URL:

https://crackheaps.com/a/h/Paypal+Money+Adder+2021+desk+software+key+not+used/

Full analysis: https://app.any.run/tasks/3d43bf0e-6412-4123-b3a8-4c3c13e724a5
Verdict: Malicious activity
Threats:

AZORult can steal banking information, including passwords and credit card details, as well as cryptocurrency. This constantly updated information stealer malware should not be taken lightly, as it continues to be an active threat.

Analysis date: March 22, 2021, 18:48:56
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
rat
azorult
stealer
evasion
opendir
loader
Indicators:
MD5:

F6A5BCFF7FA56E9B7D5B6BF869C991F0

SHA1:

79C7242BFDA1B17B06C06B63310E530C70D875DF

SHA256:

035C131F9EBC5300814E0B91AC733D470C70845CC0A6B9DAAFD5E57353BB39C8

SSDEEP:

3:N8Kg8yTffLoKL5DEOBAWYNHBKn:2KD2fPaOBzYSn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • keygen-pr.exe (PID: 772)
      • keygen-step-1.exe (PID: 2648)
      • Reimage.Pc.Repair.Online.serial.number.keygen.exe (PID: 2488)
      • keygen-step-4.exe (PID: 332)
      • keygen-step-3.exe (PID: 3140)
      • Setup.exe (PID: 1748)
      • key.exe (PID: 1648)
      • Setup.exe (PID: 2204)
      • key.exe (PID: 2676)
      • multitimer.exe (PID: 2156)
      • multitimer.exe (PID: 4024)
      • Install.exe (PID: 3072)
      • setups.exe (PID: 348)
      • XOhyzTKiqVDQkp9FY8MlLB7C.exe (PID: 2824)
    • Drops executable file immediately after starts

      • keygen-step-4.exe (PID: 332)
      • setups.tmp (PID: 372)
    • Connects to CnC server

      • keygen-step-1.exe (PID: 2648)
      • keygen-step-3.exe (PID: 3140)
    • Actions looks like stealing of personal data

      • keygen-step-4.exe (PID: 332)
    • Stealing of credential data

      • keygen-step-3.exe (PID: 3140)
    • Runs PING.EXE for delay simulation

      • cmd.exe (PID: 2416)
    • AZORULT was detected

      • keygen-step-1.exe (PID: 2648)
    • Changes settings of System certificates

      • Setup.exe (PID: 2204)
    • Changes the autorun value in the registry

      • Install.exe (PID: 3072)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 1264)
      • Reimage.Pc.Repair.Online.serial.number.keygen.exe (PID: 2488)
      • keygen-step-4.exe (PID: 332)
      • keygen-pr.exe (PID: 772)
      • Setup.exe (PID: 2204)
      • setups.exe (PID: 348)
      • setups.tmp (PID: 372)
      • Install.exe (PID: 3072)
    • Drops a file with too old compile date

      • Reimage.Pc.Repair.Online.serial.number.keygen.exe (PID: 2488)
      • keygen-step-4.exe (PID: 332)
      • setups.exe (PID: 348)
      • Setup.exe (PID: 2204)
      • setups.tmp (PID: 372)
    • Drops a file with a compile date too recent

      • Reimage.Pc.Repair.Online.serial.number.keygen.exe (PID: 2488)
      • keygen-step-4.exe (PID: 332)
      • Setup.exe (PID: 2204)
      • Install.exe (PID: 3072)
    • Drops a file that was compiled in debug mode

      • Reimage.Pc.Repair.Online.serial.number.keygen.exe (PID: 2488)
      • WinRAR.exe (PID: 1264)
      • keygen-step-4.exe (PID: 332)
      • setups.tmp (PID: 372)
      • Install.exe (PID: 3072)
    • Starts CMD.EXE for commands execution

      • Reimage.Pc.Repair.Online.serial.number.keygen.exe (PID: 2488)
      • keygen-step-3.exe (PID: 3140)
    • Application launched itself

      • WinRAR.exe (PID: 3128)
      • key.exe (PID: 2676)
      • multitimer.exe (PID: 4024)
    • Reads the cookies of Google Chrome

      • keygen-step-3.exe (PID: 3140)
    • Starts CMD.EXE for self-deleting

      • keygen-step-3.exe (PID: 3140)
    • Adds / modifies Windows certificates

      • Setup.exe (PID: 2204)
    • Starts Internet Explorer

      • setups.tmp (PID: 372)
    • Creates files in the user directory

      • Install.exe (PID: 3072)
    • Creates files in the Windows directory

      • multitimer.exe (PID: 4024)
  • INFO

    • Reads the hosts file

      • chrome.exe (PID: 2136)
      • chrome.exe (PID: 2152)
    • Application launched itself

      • chrome.exe (PID: 2136)
      • iexplore.exe (PID: 3336)
    • Application was dropped or rewritten from another process

      • setups.tmp (PID: 372)
    • Loads dropped or rewritten executable

      • setups.tmp (PID: 372)
    • Changes internet zones settings

      • iexplore.exe (PID: 3336)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 968)
      • Install.exe (PID: 3072)
    • Reads internet explorer settings

      • iexplore.exe (PID: 968)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 968)
    • Changes settings of System certificates

      • iexplore.exe (PID: 968)
    • Creates files in the user directory

      • iexplore.exe (PID: 968)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
77
Monitored processes
34
Malicious processes
10
Suspicious processes
3

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs winrar.exe no specs winrar.exe reimage.pc.repair.online.serial.number.keygen.exe cmd.exe no specs chrome.exe no specs keygen-pr.exe #AZORULT keygen-step-1.exe keygen-step-3.exe keygen-step-4.exe cmd.exe no specs setup.exe no specs key.exe no specs ping.exe no specs key.exe no specs setup.exe multitimer.exe no specs setups.exe install.exe setups.tmp iexplore.exe no specs multitimer.exe no specs iexplore.exe xohyztkiqvdqkp9fy8mllb7c.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
312"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1004,1567391435185486560,5881708818487281267,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgACAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=5719684224327961637 --mojo-platform-channel-handle=1024 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
332keygen-step-4.exe C:\Users\admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe
cmd.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rarsfx0\keygen-step-4.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\gdiplus.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
348"C:\Users\admin\AppData\Local\Temp\FHHZ5MKCU9\setups.exe" llC:\Users\admin\AppData\Local\Temp\FHHZ5MKCU9\setups.exe
Setup.exe
User:
admin
Company:
Integrity Level:
HIGH
Description:
HJKH Setup
Exit code:
0
Version:
Modules
Images
c:\users\admin\appdata\local\temp\fhhz5mkcu9\setups.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
372"C:\Users\admin\AppData\Local\Temp\is-J50AG.tmp\setups.tmp" /SL5="$701C0,290870,64000,C:\Users\admin\AppData\Local\Temp\FHHZ5MKCU9\setups.exe" llC:\Users\admin\AppData\Local\Temp\is-J50AG.tmp\setups.tmp
setups.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.52.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-j50ag.tmp\setups.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
772keygen-pr.exe -p83fsase3GeC:\Users\admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe
cmd.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rarsfx0\keygen-pr.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
916cmd /c ""C:\Users\admin\AppData\Local\Temp\RarSFX0\keygen.bat" "C:\Windows\system32\cmd.exeReimage.Pc.Repair.Online.serial.number.keygen.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
968"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:3336 CREDAT:275457 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
1060"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1004,1567391435185486560,5881708818487281267,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=2713098010609371027 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1264"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\Rar$DIa3128.31177\Reimage.Pc.Repair.Online.serial.number.keygen.zipC:\Program Files\WinRAR\WinRAR.exe
WinRAR.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1508"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6c1ea9d0,0x6c1ea9e0,0x6c1ea9ecC:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
Total events
4 526
Read events
4 297
Write events
226
Delete events
3

Modification events

(PID) Process:(2136) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(2136) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(2136) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(2136) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(2136) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(2532) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:writeName:2136-13260912553834250
Value:
259
(PID) Process:(2136) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(2136) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(2136) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:delete valueName:3252-13245750958665039
Value:
0
(PID) Process:(2136) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
Executable files
22
Suspicious files
37
Text files
79
Unknown types
5

Dropped files

PID
Process
Filename
Type
2136chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-6058E6AA-858.pma
MD5:
SHA256:
2136chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\1276e332-5b9e-4fa6-97da-8e8a532a40c8.tmp
MD5:
SHA256:
2136chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000048.dbtmp
MD5:
SHA256:
2136chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\LOG.old
MD5:
SHA256:
2136chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.oldtext
MD5:
SHA256:
2136chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.oldtext
MD5:
SHA256:
2136chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RFe6db9.TMPtext
MD5:
SHA256:
2136chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old~RFe6db9.TMPtext
MD5:
SHA256:
2136chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old
MD5:
SHA256:
2136chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old~RFe6fec.TMP
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
19
TCP/UDP connections
44
DNS requests
31
Threats
27

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3072
Install.exe
GET
103.124.106.203:80
http://103.124.106.203/cof4/inst.exe
unknown
malicious
3072
Install.exe
GET
45.144.30.78:80
http://aretywer.xyz/Corepad092.exe
unknown
suspicious
GET
91.200.41.57:80
http://gclean.in/stats/remember.php?pub=mixinte&user=admin
UA
malicious
GET
91.200.41.57:80
http://gclean.in/decision.php?pub=mixinte
UA
malicious
GET
204.79.197.200:80
http://www.bing.com/favicon.ico
US
whitelisted
3072
Install.exe
GET
200
45.133.1.139:80
http://45.133.1.139/Manager/Temp/EFgzd7IrnKmvSY7NoweEU7Pm/KG5pc5F7jZu3r0hr7kiig97u.exe
unknown
executable
9.00 Kb
suspicious
3140
keygen-step-3.exe
POST
200
45.76.53.14:80
http://www.wws23dfwe.com/index.php/api/a
JP
text
24 b
malicious
3072
Install.exe
GET
200
104.21.66.169:80
http://file.ekkggr3.com/iuww/jvppp.exe
US
html
4.21 Kb
malicious
968
iexplore.exe
GET
200
2.16.186.27:80
http://crl.identrust.com/DSTROOTCAX3CRL.crl
unknown
der
1.16 Kb
whitelisted
968
iexplore.exe
GET
200
2.16.186.27:80
http://r3.o.lencr.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBRI2smg%2ByvTLU%2Fw3mjS9We3NfmzxAQUFC6zF7dYVsuuUAlA5h%2BvnYsUwsYCEgR2zp%2FaTG3OICcvKJ0qsA9fIQ%3D%3D
unknown
der
503 b
shared
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2152
chrome.exe
104.21.16.246:443
crackheaps.com
Cloudflare Inc
US
unknown
2152
chrome.exe
142.250.185.237:443
accounts.google.com
Google Inc.
US
suspicious
2152
chrome.exe
104.16.19.94:443
cdnjs.cloudflare.com
Cloudflare Inc
US
suspicious
2152
chrome.exe
142.250.186.168:443
www.googletagmanager.com
Google Inc.
US
suspicious
2152
chrome.exe
142.250.186.142:443
www.google-analytics.com
Google Inc.
US
whitelisted
2152
chrome.exe
142.250.185.131:443
ssl.gstatic.com
Google Inc.
US
whitelisted
2152
chrome.exe
37.1.219.39:443
crackheap.net
Leaseweb Deutschland GmbH
DE
suspicious
2152
chrome.exe
185.177.93.51:443
get.ziplink.xyz
MD
suspicious
3140
keygen-step-3.exe
45.76.53.14:80
www.wws23dfwe.com
Choopa, LLC
JP
malicious
2152
chrome.exe
142.250.186.78:443
sb-ssl.google.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
crackheaps.com
  • 104.21.16.246
  • 172.67.217.83
malicious
accounts.google.com
  • 142.250.185.237
shared
cdnjs.cloudflare.com
  • 104.16.19.94
  • 104.16.18.94
whitelisted
www.googletagmanager.com
  • 142.250.186.168
whitelisted
www.google-analytics.com
  • 142.250.186.142
whitelisted
ssl.gstatic.com
  • 142.250.185.131
whitelisted
crackheap.net
  • 37.1.219.39
malicious
get.ziplink.xyz
  • 185.177.93.51
suspicious
sb-ssl.google.com
  • 142.250.186.78
whitelisted
www.wws23dfwe.com
  • 45.76.53.14
unknown

Threats

PID
Process
Class
Message
2152
chrome.exe
Potentially Bad Traffic
ET INFO Observed Let's Encrypt Certificate for Suspicious TLD (.xyz)
2648
keygen-step-1.exe
A Network Trojan was detected
ET TROJAN Win32/AZORult V3.3 Client Checkin M2
2648
keygen-step-1.exe
A Network Trojan was detected
AV TROJAN Azorult CnC Beacon
2648
keygen-step-1.exe
A Network Trojan was detected
STEALER [PTsecurity] AZORult v.3
2648
keygen-step-1.exe
A Network Trojan was detected
STEALER [PTsecurity] AZORult
3140
keygen-step-3.exe
A Network Trojan was detected
STEALER [PTsecurity] Powerkatz32_2
3140
keygen-step-3.exe
A Network Trojan was detected
STEALER [PTsecurity] Powerkatz32_2
3140
keygen-step-3.exe
A Network Trojan was detected
STEALER [PTsecurity] Powerkatz32_2
3072
Install.exe
A Network Trojan was detected
ET INFO Executable Download from dotted-quad Host
3072
Install.exe
Potential Corporate Privacy Violation
AV POLICY HTTP request for .exe file with no User-Agent
4 ETPRO signatures available at the full report
No debug info