analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

C:\Users\admin\AppData\Local\Temp\nsm9B4D.tmp\PW001.exe

Full analysis: https://app.any.run/tasks/b94dd52d-eb11-47e9-bf98-79ff3bd1d793
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: February 10, 2019, 15:46:34
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
installer
adware
pua
lavasoft
loader
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

14E8AFB1EECCF97178B645F49D2EA7A1

SHA1:

4BA319F46201D7AF9C01B28CFC53BA7975C4BC3E

SHA256:

1C52B0C39AE1F8405F09FAB77E2FF02CC5083B0B329D06C979F4CA4F2EB1F934

SSDEEP:

24576:fG50ZfFK6MLYptRReZ3kTE3S00B1RxjBnYy+olZhDvL1g:fG5UfgVYlMRkTEiRBPxJBVZhDC

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • GenericSetup.exe (PID: 3140)
      • OfferInstaller.exe (PID: 3024)
      • mftv122u.zvf.exe (PID: 2236)
      • mftv122u.zvf.exe (PID: 3828)
      • mftv122u.zvf.exe (PID: 3732)
      • mftv122u.zvf.exe (PID: 1348)
      • mftv122u.zvf.exe (PID: 2660)
      • WebCompanionInstaller.exe (PID: 2800)
      • installer.exe (PID: 2572)
      • installer.exe (PID: 3548)
      • WebCompanion.exe (PID: 3196)
      • opera.exe (PID: 2304)
      • opera.exe (PID: 3328)
      • opera.exe (PID: 3432)
      • opera.exe (PID: 3464)
      • opera.exe (PID: 2548)
      • opera.exe (PID: 2500)
      • opera.exe (PID: 2348)
      • Lavasoft.WCAssistant.WinService.exe (PID: 3972)
      • opera.exe (PID: 4048)
      • opera.exe (PID: 3004)
      • opera.exe (PID: 3976)
      • opera.exe (PID: 3428)
      • opera.exe (PID: 3708)
      • installer.exe (PID: 2784)
      • WebCompanion.exe (PID: 3756)
      • instup.exe (PID: 3052)
    • Application was dropped or rewritten from another process

      • GenericSetup.exe (PID: 3140)
      • installer.exe (PID: 3772)
      • OfferInstaller.exe (PID: 3024)
      • mftv122u.zvf.exe (PID: 2236)
      • mftv122u.zvf.exe (PID: 1348)
      • mftv122u.zvf.exe (PID: 3732)
      • lhtq43qh.kty.exe (PID: 3684)
      • lhtq43qh.kty.exe (PID: 2852)
      • mftv122u.zvf.exe (PID: 2660)
      • lhtq43qh.kty.exe (PID: 2584)
      • mftv122u.zvf.exe (PID: 3828)
      • WebCompanionInstaller.exe (PID: 2800)
      • assistant_installer.exe (PID: 352)
      • _sfx.exe (PID: 2960)
      • Lavasoft.WCAssistant.WinService.exe (PID: 3972)
      • assistant_installer.exe (PID: 3996)
      • assistant_installer.exe (PID: 3416)
      • installer.exe (PID: 2572)
      • browser_assistant.exe (PID: 3920)
      • installer.exe (PID: 3548)
      • WebCompanion.exe (PID: 3196)
      • launcher.exe (PID: 2324)
      • launcher.exe (PID: 296)
      • opera.exe (PID: 3328)
      • opera.exe (PID: 2304)
      • opera.exe (PID: 3432)
      • opera_crashreporter.exe (PID: 2352)
      • opera.exe (PID: 3004)
      • opera.exe (PID: 3464)
      • opera.exe (PID: 2348)
      • opera.exe (PID: 2500)
      • opera.exe (PID: 3428)
      • opera.exe (PID: 2548)
      • opera.exe (PID: 4048)
      • opera_autoupdate.exe (PID: 340)
      • opera.exe (PID: 3976)
      • launcher.exe (PID: 3468)
      • opera_autoupdate.exe (PID: 2564)
      • opera.exe (PID: 3708)
      • opera_autoupdate.exe (PID: 3852)
      • installer.exe (PID: 2784)
      • opera_autoupdate.exe (PID: 1832)
      • WebCompanion.exe (PID: 3756)
      • ueoegijj.ojh.exe (PID: 3724)
      • ueoegijj.ojh.exe (PID: 3508)
      • opera_autoupdate.exe (PID: 3100)
      • opera_autoupdate.exe (PID: 2712)
      • ueoegijj.ojh.exe (PID: 2376)
      • Ad-Aware Web Companion.exe (PID: 2904)
      • instup.exe (PID: 3052)
      • avast_free_antivirus_setup_online.exe (PID: 1288)
      • instup.exe (PID: 3272)
    • LAVASOFT was detected

      • installer.exe (PID: 3772)
    • Downloads executable files from the Internet

      • OfferInstaller.exe (PID: 3024)
      • ueoegijj.ojh.exe (PID: 2376)
    • Changes internet zones settings

      • WebCompanionInstaller.exe (PID: 2800)
    • Changes the autorun value in the registry

      • WebCompanion.exe (PID: 3196)
      • assistant_installer.exe (PID: 3416)
    • Loads the Task Scheduler COM API

      • assistant_installer.exe (PID: 3416)
      • installer.exe (PID: 3548)
      • opera.exe (PID: 2304)
    • Actions looks like stealing of personal data

      • opera.exe (PID: 2304)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • PW001.exe (PID: 2868)
      • mftv122u.zvf.exe (PID: 1348)
      • mftv122u.zvf.exe (PID: 3732)
      • OfferInstaller.exe (PID: 3024)
      • mftv122u.zvf.exe (PID: 3828)
      • mftv122u.zvf.exe (PID: 2236)
      • mftv122u.zvf.exe (PID: 2660)
      • lhtq43qh.kty.exe (PID: 2852)
      • _sfx.exe (PID: 2960)
      • WebCompanionInstaller.exe (PID: 2800)
      • installer.exe (PID: 3548)
      • installer.exe (PID: 2572)
      • assistant_installer.exe (PID: 3416)
      • launcher.exe (PID: 3468)
      • installer.exe (PID: 2784)
      • csc.exe (PID: 3064)
      • ueoegijj.ojh.exe (PID: 2376)
      • avast_free_antivirus_setup_online.exe (PID: 1288)
      • instup.exe (PID: 3052)
    • Reads Windows owner or organization settings

      • GenericSetup.exe (PID: 3140)
      • OfferInstaller.exe (PID: 3024)
    • Reads Environment values

      • GenericSetup.exe (PID: 3140)
      • OfferInstaller.exe (PID: 3024)
    • Reads the Windows organization settings

      • GenericSetup.exe (PID: 3140)
      • OfferInstaller.exe (PID: 3024)
    • Starts CMD.EXE for commands execution

      • OfferInstaller.exe (PID: 3024)
      • WebCompanionInstaller.exe (PID: 2800)
      • Lavasoft.WCAssistant.WinService.exe (PID: 3972)
    • Starts itself from another location

      • mftv122u.zvf.exe (PID: 3732)
      • instup.exe (PID: 3052)
    • Creates files in the user directory

      • mftv122u.zvf.exe (PID: 1348)
      • WebCompanionInstaller.exe (PID: 2800)
      • installer.exe (PID: 3548)
      • browser_assistant.exe (PID: 3920)
      • opera_autoupdate.exe (PID: 340)
      • opera.exe (PID: 2304)
      • opera_autoupdate.exe (PID: 3100)
      • WebCompanion.exe (PID: 3196)
    • Application launched itself

      • mftv122u.zvf.exe (PID: 3732)
      • opera.exe (PID: 2304)
      • opera_autoupdate.exe (PID: 3852)
      • opera_autoupdate.exe (PID: 340)
      • opera_autoupdate.exe (PID: 3100)
    • Searches for installed software

      • GenericSetup.exe (PID: 3140)
      • OfferInstaller.exe (PID: 3024)
    • Creates a software uninstall entry

      • WebCompanionInstaller.exe (PID: 2800)
      • installer.exe (PID: 3548)
    • Starts SC.EXE for service management

      • WebCompanionInstaller.exe (PID: 2800)
    • Creates files in the program directory

      • WebCompanionInstaller.exe (PID: 2800)
      • WebCompanion.exe (PID: 3196)
      • Lavasoft.WCAssistant.WinService.exe (PID: 3972)
      • WebCompanion.exe (PID: 3756)
      • avast_free_antivirus_setup_online.exe (PID: 1288)
      • instup.exe (PID: 3052)
    • Modifies the open verb of a shell class

      • installer.exe (PID: 3548)
    • Uses NETSH.EXE for network configuration

      • cmd.exe (PID: 2252)
      • cmd.exe (PID: 3420)
    • Changes IE settings (feature browser emulation)

      • assistant_installer.exe (PID: 3416)
    • Creates files in the Windows directory

      • Lavasoft.WCAssistant.WinService.exe (PID: 3972)
      • WebCompanion.exe (PID: 3196)
      • WebCompanionInstaller.exe (PID: 2800)
      • instup.exe (PID: 3052)
      • instup.exe (PID: 3272)
      • avast_free_antivirus_setup_online.exe (PID: 1288)
      • ueoegijj.ojh.exe (PID: 2376)
    • Reads the machine GUID from the registry

      • opera.exe (PID: 2304)
    • Removes files from Windows directory

      • Lavasoft.WCAssistant.WinService.exe (PID: 3972)
      • WebCompanionInstaller.exe (PID: 2800)
      • instup.exe (PID: 3052)
    • Changes the started page of IE

      • WebCompanion.exe (PID: 3196)
    • Low-level read access rights to disk partition

      • ueoegijj.ojh.exe (PID: 2376)
      • avast_free_antivirus_setup_online.exe (PID: 1288)
      • instup.exe (PID: 3052)
  • INFO

    • Reads settings of System Certificates

      • GenericSetup.exe (PID: 3140)
      • mftv122u.zvf.exe (PID: 3732)
      • opera.exe (PID: 2304)
    • Dropped object may contain Bitcoin addresses

      • WebCompanionInstaller.exe (PID: 2800)
      • mftv122u.zvf.exe (PID: 2660)
      • WebCompanion.exe (PID: 3196)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | InstallShield setup (36.8)
.exe | Win32 Executable MS Visual C++ (generic) (26.6)
.exe | Win64 Executable (generic) (23.6)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)

EXIF

EXE

ProductName: Password Sentinel
OriginalFileName: Password-Sentinel-setup.exe
LegalCopyright: PasswordSentinel LLC
InternalName: Password-Sentinel-setup.exe
FileDescription: Password Sentinel
CompanyName: PasswordSentinel LLC
ProductVersion: 5.5.0.0
FileVersion: 5.5.0.0
CharacterSet: Unicode
LanguageCode: English (U.S.)
FileSubtype: -
ObjectFileType: Executable application
FileOS: Windows NT 32-bit
FileFlags: (none)
FileFlagsMask: 0x003f
ProductVersionNumber: 5.5.0.0
FileVersionNumber: 5.5.0.0
Subsystem: Windows GUI
SubsystemVersion: 4
ImageVersion: -
OSVersion: 4
EntryPoint: 0x148d4
UninitializedDataSize: -
InitializedDataSize: 40448
CodeSize: 104448
LinkerVersion: 6
PEType: PE32
TimeStamp: 2011:04:18 20:54:06+02:00
MachineType: Intel 386 or later, and compatibles
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
114
Monitored processes
67
Malicious processes
21
Suspicious processes
18

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start pw001.exe #LAVASOFT installer.exe genericsetup.exe offerinstaller.exe cmd.exe no specs mftv122u.zvf.exe mftv122u.zvf.exe mftv122u.zvf.exe cmd.exe no specs lhtq43qh.kty.exe no specs mftv122u.zvf.exe mftv122u.zvf.exe lhtq43qh.kty.exe no specs lhtq43qh.kty.exe webcompanioninstaller.exe _sfx.exe assistant_installer.exe sc.exe no specs sc.exe no specs sc.exe no specs cmd.exe no specs netsh.exe no specs webcompanion.exe installer.exe installer.exe lavasoft.wcassistant.winservice.exe assistant_installer.exe assistant_installer.exe browser_assistant.exe launcher.exe no specs unsecapp.exe no specs launcher.exe no specs opera.exe opera_crashreporter.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera_autoupdate.exe launcher.exe opera_autoupdate.exe no specs csc.exe installer.exe cmd.exe no specs netsh.exe no specs opera_autoupdate.exe opera.exe no specs opera_autoupdate.exe no specs cvtres.exe no specs ad-aware web companion.exe no specs opera_autoupdate.exe opera_autoupdate.exe no specs webcompanion.exe cmd.exe no specs ueoegijj.ojh.exe no specs ueoegijj.ojh.exe no specs ueoegijj.ojh.exe presentationfontcache.exe no specs avast_free_antivirus_setup_online.exe instup.exe instup.exe

Process information

PID
CMD
Path
Indicators
Parent process
2868"C:\Users\admin\Desktop\PW001.exe" C:\Users\admin\Desktop\PW001.exe
explorer.exe
User:
admin
Company:
PasswordSentinel LLC
Integrity Level:
MEDIUM
Description:
Password Sentinel
Exit code:
0
Version:
5.5.0.0
Modules
Images
c:\users\admin\desktop\pw001.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
3772.\installer.exeC:\Users\admin\AppData\Local\Temp\7zS43B6C3A9\installer.exe
PW001.exe
User:
admin
Company:
adaware
Integrity Level:
MEDIUM
Description:
Password Sentinel
Exit code:
0
Version:
2.5.0.1009
Modules
Images
c:\users\admin\appdata\local\temp\7zs43b6c3a9\installer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3140C:\Users\admin\AppData\Local\Temp\7zS43B6C3A9\GenericSetup.exe husertype=AdminC:\Users\admin\AppData\Local\Temp\7zS43B6C3A9\GenericSetup.exe
installer.exe
User:
admin
Company:
adaware
Integrity Level:
MEDIUM
Description:
Password Sentinel
Exit code:
0
Version:
2.5.0.1009
Modules
Images
c:\users\admin\appdata\local\temp\7zs43b6c3a9\genericsetup.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3024"C:\Users\admin\AppData\Local\Temp\7zS43B6C3A9\OfferInstaller.exe" C:\Users\admin\AppData\Local\Temp\7zS43B6C3A9\OfferInstaller.exe
GenericSetup.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Password Sentinel
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\7zs43b6c3a9\offerinstaller.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3264"C:\Windows\system32\cmd.exe" /C ""C:\Users\admin\AppData\Local\Temp\mftv122u.zvf.exe" --silent --otd="utm.medium:pb,utm.source:lavasoft,utm.campaign:lavasoft""C:\Windows\system32\cmd.exeOfferInstaller.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3732"C:\Users\admin\AppData\Local\Temp\mftv122u.zvf.exe" --silent --otd="utm.medium:pb,utm.source:lavasoft,utm.campaign:lavasoft"C:\Users\admin\AppData\Local\Temp\mftv122u.zvf.exe
cmd.exe
User:
admin
Company:
Opera Software
Integrity Level:
MEDIUM
Description:
Opera Installer
Exit code:
0
Version:
58.0.3135.53
Modules
Images
c:\users\admin\appdata\local\temp\mftv122u.zvf.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1348C:\Users\admin\AppData\Local\Temp\mftv122u.zvf.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=58.0.3135.53 --initial-client-data=0xdc,0xe4,0xe8,0xe0,0xec,0x6a0da8e0,0x6a0da8f0,0x6a0da8fcC:\Users\admin\AppData\Local\Temp\mftv122u.zvf.exe
mftv122u.zvf.exe
User:
admin
Company:
Opera Software
Integrity Level:
MEDIUM
Description:
Opera Installer
Exit code:
0
Version:
58.0.3135.53
Modules
Images
c:\users\admin\appdata\local\temp\mftv122u.zvf.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2236"C:\Users\admin\AppData\Local\Temp\Opera Installer\mftv122u.zvf.exe" --versionC:\Users\admin\AppData\Local\Temp\Opera Installer\mftv122u.zvf.exe
mftv122u.zvf.exe
User:
admin
Company:
Opera Software
Integrity Level:
MEDIUM
Description:
Opera Installer
Exit code:
0
Version:
58.0.3135.53
Modules
Images
c:\users\admin\appdata\local\temp\opera installer\mftv122u.zvf.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2668"C:\Windows\system32\cmd.exe" /C ""C:\Users\admin\AppData\Local\Temp\lhtq43qh.kty.exe" --silent --homepage=1 --search=1 --partner=PW170901"C:\Windows\system32\cmd.exeOfferInstaller.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3684"C:\Users\admin\AppData\Local\Temp\lhtq43qh.kty.exe" --silent --homepage=1 --search=1 --partner=PW170901C:\Users\admin\AppData\Local\Temp\lhtq43qh.kty.execmd.exe
User:
admin
Company:
Lavasoft
Integrity Level:
MEDIUM
Description:
Web Companion Installer
Exit code:
3221226540
Version:
4.5.1957.3838
Modules
Images
c:\users\admin\appdata\local\temp\lhtq43qh.kty.exe
c:\systemroot\system32\ntdll.dll
Total events
5 758
Read events
4 834
Write events
0
Delete events
0

Modification events

No data
Executable files
130
Suspicious files
101
Text files
562
Unknown types
79

Dropped files

PID
Process
Filename
Type
3140GenericSetup.exeC:\Users\admin\AppData\Local\Temp\Password Sentinel Setup.logtext
MD5:298A71B0E9510E09889F03A95C2A89F5
SHA256:E55A8790423FC6C1824A5E4B13021669F4C2AB85E4AC8EB8F1A7B9B052642E18
2868PW001.exeC:\Users\admin\AppData\Local\Temp\7zS43B6C3A9\GenericSetup.exe.configxml
MD5:40E903F70B1412FEBAA4B889092BDD4F
SHA256:D335033BC27C28AE3A4E22313D4C26F9B3F6B78C44ACEF4A2D8BA3C5A5D9F9A1
3772installer.exeC:\Users\admin\AppData\Local\Temp\7zS43B6C3A9\GenericSetup.exe.configxml
MD5:8958ECE6D79F967CD18F8AB75665D7A9
SHA256:3DD629278C173EF39428D725495721F6E0F41E6D639ADF05BFC42E812E00FA3F
2868PW001.exeC:\Users\admin\AppData\Local\Temp\7zS43B6C3A9\DevLib.dllexecutable
MD5:6EF90166CD0485D28F9041D95C1893A9
SHA256:B1E20529054B4F884E6E60EB0159A38520A36D90A57F3384E12F7F4351EA2EBE
2868PW001.exeC:\Users\admin\AppData\Local\Temp\7zS43B6C3A9\fr\DevLib.resources.dllexecutable
MD5:C0F443CFEC89F9EC78B04D63E8CB9896
SHA256:BE661C91362E9F6B7CC968D03176C5A8A9ADB79CF656BFDBC3B35323D4146F20
2868PW001.exeC:\Users\admin\AppData\Local\Temp\7zS43B6C3A9\OfferInstaller.exeexecutable
MD5:9DB2FC9A43DD40E57465B24394B538E6
SHA256:1FFD478F24BDB376218C953C5BDF0C9286C891698230DADD9469DAB18DB1842F
2868PW001.exeC:\Users\admin\AppData\Local\Temp\7zS43B6C3A9\en\DevLib.resources.dllexecutable
MD5:5537B6D01A5A7A640AADCA5AFC517E17
SHA256:C707D541014971CA5188B7C19488E2DBF891CC66BE7249F0487EA65439BE18A8
2868PW001.exeC:\Users\admin\AppData\Local\Temp\7zS43B6C3A9\BundleConfig.xmltext
MD5:C0A417B3394C1F645BDE55008662CF86
SHA256:35A59DAED91192145F06FBEDA58938613ADA800027008566FD15446CDD4EBD9D
2868PW001.exeC:\Users\admin\AppData\Local\Temp\7zS43B6C3A9\de\DevLib.resources.dllexecutable
MD5:E510199A9905BE61FE8ECC2AF5A6049A
SHA256:73E67D0D30C6C2BA199ED96D15E48A0E8B4FF04BB66FEEDFC09D8A9E54E826CA
3772installer.exeC:\Users\admin\AppData\Local\Temp\7zS43B6C3A9\2019.02.10_15.47.02.161500_installer_pid=3772.txt
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
64
TCP/UDP connections
84
DNS requests
90
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3024
OfferInstaller.exe
GET
200
185.26.182.112:80
http://net.geo.opera.com/opera/stable/windows?utm_source=lavasoft&utm_medium=pb&utm_campaign=lavasoft
unknown
executable
2.06 Mb
whitelisted
2800
WebCompanionInstaller.exe
POST
200
72.55.154.82:80
http://wc-tracking.lavasoft.com/Install.asmx
CA
xml
294 b
whitelisted
2800
WebCompanionInstaller.exe
POST
200
72.55.154.82:80
http://wc-tracking.lavasoft.com/Install.asmx
CA
xml
294 b
whitelisted
3772
installer.exe
POST
200
104.17.60.19:80
http://flow.lavasoft.com/v1/event-stat?ProductID=IS&Type=StubBundleStart
US
text
29 b
whitelisted
2800
WebCompanionInstaller.exe
POST
200
72.55.154.82:80
http://wc-tracking.lavasoft.com/Install.asmx
CA
xml
294 b
whitelisted
2800
WebCompanionInstaller.exe
POST
200
72.55.154.82:80
http://wc-tracking.lavasoft.com/Install.asmx
CA
xml
294 b
whitelisted
2800
WebCompanionInstaller.exe
POST
200
72.55.154.82:80
http://wc-tracking.lavasoft.com/Install.asmx
CA
xml
294 b
whitelisted
3024
OfferInstaller.exe
GET
200
104.17.177.102:80
http://webcompanion.com/nano_download.php?partner=PW170901
US
executable
347 Kb
malicious
2800
WebCompanionInstaller.exe
POST
200
72.55.154.82:80
http://wc-tracking.lavasoft.com/Install.asmx
CA
xml
294 b
whitelisted
2800
WebCompanionInstaller.exe
POST
200
72.55.154.82:80
http://wc-tracking.lavasoft.com/Install.asmx
CA
xml
294 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3140
GenericSetup.exe
104.16.236.79:443
sos.adaware.com
Cloudflare Inc
US
shared
3024
OfferInstaller.exe
104.17.177.102:80
webcompanion.com
Cloudflare Inc
US
shared
3140
GenericSetup.exe
104.17.61.19:443
flow.lavasoft.com
Cloudflare Inc
US
shared
3732
mftv122u.zvf.exe
185.26.182.105:443
autoupdate.geo.opera.com
Opera Software AS
unknown
3024
OfferInstaller.exe
185.26.182.112:80
net.geo.opera.com
Opera Software AS
malicious
3772
installer.exe
104.17.60.19:80
flow.lavasoft.com
Cloudflare Inc
US
shared
3024
OfferInstaller.exe
104.17.61.19:443
flow.lavasoft.com
Cloudflare Inc
US
shared
2800
WebCompanionInstaller.exe
104.17.61.19:80
flow.lavasoft.com
Cloudflare Inc
US
shared
3732
mftv122u.zvf.exe
185.26.182.111:443
net.geo.opera.com
Opera Software AS
whitelisted
2800
WebCompanionInstaller.exe
72.55.154.82:80
wc-tracking.lavasoft.com
iWeb Technologies Inc.
CA
unknown

DNS requests

Domain
IP
Reputation
www.google.com
  • 172.217.16.68
whitelisted
sos.adaware.com
  • 104.16.236.79
  • 104.16.235.79
whitelisted
flow.lavasoft.com
  • 104.17.60.19
  • 104.17.61.19
whitelisted
webcompanion.com
  • 104.17.177.102
  • 104.17.178.102
malicious
net.geo.opera.com
  • 185.26.182.112
  • 185.26.182.111
whitelisted
desktop-netinstaller-sub.osp.opera.software
  • 82.145.217.121
whitelisted
autoupdate.geo.opera.com
  • 185.26.182.105
  • 185.26.182.95
whitelisted
dl.opera.com
  • 185.26.182.111
  • 185.26.182.112
whitelisted
download3.operacdn.com
  • 2.18.232.199
whitelisted
wc-tracking.lavasoft.com
  • 72.55.154.82
  • 72.55.154.81
whitelisted

Threats

PID
Process
Class
Message
3772
installer.exe
A Network Trojan was detected
ET MALWARE Lavasoft PUA/Adware Client Install
3024
OfferInstaller.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3024
OfferInstaller.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
3024
OfferInstaller.exe
Misc activity
ET INFO EXE - Served Attached HTTP
3024
OfferInstaller.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3024
OfferInstaller.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
3024
OfferInstaller.exe
Misc activity
ET INFO EXE - Served Attached HTTP
3024
OfferInstaller.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3024
OfferInstaller.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
2376
ueoegijj.ojh.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Process
Message
WebCompanionInstaller.exe
Detecting windows culture
WebCompanionInstaller.exe
2/10/2019 3:47:31 PM :-> Starting installer 4.5.1957.3838 with: .\WebCompanionInstaller.exe --partner=PW170901 --version=4.5.1957.3838 --prod --silent --homepage=1 --search=1 --partner=PW170901, Run as admin: True
WebCompanionInstaller.exe
Preparing for installing Web Companion
WebCompanionInstaller.exe
2/10/2019 3:47:32 PM :-> Generating Machine and Install Id ...
WebCompanionInstaller.exe
2/10/2019 3:47:32 PM :-> Machine Id and Install Id has been generated
WebCompanionInstaller.exe
2/10/2019 3:47:33 PM :-> Checking prerequisites ...
WebCompanionInstaller.exe
2/10/2019 3:47:33 PM :-> Antivirus not detected
WebCompanionInstaller.exe
2/10/2019 3:47:33 PM :-> vm_check False
WebCompanionInstaller.exe
2/10/2019 3:47:33 PM :-> reg_check :False
WebCompanionInstaller.exe
2/10/2019 3:47:33 PM :-> Installed .Net framework is V40