URL:

https://download.passfab.com/downloads/android-unlock_1943.exe?rnclid=11732518372082504301

Full analysis: https://app.any.run/tasks/369bc492-ddfe-4721-ad77-84809405a8f9
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: November 25, 2024, 08:39:47
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
evasion
adware
upx
confuser
vmprotect
Indicators:
MD5:

45CE81519E9EA3919096E2A31710B388

SHA1:

5F1E75E4CAF79F2E35518FD5E4079DD45BFE19AD

SHA256:

3E42BC8E6A571718ADCD384A281D57CDADBC1EAC9711DDD289F79271CDC3A8AE

SSDEEP:

3:N8SElZEErdIKBKXKiXXBt9KGVUcRWLIbGJMnWxLX3XQjn:2SKZBKK8aiHBtbVUgWL7BnXG

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Connects to the CnC server

      • android-unlock_11732518372082504301.exe (PID: 2076)
  • SUSPICIOUS

    • Checks for external IP

      • android-unlock_11732518372082504301.exe (PID: 2076)
      • svchost.exe (PID: 2192)
    • Access to an unwanted program domain was detected

      • android-unlock_11732518372082504301.exe (PID: 2076)
    • Executable content was dropped or overwritten

      • 4ukeyforandroid_pf_2.14.2.exe (PID: 5320)
      • 4ukeyforandroid_pf_2.14.2.tmp (PID: 640)
      • PassFabAndroidUnlock.exe (PID: 1580)
      • drvinst.exe (PID: 1520)
      • drvinst.exe (PID: 6412)
      • drvinst.exe (PID: 7032)
      • drvinst.exe (PID: 6320)
      • DPInst64.exe (PID: 6436)
      • drvinst.exe (PID: 7256)
    • Process drops legitimate windows executable

      • 4ukeyforandroid_pf_2.14.2.tmp (PID: 640)
      • PassFabAndroidUnlock.exe (PID: 1580)
      • drvinst.exe (PID: 6320)
      • drvinst.exe (PID: 1520)
      • DPInst64.exe (PID: 6436)
      • drvinst.exe (PID: 7032)
    • Potential Corporate Privacy Violation

      • android-unlock_11732518372082504301.exe (PID: 2076)
    • Drops 7-zip archiver for unpacking

      • 4ukeyforandroid_pf_2.14.2.tmp (PID: 640)
      • PassFabAndroidUnlock.exe (PID: 1580)
    • Drops a system driver (possible attempt to evade defenses)

      • PassFabAndroidUnlock.exe (PID: 1580)
      • 4ukeyforandroid_pf_2.14.2.tmp (PID: 640)
      • drvinst.exe (PID: 6412)
      • DPInst64.exe (PID: 6436)
      • drvinst.exe (PID: 7256)
    • The process drops C-runtime libraries

      • 4ukeyforandroid_pf_2.14.2.tmp (PID: 640)
    • Process drops legitimate windows executable (CertUtil.exe)

      • 4ukeyforandroid_pf_2.14.2.tmp (PID: 640)
    • Process drops python dynamic module

      • 4ukeyforandroid_pf_2.14.2.tmp (PID: 640)
    • Starts CMD.EXE for commands execution

      • PassFabAndroidUnlock.exe (PID: 1580)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 1856)
  • INFO

    • Executable content was dropped or overwritten

      • chrome.exe (PID: 2132)
      • chrome.exe (PID: 2148)
    • UPX packer has been detected

      • android-unlock_11732518372082504301.exe (PID: 2076)
    • Application launched itself

      • chrome.exe (PID: 2132)
      • msedge.exe (PID: 1448)
      • msedge.exe (PID: 244)
    • Confuser has been detected (YARA)

      • PassFabAndroidUnlock.exe (PID: 1580)
    • Manual execution by a user

      • msedge.exe (PID: 244)
    • VMProtect protector has been detected

      • PassFabAndroidUnlock.exe (PID: 1580)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
232
Monitored processes
94
Malicious processes
10
Suspicious processes
2

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs android-unlock_11732518372082504301.exe no specs android-unlock_11732518372082504301.exe svchost.exe 4ukeyforandroid_pf_2.14.2.exe 4ukeyforandroid_pf_2.14.2.tmp chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs start.exe no specs passfabandroidunlock.exe monitor.exe no specs cmd.exe no specs conhost.exe no specs netstat.exe no specs findstr.exe no specs findstr.exe no specs certutil.exe no specs conhost.exe no specs certutil.exe no specs conhost.exe no specs installanddriver.exe no specs conhost.exe no specs repair.exe no specs dpinst64.exe chrome.exe no specs drvinst.exe rundll32.exe no specs msedge.exe no specs drvinst.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs drvinst.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs drvinst.exe drvinst.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs adb.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs chrome.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
244"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --flag-switches-begin --flag-switches-end --do-not-de-elevate --single-argument https://cbs.passfab.com/go?pid=1941&a=i&v=2.14.2C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
122.0.2365.59
488"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=5864 --field-trial-handle=1816,i,18392968173658135999,5154519707308347612,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
640"C:\Users\admin\AppData\Local\Temp\is-JRUH9.tmp\4ukeyforandroid_pf_2.14.2.tmp" /SL5="$40242,122673955,575488,C:\Users\admin\AppData\Local\Temp\4ukeyforandroid_pf\4ukeyforandroid_pf_2.14.2.exe" /VERYSILENT /SP- /NORESTART /DIR="C:\Program Files (x86)\UltFone\PassFab Android Unlock\" /LANG=en /LOG="C:\Users\admin\AppData\Local\Temp\PassFab Android Unlocker_Setup_20241125084039.log" /sptrack nullC:\Users\admin\AppData\Local\Temp\is-JRUH9.tmp\4ukeyforandroid_pf_2.14.2.tmp
4ukeyforandroid_pf_2.14.2.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-jruh9.tmp\4ukeyforandroid_pf_2.14.2.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
720"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cbs.passfab.com/go?pid=1941&a=db&v=2.14.2C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exePassFabAndroidUnlock.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
1076\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execertutil.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
1140"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=4056 --field-trial-handle=1816,i,18392968173658135999,5154519707308347612,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1304"C:\Program Files (x86)\UltFone\PassFab Android Unlock\repair.exe"C:\Program Files (x86)\UltFone\PassFab Android Unlock\repair.exePassFabAndroidUnlock.exe
User:
admin
Company:
Samsung Electronics Co., Ltd.
Integrity Level:
HIGH
Description:
Odin Downloader
Version:
2017.10.18.1
1344"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2464 --field-trial-handle=2344,i,8231445231751981036,17691184198978938018,262144 --variations-seed-version /prefetch:3C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
1348\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execertutil.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
1448"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cbs.passfab.com/go?pid=1941&a=i&v=2.14.2C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exePassFabAndroidUnlock.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Exit code:
1
Version:
122.0.2365.59
Total events
15 785
Read events
15 733
Write events
46
Delete events
6

Modification events

(PID) Process:(2132) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(2132) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(2132) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(2132) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(2132) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(7116) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
Operation:writeName:{2781761E-28E0-4109-99FE-B9D127C57AFE} {56FFCC30-D398-11D0-B2AE-00A0C908FA49} 0xFFFF
Value:
01000000000000009BA6A29B153FDB01
(PID) Process:(2076) android-unlock_11732518372082504301.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Tenorshare\Downloader2.5.0
Operation:writeName:GA_PC
Value:
1
(PID) Process:(2076) android-unlock_11732518372082504301.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\GuidGuidold
Operation:writeName:guid
Value:
42887177-4422-4738-9E7B-5DF25D16C18D
(PID) Process:(2076) android-unlock_11732518372082504301.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\GuidGuidold
Operation:writeName:user_id
Value:
1001
(PID) Process:(2132) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Common\Rlz\Events\C
Operation:writeName:C1I
Value:
1
Executable files
933
Suspicious files
2 437
Text files
229
Unknown types
223

Dropped files

PID
Process
Filename
Type
2132chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\discounts_db\LOG.old~RF135c6b.TMP
MD5:
SHA256:
2132chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
2132chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db\LOG.old~RF135c7b.TMP
MD5:
SHA256:
2132chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old~RF135c7b.TMP
MD5:
SHA256:
2132chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db\LOG.old
MD5:
SHA256:
2132chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
2132chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF135c7b.TMP
MD5:
SHA256:
2132chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
2132chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old~RF135c7b.TMP
MD5:
SHA256:
2132chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
96
TCP/UDP connections
274
DNS requests
170
Threats
16

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4328
svchost.exe
GET
200
23.216.77.30:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
2076
android-unlock_11732518372082504301.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAhflMAthXvozBT%2FU%2B2iPio%3D
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4328
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2076
android-unlock_11732518372082504301.exe
POST
200
172.217.16.206:80
http://www.google-analytics.com/collect
unknown
whitelisted
2076
android-unlock_11732518372082504301.exe
GET
301
104.17.207.155:80
http://www.tenorshare.com/downloads/service/softwarelog.txt
unknown
whitelisted
2076
android-unlock_11732518372082504301.exe
POST
200
172.217.16.206:80
http://www.google-analytics.com/collect
unknown
whitelisted
2076
android-unlock_11732518372082504301.exe
POST
200
172.217.16.206:80
http://www.google-analytics.com/collect
unknown
whitelisted
2076
android-unlock_11732518372082504301.exe
GET
200
208.95.112.1:80
http://ip-api.com/csv
unknown
shared
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4712
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4328
svchost.exe
23.216.77.30:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4328
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5064
SearchApp.exe
104.126.37.137:443
www.bing.com
Akamai International B.V.
DE
whitelisted
5064
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4
System
192.168.100.255:138
whitelisted
2132
chrome.exe
239.255.255.250:1900
whitelisted
6564
chrome.exe
104.18.25.142:443
download.passfab.com
CLOUDFLARENET
suspicious

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 23.216.77.30
  • 23.216.77.23
  • 23.216.77.17
  • 23.216.77.25
  • 23.216.77.22
  • 23.216.77.18
  • 23.216.77.15
  • 23.216.77.21
  • 23.216.77.19
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
google.com
  • 142.250.186.142
whitelisted
www.bing.com
  • 104.126.37.137
  • 104.126.37.153
  • 104.126.37.123
  • 104.126.37.152
  • 104.126.37.186
  • 104.126.37.139
  • 104.126.37.130
  • 104.126.37.128
  • 104.126.37.179
  • 184.86.251.4
  • 184.86.251.24
  • 184.86.251.28
  • 184.86.251.26
  • 184.86.251.30
  • 184.86.251.25
  • 184.86.251.27
  • 184.86.251.5
  • 184.86.251.31
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
download.passfab.com
  • 104.18.25.142
  • 104.18.24.142
unknown
accounts.google.com
  • 108.177.127.84
whitelisted
go.microsoft.com
  • 23.218.210.69
whitelisted
sb-ssl.google.com
  • 142.250.181.238
whitelisted

Threats

PID
Process
Class
Message
2076
android-unlock_11732518372082504301.exe
Potential Corporate Privacy Violation
ET POLICY Unsupported/Fake Windows NT Version 5.0
2076
android-unlock_11732518372082504301.exe
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup ip-api.com
2192
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
2076
android-unlock_11732518372082504301.exe
Potential Corporate Privacy Violation
ET POLICY Unsupported/Fake Windows NT Version 5.0
2192
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
2076
android-unlock_11732518372082504301.exe
Possibly Unwanted Program Detected
ET ADWARE_PUP Tenorshare Google Analytics Checkin
Misc activity
ET INFO DNS Query to Alibaba Cloud CDN Domain (aliyuncs .com)
Potential Corporate Privacy Violation
ET POLICY Unsupported/Fake Windows NT Version 5.0
Not Suspicious Traffic
INFO [ANY.RUN] Google Hosted Libraries (ajax .googleapis .com)
Not Suspicious Traffic
INFO [ANY.RUN] Google Hosted Libraries (ajax .googleapis .com)
3 ETPRO signatures available at the full report
No debug info