File name:

1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733

Full analysis: https://app.any.run/tasks/1509a8f0-6e26-4788-a0b3-7e118bcf0a3e
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: October 17, 2018, 07:12:26
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
adware
icloader
loader
pua
lavasoft
adposhel
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

5A4C960419E552579ABF410090AAA6B9

SHA1:

5259CAD6052396E056A5BDAED3F54A7D9B7523AC

SHA256:

1CE65368CABD97CA3B7EC58DDBE839E74A64CC74B570894E33492B1BF5F06733

SSDEEP:

49152:xccCjK2w9Blhkwp5a6sbPGn4J1OeMVwKFbnN5qGuwn64TcHfEOQG:ScE3w9Jkwp5albPGn6Mtbxp6r1

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • ICLOADER was detected

      • 1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exe (PID: 3312)
    • Changes the autorun value in the registry

      • xdata7.exe (PID: 3696)
      • WebDiscover-4.28.2.tmp (PID: 1488)
      • utkkittqqvi.tmp (PID: 2540)
      • 6273467.exe (PID: 3196)
    • Downloads executable files from the Internet

      • 1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exe (PID: 3312)
    • Loads dropped or rewritten executable

      • GenericSetup.exe (PID: 3704)
      • rundll32.exe (PID: 3168)
      • browser.exe (PID: 776)
      • browser.exe (PID: 2124)
      • browser.exe (PID: 2296)
      • browser.exe (PID: 3084)
      • browser.exe (PID: 4064)
      • s2s.exe (PID: 116)
      • s2s.exe (PID: 3368)
      • browser.exe (PID: 3592)
      • browser.exe (PID: 568)
    • Application was dropped or rewritten from another process

      • IDM_2018_Serial_Number_and_Crack_Free.exe (PID: 1764)
      • GenericSetup.exe (PID: 3704)
      • xdata7.exe (PID: 3696)
      • installer.exe (PID: 3548)
      • OneSystemCare.exe (PID: 704)
      • OneSystemCare.exe (PID: 3092)
      • browser.exe (PID: 776)
      • browser.exe (PID: 2124)
      • browser.exe (PID: 3084)
      • browser.exe (PID: 2296)
      • browser.exe (PID: 4064)
      • s2s.exe (PID: 116)
      • browser.exe (PID: 3592)
      • browser.exe (PID: 568)
      • s5m_install_325.exe (PID: 3340)
      • s2s.exe (PID: 3368)
      • nsFA63.tmp (PID: 3800)
      • nsFC39.tmp (PID: 1412)
      • ns978.tmp (PID: 2128)
      • nsA54.tmp (PID: 3428)
      • nsB3F.tmp (PID: 3120)
      • setup0904.exe (PID: 3712)
    • LAVASOFT was detected

      • installer.exe (PID: 3548)
    • Modifies files in Chrome extension folder

      • 1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exe (PID: 3312)
    • Uses Task Scheduler to run other applications

      • WebDiscover-4.28.2.tmp (PID: 1488)
    • Loads the Task Scheduler COM API

      • schtasks.exe (PID: 504)
      • schtasks.exe (PID: 2600)
      • schtasks.exe (PID: 1776)
      • schtasks.exe (PID: 772)
      • schtasks.exe (PID: 2672)
      • schtasks.exe (PID: 1720)
      • SystemConsole.exe (PID: 3620)
    • Changes settings of System certificates

      • 6273467.exe (PID: 2536)
      • browser.exe (PID: 3084)
    • ADPOSHEL was detected

      • SystemConsole.exe (PID: 3620)
    • Connects to CnC server

      • SystemConsole.exe (PID: 3620)
    • Starts NET.EXE for service management

      • nsFC39.tmp (PID: 1412)
  • SUSPICIOUS

    • Changes tracing settings of the file or console

      • 1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exe (PID: 3312)
    • Executable content was dropped or overwritten

      • 1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exe (PID: 3312)
      • IDM_2018_Serial_Number_and_Crack_Free.exe (PID: 1764)
      • xdata7.exe (PID: 3696)
      • WebDiscover-4.28.2.exe (PID: 2652)
      • OneSystemCare.exe (PID: 3092)
      • OneSystemCare.tmp (PID: 2152)
      • WebDiscover-4.28.2.tmp (PID: 1488)
      • s2s.exe (PID: 116)
      • OneSystemCare.tmp (PID: 3268)
      • setup (1).exe (PID: 3764)
      • utkkittqqvi.exe (PID: 3772)
      • utkkittqqvi.tmp (PID: 2540)
      • s5m_install_325.exe (PID: 3340)
      • s2s.exe (PID: 3368)
    • Reads internet explorer settings

      • 1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exe (PID: 3312)
    • Uses NETSH.EXE for network configuration

      • xdata7.exe (PID: 3696)
    • Reads Windows owner settings

      • GenericSetup.exe (PID: 3704)
      • OneSystemCare.tmp (PID: 2152)
      • WebDiscover-4.28.2.tmp (PID: 1488)
      • OneSystemCare.tmp (PID: 3268)
    • Creates files in the user directory

      • 1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exe (PID: 3312)
      • OneSystemCare.tmp (PID: 3268)
    • Reads the Windows organization settings

      • GenericSetup.exe (PID: 3704)
      • OneSystemCare.tmp (PID: 2152)
      • WebDiscover-4.28.2.tmp (PID: 1488)
      • OneSystemCare.tmp (PID: 3268)
    • Reads the machine GUID from the registry

      • WebDiscover-4.28.2.tmp (PID: 1488)
    • Starts SC.EXE for service management

      • WebDiscover-4.28.2.tmp (PID: 1488)
      • nsFA63.tmp (PID: 3800)
      • ns978.tmp (PID: 2128)
    • Adds / modifies Windows certificates

      • 6273467.exe (PID: 2536)
      • browser.exe (PID: 3084)
    • Searches for installed software

      • WebDiscover-4.28.2.tmp (PID: 1488)
      • GenericSetup.exe (PID: 3704)
    • Creates files in the program directory

      • setup (1).exe (PID: 3764)
      • s5m_install_325.exe (PID: 3340)
    • Application launched itself

      • browser.exe (PID: 3084)
      • 6273467.exe (PID: 2536)
      • 6273467.exe (PID: 3196)
    • Creates a software uninstall entry

      • SystemConsole.exe (PID: 3620)
      • s5m_install_325.exe (PID: 3340)
    • Starts application with an unusual extension

      • s2s.exe (PID: 116)
    • Removes files from Windows directory

      • s2s.exe (PID: 3368)
    • Creates files in the Windows directory

      • 6273467.exe (PID: 2536)
      • s2s.exe (PID: 3368)
    • Uses REG.EXE to modify Windows registry

      • nsA54.tmp (PID: 3428)
  • INFO

    • Application was dropped or rewritten from another process

      • WebDiscover-4.28.2.tmp (PID: 1488)
      • OneSystemCare.tmp (PID: 3268)
      • OneSystemCare.tmp (PID: 2152)
      • utkkittqqvi.tmp (PID: 2540)
    • Creates files in the program directory

      • WebDiscover-4.28.2.tmp (PID: 1488)
      • setup.tmp (PID: 3208)
      • OneSystemCare.tmp (PID: 3268)
      • utkkittqqvi.tmp (PID: 2540)
    • Loads dropped or rewritten executable

      • OneSystemCare.tmp (PID: 2152)
      • OneSystemCare.tmp (PID: 3268)
    • Dropped object may contain Bitcoin addresses

      • WebDiscover-4.28.2.tmp (PID: 1488)
      • OneSystemCare.tmp (PID: 3268)
      • s2s.exe (PID: 116)
      • s2s.exe (PID: 3368)
    • Creates a software uninstall entry

      • WebDiscover-4.28.2.tmp (PID: 1488)
      • OneSystemCare.tmp (PID: 3268)
      • utkkittqqvi.tmp (PID: 2540)
    • Reads settings of System Certificates

      • 6273467.exe (PID: 2536)
      • 6273467.exe (PID: 840)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (38.3)
.exe | Win32 Executable (generic) (26.3)
.exe | Clipper DOS Executable (11.7)
.exe | Generic Win/DOS Executable (11.6)
.exe | DOS Executable Generic (11.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2018:10:16 01:01:52+02:00
PEType: PE32
LinkerVersion: 8
CodeSize: 880640
InitializedDataSize: 3088384
UninitializedDataSize: -
EntryPoint: 0xd27a6
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 15-Oct-2018 23:01:52
Detected languages:
  • English - United Kingdom
  • English - United States

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000D8

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 3
Time date stamp: 15-Oct-2018 23:01:52
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LARGE_ADDRESS_AWARE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
a2c1b
0x00001000
0x000D6CC8
0x000D7000
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
7.76514
a2c1c
0x000D8000
0x00065CF2
0x00066000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0.17677
0x0013E000
0x0028B250
0x0028C000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
7.54937

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.20869
2167
UNKNOWN
English - United States
RT_MANIFEST
2
5.41946
4264
UNKNOWN
English - United States
RT_ICON
3
4.93128
9640
UNKNOWN
English - United States
RT_ICON
7
3.28142
928
UNKNOWN
English - United Kingdom
RT_STRING
8
3.09746
458
UNKNOWN
English - United Kingdom
RT_STRING
9
3.24205
286
UNKNOWN
English - United Kingdom
RT_STRING
10
3.27968
270
UNKNOWN
English - United Kingdom
RT_STRING
11
2.92195
204
UNKNOWN
English - United Kingdom
RT_STRING
12
3.16338
270
UNKNOWN
English - United Kingdom
RT_STRING
13
2.61716
100
UNKNOWN
English - United Kingdom
RT_STRING

Imports

ADVAPI32.dll
GDI32.dll
KERNEL32.dll
USER32.dll
WS2_32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
109
Monitored processes
56
Malicious processes
19
Suspicious processes
10

Behavior graph

Click at the process to see the details
drop and start drop and start drop and start drop and start start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start #ICLOADER 1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exe xdata7.exe idm_2018_serial_number_and_crack_free.exe netsh.exe no specs #LAVASOFT installer.exe genericsetup.exe rundll32.exe webdiscover-4.28.2.exe webdiscover-4.28.2.tmp onesystemcare.exe onesystemcare.tmp onesystemcare.exe no specs onesystemcare.tmp setup.exe no specs setup.tmp no specs 6273467.exe schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs sc.exe no specs schtasks.exe no specs schtasks.exe no specs browser.exe browser.exe no specs browser.exe browser.exe no specs browser.exe no specs s2s.exe #ADPOSHEL systemconsole.exe setup (1).exe browser.exe no specs browser.exe no specs utkkittqqvi.exe utkkittqqvi.tmp s5m_install_325.exe setup0904.exe no specs nsfa63.tmp no specs sc.exe no specs nsfc39.tmp no specs 6273467.exe net.exe no specs net1.exe no specs s2s.exe 6273467.exe ns978.tmp no specs sc.exe no specs nsa54.tmp no specs reg.exe no specs nsb3f.tmp no specs reg.exe no specs nsc0b.tmp no specs reg.exe no specs nscf7.tmp no specs reg.exe no specs 1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
116"C:\Users\admin\AppData\Local\Temp\s2s.exe" /S eyJhaWQiOiI5NTYwIiwiZG9udF91c2VfcG9zdCI6InRydWUifQ==C:\Users\admin\AppData\Local\Temp\s2s.exe
1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\s2s.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
504"schtasks" /delete /tn "WebDiscover Browser Launch Task" /fC:\Windows\system32\schtasks.exeWebDiscover-4.28.2.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Manages scheduled tasks
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\schtasks.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
564C:\Windows\system32\net1 start --C:\Windows\system32\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Net Command
Exit code:
2
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\net1.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dsrole.dll
c:\windows\system32\netutils.dll
568"C:\Program Files\WebDiscoverBrowser\4.28.2\browser.exe" --type=renderer --field-trial-handle=2140,13494583771007228224,16395481360878918715,131072 --service-pipe-token=F0BCEBCB717566F41928ECA5AC948DF0 --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --enable-pinch --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553 --disable-accelerated-video-decode --disable-gpu-compositing --service-request-channel-token=F0BCEBCB717566F41928ECA5AC948DF0 --renderer-client-id=2 --mojo-platform-channel-handle=2144 /prefetch:1C:\Program Files\WebDiscoverBrowser\4.28.2\browser.exebrowser.exe
User:
admin
Company:
WebDiscover Media
Integrity Level:
LOW
Description:
WebDiscover Browser
Exit code:
0
Version:
63.0.3239.132
Modules
Images
c:\program files\webdiscoverbrowser\4.28.2\browser.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\webdiscoverbrowser\4.28.2\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
704C:\Users\admin\AppData\Local\Temp\OneSystemCare.exe /VERYSILENT /SL5=$705D8,3673978,151040,C:\Users\admin\AppData\Local\Temp\OneSystemCare.exe /S --subid 4209C:\Users\admin\AppData\Local\Temp\OneSystemCare.exeOneSystemCare.tmp
User:
admin
Company:
Integrity Level:
HIGH
Description:
Exit code:
0
Version:
Modules
Images
c:\users\admin\appdata\local\temp\onesystemcare.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
772"schtasks" /delete /tn "WebDiscover Update Task" /fC:\Windows\system32\schtasks.exeWebDiscover-4.28.2.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Manages scheduled tasks
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\schtasks.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
776"C:\Program Files\WebDiscoverBrowser\4.28.2\browser.exe" --updateC:\Program Files\WebDiscoverBrowser\4.28.2\browser.exe
WebDiscover-4.28.2.tmp
User:
admin
Company:
WebDiscover Media
Integrity Level:
HIGH
Description:
WebDiscover Browser
Exit code:
0
Version:
63.0.3239.132
Modules
Images
c:\program files\webdiscoverbrowser\4.28.2\browser.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\webdiscoverbrowser\4.28.2\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
820reg add HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT /v DontReportInfectionInformation /t REG_DWORD /d 1 /fC:\Windows\system32\reg.exensA54.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
840"C:\Program Files\Pictrue\6273467.exe" 2 3.1539760420.5bc6e1245c13eC:\Program Files\Pictrue\6273467.exe
6273467.exe
User:
admin
Integrity Level:
HIGH
Description:
BreakingBad
Exit code:
0
Version:
0.0.0.1
Modules
Images
c:\program files\pictrue\6273467.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
1028reg add HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT /v DontReportInfectionInformation /t REG_DWORD /d 1 /f /reg:32C:\Windows\system32\reg.exensB3F.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Total events
6 474
Read events
6 066
Write events
390
Delete events
18

Modification events

(PID) Process:(3312) 1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3312) 1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3312) 1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(3312) 1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
4294901760
(PID) Process:(3312) 1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(3312) 1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(3312) 1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3312) 1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3312) 1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASMANCS
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(3312) 1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASMANCS
Operation:writeName:ConsoleTracingMask
Value:
4294901760
Executable files
62
Suspicious files
15
Text files
83
Unknown types
24

Dropped files

PID
Process
Filename
Type
33121ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\RB73MZ6Y\offer[1].txthtml
MD5:
SHA256:
1764IDM_2018_Serial_Number_and_Crack_Free.exeC:\Users\admin\AppData\Local\Temp\7zS4E6AAC6C\BundleConfig.xmltext
MD5:
SHA256:
33121ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exeC:\Users\admin\AppData\Local\Temp\IDM_2018_Serial_Number_and_Crack_Free.exeexecutable
MD5:
SHA256:
1764IDM_2018_Serial_Number_and_Crack_Free.exeC:\Users\admin\AppData\Local\Temp\7zS4E6AAC6C\es\DevLib.resources.dllexecutable
MD5:
SHA256:
33121ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exeC:\Users\admin\AppData\Local\Temp\WebDiscover-4.28.2.exe
MD5:
SHA256:
1764IDM_2018_Serial_Number_and_Crack_Free.exeC:\Users\admin\AppData\Local\Temp\7zS4E6AAC6C\de\DevLib.resources.dllexecutable
MD5:
SHA256:
33121ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exeC:\Program Files\Google\Chrome\Application\68.0.3440.106\chrome.dll
MD5:
SHA256:
1764IDM_2018_Serial_Number_and_Crack_Free.exeC:\Users\admin\AppData\Local\Temp\7zS4E6AAC6C\uTorrent.dllexecutable
MD5:
SHA256:
33121ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exeC:\Program Files\Mozilla Firefox\xul.dll
MD5:
SHA256:
1488WebDiscover-4.28.2.tmpC:\Program Files\WebDiscoverBrowser\is-O9M1O.tmp
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
52
TCP/UDP connections
52
DNS requests
32
Threats
38

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3312
1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exe
POST
200
195.201.249.17:80
http://static.17.249.201.195.clients.your-server.de/request/autok?user=luxsoft&ver=10&key=a8d588afe11b4f83598303abd1b1afc3
RU
text
140 b
malicious
3312
1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exe
GET
200
195.201.249.17:80
http://static.17.249.201.195.clients.your-server.de/api/installer/offer?component_id=129700&token=f4ff9684cd583026e1f8799ebb0138f9
RU
html
1.01 Kb
malicious
3312
1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exe
GET
200
78.47.21.155:80
http://dl3.joxi.net/drive/2018/07/25/0015/1511/988647/47/722196ba8a.jpg
DE
image
9.63 Kb
suspicious
3312
1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exe
POST
200
195.201.249.17:80
http://static.17.249.201.195.clients.your-server.de/request/offers?user=luxsoft&ver=10&key=a8fa3e10250a59a15dc8989e3a7dfbf3&token=f4ff9684cd583026e1f8799ebb0138f9
RU
text
8.18 Kb
malicious
3312
1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exe
GET
200
195.201.249.17:80
http://static.17.249.201.195.clients.your-server.de/request/get/f4ff9684cd583026e1f8799ebb0138f9/130413
RU
executable
445 Kb
malicious
3312
1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exe
POST
200
195.201.249.17:80
http://static.17.249.201.195.clients.your-server.de/request/conditions?user=luxsoft&ver=10&key=b2200bd5c6bc620890db2ea85011ad4c&token=f4ff9684cd583026e1f8799ebb0138f9
RU
text
24.8 Kb
malicious
3312
1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exe
GET
200
67.215.238.66:80
http://download.ap.bittorrent.com/track/stable/endpoint/utorrent/os/windows
US
executable
2.83 Mb
whitelisted
3312
1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exe
GET
200
104.24.119.133:80
http://vd.onesystemhost.net/331002721/OneSystemCare.exe
US
executable
3.96 Mb
shared
3312
1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exe
GET
200
5.149.255.62:80
http://img.wait3sec.com/images/iphonex.ico
NL
image
248 Kb
shared
3312
1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exe
GET
200
195.201.249.17:80
http://static.17.249.201.195.clients.your-server.de/request/get/f4ff9684cd583026e1f8799ebb0138f9/130124
RU
executable
1.15 Mb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3312
1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exe
195.201.249.17:80
static.17.249.201.195.clients.your-server.de
Awanti Ltd.
RU
malicious
3312
1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exe
78.47.21.155:80
dl3.joxi.net
Hetzner Online GmbH
DE
suspicious
3312
1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exe
67.215.238.66:80
download.ap.bittorrent.com
QuadraNet, Inc
US
suspicious
3704
GenericSetup.exe
104.16.234.150:443
sos.adaware.com
Cloudflare Inc
US
shared
3704
GenericSetup.exe
104.16.234.150:80
sos.adaware.com
Cloudflare Inc
US
shared
3548
installer.exe
104.17.60.19:80
flow.lavasoft.com
Cloudflare Inc
US
shared
3704
GenericSetup.exe
104.17.61.19:443
flow.lavasoft.com
Cloudflare Inc
US
shared
3168
rundll32.exe
172.217.20.75:443
Google Inc.
US
whitelisted
1488
WebDiscover-4.28.2.tmp
104.31.86.53:443
update.getdiscoverbrowser.com
Cloudflare Inc
US
shared
3312
1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exe
104.24.119.133:80
vd.onesystemhost.net
Cloudflare Inc
US
shared

DNS requests

Domain
IP
Reputation
static.17.249.201.195.clients.your-server.de
  • 195.201.249.17
malicious
dl3.joxi.net
  • 78.47.21.155
unknown
download.ap.bittorrent.com
  • 67.215.238.66
whitelisted
www.google.com
  • 172.217.21.228
  • 172.217.22.4
malicious
sos.adaware.com
  • 104.16.234.150
  • 104.16.237.150
  • 104.16.238.150
  • 104.16.236.150
  • 104.16.235.150
whitelisted
flow.lavasoft.com
  • 104.17.60.19
  • 104.17.61.19
whitelisted
update.getdiscoverbrowser.com
  • 104.31.86.53
  • 104.31.87.53
whitelisted
vd.onesystemhost.net
  • 104.24.119.133
  • 104.24.118.133
unknown
img.wait3sec.com
  • 5.149.255.62
shared
pc.mainmarketingswarm.com
  • 149.202.91.53
  • 149.202.76.117
suspicious

Threats

PID
Process
Class
Message
3312
1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exe
A Network Trojan was detected
ET MALWARE Luxsoft Win32/ICLoader User-Agent
3312
1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exe
Misc activity
ADWARE [PTsecurity] Application.Bundler.ICLoader Response
3312
1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exe
A Network Trojan was detected
ET MALWARE Luxsoft Win32/ICLoader User-Agent
3312
1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exe
A Network Trojan was detected
SC ADWARE SoftwareBundler:Win32/ICLoader
3312
1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exe
A Network Trojan was detected
ET MALWARE Luxsoft Win32/ICLoader User-Agent
3312
1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exe
A Network Trojan was detected
SC ADWARE SoftwareBundler:Win32/ICLoader
3312
1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3312
1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exe
Misc activity
ET INFO EXE - Served Attached HTTP
3312
1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3312
1ce65368cabd97ca3b7ec58ddbe839e74a64cc74b570894e33492b1bf5f06733.exe
Misc activity
ET INFO EXE - Served Attached HTTP
1 ETPRO signatures available at the full report
No debug info