URL: | https://www.chip.de/downloads/Free-DWG-Viewer_41650194.html |
Full analysis: | https://app.any.run/tasks/7a260e28-9fcf-492d-bd07-236b6d31964d |
Verdict: | Malicious activity |
Threats: | Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security. |
Analysis date: | July 27, 2020 at 12:44:05 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MD5: | 8A961902C5D18E1736296E3C72248ABA |
SHA1: | 8317161165930FEF08779D2DCC0FF1C742A94A29 |
SHA256: | 2FB705FF155EC60218B22F12EBF7DA8B4ED7BC8B025D7AF9A15C649494B588B7 |
SSDEEP: | 3:N8DSLBBiKrVk/hYn:2OL5Jk/hYn |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
272 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1024,16893231394998978830,6909780386222584807,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=5436395587538650617 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4616 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 Modules
| |||||||||||||||
680 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1024,16893231394998978830,6909780386222584807,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=18413091378568427326 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 Modules
| |||||||||||||||
1424 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1024,16893231394998978830,6909780386222584807,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=13230727138851508118 --mojo-platform-channel-handle=500 --ignored=" --type=renderer " /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 Modules
| |||||||||||||||
1444 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1024,16893231394998978830,6909780386222584807,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=1802500046738628442 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3760 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 Modules
| |||||||||||||||
1464 | "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.chip.de/downloads/Free-DWG-Viewer_41650194.html" | C:\Program Files\Google\Chrome\Application\chrome.exe | explorer.exe | ||||||||||||
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 Modules
| |||||||||||||||
1596 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=2300 --on-initialized-event-handle=324 --parent-handle=328 /prefetch:6 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 Modules
| |||||||||||||||
1672 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=988,16390618090434803648,14723761809948766831,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=5517018990274239574 --mojo-platform-channel-handle=1528 /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: HIGH Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 Modules
| |||||||||||||||
1692 | "C:\Users\admin\AppData\Local\Temp\DMR\dmr_72.exe" -install -54460994 -chipderedesign -7e5c2423dc1e4f128a12f1d033407c84 - -BLUB2 -jgxmxoeeyyqndqqe -2196 | C:\Users\admin\AppData\Local\Temp\DMR\dmr_72.exe | Free DWG Viewer - CHIP-Installer.exe | ||||||||||||
User: admin Company: Chip Digital GmbH Integrity Level: HIGH Description: CHIP Secured Installer Exit code: 0 Version: 2.11.2.0 Modules
| |||||||||||||||
1704 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1024,16893231394998978830,6909780386222584807,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=4534462595725787726 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2264 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 Modules
| |||||||||||||||
1732 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1024,16893231394998978830,6909780386222584807,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=247711750427114102 --mojo-platform-channel-handle=3004 --ignored=" --type=renderer " /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 Modules
|
(PID) Process: | (1464) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
Operation: | write | Name: | failed_count |
Value: 0 | |||
(PID) Process: | (1464) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
Operation: | write | Name: | state |
Value: 2 | |||
(PID) Process: | (1464) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty |
Operation: | write | Name: | StatusCodes |
Value: | |||
(PID) Process: | (1464) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty |
Operation: | write | Name: | StatusCodes |
Value: 01000000 | |||
(PID) Process: | (1464) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon |
Operation: | write | Name: | state |
Value: 1 | |||
(PID) Process: | (1596) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes |
Operation: | write | Name: | 1464-13240327459646125 |
Value: 259 | |||
(PID) Process: | (1464) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96} |
Operation: | write | Name: | dr |
Value: 1 | |||
(PID) Process: | (1464) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome |
Operation: | write | Name: | UsageStatsInSample |
Value: 0 | |||
(PID) Process: | (1464) chrome.exe | Key: | HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes |
Operation: | delete value | Name: | 2832-13239195546717773 |
Value: 0 | |||
(PID) Process: | (1464) chrome.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96} |
Operation: | write | Name: | usagestats |
Value: 0 |
PID | Process | Filename | Type | |
---|---|---|---|---|
1464 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old | — | |
MD5:— | SHA256:— | |||
1464 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old~RFd69c6.TMP | — | |
MD5:— | SHA256:— | |||
1464 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\eefdaee5-d07e-4690-9e00-a9839d1fc18c.tmp | — | |
MD5:— | SHA256:— | |||
1464 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000032.dbtmp | — | |
MD5:— | SHA256:— | |||
1464 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB\LOG.old | text | |
MD5:AFDDC99E148FD40EED8086EE532B61C4 | SHA256:3F1C412561D08C113C1561C9D273FBA00DAB5481B4AC1428FCC91D9285BA7E1E | |||
1464 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Last Tabs | binary | |
MD5:0CE1FA0314D44178816BA5E7133E07DD | SHA256:8D81EC8C4EFED885A0FF9267B0B388FB53316938EEDCDFABDC697E3610883714 | |||
1464 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase\000001.dbtmp | — | |
MD5:— | SHA256:— | |||
1464 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB\LOG.old~RFd6a43.TMP | text | |
MD5:AFDDC99E148FD40EED8086EE532B61C4 | SHA256:3F1C412561D08C113C1561C9D273FBA00DAB5481B4AC1428FCC91D9285BA7E1E | |||
1464 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase\LOG.old | text | |
MD5:9C9B056722F1FC3D08C9E45DB6EE28BC | SHA256:6A84732F643BDA3A0FF954FD0FFDF0A501B47F2C6DE42956AEEA78A2B9B514CF | |||
1464 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\LOG.old | text | |
MD5:93AD58B08432FE2A935E1CEF40067A30 | SHA256:8C0A6636BDB4ACD83D99E0BD78A484710121D5410459F27DEE24A0EB5B2877A2 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3904 | chrome.exe | GET | 304 | 2.17.46.176:80 | http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab | unknown | compressed | 57.0 Kb | whitelisted |
1692 | dmr_72.exe | GET | 200 | 148.251.213.132:80 | http://api2.chip-secured-download.de/track/uac.php?clientid=6c367372-8b0b-40f2-8ae3-95454727e045&cid=54460994&pid=chipderedesign&source=BLUB2&setupid=7e5c2423dc1e4f128a12f1d033407c84&langcountry=en-US&state=WithoutUAC | DE | binary | 114 Kb | malicious |
3904 | chrome.exe | GET | 304 | 2.17.46.176:80 | http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab | unknown | compressed | 57.0 Kb | whitelisted |
1692 | dmr_72.exe | GET | 200 | 5.9.198.84:80 | http://static.chip-secured-download.de/gfx/pagead/Opera/Opera-WCv1.gif | DE | image | 27.8 Kb | suspicious |
1692 | dmr_72.exe | GET | 200 | 5.9.198.84:80 | http://static.chip-secured-download.de/gfx/pagead/Quick-Driver-Updater/Unknown.png | DE | image | 62.4 Kb | suspicious |
1692 | dmr_72.exe | GET | 200 | 5.9.198.84:80 | http://static.chip-secured-download.de/gfx/pagead/Amazon-Offer/amazon-icon-addon-ff-feb2018-v7.gif | DE | image | 31.3 Kb | suspicious |
1692 | dmr_72.exe | GET | 200 | 5.9.198.84:80 | http://static.chip-secured-download.de/gfx/pagead/AVAST/avast-buttons-v1-feb18.gif | DE | image | 36.6 Kb | suspicious |
1692 | dmr_72.exe | GET | 200 | 148.251.213.132:80 | http://api2.chip-secured-download.de/downloaderContent/progress.php?pid=chipderedesign&cid=54460994&sid=7e5c2423dc1e4f128a12f1d033407c84&appname=467265652044574720566965776572&uid=6c367372-8b0b-40f2-8ae3-95454727e045&scid=&source=BLUB2&language=en-at&piddata=&uaexe=6368726F6D652E657865&Camplist=39353236356165373862303365653035346331323630376532333234346435643B31326162653639353463663536303063383039393663376466363934323930623B36636362363333656265363135336266643864386338303237663661653962303B6438663531333838363832333635626139356261643432646332393330383866 | DE | htm | 2.01 Kb | malicious |
1692 | dmr_72.exe | GET | 200 | 148.251.213.132:80 | http://api2.chip-secured-download.de/downloaderContent/main.css?v=1461939270 | DE | text | 6.02 Kb | malicious |
1692 | dmr_72.exe | GET | 200 | 148.251.213.132:80 | http://api2.chip-secured-download.de/downloaderContent/jquery.js | DE | text | 102 Kb | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
3904 | chrome.exe | 172.217.18.3:443 | clientservices.googleapis.com | Google Inc. | US | whitelisted |
3904 | chrome.exe | 2.20.142.4:443 | www.chip.de | Akamai International B.V. | — | unknown |
3904 | chrome.exe | 216.58.208.45:443 | accounts.google.com | Google Inc. | US | whitelisted |
3904 | chrome.exe | 2.20.142.3:443 | a.bf-ad.net | Akamai International B.V. | — | unknown |
3904 | chrome.exe | 92.122.215.59:443 | www.chip.de | Akamai International B.V. | — | suspicious |
3904 | chrome.exe | 185.33.221.11:443 | secure.adnxs.com | AppNexus, Inc | — | unknown |
3904 | chrome.exe | 72.247.225.215:443 | widgets.outbrain.com | Akamai Technologies, Inc. | US | whitelisted |
3904 | chrome.exe | 91.215.100.39:443 | script.ioam.de | INFOnline GmbH | DE | unknown |
3904 | chrome.exe | 72.247.226.107:443 | tcheck.outbrainimg.com | Akamai Technologies, Inc. | US | unknown |
3904 | chrome.exe | 72.247.225.17:443 | acdn.adnxs.com | Akamai Technologies, Inc. | US | whitelisted |
Domain | IP | Reputation |
---|---|---|
clientservices.googleapis.com |
| whitelisted |
www.chip.de |
| whitelisted |
accounts.google.com |
| shared |
a.bf-ad.net |
| whitelisted |
content.chip.de |
| suspicious |
adtm.chip.de |
| whitelisted |
secure.adnxs.com |
| whitelisted |
widgets.outbrain.com |
| whitelisted |
chip.de |
| whitelisted |
a.bf-tools.net |
| whitelisted |
PID | Process | Class | Message |
---|---|---|---|
— | — | Misc activity | ADWARE [PTsecurity] DownloadSponsor inbound artifact m1 |
— | — | A Network Trojan was detected | MALWARE [PTsecurity] DownloadSponsor img_welcome PNG artifact |
— | — | Misc activity | ADWARE [PTsecurity] DownloadSponsor inbound artifact m1 |
— | — | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
— | — | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
— | — | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
— | — | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |