URL:

https://www.bytesin.com/software/download-link-8/166987/

Full analysis: https://app.any.run/tasks/0fb02d11-c719-4eb1-acf9-cf0b6a5f5070
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: October 24, 2019, 21:27:22
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
trojan
adware
Indicators:
MD5:

F57F5D504E681919FFA1C6B1135C7BC1

SHA1:

EC9E3A61CF083DA61CF16BCE03F5FB10080438F0

SHA256:

2BEB2BD59B9D84C3A931AA277ACC5F61E592BCCFD610FD0D8E5966D6D631B487

SSDEEP:

3:N8DSL8AyKmKOJMhHcf:2OL8AyKmUG

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • DriverPack-17-Online.exe (PID: 2888)
      • devcon.exe (PID: 3256)
      • DrvInst.exe (PID: 4048)
      • DirectX.exe (PID: 3820)
      • regsvr32.exe (PID: 2432)
      • regsvr32.exe (PID: 1788)
      • regsvr32.exe (PID: 3552)
      • regsvr32.exe (PID: 3344)
    • Application was dropped or rewritten from another process

      • DriverPack-17-Online.exe (PID: 884)
      • driverpack-wget.exe (PID: 2860)
      • aria2c.exe (PID: 2948)
      • aria2c.exe (PID: 2092)
      • aria2c.exe (PID: 3896)
      • aria2c.exe (PID: 856)
      • aria2c.exe (PID: 1724)
      • DriverPack-17-Online.exe (PID: 2888)
      • driverpack-7za.exe (PID: 3216)
      • devcon.exe (PID: 3256)
      • driverpack-7za.exe (PID: 2868)
      • YandexLiteUSA.exe (PID: 3004)
      • YandexLiteUSA.exe (PID: 2536)
      • setup.exe (PID: 3084)
      • setup.exe (PID: 4040)
      • setup.exe (PID: 3580)
      • service_update.exe (PID: 4012)
      • service_update.exe (PID: 2868)
      • service_update.exe (PID: 1756)
      • service_update.exe (PID: 1704)
      • service_update.exe (PID: 592)
      • service_update.exe (PID: 2060)
      • service_update.exe (PID: 1972)
      • clidmgr.exe (PID: 3600)
      • clidmgr.exe (PID: 3952)
      • service_update.exe (PID: 3076)
      • clidmgr.exe (PID: 896)
      • DirectX.exe (PID: 3820)
      • RuntimePack.exe (PID: 2684)
    • Executes PowerShell scripts

      • cmd.exe (PID: 3948)
    • Starts Visual C# compiler

      • powershell.exe (PID: 2076)
    • Changes internet zones settings

      • mshta.exe (PID: 2588)
    • Changes settings of System certificates

      • mshta.exe (PID: 2588)
    • Downloads executable files from the Internet

      • mshta.exe (PID: 2588)
      • chrome.exe (PID: 1648)
      • aria2c.exe (PID: 856)
      • aria2c.exe (PID: 2092)
    • Loads the Task Scheduler DLL interface

      • service_update.exe (PID: 592)
      • service_update.exe (PID: 3076)
    • Loads the Task Scheduler COM API

      • service_update.exe (PID: 4012)
    • Registers / Runs the DLL via REGSVR32.EXE

      • cmd.exe (PID: 2904)
      • RuntimePack.exe (PID: 2684)
      • DirectX.exe (PID: 3820)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • DriverPack-17-Online.exe (PID: 2888)
      • csc.exe (PID: 1932)
      • mshta.exe (PID: 2588)
      • chrome.exe (PID: 1648)
      • aria2c.exe (PID: 1724)
      • chrome.exe (PID: 992)
      • aria2c.exe (PID: 856)
      • driverpack-7za.exe (PID: 2868)
      • devcon.exe (PID: 3256)
      • DrvInst.exe (PID: 2712)
      • aria2c.exe (PID: 2092)
      • DrvInst.exe (PID: 4048)
      • YandexLiteUSA.exe (PID: 3004)
      • setup.exe (PID: 4040)
      • setup.exe (PID: 3084)
      • ybEADE.tmp (PID: 3968)
      • service_update.exe (PID: 2868)
      • service_update.exe (PID: 1756)
      • RuntimePack.exe (PID: 2684)
      • DirectX.exe (PID: 3820)
      • xcopy.exe (PID: 2376)
    • Starts MSHTA.EXE for opening HTA or HTMLS files

      • DriverPack-17-Online.exe (PID: 2888)
    • Creates files in the user directory

      • cmd.exe (PID: 3948)
      • mshta.exe (PID: 2588)
      • powershell.exe (PID: 2076)
      • cmd.exe (PID: 2248)
      • cmd.exe (PID: 3676)
      • cmd.exe (PID: 736)
      • cmd.exe (PID: 2572)
      • cmd.exe (PID: 2456)
      • cmd.exe (PID: 2492)
      • aria2c.exe (PID: 2948)
      • aria2c.exe (PID: 1724)
      • aria2c.exe (PID: 2092)
      • aria2c.exe (PID: 856)
      • cmd.exe (PID: 3396)
      • cmd.exe (PID: 236)
      • cmd.exe (PID: 1584)
      • cmd.exe (PID: 2756)
      • cmd.exe (PID: 3052)
      • cmd.exe (PID: 3096)
      • YandexLiteUSA.exe (PID: 2536)
      • aria2c.exe (PID: 3896)
      • cmd.exe (PID: 2924)
      • cmd.exe (PID: 2740)
      • setup.exe (PID: 4040)
      • cmd.exe (PID: 3688)
      • clidmgr.exe (PID: 3952)
      • cmd.exe (PID: 2364)
      • DriverPack-Alice.exe (PID: 2120)
    • Uses REG.EXE to modify Windows registry

      • DriverPack-17-Online.exe (PID: 2888)
    • Starts CMD.EXE for commands execution

      • mshta.exe (PID: 2588)
      • cmd.exe (PID: 3396)
      • RuntimePack.exe (PID: 2684)
    • Uses NETSH.EXE for network configuration

      • cmd.exe (PID: 2248)
      • cmd.exe (PID: 3676)
      • cmd.exe (PID: 2572)
    • Adds / modifies Windows certificates

      • mshta.exe (PID: 2588)
    • Uses RUNDLL32.EXE to load library

      • mshta.exe (PID: 2588)
      • DrvInst.exe (PID: 2712)
    • Starts application with an unusual extension

      • cmd.exe (PID: 2572)
      • cmd.exe (PID: 3396)
      • YandexLiteUSA.exe (PID: 2536)
    • Executed as Windows Service

      • vssvc.exe (PID: 2484)
      • service_update.exe (PID: 1704)
    • Starts SC.EXE for service management

      • cmd.exe (PID: 2456)
    • Executed via COM

      • DllHost.exe (PID: 2548)
      • DrvInst.exe (PID: 2712)
      • DrvInst.exe (PID: 4048)
    • Connects to unusual port

      • aria2c.exe (PID: 3896)
    • Application launched itself

      • cmd.exe (PID: 3396)
      • setup.exe (PID: 3084)
      • service_update.exe (PID: 1704)
      • service_update.exe (PID: 592)
    • Uses TASKLIST.EXE to query information about running processes

      • cmd.exe (PID: 3396)
    • Creates files in the driver directory

      • DrvInst.exe (PID: 2712)
      • DrvInst.exe (PID: 4048)
    • Removes files from Windows directory

      • DrvInst.exe (PID: 2712)
      • DrvInst.exe (PID: 4048)
      • service_update.exe (PID: 1704)
      • service_update.exe (PID: 1972)
    • Creates files in the Windows directory

      • DrvInst.exe (PID: 2712)
      • DrvInst.exe (PID: 4048)
      • service_update.exe (PID: 592)
      • service_update.exe (PID: 1704)
      • service_update.exe (PID: 3076)
      • xcopy.exe (PID: 2376)
      • xcopy.exe (PID: 3832)
      • cmd.exe (PID: 2904)
      • service_update.exe (PID: 1972)
      • DirectX.exe (PID: 3820)
    • Modifies files in Chrome extension folder

      • chrome.exe (PID: 992)
    • Reads Internet Cache Settings

      • setup.exe (PID: 4040)
    • Modifies the open verb of a shell class

      • setup.exe (PID: 4040)
    • Creates files in the program directory

      • service_update.exe (PID: 1756)
    • Creates a software uninstall entry

      • setup.exe (PID: 4040)
    • Creates COM task schedule object

      • regsvr32.exe (PID: 3408)
      • regsvr32.exe (PID: 1712)
      • regsvr32.exe (PID: 2504)
      • regsvr32.exe (PID: 3372)
      • regsvr32.exe (PID: 3380)
      • regsvr32.exe (PID: 3464)
      • regsvr32.exe (PID: 3232)
      • regsvr32.exe (PID: 2648)
      • regsvr32.exe (PID: 3280)
      • regsvr32.exe (PID: 3976)
      • regsvr32.exe (PID: 1044)
      • regsvr32.exe (PID: 3752)
      • regsvr32.exe (PID: 3480)
      • regsvr32.exe (PID: 3456)
      • regsvr32.exe (PID: 3736)
      • regsvr32.exe (PID: 2004)
  • INFO

    • Reads the hosts file

      • chrome.exe (PID: 1648)
      • chrome.exe (PID: 992)
      • aria2c.exe (PID: 2948)
      • aria2c.exe (PID: 856)
      • aria2c.exe (PID: 3896)
      • aria2c.exe (PID: 2092)
      • aria2c.exe (PID: 1724)
    • Application launched itself

      • chrome.exe (PID: 992)
    • Reads Internet Cache Settings

      • chrome.exe (PID: 992)
    • Reads internet explorer settings

      • mshta.exe (PID: 2588)
    • Reads settings of System Certificates

      • mshta.exe (PID: 2588)
      • chrome.exe (PID: 1648)
    • Low-level read access rights to disk partition

      • vssvc.exe (PID: 2484)
    • Creates files in the user directory

      • chrome.exe (PID: 992)
    • Searches for installed software

      • DrvInst.exe (PID: 2712)
    • Dropped object may contain Bitcoin addresses

      • setup.exe (PID: 4040)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
210
Monitored processes
139
Malicious processes
25
Suspicious processes
13

Behavior graph

Click at the process to see the details
drop and start drop and start start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs driverpack-17-online.exe no specs driverpack-17-online.exe reg.exe no specs mshta.exe cmd.exe no specs powershell.exe no specs csc.exe cvtres.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs netsh.exe no specs cmd.exe no specs driverpack-wget.exe chrome.exe no specs rundll32.exe no specs chrome.exe no specs cmd.exe no specs chcp.com no specs netsh.exe no specs cmd.exe no specs sc.exe no specs vssvc.exe no specs cmd.exe no specs wmic.exe no specs SPPSurrogate no specs rundll32.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs aria2c.exe aria2c.exe aria2c.exe aria2c.exe aria2c.exe cmd.exe no specs chcp.com no specs tasklist.exe no specs cmd.exe no specs timeout.exe no specs cmd.exe no specs cmd.exe no specs driverpack-7za.exe no specs driverpack-7za.exe findstr.exe no specs find.exe no specs cmd.exe no specs devcon.exe drvinst.exe rundll32.exe no specs rundll32.exe no specs drvinst.exe cmd.exe no specs yandexliteusa.exe yandexliteusa.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs ybeade.tmp setup.exe setup.exe setup.exe no specs service_update.exe service_update.exe service_update.exe no specs service_update.exe service_update.exe no specs service_update.exe no specs service_update.exe service_update.exe no specs clidmgr.exe clidmgr.exe clidmgr.exe csc.exe cvtres.exe no specs cmd.exe no specs driverpack-alice.exe no specs cmd.exe no specs cmd.exe no specs directx.exe runtimepack.exe cmd.exe no specs xcopy.exe cmd.exe no specs xcopy.exe no specs cmd.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
236"C:\Windows\System32\cmd.exe" /c ""tools\aria2c.exe" "http://dl.drp.su/soft/YandexLiteUSA.exe.torrent" --dir="C:\Users\admin\AppData\Roaming\DRPSu\PROGRAMS" --quiet --continue --min-split-size=1M --follow-torrent=true --check-integrity --seed-time=0 --bt-stop-timeout=120 || echo Done & call echo Done %^errorLevel% > "C:\Users\admin\AppData\Roaming\DRPSu\temp\run_command_68535.txt""C:\Windows\System32\cmd.exemshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
252regsvr32 /s xactengine3_7.dllC:\Windows\system32\regsvr32.exeDirectX.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
272"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=992,13940121752180770070,18090190436657578493,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=15344941882215985114 --mojo-platform-channel-handle=4636 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
460"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=992,13940121752180770070,18090190436657578493,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=10066228738910558509 --mojo-platform-channel-handle=4324 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
592"C:\Program Files\Yandex\YandexBrowser\19.9.3.314\service_update.exe" --update-schedulerC:\Program Files\Yandex\YandexBrowser\19.9.3.314\service_update.exeservice_update.exe
User:
SYSTEM
Company:
YANDEX LLC
Integrity Level:
SYSTEM
Description:
Yandex
Exit code:
0
Version:
19.9.3.314
Modules
Images
c:\program files\yandex\yandexbrowser\19.9.3.314\service_update.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shell32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
720C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESD346.tmp" "c:\Users\admin\AppData\Local\Temp\CSCD345.tmp"C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
8.00.50727.4940 (Win7SP1.050727-5400)
Modules
Images
c:\windows\microsoft.net\framework\v2.0.50727\cvtres.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.4940_none_d08cc06a442b34fc\msvcr80.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cryptsp.dll
736"C:\Windows\System32\cmd.exe" /c ""C:\Users\admin\AppData\Local\Temp\DriverPack-20191024222759\tools\driverpack-wget.exe" http://download.drp.su/assistant/beetle/speed-test-5 -o "C:\Users\admin\AppData\Local\Temp\DriverPack-20191024222759\speed-test.log" || echo Done & call echo Done %^errorLevel% > "C:\Users\admin\AppData\Roaming\DRPSu\temp\run_command_30442.txt""C:\Windows\System32\cmd.exemshta.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
856"tools\aria2c.exe" "http://dl.drp.su/soft/RuntimePack.exe.torrent" --dir="C:\Users\admin\AppData\Roaming\DRPSu\PROGRAMS" --quiet --continue --min-split-size=1M --follow-torrent=true --check-integrity --seed-time=0 --bt-stop-timeout=120 C:\Users\admin\AppData\Local\Temp\DriverPack-20191024222759\tools\aria2c.exe
cmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\driverpack-20191024222759\tools\aria2c.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
884"C:\Users\admin\Downloads\DriverPack-17-Online.exe" C:\Users\admin\Downloads\DriverPack-17-Online.exechrome.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\downloads\driverpack-17-online.exe
c:\systemroot\system32\ntdll.dll
892"C:\Windows\System32\regsvr32.exe" /S mscomct2.ocxC:\Windows\System32\regsvr32.exeRuntimePack.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
6 893
Read events
3 622
Write events
3 081
Delete events
190

Modification events

(PID) Process:(2400) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:writeName:992-13216426058616000
Value:
259
(PID) Process:(992) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(992) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(992) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(992) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(992) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(992) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(992) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(992) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:delete valueName:1512-13197841398593750
Value:
0
(PID) Process:(992) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
Executable files
187
Suspicious files
174
Text files
3 278
Unknown types
100

Dropped files

PID
Process
Filename
Type
992chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\805293a8-84cb-4a2a-9bc1-2fd4ad079103.tmp
MD5:
SHA256:
992chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000020.dbtmp
MD5:
SHA256:
992chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF39a591.TMPtext
MD5:
SHA256:
992chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.oldtext
MD5:
SHA256:
992chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old
MD5:
SHA256:
992chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old~RF39a591.TMPtext
MD5:
SHA256:
992chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB\LOG.old~RF39a60e.TMPtext
MD5:
SHA256:
992chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_1
MD5:
SHA256:
992chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.oldtext
MD5:
SHA256:
992chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Platform Notifications\LOG.oldtext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
271
TCP/UDP connections
308
DNS requests
56
Threats
485

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1648
chrome.exe
GET
200
87.117.231.157:80
http://download.drp.su/17-online/DriverPack-17-Online.exe
GB
executable
6.03 Mb
malicious
2588
mshta.exe
POST
178.162.207.42:80
http://update.drp.su/api/select
DE
malicious
2588
mshta.exe
POST
178.162.207.42:80
http://update.drp.su/api/logs
DE
malicious
2588
mshta.exe
GET
200
178.162.207.42:80
http://update.drp.su/
DE
html
141 b
malicious
2588
mshta.exe
GET
200
87.117.239.148:80
http://dl.drp.su/updates/beetle/driverpack-wget.exe
GB
executable
392 Kb
whitelisted
2588
mshta.exe
POST
202
178.162.207.42:80
http://update.drp.su/api/events
DE
text
24 b
malicious
2588
mshta.exe
POST
202
178.162.207.42:80
http://update.drp.su/api/logs
DE
text
24 b
malicious
2588
mshta.exe
POST
202
178.162.207.42:80
http://update.drp.su/api/logs
DE
text
24 b
malicious
2588
mshta.exe
POST
202
178.162.207.42:80
http://update.drp.su/api/logs
DE
text
24 b
malicious
2860
driverpack-wget.exe
GET
200
95.154.237.19:80
http://download.drp.su/assistant/beetle/speed-test-5
GB
gmc
5.00 Mb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1648
chrome.exe
173.244.208.100:443
www.bytesin.com
WestHost, Inc.
US
unknown
1648
chrome.exe
172.217.18.99:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
1648
chrome.exe
172.217.23.141:443
accounts.google.com
Google Inc.
US
whitelisted
1648
chrome.exe
87.117.231.157:80
download.drp.su
iomart Cloud Services Limited.
GB
malicious
1648
chrome.exe
172.217.23.164:443
www.google.com
Google Inc.
US
whitelisted
1648
chrome.exe
216.58.210.14:443
sb-ssl.google.com
Google Inc.
US
whitelisted
1648
chrome.exe
172.217.18.3:443
ssl.gstatic.com
Google Inc.
US
whitelisted
2588
mshta.exe
178.162.204.5:80
auth.drp.su
Leaseweb Deutschland GmbH
DE
suspicious
2588
mshta.exe
104.28.27.110:80
allfont.ru
Cloudflare Inc
US
shared
2588
mshta.exe
93.158.134.119:443
mc.yandex.ru
YANDEX LLC
RU
whitelisted

DNS requests

Domain
IP
Reputation
www.bytesin.com
  • 173.244.208.100
unknown
clientservices.googleapis.com
  • 172.217.18.99
whitelisted
accounts.google.com
  • 172.217.23.141
shared
download.drp.su
  • 87.117.231.157
  • 81.94.205.66
  • 95.154.237.19
  • 87.117.239.148
  • 87.117.239.150
  • 87.117.239.151
  • 88.150.137.207
  • 81.94.192.167
malicious
www.google.com
  • 172.217.23.164
malicious
sb-ssl.google.com
  • 216.58.210.14
whitelisted
ssl.gstatic.com
  • 172.217.18.3
whitelisted
allfont.ru
  • 104.28.27.110
  • 104.28.26.110
whitelisted
auth.drp.su
  • 178.162.204.5
suspicious
mc.yandex.ru
  • 93.158.134.119
  • 87.250.251.119
  • 77.88.21.119
  • 87.250.250.119
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
Potentially Bad Traffic
ET POLICY HTTP Request to .su TLD (Soviet Union) Often Malware Related
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
Potentially Bad Traffic
ET POLICY HTTP Request to .su TLD (Soviet Union) Often Malware Related
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
Potentially Bad Traffic
ET POLICY HTTP Request to .su TLD (Soviet Union) Often Malware Related
Misc activity
SUSPICIOUS [PTsecurity] Cmd.Powershell.Download HTTP UserAgent (Win7)
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
Potentially Bad Traffic
ET POLICY HTTP Request to .su TLD (Soviet Union) Often Malware Related
Process
Message
csc.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
csc.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
csc.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
csc.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144
csc.exe
*** HR originated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\copyout.cpp, line 1302
csc.exe
*** HR propagated: -2147024774 *** Source File: d:\iso_whid\x86fre\base\isolation\com\enumidentityattribute.cpp, line 144