File name:

Greenshot - CHIP-Installer.exe

Full analysis: https://app.any.run/tasks/a017d0f9-4696-4884-a42f-841306e42cb4
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: August 16, 2018, 11:35:49
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
MD5:

8B6B98940827A6BD3484E14797AC913E

SHA1:

CFE42A44E41B928DCB507D515C81ECBCCE670D2F

SHA256:

1BF34B5C2EC7AFBA1D98EFC7E016F257D4B988048A8A5EB3560D8C7B2C4FFC0A

SSDEEP:

24576:+q5TfcdHj4fmbe2q0jzKJ9TtrZQKPxn1RfKNk72QFzQJ9TtFfDkORZ1bRk7Lma:+UTsamixH5x6Nk7G5xH9k7F

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • dmr_72.exe (PID: 4064)
      • IconInstaller.exe (PID: 1180)
      • chip 1-click installer.exe (PID: 2464)
      • 1-klick-chip-setup.exe (PID: 2296)
      • inst.exe (PID: 3812)
      • Greenshot-INSTALLER-1.2.10.6-RELEASE.exe (PID: 3588)
    • Changes settings of System certificates

      • dmr_72.exe (PID: 4064)
      • msiexec.exe (PID: 2016)
      • inst.exe (PID: 3812)
      • mscorsvw.exe (PID: 3700)
    • Downloads executable files from the Internet

      • dmr_72.exe (PID: 4064)
    • Loads dropped or rewritten executable

      • inst.exe (PID: 3812)
      • mscorsvw.exe (PID: 2176)
      • mscorsvw.exe (PID: 3784)
      • mscorsvw.exe (PID: 1200)
      • mscorsvw.exe (PID: 3516)
      • mscorsvw.exe (PID: 2644)
      • mscorsvw.exe (PID: 3700)
      • mscorsvw.exe (PID: 3844)
      • mscorsvw.exe (PID: 1452)
      • mscorsvw.exe (PID: 2300)
    • Changes the autorun value in the registry

      • Greenshot-INSTALLER-1.2.10.6-RELEASE.tmp (PID: 2304)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Greenshot - CHIP-Installer.exe (PID: 3540)
      • 1-klick-chip-setup.exe (PID: 2296)
      • IconInstaller.exe (PID: 1180)
      • dmr_72.exe (PID: 4064)
      • msiexec.exe (PID: 2016)
      • Greenshot-INSTALLER-1.2.10.6-RELEASE.exe (PID: 3588)
      • Greenshot-INSTALLER-1.2.10.6-RELEASE.tmp (PID: 2304)
      • mscorsvw.exe (PID: 3784)
      • mscorsvw.exe (PID: 3516)
      • mscorsvw.exe (PID: 1200)
      • mscorsvw.exe (PID: 2644)
      • mscorsvw.exe (PID: 3844)
      • mscorsvw.exe (PID: 1452)
      • mscorsvw.exe (PID: 2300)
    • Creates files in the user directory

      • dmr_72.exe (PID: 4064)
      • inst.exe (PID: 3812)
      • IconInstaller.exe (PID: 1180)
    • Adds / modifies Windows certificates

      • dmr_72.exe (PID: 4064)
      • inst.exe (PID: 3812)
      • mscorsvw.exe (PID: 3700)
    • Reads internet explorer settings

      • dmr_72.exe (PID: 4064)
    • Reads Internet Cache Settings

      • dmr_72.exe (PID: 4064)
      • IconInstaller.exe (PID: 1180)
    • Starts Microsoft Installer

      • 1-klick-chip-setup.exe (PID: 2296)
      • IconInstaller.exe (PID: 1180)
    • Creates or modifies windows services

      • chip 1-click installer.exe (PID: 2464)
    • Reads Windows owner settings

      • Greenshot-INSTALLER-1.2.10.6-RELEASE.tmp (PID: 2304)
    • Reads the Windows organization settings

      • Greenshot-INSTALLER-1.2.10.6-RELEASE.tmp (PID: 2304)
    • Checks supported languages

      • Greenshot-INSTALLER-1.2.10.6-RELEASE.tmp (PID: 2304)
    • Modifies the open verb of a shell class

      • Greenshot-INSTALLER-1.2.10.6-RELEASE.tmp (PID: 2304)
    • Creates files in the Windows directory

      • ngen.exe (PID: 592)
      • inst.exe (PID: 3812)
      • mscorsvw.exe (PID: 3784)
      • mscorsvw.exe (PID: 3516)
      • mscorsvw.exe (PID: 1200)
      • mscorsvw.exe (PID: 2644)
      • mscorsvw.exe (PID: 3844)
      • mscorsvw.exe (PID: 1452)
      • ngen.exe (PID: 2588)
      • mscorsvw.exe (PID: 2300)
    • Removes files from Windows directory

      • mscorsvw.exe (PID: 3784)
      • mscorsvw.exe (PID: 3516)
      • mscorsvw.exe (PID: 3844)
      • mscorsvw.exe (PID: 2300)
      • mscorsvw.exe (PID: 1452)
      • mscorsvw.exe (PID: 2644)
      • mscorsvw.exe (PID: 1200)
    • Starts Internet Explorer

      • Greenshot-INSTALLER-1.2.10.6-RELEASE.tmp (PID: 2304)
      • IconInstaller.exe (PID: 1180)
    • Creates a software uninstall entry

      • IconInstaller.exe (PID: 1180)
    • Searches for installed software

      • dmr_72.exe (PID: 4064)
  • INFO

    • Dropped object may contain URL's

      • Greenshot - CHIP-Installer.exe (PID: 3540)
      • dmr_72.exe (PID: 4064)
      • IconInstaller.exe (PID: 1180)
      • 1-klick-chip-setup.exe (PID: 2296)
      • ngen.exe (PID: 592)
      • inst.exe (PID: 3812)
      • msiexec.exe (PID: 2016)
      • Greenshot-INSTALLER-1.2.10.6-RELEASE.tmp (PID: 2304)
      • mscorsvw.exe (PID: 3700)
      • ngen.exe (PID: 2588)
    • Dropped object may contain Bitcoin addresses

      • Greenshot - CHIP-Installer.exe (PID: 3540)
      • msiexec.exe (PID: 2016)
      • Greenshot-INSTALLER-1.2.10.6-RELEASE.tmp (PID: 2304)
    • Reads settings of System Certificates

      • dmr_72.exe (PID: 4064)
      • inst.exe (PID: 3812)
      • mscorsvw.exe (PID: 3700)
    • Application launched itself

      • msiexec.exe (PID: 2016)
      • iexplore.exe (PID: 1176)
      • iexplore.exe (PID: 2312)
    • Creates files in the program directory

      • msiexec.exe (PID: 2016)
      • Greenshot-INSTALLER-1.2.10.6-RELEASE.tmp (PID: 2304)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 2016)
      • Greenshot-INSTALLER-1.2.10.6-RELEASE.tmp (PID: 2304)
    • Application was dropped or rewritten from another process

      • Greenshot-INSTALLER-1.2.10.6-RELEASE.tmp (PID: 2304)
    • Loads dropped or rewritten executable

      • Greenshot-INSTALLER-1.2.10.6-RELEASE.tmp (PID: 2304)
    • Changes internet zones settings

      • iexplore.exe (PID: 1176)
      • iexplore.exe (PID: 2312)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (30.7)
.exe | UPX compressed Win32 Executable (30.1)
.exe | Win32 EXE Yoda's Crypter (29.5)
.exe | Win32 Executable (generic) (5)
.exe | Generic Win/DOS Executable (2.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2018:05:26 12:02:25+02:00
PEType: PE32
LinkerVersion: 11
CodeSize: 344064
InitializedDataSize: 1196032
UninitializedDataSize: 1720320
EntryPoint: 0x1f8920
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 2.9.8.2
ProductVersionNumber: 2.9.8.2
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: German
CharacterSet: Unicode
FileVersion: 2.9.8.2
Comments: CHIP Secured Installer
FileDescription: CHIP Secured Installer
ProductVersion: 2.9.8.2
LegalCopyright: Copyright © 2018 Chip Digital GmbH
CompanyName: CHIP Digital GmbH
InternalName: CHIP Secured Installer
ProductName: CHIP Secured Installer
OriginalFileName: CHIP Secured Installer

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 26-May-2018 10:02:25
Detected languages:
  • English - United Kingdom
  • German - Germany
FileVersion: 2.9.8.2
Comments: CHIP Secured Installer
FileDescription: CHIP Secured Installer
ProductVersion: 2.9.8.2
LegalCopyright: Copyright © 2018 Chip Digital GmbH
CompanyName: CHIP Digital GmbH
InternalName: CHIP Secured Installer
ProductName: CHIP Secured Installer
OriginalFilename: CHIP Secured Installer

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000108

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 3
Time date stamp: 26-May-2018 10:02:25
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LARGE_ADDRESS_AWARE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
UPX0
0x00001000
0x001A4000
0x00000000
IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
UPX1
0x001A5000
0x00054000
0x00053C00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
7.93606
.rsrc
0x001F9000
0x00124000
0x00123200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
6.77071

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.32366
1444
Latin 1 / Western European
German - Germany
RT_MANIFEST
4
3.75291
9640
Latin 1 / Western European
English - United Kingdom
RT_ICON
7
3.34702
1428
Latin 1 / Western European
English - United Kingdom
RT_STRING
8
3.2817
1674
Latin 1 / Western European
English - United Kingdom
RT_STRING
9
3.28849
1168
Latin 1 / Western European
English - United Kingdom
RT_STRING
10
3.28373
1532
Latin 1 / Western European
English - United Kingdom
RT_STRING
11
3.26322
1628
Latin 1 / Western European
English - United Kingdom
RT_STRING
12
3.25812
1126
Latin 1 / Western European
English - United Kingdom
RT_STRING
99
2.0815
20
Latin 1 / Western European
English - United Kingdom
RT_GROUP_ICON
166
2.68292
80
Latin 1 / Western European
English - United Kingdom
RT_MENU

Imports

ADVAPI32.dll
COMCTL32.dll
COMDLG32.dll
GDI32.dll
IPHLPAPI.DLL
KERNEL32.DLL
MPR.dll
OLEAUT32.dll
PSAPI.DLL
SHELL32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
67
Monitored processes
28
Malicious processes
18
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start drop and start drop and start drop and start greenshot - chip-installer.exe dmr_72.exe 1-klick-chip-setup.exe iconinstaller.exe msiexec.exe no specs msiexec.exe msiexec.exe no specs msiexec.exe chip 1-click installer.exe no specs inst.exe greenshot-installer-1.2.10.6-release.exe greenshot-installer-1.2.10.6-release.tmp ngen.exe no specs mscorsvw.exe no specs mscorsvw.exe mscorsvw.exe mscorsvw.exe mscorsvw.exe ngen.exe no specs mscorsvw.exe mscorsvw.exe mscorsvw.exe mscorsvw.exe iexplore.exe no specs iexplore.exe no specs iexplore.exe no specs iexplore.exe no specs greenshot - chip-installer.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
592"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe" install "C:\Program Files\Greenshot\Greenshot.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exeGreenshot-INSTALLER-1.2.10.6-RELEASE.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Common Language Runtime native compiler
Exit code:
0
Version:
4.6.1055.0 built by: NETFXREL2
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\ngen.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcr120_clr0400.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
1176"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exeIconInstaller.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1180"C:\Users\admin\AppData\Local\Temp\DMR\Downloads\152e221a8bef8d2d13c58f995563a1a1\592a1e6682c29a41a1de95b65c2caa45\IconInstaller.exe" , "Amazon" , "amazonblau" , "true" , "656E2D7573#656E2D7573_416D617A6F6E2E636F6D&64652D6465_616D617A6F6E2E6465" C:\Users\admin\AppData\Local\Temp\DMR\Downloads\152e221a8bef8d2d13c58f995563a1a1\592a1e6682c29a41a1de95b65c2caa45\IconInstaller.exe
dmr_72.exe
User:
admin
Company:
Burda Digital Systems GmbH
Integrity Level:
HIGH
Description:
IconInstaller
Exit code:
0
Version:
1.1.3.1
Modules
Images
c:\users\admin\appdata\local\temp\dmr\downloads\152e221a8bef8d2d13c58f995563a1a1\592a1e6682c29a41a1de95b65c2caa45\iconinstaller.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
1200C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1c4 -InterruptEvent 0 -NGENProcess 170 -Pipe 1c0 -Comment "NGen Worker Process"C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
ngen.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
.NET Runtime Optimization Service
Exit code:
0
Version:
4.6.1055.0 built by: NETFXREL2
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\msvcr120_clr0400.dll
c:\windows\system32\mscoree.dll
1452C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 180 -InterruptEvent 0 -NGENProcess 16c -Pipe 174 -Comment "NGen Worker Process"C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
ngen.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
.NET Runtime Optimization Service
Exit code:
0
Version:
4.6.1055.0 built by: NETFXREL2
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\msvcr120_clr0400.dll
c:\windows\system32\mscoree.dll
2016C:\Windows\system32\msiexec.exe /VC:\Windows\system32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2176C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 108 -InterruptEvent 0 -NGENProcess f8 -Pipe 104 -Comment "NGen Worker Process"C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exengen.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
.NET Runtime Optimization Service
Exit code:
0
Version:
4.6.1055.0 built by: NETFXREL2
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\msvcr120_clr0400.dll
c:\windows\system32\mscoree.dll
2296"C:\Users\admin\AppData\Local\Temp\DMR\Downloads\152e221a8bef8d2d13c58f995563a1a1\3533bda4c65ccfbbc76d3b22854fd16c\1-klick-chip-setup.exe" /s /v""/qn""C:\Users\admin\AppData\Local\Temp\DMR\Downloads\152e221a8bef8d2d13c58f995563a1a1\3533bda4c65ccfbbc76d3b22854fd16c\1-klick-chip-setup.exe
dmr_72.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\dmr\downloads\152e221a8bef8d2d13c58f995563a1a1\3533bda4c65ccfbbc76d3b22854fd16c\1-klick-chip-setup.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\user32.dll
2300C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 180 -InterruptEvent 0 -NGENProcess 18c -Pipe 190 -Comment "NGen Worker Process"C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
ngen.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
.NET Runtime Optimization Service
Exit code:
0
Version:
4.6.1055.0 built by: NETFXREL2
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\msvcr120_clr0400.dll
c:\windows\system32\mscoree.dll
2304"C:\Users\admin\AppData\Local\Temp\is-N8ENF.tmp\Greenshot-INSTALLER-1.2.10.6-RELEASE.tmp" /SL5="$1D017C,1293027,131584,C:\Users\admin\AppData\Local\Temp\DMR\Downloads\152e221a8bef8d2d13c58f995563a1a1\8aecac18802da1d63e7ae1653aa36455\Greenshot-INSTALLER-1.2.10.6-RELEASE.exe" C:\Users\admin\AppData\Local\Temp\is-N8ENF.tmp\Greenshot-INSTALLER-1.2.10.6-RELEASE.tmp
Greenshot-INSTALLER-1.2.10.6-RELEASE.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-n8enf.tmp\greenshot-installer-1.2.10.6-release.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
Total events
6 351
Read events
5 763
Write events
561
Delete events
27

Modification events

(PID) Process:(3540) Greenshot - CHIP-Installer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3540) Greenshot - CHIP-Installer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(4064) dmr_72.exeKey:HKEY_CURRENT_USER\Software\OCS
Operation:writeName:CID
Value:
94166c9b-0bdb-4f03-b821-7cc9317839a9
(PID) Process:(4064) dmr_72.exeKey:HKEY_CURRENT_USER\Software\OCS
Operation:writeName:PID
Value:
chipderedesign
(PID) Process:(4064) dmr_72.exeKey:HKEY_CURRENT_USER\Software\OCS
Operation:writeName:lastPID
Value:
chipderedesign
(PID) Process:(4064) dmr_72.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dmr_72_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4064) dmr_72.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dmr_72_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(4064) dmr_72.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dmr_72_RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(4064) dmr_72.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dmr_72_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
4294901760
(PID) Process:(4064) dmr_72.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\dmr_72_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
Executable files
82
Suspicious files
19
Text files
131
Unknown types
19

Dropped files

PID
Process
Filename
Type
4064dmr_72.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HHUAAB7W\bg-icon-speedometer[1].pngimage
MD5:
SHA256:
4064dmr_72.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XB3OCR2W\no-impression[1].gif
MD5:
SHA256:
4064dmr_72.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GUFVP8I9\main[1].csstext
MD5:
SHA256:
4064dmr_72.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HHUAAB7W\jquery[1].jstext
MD5:
SHA256:
4064dmr_72.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HHUAAB7W\progress[1].htmhtm
MD5:
SHA256:
4064dmr_72.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\GUFVP8I9\main[1].jstext
MD5:
SHA256:
3540Greenshot - CHIP-Installer.exeC:\Users\admin\AppData\Local\Temp\DMR\ysvjmqyidbyypqbz.dattext
MD5:
SHA256:
4064dmr_72.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NBLQPZGH\MarselisSlabWeb[1].eoteot
MD5:
SHA256:
4064dmr_72.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\NBLQPZGH\background%20progressad[1].gifimage
MD5:
SHA256:
22961-klick-chip-setup.exeC:\Users\admin\AppData\Local\Temp\~780E.tmp
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
39
TCP/UDP connections
26
DNS requests
18
Threats
10

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4064
dmr_72.exe
GET
5.9.198.83:80
http://api.chip-secured-download.de/downloaderContent/main.css?v=1461939270
DE
malicious
4064
dmr_72.exe
GET
200
5.9.198.83:80
http://api.chip-secured-download.de/track/uac.php?clientid=94166c9b-0bdb-4f03-b821-7cc9317839a9&cid=54452189&pid=chipderedesign&source=BLUB2&setupid=6d20cf9bce7d4220a889d31783fc8db8&langcountry=en-US&state=WithoutUAC
DE
binary
162 Kb
malicious
4064
dmr_72.exe
GET
200
176.9.97.245:80
http://static.chip-secured-download.de/gfx/pagead/AVAST/avast-buttons-v1-feb18.gif
DE
image
36.6 Kb
suspicious
4064
dmr_72.exe
GET
200
5.9.198.83:80
http://api.chip-secured-download.de/downloaderContent/progress.php?pid=chipderedesign&cid=54452189&sid=6d20cf9bce7d4220a889d31783fc8db8&appname=477265656E73686F74&uid=94166c9b-0bdb-4f03-b821-7cc9317839a9&scid=&source=BLUB2&language=en-gb&piddata=&uaexe=66697265666F782E657865&Camplist=31313131636230656231386533626238623736356362663664623237656132333B37373964343266306630313562653938396664366635656230653437653437333B61616430363464373937356330313462613932353163623465303464396439323B6438663531333838363832333635626139356261643432646332393330383866
DE
htm
2.00 Kb
malicious
4064
dmr_72.exe
GET
200
5.9.198.83:80
http://api.chip-secured-download.de/newbrandmachine/chipderedesign?cid=54452189&scid=&headline1=477265656E73686F74&headline2=434849502D444F574E4C4F4144&euid=366163383832326665663261333165376136383332383431&icon=687474703A2F2F7777772E636869702E64652F69692F372F302F342F352F372F352F332F633862616666343663653334333031612E6A7067&screenshot=687474703A2F2F7777772E636869702E64652F69692F372F302F342F352F372F352F332F643133376333646530626366643835352E6A7067&MetaRating=34&lang=en
DE
binary
162 Kb
malicious
4064
dmr_72.exe
GET
200
5.9.198.83:80
http://api.chip-secured-download.de/geoip/geoip.php?ip=3132332e3235322e3233362e3639&givezip=true
DE
text
13 b
malicious
4064
dmr_72.exe
GET
200
5.9.198.83:80
http://api.chip-secured-download.de/downloaderContent/img/background%20progressad.gif
DE
image
1.81 Kb
malicious
4064
dmr_72.exe
GET
200
5.9.198.83:80
http://api.chip-secured-download.de/downloaderContent/img/bg-icon-speedometer.png
DE
image
5.35 Kb
malicious
4064
dmr_72.exe
GET
200
5.9.198.83:80
http://api.chip-secured-download.de/downloaderContent/MarselisSlabWeb.eot?&1440165143
DE
eot
61.7 Kb
malicious
4064
dmr_72.exe
GET
200
5.9.198.83:80
http://api.chip-secured-download.de/downloaderContent/main.css?v=1461939270
DE
text
1.66 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4064
dmr_72.exe
5.9.198.83:80
api.chip-secured-download.de
Hetzner Online GmbH
DE
malicious
4064
dmr_72.exe
176.9.97.245:80
static.chip-secured-download.de
Hetzner Online GmbH
DE
suspicious
4064
dmr_72.exe
148.251.198.118:80
ads-not-by-this-site.de
Hetzner Online GmbH
DE
unknown
4064
dmr_72.exe
74.117.182.93:80
www.1-1ads.com
WZ Communications Inc.
US
unknown
4064
dmr_72.exe
172.217.168.6:443
ad.doubleclick.net
Google Inc.
US
whitelisted
4064
dmr_72.exe
2.16.186.26:80
dl.cdn.chip.de
Akamai International B.V.
whitelisted
2728
MsiExec.exe
5.9.198.83:80
api.chip-secured-download.de
Hetzner Online GmbH
DE
malicious
4064
dmr_72.exe
2.19.45.205:443
downloaderapi.chip.de
Akamai International B.V.
whitelisted
4064
dmr_72.exe
2.19.45.205:80
downloaderapi.chip.de
Akamai International B.V.
whitelisted
4064
dmr_72.exe
5.9.116.27:80
ocs2.chdi-server.de
Hetzner Online GmbH
DE
malicious

DNS requests

Domain
IP
Reputation
api.chip-secured-download.de
  • 5.9.198.83
  • 176.9.97.244
unknown
ocs2.chdi-server.de
  • 5.9.116.27
unknown
static.chip-secured-download.de
  • 176.9.97.245
  • 5.9.198.84
suspicious
ad.doubleclick.net
  • 172.217.168.6
whitelisted
downloaderapi.chip.de
  • 2.19.45.205
whitelisted
ads-not-by-this-site.de
  • 148.251.198.118
suspicious
www.1-1ads.com
  • 74.117.182.93
whitelisted
r.chip.de
  • 2.19.45.205
whitelisted
service.chip-secured-download.de
  • 5.9.198.83
  • 176.9.97.244
malicious
dl.cdn.chip.de
  • 2.16.186.26
  • 2.16.186.16
whitelisted

Threats

PID
Process
Class
Message
4064
dmr_72.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
4064
dmr_72.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
4064
dmr_72.exe
Misc activity
ET INFO Packed Executable Download
4064
dmr_72.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
4064
dmr_72.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
4064
dmr_72.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
4064
dmr_72.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
4064
dmr_72.exe
Misc activity
ET INFO EXE - Served Attached HTTP
4064
dmr_72.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
4064
dmr_72.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
No debug info