4.4-VM.exe (PID: 5204)
      • BootyTickle Account Generator V4.4-VM.exe (PID: 664)
      • BootyTickle Account Generator V4.4-VM.exe (PID: 7380)
    • Reads the BIOS version

      • BootyTickle Account Generator V4.4-VM.exe (PID: 7984)
      • BootyTickle Account Generator V4.4-VM.exe (PID: 5048)
      • BootyTickle Account Generator V4.4-VM.exe (PID: 5204)
      • BootyTickle Account Generator V4.4-VM.exe (PID: 664)
      • BootyTickle Account Generator V4.4-VM.exe (PID: 7380)
    • Executes application which crashes

      • BootyTickle Account Generator V4.4-VM.exe (PID: 7984)
      • BootyTickle Account Generator V4.4-VM.exe (PID: 5048)
    • There is functionality for taking screenshot (YARA)

      • BootyTickle Account Generator V4.4-VM.exe (PID: 664)
      • BootyTickle Account Generator V4.4-VM.exe (PID: 7380)
  • INFO

    • Manual execution by a user

      • BootyTickle Account Generator V4.4-VM.exe (PID: 7984)
      • BootyTickle Account Generator V4.4-VM.exe (PID: 5048)
      • BootyTickle Account Generator V4.4-VM.exe (PID: 5204)
      • BootyTickle Account Generator V4.4-VM.exe (PID: 664)
      • BootyTickle Account Generator V4.4-VM.exe (PID: 7380)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7216)
    • Checks supported languages

      • BootyTickle Account Generator V4.4-VM.exe (PID: 7984)
      • BootyTickle Account Generator V4.4-VM.exe (PID: 5048)
      • BootyTickle Account Generator V4.4-VM.exe (PID: 664)
      • BootyTickle Account Generator V4.4-VM.exe (PID: 5204)
      • BootyTickle Account Generator V4.4-VM.exe (PID: 7380)
    • Reads the computer name

      • BootyTickle Account Generator V4.4-VM.exe (PID: 7984)
      • BootyTickle Account Generator V4.4-VM.exe (PID: 5048)
      • BootyTickle Account Generator V4.4-VM.exe (PID: 664)
      • BootyTickle Account Generator V4.4-VM.exe (PID: 5204)
      • BootyTickle Account Generator V4.4-VM.exe (PID: 7380)
    • Reads the machine GUID from the registry

      • BootyTickle Account Generator V4.4-VM.exe (PID: 7984)
      • BootyTickle Account Generator V4.4-VM.exe (PID: 5048)
      • BootyTickle Account Generator V4.4-VM.exe (PID: 5204)
      • BootyTickle Account Generator V4.4-VM.exe (PID: 664)
      • BootyTickle Account Generator V4.4-VM.exe (PID: 7380)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 8124)
      • WerFault.exe (PID: 5892)
    • Checks proxy server information

      • BootyTickle Account Generator V4.4-VM.exe (PID: 664)
      • slui.exe (PID: 6148)
    • Disables trace logs

      • BootyTickle Account Generator V4.4-VM.exe (PID: 664)
    • Reads the software policy settings

      • slui.exe (PID: 6148)
      • BootyTickle Account Generator V4.4-VM.exe (PID: 664)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)

EXIF

ZIP

FileVersion: RAR v5
CompressedSize: 4936073
UncompressedSize: 5233152
OperatingSystem: Win32
ArchivedFileName: Accoutn GeneratorBooty Ticklet/BootyTickle Account Generator V4.4-VM.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
148
Monitored processes
11
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe rundll32.exe no specs bootytickle account generator v4.4-vm.exe svchost.exe werfault.exe no specs slui.exe bootytickle account generator v4.4-vm.exe werfault.exe no specs bootytickle account generator v4.4-vm.exe no specs bootytickle account generator v4.4-vm.exe bootytickle account generator v4.4-vm.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
664"C:\Users\admin\Desktop\Accoutn GeneratorBooty Ticklet\BootyTickle Account Generator V4.4-VM.exe" C:\Users\admin\Desktop\Accoutn GeneratorBooty Ticklet\BootyTickle Account Generator V4.4-VM.exe
explorer.exe
User:
admin
Company:
Arxvestiys Service
Integrity Level:
MEDIUM
Description:
Account Generator V4.4
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\accoutn generatorbooty ticklet\bootytickle account generator v4.4-vm.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
5048"C:\Users\admin\Desktop\Accoutn GeneratorBooty Ticklet\BootyTickle Account Generator V4.4-VM.exe" C:\Users\admin\Desktop\Accoutn GeneratorBooty Ticklet\BootyTickle Account Generator V4.4-VM.exe
explorer.exe
User:
admin
Company:
Arxvestiys Service
Integrity Level:
MEDIUM
Description:
Account Generator V4.4
Exit code:
3762504530
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\accoutn generatorbooty ticklet\bootytickle account generator v4.4-vm.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
5204"C:\Users\admin\Desktop\Accoutn GeneratorBooty Ticklet\BootyTickle Account Generator V4.4-VM.exe" C:\Users\admin\Desktop\Accoutn GeneratorBooty Ticklet\BootyTickle Account Generator V4.4-VM.exeexplorer.exe
User:
admin
Company:
Arxvestiys Service
Integrity Level:
MEDIUM
Description:
Account Generator V4.4
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\accoutn generatorbooty ticklet\bootytickle account generator v4.4-vm.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
5892C:\WINDOWS\SysWOW64\WerFault.exe -u -p 5048 -s 6608C:\Windows\SysWOW64\WerFault.exeBootyTickle Account Generator V4.4-VM.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
6148C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7216"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Accoutn GeneratorBooty Ticklet.rar"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7380"C:\Users\admin\Desktop\Accoutn GeneratorBooty Ticklet\BootyTickle Account Generator V4.4-VM.exe" C:\Users\admin\Desktop\Accoutn GeneratorBooty Ticklet\BootyTickle Account Generator V4.4-VM.exeexplorer.exe
User:
admin
Company:
Arxvestiys Service
Integrity Level:
MEDIUM
Description:
Account Generator V4.4
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\accoutn generatorbooty ticklet\bootytickle account generator v4.4-vm.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
7932C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
7984"C:\Users\admin\Desktop\Accoutn GeneratorBooty Ticklet\BootyTickle Account Generator V4.4-VM.exe" C:\Users\admin\Desktop\Accoutn GeneratorBooty Ticklet\BootyTickle Account Generator V4.4-VM.exe
explorer.exe
User:
admin
Company:
Arxvestiys Service
Integrity Level:
MEDIUM
Description:
Account Generator V4.4
Exit code:
3762504530
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\accoutn generatorbooty ticklet\bootytickle account generator v4.4-vm.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
Total events
9 629
Read events
9 597
Write events
32
Delete events
0

Modification events

(PID) Process:(7216) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7216) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7216) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7216) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Accoutn GeneratorBooty Ticklet.rar
(PID) Process:(7216) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7216) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7216) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7216) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7216) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000
(PID) Process:(7216) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:name
Value:
256
Executable files
2
Suspicious files
4
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
8124WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_QEI3OC35JESVXQAB_3e961deb232a41dcd97918c14a42c2560914144_399df6ad_5978400f-e12e-4465-b62c-9d3206c324ed\Report.wer
MD5:
SHA256:
8124WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\BootyTickle Account Generator V4.4-VM.exe.7984.dmp
MD5:
SHA256:
5892WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_QEI3OC35JESVXQAB_3e961deb232a41dcd97918c14a42c2560914144_399df6ad_996a070d-36e3-43eb-bb87-351a6bd17a95\Report.wer
MD5:
SHA256:
5892WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\BootyTickle Account Generator V4.4-VM.exe.5048.dmp
MD5:
SHA256:
8124WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER561E.tmp.xmlxml
MD5:92CFE2B20C358B849A845FBCBD07F3B4
SHA256:3141B40F30BFC00D70BE3A58887C9A452968E628F626AC2B30F02E43A1F1A645
7216WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7216.17663\Accoutn GeneratorBooty Ticklet\CA06D352.dllexecutable
MD5:92B3B4A2E337FD9A51F604DBF43A94F2
SHA256:8C3E7B19782A8C96A357B47C0AC432BA592BC30A69A593BD75622E71E73A165B
8124WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER55DE.tmp.WERInternalMetadata.xmlbinary
MD5:BF00EACC0D180C93AC40149276D3617E
SHA256:6DF99F06C0C380CD8DA7A55014AF1C04AA75C20F24CDDBEBA9C42905174CF68A
8124WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER53BA.tmp.dmpbinary
MD5:742C3EF573990E3CF363FE1D9E674E71
SHA256:9AFFFF3A90CF769F58570F731BB5B3D5262E128B6DB4F795828EC6504FD8B674
5892WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERF9DF.tmp.WERInternalMetadata.xmlbinary
MD5:037A8B856EC45170EEA95692A6C71148
SHA256:79D83D75680AC5B938819FA01123CCDA78D576956E074D463FD0EE80BE15245C
5892WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERF9FF.tmp.xmlxml
MD5:2062F3198606100DBBE457E8607453A7
SHA256:603673A5DDA43D3D1E201F7545F179D20427445FF61BB8526D29CC12502A5F09
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
34
DNS requests
20
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.216.77.29:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7740
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7740
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2924
SearchApp.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
23.216.77.29:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2104
svchost.exe
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
2112
svchost.exe
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.31.73:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 23.216.77.29
  • 23.216.77.31
  • 23.216.77.35
  • 23.216.77.28
  • 23.216.77.36
  • 23.216.77.37
  • 23.216.77.26
  • 23.216.77.22
  • 23.216.77.27
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 40.126.31.73
  • 20.190.159.0
  • 40.126.31.0
  • 20.190.159.2
  • 20.190.159.73
  • 20.190.159.75
  • 40.126.31.3
  • 20.190.159.131
  • 40.126.31.128
  • 40.126.31.1
  • 40.126.31.131
  • 20.190.159.23
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted
keyauth.win
  • 104.26.1.5
  • 172.67.72.57
  • 104.26.0.5
malicious
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Potentially Bad Traffic
ET INFO KeyAuth Open-source Authentication System Domain in DNS Lookup (keyauth .win)
664
BootyTickle Account Generator V4.4-VM.exe
Potentially Bad Traffic
ET INFO KeyAuth Open-source Authentication System Domain (keyauth .win) in TLS SNI
No debug info