File name:

161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exe

Full analysis: https://app.any.run/tasks/5f0fe66d-4510-4b68-a22c-025ea8cc9688
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: November 22, 2024, 14:25:38
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
loader
themida
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 9 sections
MD5:

4818689E6D356D05A07FEBA9684F35FE

SHA1:

2A2C8D02D1D861DBBC35F53FED182F6DBE10AF84

SHA256:

161A232B2FE43126C82542B15E49BA2CC31CE71271E23ECF2FCD8DF6CD4CB2BB

SSDEEP:

98304:gm7UjvurOaX1kMR9mV3nO/7HIfLJ194WzSTKH+hcaxsYyVlRRC5rIqg1P/DzGvf8:x9ZYoo0y7J

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • 161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exe (PID: 396)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exe (PID: 396)
    • Reads the BIOS version

      • 161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exe (PID: 396)
  • INFO

    • Reads the software policy settings

      • 161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exe (PID: 396)
    • Checks supported languages

      • 161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exe (PID: 396)
    • Reads the computer name

      • 161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exe (PID: 396)
    • Reads the machine GUID from the registry

      • 161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exe (PID: 396)
    • Themida protector has been detected

      • 161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exe (PID: 396)
    • Sends debugging messages

      • StartMenuExperienceHost.exe (PID: 5936)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2021:10:21 06:27:35+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32
LinkerVersion: 48
CodeSize: 1592832
InitializedDataSize: 105984
UninitializedDataSize: -
EntryPoint: 0x6f0000
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: FatihProjesi
FileVersion: 1.0.0.0
InternalName: FatihProjesi.exe
LegalCopyright: Copyright © 2020
LegalTrademarks: -
OriginalFileName: FatihProjesi.exe
ProductName: FatihProjesi
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exe textinputhost.exe no specs startmenuexperiencehost.exe no specs searchapp.exe mobsync.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
396"C:\Users\admin\Desktop\161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exe" C:\Users\admin\Desktop\161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
FatihProjesi
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
2456"C:\WINDOWS\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exe" -ServerName:InputApp.AppXjd5de1g66v206tj52m9d0dtpppx4cgpn.mcaC:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TextInputHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Version:
123.26505.0.0
Modules
Images
c:\windows\systemapps\microsoftwindows.client.cbs_cw5n1h2txyewy\textinputhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\systemapps\microsoftwindows.client.cbs_cw5n1h2txyewy\vcruntime140_app.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
2796"C:\WINDOWS\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mcaC:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Search application
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\systemapps\microsoft.windows.search_cw5n1h2txyewy\searchapp.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5936"C:\WINDOWS\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mcaC:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exesvchost.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\windows\systemapps\microsoft.windows.startmenuexperiencehost_cw5n1h2txyewy\startmenuexperiencehost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\wincorlib.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
6200C:\WINDOWS\System32\mobsync.exe -EmbeddingC:\Windows\System32\mobsync.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Sync Center
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\mobsync.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
20 620
Read events
20 523
Write events
94
Delete events
3

Modification events

(PID) Process:(396) 161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(396) 161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(396) 161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(396) 161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(396) 161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(396) 161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(396) 161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(396) 161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(396) 161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(396) 161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
2
Suspicious files
8
Text files
13
Unknown types
0

Dropped files

PID
Process
Filename
Type
2796SearchApp.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133767591696085250.txt~RF13bb64.TMP
MD5:
SHA256:
2796SearchApp.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133767591789229139.txt~RF13dde0.TMP
MD5:
SHA256:
2796SearchApp.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{07965b58-c4d6-4a5f-abb4-175b0e3f8724}\0.0.filtertrie.intermediate.txttext
MD5:313FB75B427790D01342FE144D9C3C06
SHA256:50DBBA1A26C02E1C1B831C474708E68C9B11E3FCF6B254AE908A2C3007D88100
2796SearchApp.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\INetCache\Q84V0JUH\6hU_LneafI_NFLeDvM367ebFaKQ[1].jsbinary
MD5:C6C21B7634D82C53FB86080014D86E66
SHA256:D39E9BA92B07F4D50B11A49965E9B162452D7B9C9F26D9DCB07825727E31057E
2796SearchApp.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\AppCache\5Y734AMR\67\yy4SnZtT2-rfsZpLbcm-u8xyafQ[1].csstext
MD5:F17DF11A7C86F77E92950D111ABAF4E1
SHA256:72504249ABB304D8B5F75A5E9182B478112E02773B8A9A276CD4982D8CF842FE
2796SearchApp.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{07965b58-c4d6-4a5f-abb4-175b0e3f8724}\Apps.ftbinary
MD5:AB5CF5D309581951ACE7978FF8DF0FF0
SHA256:CA45CAA7DE38CB805EC43EDC8B9332E1E95124A27FBB6E5BD3DDD5E8A526AFC7
2796SearchApp.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\AppCache\5Y734AMR\67\6aa-EF2IAVwnTTOiwAbhwI_VmCw[1].jsbinary
MD5:B2C3CBF8A1D940D6C83D59A67486675C
SHA256:08EA9109346E9018ED50567503D2C141F7A84CFDE80EB25E97FDDCFE270BAA67
396161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exeC:\Users\admin\Desktop\Newtonsoft.Json.dllexecutable
MD5:081D9558BBB7ADCE142DA153B2D5577A
SHA256:B624949DF8B0E3A6153FDFB730A7C6F4990B6592EE0D922E1788433D276610F3
2796SearchApp.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{07965b58-c4d6-4a5f-abb4-175b0e3f8724}\Apps.indexbinary
MD5:FE9A819377870FA6FDD677E5D3AA1A07
SHA256:C43D46A72D282151F56E09F15CD47DB4414ECA02B536D41D26D5560AA5ADEC78
2796SearchApp.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133767591696085250.txtini
MD5:39FEA118E9A443749C833A616160B40F
SHA256:32F96CF504EF57CA43A9E9886A741DE0DD6AA7DDAEBC78DAAC2D3B041C2C5B53
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
109
TCP/UDP connections
92
DNS requests
13
Threats
64

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
23.48.23.193:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1488
RUXIMICS.exe
GET
200
23.48.23.193:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
396
161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exe
GET
216.58.212.131:80
http://www.google.com.tr/
unknown
whitelisted
1488
RUXIMICS.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
396
161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exe
GET
216.58.212.131:80
http://www.google.com.tr/
unknown
whitelisted
396
161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exe
GET
216.58.212.131:80
http://www.google.com.tr/
unknown
whitelisted
396
161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exe
GET
216.58.212.131:80
http://www.google.com.tr/
unknown
whitelisted
396
161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exe
GET
216.58.212.131:80
http://www.google.com.tr/
unknown
whitelisted
396
161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exe
GET
216.58.212.131:80
http://www.google.com.tr/
unknown
whitelisted
POST
200
104.21.8.34:443
https://api.mebre.com.tr/v2/s_brt.php
unknown
text
5 b
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4308
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1488
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5064
SearchApp.exe
104.126.37.161:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
4712
MoUsoCoreWorker.exe
23.48.23.193:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
396
161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exe
104.21.8.34:443
www.mebre.com.tr
CLOUDFLARENET
unknown
4308
svchost.exe
23.48.23.193:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1488
RUXIMICS.exe
23.48.23.193:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 20.73.194.208
whitelisted
www.bing.com
  • 104.126.37.161
  • 104.126.37.145
  • 104.126.37.153
  • 104.126.37.155
  • 104.126.37.163
  • 104.126.37.146
  • 104.126.37.160
  • 104.126.37.147
  • 104.126.37.162
  • 2.23.209.156
  • 2.23.209.141
  • 2.23.209.149
  • 2.23.209.154
  • 2.23.209.144
  • 2.23.209.140
  • 2.23.209.135
  • 2.23.209.158
  • 2.23.209.150
whitelisted
google.com
  • 216.58.212.174
whitelisted
crl.microsoft.com
  • 23.48.23.193
  • 23.48.23.153
  • 23.48.23.143
  • 23.48.23.151
  • 23.48.23.140
  • 23.48.23.141
  • 23.48.23.135
  • 23.48.23.195
  • 23.48.23.138
whitelisted
www.mebre.com.tr
  • 104.21.8.34
  • 172.67.156.190
unknown
www.microsoft.com
  • 184.30.21.171
whitelisted
www.google.com.tr
  • 216.58.212.131
whitelisted
api.mebre.com.tr
  • 104.21.8.34
  • 172.67.156.190
unknown
r.bing.com
  • 2.23.209.158
  • 2.23.209.160
  • 2.23.209.176
  • 2.23.209.179
  • 2.23.209.156
  • 2.23.209.177
  • 2.23.209.161
  • 2.23.209.181
  • 2.23.209.182
whitelisted
self.events.data.microsoft.com
  • 20.189.173.24
whitelisted

Threats

PID
Process
Class
Message
396
161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exe
A Network Trojan was detected
ET HUNTING Terse Unencrypted Request for Google - Likely Connectivity Check
396
161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exe
A Network Trojan was detected
ET HUNTING Terse Unencrypted Request for Google - Likely Connectivity Check
396
161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exe
A Network Trojan was detected
ET HUNTING Terse Unencrypted Request for Google - Likely Connectivity Check
396
161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exe
A Network Trojan was detected
ET HUNTING Terse Unencrypted Request for Google - Likely Connectivity Check
396
161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exe
A Network Trojan was detected
ET HUNTING Terse Unencrypted Request for Google - Likely Connectivity Check
396
161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exe
A Network Trojan was detected
ET HUNTING Terse Unencrypted Request for Google - Likely Connectivity Check
396
161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exe
A Network Trojan was detected
ET HUNTING Terse Unencrypted Request for Google - Likely Connectivity Check
396
161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exe
A Network Trojan was detected
ET HUNTING Terse Unencrypted Request for Google - Likely Connectivity Check
396
161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exe
A Network Trojan was detected
ET HUNTING Terse Unencrypted Request for Google - Likely Connectivity Check
396
161a232b2fe43126c82542b15e49ba2cc31ce71271e23ecf2fcd8df6cd4cb2bb.exe
A Network Trojan was detected
ET HUNTING Terse Unencrypted Request for Google - Likely Connectivity Check
No debug info