File name:

FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe

Full analysis: https://app.any.run/tasks/8a5ad63e-1cb7-4b1c-a2a1-292ecf200d16
Verdict: Malicious activity
Threats:

DarkCloud is an infostealer that focuses on collecting and exfiltrating browser data from the infected device. The malware is also capable of keylogging and crypto address swapping. DarkCloud is typically delivered to victims’ computers via phishing emails.

Analysis date: May 10, 2025, 03:29:54
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto-startup
stealer
evasion
smtp
darkcloud
upx
crypto-regex
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

36E1BBCB5B07653ECE980904BE081DD0

SHA1:

AC12714DB26C9093F2AAD828F6C4A1E11C84B6FC

SHA256:

F4484AEDB6BCC06405642DD598C025C97F57C26267CF1D59DDC607D5C2C41626

SSDEEP:

768:D1oGOOOOOOOOOOOOOOOOOOOJXq3yyUOzLNpYAFSlSjSTL/G:JoFBG5pYAFKlT7G

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 4428)
    • Executing a file with an untrusted certificate

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 5740)
      • hLevel.exe (PID: 904)
      • hLevel.exe (PID: 4980)
    • Stealers network behavior

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 5740)
    • DARKCLOUD has been detected (YARA)

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 5740)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 4428)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 6768)
    • Checks for external IP

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 5740)
    • Reads security settings of Internet Explorer

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 5740)
    • Connects to SMTP port

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 5740)
    • Connects to the server without a host name

      • hLevel.exe (PID: 904)
    • Uses TASKKILL.EXE to kill Browsers

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 5740)
    • Found regular expressions for crypto-addresses (YARA)

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 5740)
  • INFO

    • Reads the computer name

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 4428)
      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 5740)
      • hLevel.exe (PID: 904)
    • Disables trace logs

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 4428)
      • hLevel.exe (PID: 904)
    • Checks supported languages

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 4428)
      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 5740)
      • hLevel.exe (PID: 904)
    • Checks proxy server information

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 4428)
      • hLevel.exe (PID: 904)
      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 5740)
    • Reads the machine GUID from the registry

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 4428)
      • hLevel.exe (PID: 904)
      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 5740)
    • Auto-launch of the file from Startup directory

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 4428)
    • Creates files or folders in the user directory

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 4428)
      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 5740)
    • Manual execution by a user

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 5740)
      • wscript.exe (PID: 6768)
      • hLevel.exe (PID: 4980)
    • UPX packer has been detected

      • FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe (PID: 5740)
    • Reads the software policy settings

      • slui.exe (PID: 5596)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (43.5)
.exe | Win32 Executable (generic) (29.8)
.exe | Generic Win/DOS Executable (13.2)
.exe | DOS Executable Generic (13.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:05:09 14:18:24+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 5632
InitializedDataSize: 70144
UninitializedDataSize: -
EntryPoint: 0x345e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 5.5.3.0
ProductVersionNumber: 5.5.3.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: GyOnboarding
CompanyName: Helpfeel Inc.
FileDescription: GyOnboarding
FileVersion: 5.5.3.0
InternalName: ref037.exe
LegalCopyright: Copyright © 2023 Gyazo Team at Helpfeel Inc.
LegalTrademarks: Gyazo
OriginalFileName: ref037.exe
ProductName: GyOnboarding
ProductVersion: 5.5.3.0
AssemblyVersion: 5.5.3.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
145
Monitored processes
11
Malicious processes
3
Suspicious processes
2

Behavior graph

Click at the process to see the details
start final payment soa - superyatch interiors.exe #DARKCLOUD final payment soa - superyatch interiors.exe sppextcomobj.exe no specs slui.exe wscript.exe no specs hlevel.exe hlevel.exe no specs taskkill.exe no specs conhost.exe no specs outlook.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
904"C:\Users\admin\AppData\Roaming\hLevel.exe" C:\Users\admin\AppData\Roaming\hLevel.exe
wscript.exe
User:
admin
Company:
Helpfeel Inc.
Integrity Level:
MEDIUM
Description:
GyOnboarding
Exit code:
4294967295
Version:
5.5.3.0
Modules
Images
c:\users\admin\appdata\roaming\hlevel.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
3884\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exetaskkill.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4428"C:\Users\admin\AppData\Local\Temp\FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe" C:\Users\admin\AppData\Local\Temp\FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe
explorer.exe
User:
admin
Company:
Helpfeel Inc.
Integrity Level:
MEDIUM
Description:
GyOnboarding
Exit code:
4294967295
Version:
5.5.3.0
Modules
Images
c:\users\admin\appdata\local\temp\final payment soa - superyatch interiors.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
4980"C:\Users\admin\AppData\Roaming\hLevel.exe"C:\Users\admin\AppData\Roaming\hLevel.exeexplorer.exe
User:
admin
Company:
Helpfeel Inc.
Integrity Level:
MEDIUM
Description:
GyOnboarding
Exit code:
3221225496
Version:
5.5.3.0
Modules
Images
c:\users\admin\appdata\roaming\hlevel.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
4980taskkill /f /im chrome.exeC:\Windows\SysWOW64\taskkill.exeFINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Terminates Processes
Exit code:
128
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
5228C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5392C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
5596"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5608"C:\Program Files\Microsoft Office\Root\Office16\OUTLOOK.EXE" -EmbeddingC:\Program Files\Microsoft Office\root\Office16\OUTLOOK.EXE
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Exit code:
0
Version:
16.0.16026.20146
Modules
Images
c:\program files\microsoft office\root\office16\outlook.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
5740"C:\Users\admin\AppData\Local\Temp\FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe"C:\Users\admin\AppData\Local\Temp\FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe
explorer.exe
User:
admin
Company:
Helpfeel Inc.
Integrity Level:
MEDIUM
Description:
GyOnboarding
Version:
5.5.3.0
Modules
Images
c:\users\admin\appdata\local\temp\final payment soa - superyatch interiors.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvbvm60.dll
Total events
9 518
Read events
9 152
Write events
330
Delete events
36

Modification events

(PID) Process:(4428) FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FINAL PAYMENT SOA - SUPERYATCH INTERIORS_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4428) FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FINAL PAYMENT SOA - SUPERYATCH INTERIORS_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(4428) FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FINAL PAYMENT SOA - SUPERYATCH INTERIORS_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(4428) FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FINAL PAYMENT SOA - SUPERYATCH INTERIORS_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(4428) FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FINAL PAYMENT SOA - SUPERYATCH INTERIORS_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(4428) FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FINAL PAYMENT SOA - SUPERYATCH INTERIORS_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(4428) FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FINAL PAYMENT SOA - SUPERYATCH INTERIORS_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(4428) FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FINAL PAYMENT SOA - SUPERYATCH INTERIORS_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4428) FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FINAL PAYMENT SOA - SUPERYATCH INTERIORS_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(4428) FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\FINAL PAYMENT SOA - SUPERYATCH INTERIORS_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
1
Suspicious files
12
Text files
5
Unknown types
0

Dropped files

PID
Process
Filename
Type
5608OUTLOOK.EXEC:\Users\admin\Documents\Outlook Files\Outlook1.pst
MD5:
SHA256:
5740FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\DBS\Cookiesbinary
MD5:06AD9E737639FDC745B3B65312857109
SHA256:C8925892CA8E213746633033AE95ACFB8DD9531BC376B82066E686AC6F40A404
5740FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\DBS\WebDatabinary
MD5:F6C33AC5E1032A0873BE7BFC65169287
SHA256:D97895CEDED32E33D57BDCACCDBE144E58AA87AF4D2F8855D630286CE30A8D83
4428FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exeC:\Users\admin\AppData\Roaming\hLevel.exeexecutable
MD5:36E1BBCB5B07653ECE980904BE081DD0
SHA256:F4484AEDB6BCC06405642DD598C025C97F57C26267CF1D59DDC607D5C2C41626
5740FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\DBS\cookies.db-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
5740FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\DBS\cookies.dbbinary
MD5:19BA68C3ECBCA72C2B90AFADDE745DC6
SHA256:8B3758EE2D2C0A07EE7003F902F0667ABE5D9667941F8617EDA3CDF94C78E7B8
5740FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\DBS\LoginDatabinary
MD5:A45465CDCDC6CB30C8906F3DA4EC114C
SHA256:4412319EF944EBCCA9581CBACB1D4E1DC614C348D1DFC5D2FAAAAD863D300209
5608OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntitiesUpdated.bintext
MD5:4F41F4ED81E85CAEC55EE4DDB79A1BD7
SHA256:257EBA50A8B79142E2EED034C128F38849A4D788270FB1A4F862533256F991A1
5608OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Office\16.0\AddInClassifierCache\OfficeSharedEntities.bintext
MD5:CC90D669144261B198DEAD45AA266572
SHA256:89C701EEFF939A44F28921FD85365ECD87041935DCD0FE0BAF04957DA12C9899
4428FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hLevel.vbstext
MD5:E4482E77AAA0AD4ED160B1DCFCD1EAEF
SHA256:32A7FAC895747AB53745171A6E5C2E2DF905C4861CECAE82CD47FC8A87172411
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
33
DNS requests
20
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.164.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2104
svchost.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4428
FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe
GET
200
3.72.88.224:80
http://3.72.88.224/f1/Yfgdlydfyrs.wav
unknown
904
hLevel.exe
GET
200
3.72.88.224:80
http://3.72.88.224/f1/Yfgdlydfyrs.wav
unknown
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5740
FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe
GET
200
162.55.60.2:80
http://showip.net/
unknown
shared
6572
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6572
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.16.164.120:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
5496
MoUsoCoreWorker.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
2104
svchost.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
4
System
192.168.100.255:138
whitelisted
4428
FINAL PAYMENT SOA - SUPERYATCH INTERIORS.exe
3.72.88.224:80
AMAZON-02
DE
unknown
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
904
hLevel.exe
3.72.88.224:80
AMAZON-02
DE
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.181.238
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 2.16.164.120
  • 2.16.164.49
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 20.190.160.2
  • 20.190.160.20
  • 20.190.160.3
  • 20.190.160.67
  • 20.190.160.65
  • 40.126.32.140
  • 20.190.160.66
  • 40.126.32.76
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
showip.net
  • 162.55.60.2
shared
juguly.shop
  • 203.161.48.208
unknown
officeclient.microsoft.com
  • 52.109.28.46
whitelisted

Threats

PID
Process
Class
Message
Attempted Information Leak
ET INFO IP Check Domain (showip in HTTP Host)
A Network Trojan was detected
STEALER [ANY.RUN] DarkCloud External IP Check
Device Retrieving External IP Address Detected
ET HUNTING [ANY.RUN] DARKCLOUD Style External IP Check
Misc activity
INFO [ANY.RUN] SMTP email client opens transfer with server (EHLO)
Misc activity
INFO [ANY.RUN] SMTP email client opens transfer with server (EHLO)
Misc activity
INFO [ANY.RUN] SMTP email client opens transfer with server (EHLO)
Misc activity
INFO [ANY.RUN] SMTP email client opens transfer with server (EHLO)
No debug info