analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

lcFGnjYe2QlfWRaCZBbTzO.zip

Full analysis: https://app.any.run/tasks/20827437-0e35-4db7-926b-c4c808ba4121
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: December 18, 2018, 15:14:25
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
adware
addrop
pup
installcore
trojan
loader
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

37170BFF36921D8A5BA44CDFF4E52729

SHA1:

614B85A7D72851DA289F95AA16BB19C191497F1B

SHA256:

153D21F86ADD500EE0D5581EB7B4D7B2280DAFA327377013B744AEB79D407173

SSDEEP:

24576:UMd0/VEUYT4ym7PiwT6tgCLxttEARCFYRqRvxJFgVFEADkVSDd3cMld:UMK9EUQ477PiC6GCL3K8qRvxjmbDkuhH

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • installer_whatsapp_para_pc_0_2_2732__32_bit_.exe (PID: 2816)
      • installer_whatsapp_para_pc_0_2_2732__32_bit_.exe (PID: 2744)
      • avgSetup.exe (PID: 1904)
      • uninstaller.exe (PID: 3720)
      • avg_antivirus_free_setup.exe (PID: 3672)
      • instup.exe (PID: 3656)
      • instup.exe (PID: 3884)
      • sbr.exe (PID: 2808)
      • Update.exe (PID: 3168)
      • Update.exe (PID: 2560)
      • SetupInf.exe (PID: 2172)
      • SetupInf.exe (PID: 3688)
      • SetupInf.exe (PID: 3800)
      • SetupInf.exe (PID: 3508)
      • AvEmUpdate.exe (PID: 2512)
      • AvEmUpdate.exe (PID: 2372)
      • Update.exe (PID: 1784)
      • Squirrel.exe (PID: 3536)
      • AvEmUpdate.exe (PID: 624)
      • AvEmUpdate.exe (PID: 3400)
      • Update.exe (PID: 3144)
      • Update.exe (PID: 3728)
      • overseer.exe (PID: 2856)
      • aswRunDll.exe (PID: 3484)
      • Update.exe (PID: 3948)
      • Update.exe (PID: 2324)
      • instup.exe (PID: 3636)
      • Update.exe (PID: 3028)
      • instup.exe (PID: 2432)
      • AvEmUpdate.exe (PID: 3608)
      • AVGSvc.exe (PID: 2828)
      • instup.exe (PID: 3668)
      • AVGUI.exe (PID: 3156)
      • aswOfferTool.exe (PID: 2768)
      • wsc_proxy.exe (PID: 2688)
      • aswidsagent.exe (PID: 556)
      • Squirrel.exe (PID: 4036)
      • Update.exe (PID: 1248)
      • Update.exe (PID: 1976)
      • WhatsApp_ExecutionStub.exe (PID: 3812)
      • RegSvr.exe (PID: 3200)
      • Update.exe (PID: 3160)
      • RegSvr.exe (PID: 928)
      • RegSvr.exe (PID: 3888)
      • Update.exe (PID: 3940)
      • Update.exe (PID: 648)
      • Update.exe (PID: 1744)
    • ADDROP was detected

      • installer_whatsapp_para_pc_0_2_2732__32_bit_.exe (PID: 2744)
    • Connects to CnC server

      • installer_whatsapp_para_pc_0_2_2732__32_bit_.exe (PID: 2744)
      • uninstaller.exe (PID: 3720)
    • INSTALLCORE was detected

      • uninstaller.exe (PID: 3720)
    • Downloads executable files from the Internet

      • avgSetup.exe (PID: 1904)
      • AvEmUpdate.exe (PID: 2512)
    • Loads dropped or rewritten executable

      • instup.exe (PID: 3656)
      • instup.exe (PID: 3884)
      • WhatsApp.exe (PID: 2168)
      • WhatsApp.exe (PID: 3588)
      • WhatsApp.exe (PID: 920)
      • WhatsApp.exe (PID: 3916)
      • WhatsApp.exe (PID: 3312)
      • WhatsApp.exe (PID: 2268)
      • AvEmUpdate.exe (PID: 2372)
      • AvEmUpdate.exe (PID: 2512)
      • AvEmUpdate.exe (PID: 3400)
      • AvEmUpdate.exe (PID: 624)
      • RegSvr.exe (PID: 3200)
      • RegSvr.exe (PID: 928)
      • AVGSvc.exe (PID: 2828)
      • aswRunDll.exe (PID: 3484)
      • instup.exe (PID: 3636)
      • AvEmUpdate.exe (PID: 3608)
      • AVGUI.exe (PID: 3156)
      • aswOfferTool.exe (PID: 2768)
      • WhatsApp.exe (PID: 2652)
      • aswidsagent.exe (PID: 556)
      • WhatsApp.exe (PID: 1752)
      • WhatsApp.exe (PID: 3604)
      • instup.exe (PID: 2432)
      • WhatsApp.exe (PID: 2840)
      • instup.exe (PID: 3668)
      • WhatsApp_ExecutionStub.exe (PID: 3812)
      • WhatsApp.exe (PID: 1676)
      • WhatsApp.exe (PID: 3264)
      • WhatsApp.exe (PID: 4032)
      • WhatsApp.exe (PID: 4064)
      • WhatsApp.exe (PID: 2300)
      • WhatsApp.exe (PID: 3512)
    • Changes the autorun value in the registry

      • instup.exe (PID: 3656)
      • instup.exe (PID: 3636)
    • Loads the Task Scheduler COM API

      • AvEmUpdate.exe (PID: 2372)
      • AvEmUpdate.exe (PID: 2512)
      • overseer.exe (PID: 2856)
      • AvEmUpdate.exe (PID: 3608)
      • aswidsagent.exe (PID: 556)
      • AVGSvc.exe (PID: 2828)
    • Changes settings of System certificates

      • AVGSvc.exe (PID: 2828)
  • SUSPICIOUS

    • Reads the machine GUID from the registry

      • installer_whatsapp_para_pc_0_2_2732__32_bit_.exe (PID: 2744)
    • Reads Environment values

      • installer_whatsapp_para_pc_0_2_2732__32_bit_.exe (PID: 2744)
      • Update.exe (PID: 3168)
      • Update.exe (PID: 1784)
      • Update.exe (PID: 3144)
      • AVGUI.exe (PID: 3156)
    • Application launched itself

      • installer_whatsapp_para_pc_0_2_2732__32_bit_.exe (PID: 2816)
      • cmd.exe (PID: 3016)
      • cmd.exe (PID: 1420)
      • WhatsApp.exe (PID: 3588)
      • WhatsApp.exe (PID: 3312)
      • AvEmUpdate.exe (PID: 2512)
      • WhatsApp.exe (PID: 1752)
      • WhatsApp.exe (PID: 1676)
      • WhatsApp.exe (PID: 4064)
    • Reads Windows Product ID

      • installer_whatsapp_para_pc_0_2_2732__32_bit_.exe (PID: 2744)
    • Reads internet explorer settings

      • installer_whatsapp_para_pc_0_2_2732__32_bit_.exe (PID: 2744)
      • uninstaller.exe (PID: 3720)
    • Creates files in the user directory

      • installer_whatsapp_para_pc_0_2_2732__32_bit_.exe (PID: 2744)
      • uninstaller.exe (PID: 3720)
      • WhatsApp.exe (PID: 2168)
      • Update.exe (PID: 2560)
      • WhatsApp.exe (PID: 3588)
      • Update.exe (PID: 1248)
      • WhatsApp.exe (PID: 1676)
    • Reads CPU info

      • installer_whatsapp_para_pc_0_2_2732__32_bit_.exe (PID: 2744)
      • AVGUI.exe (PID: 3156)
      • AVGSvc.exe (PID: 2828)
    • Reads the date of Windows installation

      • installer_whatsapp_para_pc_0_2_2732__32_bit_.exe (PID: 2744)
      • AVGSvc.exe (PID: 2828)
    • Starts CMD.EXE for commands execution

      • installer_whatsapp_para_pc_0_2_2732__32_bit_.exe (PID: 2744)
      • cmd.exe (PID: 3016)
      • cmd.exe (PID: 1420)
    • Executable content was dropped or overwritten

      • installer_whatsapp_para_pc_0_2_2732__32_bit_.exe (PID: 2744)
      • cmd.exe (PID: 2808)
      • cmd.exe (PID: 2888)
      • avgSetup.exe (PID: 1904)
      • uninstaller.exe (PID: 3720)
      • avg_antivirus_free_setup.exe (PID: 3672)
      • instup.exe (PID: 3884)
      • 228656-691348-whatsapp-for-pc.exe (PID: 2804)
      • Update.exe (PID: 3168)
      • Squirrel.exe (PID: 3536)
      • instup.exe (PID: 3656)
      • WhatsApp.exe (PID: 3312)
      • AvEmUpdate.exe (PID: 2512)
      • AVGSvc.exe (PID: 2828)
      • AvEmUpdate.exe (PID: 3608)
      • instup.exe (PID: 3636)
      • aswOfferTool.exe (PID: 2768)
      • WhatsApp.exe (PID: 1752)
      • Update.exe (PID: 3144)
      • WhatsApp.exe (PID: 1676)
      • WhatsApp.exe (PID: 4064)
    • Creates files in the Windows directory

      • avgSetup.exe (PID: 1904)
      • instup.exe (PID: 3656)
      • AVGSvc.exe (PID: 2828)
      • keytool.exe (PID: 2824)
      • keytool.exe (PID: 3216)
    • Low-level read access rights to disk partition

      • avgSetup.exe (PID: 1904)
      • avg_antivirus_free_setup.exe (PID: 3672)
      • instup.exe (PID: 3884)
      • instup.exe (PID: 3656)
      • AvEmUpdate.exe (PID: 624)
      • AvEmUpdate.exe (PID: 3400)
      • AvEmUpdate.exe (PID: 2512)
      • overseer.exe (PID: 2856)
      • AVGSvc.exe (PID: 2828)
      • wsc_proxy.exe (PID: 2688)
      • instup.exe (PID: 3636)
      • AvEmUpdate.exe (PID: 3608)
      • AVGUI.exe (PID: 3156)
      • instup.exe (PID: 3668)
      • aswidsagent.exe (PID: 556)
      • instup.exe (PID: 2432)
    • Creates files in the program directory

      • avg_antivirus_free_setup.exe (PID: 3672)
      • instup.exe (PID: 3884)
      • instup.exe (PID: 3656)
      • AvEmUpdate.exe (PID: 2512)
      • AVGSvc.exe (PID: 2828)
      • wsc_proxy.exe (PID: 2688)
      • instup.exe (PID: 2432)
      • AvEmUpdate.exe (PID: 3608)
      • instup.exe (PID: 3636)
      • aswOfferTool.exe (PID: 2768)
      • AVGUI.exe (PID: 3156)
      • aswidsagent.exe (PID: 556)
      • instup.exe (PID: 3668)
    • Creates a software uninstall entry

      • uninstaller.exe (PID: 3720)
      • Update.exe (PID: 3168)
      • instup.exe (PID: 3656)
      • Update.exe (PID: 3144)
    • Starts itself from another location

      • instup.exe (PID: 3884)
    • Uses REG.EXE to modify Windows registry

      • WhatsApp.exe (PID: 2168)
      • WhatsApp.exe (PID: 3588)
      • WhatsApp.exe (PID: 1752)
    • Modifies the open verb of a shell class

      • reg.exe (PID: 2568)
      • reg.exe (PID: 4040)
      • instup.exe (PID: 3656)
    • Creates COM task schedule object

      • instup.exe (PID: 3656)
      • RegSvr.exe (PID: 3200)
      • RegSvr.exe (PID: 928)
      • RegSvr.exe (PID: 3888)
    • Creates or modifies windows services

      • instup.exe (PID: 3656)
    • Creates files in the driver directory

      • instup.exe (PID: 3656)
    • Reads the cookies of Mozilla Firefox

      • instup.exe (PID: 3656)
      • AVGUI.exe (PID: 3156)
    • Reads Internet Cache Settings

      • instup.exe (PID: 3656)
      • AVGUI.exe (PID: 3156)
    • Reads the cookies of Google Chrome

      • instup.exe (PID: 3656)
      • AVGUI.exe (PID: 3156)
    • Removes files from Windows directory

      • AVGSvc.exe (PID: 2828)
    • Searches for installed software

      • AVGSvc.exe (PID: 2828)
      • Update.exe (PID: 3144)
      • AVGUI.exe (PID: 3156)
    • Reads Microsoft Outlook installation path

      • AVGSvc.exe (PID: 2828)
    • Reads the computer name

      • AVGSvc.exe (PID: 2828)
  • INFO

    • Changes settings of System certificates

      • chrome.exe (PID: 4088)
    • Application launched itself

      • chrome.exe (PID: 4088)
    • Adds / modifies Windows certificates

      • chrome.exe (PID: 4088)
    • Reads settings of System Certificates

      • chrome.exe (PID: 4088)
      • Update.exe (PID: 3168)
      • Update.exe (PID: 3144)
      • AVGSvc.exe (PID: 2828)
      • WhatsApp.exe (PID: 1676)
    • Dropped object may contain Bitcoin addresses

      • instup.exe (PID: 3656)
      • instup.exe (PID: 3636)
    • Reads Microsoft Office registry keys

      • AVGUI.exe (PID: 3156)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
ZipUncompressedSize: 1332968
ZipCompressedSize: 1303498
ZipCRC: 0xbec0bee9
ZipModifyDate: 2018:12:18 11:07:04
ZipCompression: Deflated
ZipBitFlag: 0x0009
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
151
Monitored processes
96
Malicious processes
39
Suspicious processes
5

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start winrar.exe no specs installer_whatsapp_para_pc_0_2_2732__32_bit_.exe no specs #ADDROP installer_whatsapp_para_pc_0_2_2732__32_bit_.exe cmd.exe no specs timeout.exe no specs cmd.exe no specs timeout.exe no specs cmd.exe cmd.exe cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs avgsetup.exe #INSTALLCORE uninstaller.exe avg_antivirus_free_setup.exe instup.exe instup.exe sbr.exe no specs chrome.exe explorer.exe no specs chrome.exe no specs explorer.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs 228656-691348-whatsapp-for-pc.exe update.exe squirrel.exe whatsapp.exe no specs whatsapp.exe update.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs whatsapp.exe whatsapp.exe whatsapp.exe setupinf.exe no specs setupinf.exe no specs whatsapp.exe setupinf.exe no specs update.exe reg.exe no specs setupinf.exe no specs avemupdate.exe no specs avemupdate.exe avemupdate.exe avemupdate.exe regsvr.exe no specs update.exe no specs update.exe regsvr.exe no specs regsvr.exe no specs aswrundll.exe no specs overseer.exe avgsvc.exe update.exe no specs update.exe no specs wsc_proxy.exe no specs instup.exe instup.exe update.exe no specs unsecapp.exe no specs keytool.exe no specs keytool.exe no specs avemupdate.exe avgui.exe aswoffertool.exe instup.exe squirrel.exe no specs whatsapp.exe aswidsagent.exe whatsapp.exe reg.exe no specs whatsapp.exe no specs reg.exe no specs update.exe no specs whatsapp.exe no specs update.exe no specs whatsapp_executionstub.exe no specs update.exe no specs whatsapp.exe whatsapp.exe whatsapp.exe no specs update.exe no specs whatsapp.exe whatsapp.exe no specs whatsapp.exe update.exe no specs update.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3524"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\lcFGnjYe2QlfWRaCZBbTzO.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
2816"C:\Users\admin\Desktop\installer_whatsapp_para_pc_0_2_2732__32_bit_.exe" C:\Users\admin\Desktop\installer_whatsapp_para_pc_0_2_2732__32_bit_.exeexplorer.exe
User:
admin
Company:
Bopadesibo
Integrity Level:
MEDIUM
Description:
Kemocebodo Setup
Exit code:
0
Version:
1.7.5.5
2744"C:\Users\admin\Desktop\installer_whatsapp_para_pc_0_2_2732__32_bit_.exe" /RSF /ppn:YyhwYgxaFRAiP211FM5W /mnlC:\Users\admin\Desktop\installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
User:
admin
Company:
Bopadesibo
Integrity Level:
HIGH
Description:
Kemocebodo Setup
Exit code:
0
Version:
1.7.5.5
3016/d /c TIMEOUT 1 & cmd /d /c copy /B /Y "C:\Users\admin\AppData\Local\Temp\D39016406360931.dat"+"C:\Users\admin\AppData\Local\Temp\D39016406360932.dat" "C:\Users\admin\AppData\Local\Temp\in7E200845\5C087654_stp\avgSetup.exe" & cmd /d /c del "C:\Users\admin\AppData\Local\Temp\D39016406360931.dat" & cmd /d /c del "C:\Users\admin\AppData\Local\Temp\D39016406360932.dat"C:\Windows\system32\cmd.exeinstaller_whatsapp_para_pc_0_2_2732__32_bit_.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2584TIMEOUT 1 C:\Windows\system32\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
timeout - pauses command processing
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
1420/d /c TIMEOUT 1 & cmd /d /c copy /B /Y "C:\Users\admin\AppData\Local\Temp\D85911679986161.dat"+"C:\Users\admin\AppData\Local\Temp\D85911679986162.dat" "C:\Users\admin\AppData\Local\Temp\in7E200845\754ECA65_stp\uninstaller.exe" & cmd /d /c del "C:\Users\admin\AppData\Local\Temp\D85911679986161.dat" & cmd /d /c del "C:\Users\admin\AppData\Local\Temp\D85911679986162.dat"C:\Windows\system32\cmd.exeinstaller_whatsapp_para_pc_0_2_2732__32_bit_.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2332TIMEOUT 1 C:\Windows\system32\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
timeout - pauses command processing
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2808cmd /d /c copy /B /Y "C:\Users\admin\AppData\Local\Temp\D39016406360931.dat"+"C:\Users\admin\AppData\Local\Temp\D39016406360932.dat" "C:\Users\admin\AppData\Local\Temp\in7E200845\5C087654_stp\avgSetup.exe" C:\Windows\system32\cmd.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
2888cmd /d /c copy /B /Y "C:\Users\admin\AppData\Local\Temp\D85911679986161.dat"+"C:\Users\admin\AppData\Local\Temp\D85911679986162.dat" "C:\Users\admin\AppData\Local\Temp\in7E200845\754ECA65_stp\uninstaller.exe" C:\Windows\system32\cmd.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
3452cmd /d /c del "C:\Users\admin\AppData\Local\Temp\D39016406360931.dat" C:\Windows\system32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Total events
14 360
Read events
8 437
Write events
0
Delete events
0

Modification events

No data
Executable files
676
Suspicious files
515
Text files
794
Unknown types
155

Dropped files

PID
Process
Filename
Type
3524WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb3524.9058\installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
MD5:
SHA256:
2816installer_whatsapp_para_pc_0_2_2732__32_bit_.exeC:\Users\admin\AppData\Local\Temp\0013DF18.log
MD5:
SHA256:
2816installer_whatsapp_para_pc_0_2_2732__32_bit_.exeC:\Users\admin\AppData\Local\Temp\inH130229655360\css\main.csstext
MD5:EF67727CD24F56F4978008D7D8FB1269
SHA256:C07BF43017820A0D3E24F8C9B602849956B35D3508D0B997563D668573024CAE
2816installer_whatsapp_para_pc_0_2_2732__32_bit_.exeC:\Users\admin\AppData\Local\Temp\inH130229655360\css\helpers\_border-radius.scsstext
MD5:6BDF3FD89410E39D33F8137E04AD4A16
SHA256:2C6B98CB19C3E3A0E37472767C53DF213243AE92BC80EF9A7F5BAA17F7B6FA31
2816installer_whatsapp_para_pc_0_2_2732__32_bit_.exeC:\Users\admin\AppData\Local\Temp\inH130229655360\css\helpers\_positions.scsstext
MD5:D70EE316E26374F839174916490E937E
SHA256:3AFFBAEB6F57451FAF94CA9CBCAB2504EF75DF0E8570AA7BE99DD52C9CECB8E7
2816installer_whatsapp_para_pc_0_2_2732__32_bit_.exeC:\Users\admin\AppData\Local\Temp\inH130229655360\css\helpers\_colors.scsstext
MD5:2DA278FBB61E370E0CC9F548E8154E1C
SHA256:857A73FC1DA7CF54525048AA60EC9E2F07328EE1D718A66E3B17186170BB5B5B
2816installer_whatsapp_para_pc_0_2_2732__32_bit_.exeC:\Users\admin\AppData\Local\Temp\inH130229655360\css\helpers\_clearfix.scsstext
MD5:ADD166BC071472DC105F4734D2DCF0E2
SHA256:75EBE8B4A4CBBAC0EB4DE35B60972452B4526C56EEFB5186DD40A92C70773377
2816installer_whatsapp_para_pc_0_2_2732__32_bit_.exeC:\Users\admin\AppData\Local\Temp\inH130229655360\css\helpers\_typography.scsstext
MD5:0D6E99087615172921E0383B0BCE87D2
SHA256:A94BD2FB6595FAEA527116D8D8EE090FF74E89216EF3C9260F5F0B5BFA330E0E
2816installer_whatsapp_para_pc_0_2_2732__32_bit_.exeC:\Users\admin\AppData\Local\Temp\inH130229655360\css\helpers\_padding.scsstext
MD5:839CE4BBA9E717524487B58757EA63DA
SHA256:54C64F48133908B48ED7C739A95B9EDCA865B3A89BDAA34D29973652C3648EDE
2816installer_whatsapp_para_pc_0_2_2732__32_bit_.exeC:\Users\admin\AppData\Local\Temp\inH130229655360\css\helpers\_align.scsstext
MD5:BBBBD243F9525ACC7DC6077010627409
SHA256:1F11B5F53E0AA7DA1A1559A1A5CDD52BF03119EA74E5091462461C550E9288DB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
116
TCP/UDP connections
93
DNS requests
97
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
GET
301
104.27.136.111:80
http://median.mp3.es/uploads/installer_logos/programs/56/228656/65333.png
US
shared
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
POST
200
52.214.73.247:80
http://rp.guarddownloadsapps.com/
IE
malicious
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
POST
200
52.214.73.247:80
http://rp.guarddownloadsapps.com/
IE
malicious
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
POST
200
52.214.73.247:80
http://rp.guarddownloadsapps.com/
IE
malicious
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
GET
149.202.192.156:80
http://i_mp3-es_WhatsApp-para-PC-0-2-2732--32-bit.foramuinareqy.com/crawled_soft/2/2/idpf-mp300z4b8d2d6b7445358785154a7fa1034b68-ici-5889c16d992e22.71369822-chrome-idpf/228656-691348-whatsapp-for-pc.exe
FR
malicious
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
HEAD
200
149.202.192.156:80
http://i_mp3-es_WhatsApp-para-PC-0-2-2732--32-bit.foramuinareqy.com/crawled_soft/2/2/idpf-mp300z4b8d2d6b7445358785154a7fa1034b68-ici-5889c16d992e22.71369822-chrome-idpf/228656-691348-whatsapp-for-pc.exe
FR
malicious
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
POST
200
54.154.255.147:80
http://os.guarddownloadsapps.com/Vittalia_ns/
IE
binary
455 Kb
malicious
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
POST
200
52.214.73.247:80
http://rp.guarddownloadsapps.com/
IE
malicious
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
POST
200
52.214.73.247:80
http://rp.guarddownloadsapps.com/
IE
malicious
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
GET
200
146.185.27.53:80
http://img.guarddownloadsapps.com/img/Rowabobeso/bg_custom_TB.png
GB
image
11.7 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
52.214.73.247:80
rp.guarddownloadsapps.com
Amazon.com, Inc.
IE
malicious
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
104.27.136.111:80
median.mp3.es
Cloudflare Inc
US
shared
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
104.27.136.111:443
median.mp3.es
Cloudflare Inc
US
shared
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
149.202.192.156:80
i_mp3-es_whatsapp-para-pc-0-2-2732--32-bit.foramuinareqy.com
OVH SAS
FR
malicious
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
199.115.112.67:80
cdnus.vittaliacdn.com
Leaseweb USA, Inc.
US
malicious
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
54.154.255.147:80
os.guarddownloadsapps.com
Amazon.com, Inc.
IE
malicious
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
185.59.222.146:80
cdneu.vittaliacdn.com
Datacamp Limited
NL
malicious
1904
avgSetup.exe
172.217.168.46:80
www.google-analytics.com
Google Inc.
US
whitelisted
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
54.154.81.16:80
info.guarddownloadsapps.com
Amazon.com, Inc.
IE
whitelisted
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
146.185.27.53:80
img.guarddownloadsapps.com
UK-2 Limited
GB
malicious

DNS requests

Domain
IP
Reputation
rp.guarddownloadsapps.com
  • 52.214.73.247
  • 54.194.149.175
malicious
info.guarddownloadsapps.com
  • 54.154.81.16
  • 34.251.155.7
  • 52.209.116.64
malicious
median.mp3.es
  • 104.27.136.111
  • 104.27.137.111
unknown
os.guarddownloadsapps.com
  • 54.154.255.147
  • 52.30.154.50
malicious
img.guarddownloadsapps.com
  • 146.185.27.53
malicious
i_mp3-es_whatsapp-para-pc-0-2-2732--32-bit.foramuinareqy.com
  • 149.202.192.156
malicious
cdneu.vittaliacdn.com
  • 185.59.222.146
malicious
cdnus.vittaliacdn.com
  • 199.115.112.67
suspicious
www.google-analytics.com
  • 172.217.168.46
whitelisted
iavs9x.avg.u.avcdn.net
  • 72.247.178.18
  • 72.247.178.41
whitelisted

Threats

PID
Process
Class
Message
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
Misc activity
ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M1
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
Misc activity
ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M2
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
Misc activity
ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M4
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
Misc activity
ADWARE [PTsecurity] PUP.Optional.InstallCore Artifact M3
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
Generic Protocol Command Decode
SURICATA HTTP Host header invalid
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
A Network Trojan was detected
SC TROJAN_DOWNLOADER Possible threat - .exe downloading with HEAD option
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
Generic Protocol Command Decode
SURICATA HTTP Host header invalid
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
Generic Protocol Command Decode
SURICATA HTTP Host header invalid
2744
installer_whatsapp_para_pc_0_2_2732__32_bit_.exe
unknown
SURICATA IPv4 invalid checksum
24 ETPRO signatures available at the full report
Process
Message
WhatsApp.exe
[920:3532:1218/151702:VERBOSE1:crash_service_main.cc(76)] Session start. cmdline is [--reporter-url=https://web-crashlog.whatsapp.net/upload.php --application-name=WhatsApp --v=1]
WhatsApp.exe
[920:3532:1218/151702:VERBOSE1:crash_service.cc(142)] window handle is 00030180
WhatsApp.exe
[920:3532:1218/151702:VERBOSE1:crash_service.cc(284)] pipe name is \\.\pipe\WhatsApp Crash Service dumps at C:\Users\admin\AppData\Local\Temp\WhatsApp Crashes
WhatsApp.exe
[920:3532:1218/151702:VERBOSE1:crash_service.cc(288)] checkpoint is C:\Users\admin\AppData\Local\Temp\WhatsApp Crashes\crash_checkpoint.txt server is https://web-crashlog.whatsapp.net/upload.php maximum 128 reports/day reporter is electron-crash-service
WhatsApp.exe
[920:3532:1218/151702:VERBOSE1:crash_service_main.cc(92)] Ready to process crash requests
WhatsApp.exe
[920:1828:1218/151702:VERBOSE1:crash_service.cc(317)] client start. pid = 2168
WhatsApp.exe
[920:3064:1218/151703:VERBOSE1:crash_service.cc(325)] client end. pid = 2168
WhatsApp.exe
[920:3064:1218/151704:VERBOSE1:crash_service.cc(346)] zero clients. exiting
WhatsApp.exe
[920:3532:1218/151704:VERBOSE1:crash_service.cc(486)] session ending..
WhatsApp.exe
[920:3532:1218/151704:VERBOSE1:crash_service.cc(491)] clients connected :1 clients terminated :1 dumps serviced :0 dumps reported :0