URL:

https://www.iobit.com/en/advanceduninstaller.php

Full analysis: https://app.any.run/tasks/7473e4fc-bc6c-4883-910d-6c52838bf867
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: December 08, 2024, 18:11:06
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
stealer
evasion
Indicators:
MD5:

C555087E312E38C3589F7FEB2C68B5B2

SHA1:

69AF3B0EE94DFB8AB33DD0A38E9493FE3F4E85F8

SHA256:

404EC4C9964602D2831A63EDB745E12BA56ECEC06AFFDF1FE70DBCA32587FCD7

SSDEEP:

3:N8DSLgz1EoYTXLnV:2OLghPYTXLV

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Registers / Runs the DLL via REGSVR32.EXE

      • iush.exe (PID: 7524)
      • IObitUninstaler.exe (PID: 1612)
      • iush.exe (PID: 7936)
    • Runs injected code in another process

      • ICONPIN64.exe (PID: 8092)
    • Application was injected by another process

      • explorer.exe (PID: 4488)
    • Actions looks like stealing of personal data

      • IObitUninstaler.exe (PID: 1612)
      • PPUninstaller.exe (PID: 6816)
      • iTopVPN.exe (PID: 8168)
    • Steals credentials from Web Browsers

      • IObitUninstaler.exe (PID: 1612)
      • iTopVPN.exe (PID: 8168)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • iobituninstaller.exe (PID: 7924)
      • iobituninstaller.exe (PID: 848)
      • iobituninstaller.tmp (PID: 5752)
      • iobituninstaller.exe (PID: 7184)
      • iobituninstaller.tmp (PID: 3840)
      • CrRestore.exe (PID: 5004)
      • iushrun.exe (PID: 8100)
      • IObitDownloader.exe (PID: 1512)
      • iTopSetup.exe.exe (PID: 7152)
      • iTopSetup.exe.tmp (PID: 5432)
      • UninstallMonitor.exe (PID: 3544)
      • ugin.exe (PID: 7176)
      • ISRSetup.exe.exe (PID: 3420)
      • AutoUpdate.exe (PID: 7576)
      • _iu14D2N.tmp (PID: 6616)
      • unins000.exe (PID: 5004)
      • atud.exe (PID: 5752)
      • iush.exe (PID: 7936)
      • ISRSetup.exe.tmp (PID: 524)
    • Reads security settings of Internet Explorer

      • iobituninstaller.tmp (PID: 7940)
      • iobituninstaller.tmp (PID: 5752)
      • iobituninstaller.tmp (PID: 3840)
      • iush.exe (PID: 7524)
      • Setup.exe (PID: 7588)
      • IObitUninstaler.exe (PID: 1612)
      • UninstallMonitor.exe (PID: 3544)
      • IObitDownloader.exe (PID: 1512)
      • iTopSetup.exe.tmp (PID: 5432)
      • ugin.exe (PID: 7176)
      • iTopVPN.exe (PID: 8168)
      • _iu14D2N.tmp (PID: 6616)
      • atud.exe (PID: 5752)
      • iush.exe (PID: 4360)
      • _iu14D2N.tmp (PID: 6908)
      • iush.exe (PID: 7936)
      • PPUninstaller.exe (PID: 6816)
      • ISRSetup.exe.tmp (PID: 524)
      • iScrInit.exe (PID: 6952)
      • iScrInit.exe (PID: 848)
      • iScrRec.exe (PID: 6920)
      • iScrRec.exe (PID: 7172)
      • AutoUpdate.exe (PID: 8056)
      • iScrInit.exe (PID: 7272)
    • Reads the Windows owner or organization settings

      • iobituninstaller.tmp (PID: 5752)
      • iobituninstaller.tmp (PID: 3840)
      • iTopSetup.exe.tmp (PID: 5432)
      • ISRSetup.exe.tmp (PID: 524)
      • _iu14D2N.tmp (PID: 6616)
      • _iu14D2N.tmp (PID: 6908)
    • Searches for installed software

      • iobituninstaller.tmp (PID: 3840)
      • iush.exe (PID: 7524)
      • CrRestore.exe (PID: 5004)
      • IObitUninstaler.exe (PID: 1612)
      • UninstallMonitor.exe (PID: 3544)
      • iush.exe (PID: 3364)
      • IObitDownloader.exe (PID: 1512)
      • AutoUpdate.exe (PID: 7576)
      • iTopVPN.exe (PID: 8168)
      • _iu14D2N.tmp (PID: 6616)
      • iush.exe (PID: 4360)
      • _iu14D2N.tmp (PID: 6908)
      • iush.exe (PID: 7936)
      • PPUninstaller.exe (PID: 6816)
      • UninstallMonitor.exe (PID: 3288)
      • iScrInit.exe (PID: 6948)
      • itopxmasdayp24.exe (PID: 5712)
      • Gpucheck.exe (PID: 2392)
      • iScrMagnifier.exe (PID: 1876)
      • iScrInit.exe (PID: 6952)
      • iScrInit.exe (PID: 848)
      • iScrRec.exe (PID: 7172)
      • iScrGPURecording.exe (PID: 4872)
      • iScrRec.exe (PID: 6920)
      • iScrExtDown.exe (PID: 7848)
      • graphics-check.exe (PID: 1684)
      • iScrVoiceCapture.exe (PID: 5916)
      • iScrInit.exe (PID: 7272)
      • AutoUpdate.exe (PID: 8056)
      • Gpucheck.exe (PID: 7836)
      • iScrInit.exe (PID: 2736)
      • iScrRec.exe (PID: 4540)
      • iScrInit.exe (PID: 1876)
      • iScrInit.exe (PID: 7084)
      • iScrFileMover.exe (PID: 7440)
      • iScrFileMover.exe (PID: 1588)
    • Executes as Windows Service

      • IUService.exe (PID: 7736)
    • Creates/Modifies COM task schedule object

      • regsvr32.exe (PID: 7720)
      • regsvr32.exe (PID: 4388)
      • regsvr32.exe (PID: 7240)
    • Creates a software uninstall entry

      • iush.exe (PID: 7524)
    • Drops a system driver (possible attempt to evade defenses)

      • iobituninstaller.tmp (PID: 3840)
      • iTopSetup.exe.tmp (PID: 5432)
      • ugin.exe (PID: 7176)
    • Reads the date of Windows installation

      • IObitUninstaler.exe (PID: 1612)
      • UninstallMonitor.exe (PID: 3544)
      • UninstallMonitor.exe (PID: 3288)
      • PPUninstaller.exe (PID: 6816)
      • iScrRec.exe (PID: 6920)
      • iScrRec.exe (PID: 7172)
    • Checks Windows Trust Settings

      • IObitUninstaler.exe (PID: 1612)
      • atud.exe (PID: 5752)
      • iScrRec.exe (PID: 6920)
    • Process drops SQLite DLL files

      • iobituninstaller.tmp (PID: 3840)
      • iTopSetup.exe.tmp (PID: 5432)
      • ISRSetup.exe.tmp (PID: 524)
    • Adds/modifies Windows certificates

      • IObitUninstaler.exe (PID: 1612)
    • There is functionality for communication over UDP network (YARA)

      • IUService.exe (PID: 7736)
    • Manipulates environment variables

      • powershell.exe (PID: 1876)
      • powershell.exe (PID: 7636)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 3816)
      • cmd.exe (PID: 5556)
    • Starts CMD.EXE for commands execution

      • IObitUninstaler.exe (PID: 1612)
      • ugin.exe (PID: 7176)
      • iTopVPN.exe (PID: 8168)
      • PPUninstaller.exe (PID: 6816)
    • Starts application with an unusual extension

      • powershell.exe (PID: 1876)
      • unins000.exe (PID: 5004)
      • unins000.exe (PID: 1752)
      • powershell.exe (PID: 7636)
    • Process drops legitimate windows executable

      • iTopSetup.exe.tmp (PID: 5432)
      • ISRSetup.exe.tmp (PID: 524)
    • Uses TASKKILL.EXE to kill process

      • iTopSetup.exe.tmp (PID: 5432)
    • The process verifies whether the antivirus software is installed

      • IObitUninstaler.exe (PID: 1612)
      • iTopVPN.exe (PID: 8168)
    • Application launched itself

      • ugin.exe (PID: 7176)
    • Process uses IPCONFIG to clear DNS cache

      • cmd.exe (PID: 7764)
      • cmd.exe (PID: 8)
    • Suspicious use of NETSH.EXE

      • cmd.exe (PID: 7724)
    • Starts itself from another location

      • unins000.exe (PID: 5004)
      • unins000.exe (PID: 1752)
    • Checks for external IP

      • svchost.exe (PID: 2192)
      • unpr.exe (PID: 4328)
    • The process drops C-runtime libraries

      • ISRSetup.exe.tmp (PID: 524)
    • Connects to unusual port

      • iTopVPN.exe (PID: 8168)
    • The process executes via Task Scheduler

      • iScrRec.exe (PID: 6920)
    • Potential Corporate Privacy Violation

      • System (PID: 4)
  • INFO

    • Application launched itself

      • msedge.exe (PID: 6016)
    • Checks supported languages

      • identity_helper.exe (PID: 7904)
      • identity_helper.exe (PID: 2088)
      • iobituninstaller.tmp (PID: 7940)
      • iobituninstaller.exe (PID: 7924)
      • iobituninstaller.exe (PID: 848)
      • iobituninstaller.tmp (PID: 5752)
      • iobituninstaller.exe (PID: 7184)
      • Setup.exe (PID: 7588)
      • iobituninstaller.tmp (PID: 3840)
      • iushrun.exe (PID: 8100)
      • iush.exe (PID: 7524)
      • ICONPIN64.exe (PID: 8092)
      • IUService.exe (PID: 7736)
      • CrRestore.exe (PID: 5004)
      • UninstallPromote.exe (PID: 6972)
      • IObitUninstaler.exe (PID: 1612)
      • UninstallMonitor.exe (PID: 3544)
      • IObitDownloader.exe (PID: 1512)
      • iush.exe (PID: 3364)
      • AUpdate.exe (PID: 6116)
      • AutoUpdate.exe (PID: 7576)
      • iTopSetup.exe.tmp (PID: 5432)
      • iTopSetup.exe.exe (PID: 7152)
      • chcp.com (PID: 7148)
      • ugin.exe (PID: 7480)
      • ugin.exe (PID: 7564)
      • ugin.exe (PID: 4136)
      • icop64.exe (PID: 7092)
      • ullc.exe (PID: 6784)
      • ugin.exe (PID: 7176)
      • iTopVPN.exe (PID: 7188)
      • ugin.exe (PID: 4908)
      • unpr.exe (PID: 4328)
      • ugin.exe (PID: 7144)
      • iTopVPN.exe (PID: 8168)
      • ugin.exe (PID: 7236)
      • atud.exe (PID: 5752)
      • aud.exe (PID: 8044)
      • aud.exe (PID: 2132)
      • ISRSetup.exe.exe (PID: 3420)
      • ISRSetup.exe.tmp (PID: 524)
      • iTopVPNMini.exe (PID: 3488)
      • _iu14D2N.tmp (PID: 6616)
      • unins000.exe (PID: 5004)
      • _iu14D2N.tmp (PID: 6908)
      • unins000.exe (PID: 1752)
      • iush.exe (PID: 4360)
      • PPUninstaller.exe (PID: 6816)
      • iush.exe (PID: 7936)
      • UninstallPromote.exe (PID: 5892)
      • wstr.exe (PID: 7948)
      • UninstallMonitor.exe (PID: 3288)
      • iScrInit.exe (PID: 5300)
      • iScrInit.exe (PID: 5104)
      • aud.exe (PID: 7720)
      • iScrInit.exe (PID: 8172)
      • iScrInit.exe (PID: 5244)
      • chcp.com (PID: 7196)
      • itopxmasdayp24.exe (PID: 5712)
      • ibfn204.exe (PID: 5964)
      • LocalLang.exe (PID: 7064)
      • iScrInit.exe (PID: 6948)
      • iScrInit.exe (PID: 6952)
      • Gpucheck.exe (PID: 2392)
      • iScrMagnifier.exe (PID: 1876)
      • iScrGPURecording.exe (PID: 4872)
      • iScrInit.exe (PID: 848)
      • ICONPIN64.exe (PID: 3724)
      • UninstallInfo.exe (PID: 7664)
      • iScrRec.exe (PID: 7172)
      • iScrRec.exe (PID: 6920)
      • Gpucheck.exe (PID: 7836)
      • iScrExtDown.exe (PID: 7848)
      • graphics-check.exe (PID: 1684)
      • iScrVoiceCapture.exe (PID: 5916)
      • AutoUpdate.exe (PID: 8056)
      • iScrInit.exe (PID: 7272)
      • AUpdate.exe (PID: 6584)
      • iScrInit.exe (PID: 2736)
      • iScrInit.exe (PID: 7084)
      • AUpdate.exe (PID: 7488)
      • iScrRec.exe (PID: 4540)
      • iScrFileMover.exe (PID: 7440)
      • AutoUpdate.exe (PID: 6860)
      • AutoUpdate.exe (PID: 5400)
      • iScrFileMover.exe (PID: 1588)
      • iScrInit.exe (PID: 1876)
    • Executable content was dropped or overwritten

      • msedge.exe (PID: 6016)
      • msedge.exe (PID: 6432)
    • Reads the computer name

      • identity_helper.exe (PID: 7904)
      • identity_helper.exe (PID: 2088)
      • iobituninstaller.tmp (PID: 7940)
      • iobituninstaller.tmp (PID: 5752)
      • Setup.exe (PID: 7588)
      • iobituninstaller.tmp (PID: 3840)
      • iushrun.exe (PID: 8100)
      • iush.exe (PID: 7524)
      • IUService.exe (PID: 7736)
      • CrRestore.exe (PID: 5004)
      • UninstallPromote.exe (PID: 6972)
      • IObitUninstaler.exe (PID: 1612)
      • UninstallMonitor.exe (PID: 3544)
      • IObitDownloader.exe (PID: 1512)
      • iush.exe (PID: 3364)
      • AUpdate.exe (PID: 6116)
      • AutoUpdate.exe (PID: 7576)
      • iTopSetup.exe.tmp (PID: 5432)
      • ugin.exe (PID: 7480)
      • ugin.exe (PID: 7564)
      • ugin.exe (PID: 4136)
      • iTopVPN.exe (PID: 7188)
      • ugin.exe (PID: 7176)
      • iTopVPN.exe (PID: 8168)
      • unpr.exe (PID: 4328)
      • ugin.exe (PID: 7144)
      • ugin.exe (PID: 7236)
      • ugin.exe (PID: 4908)
      • aud.exe (PID: 8044)
      • atud.exe (PID: 5752)
      • aud.exe (PID: 2132)
      • ISRSetup.exe.tmp (PID: 524)
      • _iu14D2N.tmp (PID: 6616)
      • iTopVPNMini.exe (PID: 3488)
      • unins000.exe (PID: 5004)
      • iush.exe (PID: 4360)
      • unins000.exe (PID: 1752)
      • _iu14D2N.tmp (PID: 6908)
      • UninstallPromote.exe (PID: 5892)
      • PPUninstaller.exe (PID: 6816)
      • iush.exe (PID: 7936)
      • UninstallMonitor.exe (PID: 3288)
      • iScrInit.exe (PID: 5244)
      • iScrInit.exe (PID: 5300)
      • iScrInit.exe (PID: 5104)
      • aud.exe (PID: 7720)
      • wstr.exe (PID: 7948)
      • iScrInit.exe (PID: 8172)
      • itopxmasdayp24.exe (PID: 5712)
      • ibfn204.exe (PID: 5964)
      • iScrInit.exe (PID: 6948)
      • Gpucheck.exe (PID: 2392)
      • iScrMagnifier.exe (PID: 1876)
      • iScrInit.exe (PID: 6952)
      • iScrInit.exe (PID: 848)
      • UninstallInfo.exe (PID: 7664)
      • iScrRec.exe (PID: 7172)
      • iScrGPURecording.exe (PID: 4872)
      • iScrRec.exe (PID: 6920)
      • iScrExtDown.exe (PID: 7848)
      • iScrVoiceCapture.exe (PID: 5916)
      • Gpucheck.exe (PID: 7836)
      • graphics-check.exe (PID: 1684)
      • iScrInit.exe (PID: 7272)
      • AUpdate.exe (PID: 6584)
      • iScrInit.exe (PID: 2736)
      • AutoUpdate.exe (PID: 8056)
      • AUpdate.exe (PID: 7488)
      • iScrFileMover.exe (PID: 7440)
      • iScrFileMover.exe (PID: 1588)
      • iScrInit.exe (PID: 1876)
      • iScrInit.exe (PID: 7084)
      • iScrRec.exe (PID: 4540)
    • The process uses the downloaded file

      • msedge.exe (PID: 8008)
      • msedge.exe (PID: 6016)
      • iobituninstaller.tmp (PID: 5752)
      • iobituninstaller.tmp (PID: 3840)
      • iush.exe (PID: 7524)
      • Setup.exe (PID: 7588)
      • IObitUninstaler.exe (PID: 1612)
      • IObitDownloader.exe (PID: 1512)
      • iTopSetup.exe.tmp (PID: 5432)
      • ugin.exe (PID: 7176)
      • iTopVPN.exe (PID: 8168)
      • _iu14D2N.tmp (PID: 6616)
      • _iu14D2N.tmp (PID: 6908)
      • iush.exe (PID: 7936)
      • ISRSetup.exe.tmp (PID: 524)
      • atud.exe (PID: 5752)
      • explorer.exe (PID: 4488)
      • iScrRec.exe (PID: 6920)
      • iScrRec.exe (PID: 7172)
      • iScrInit.exe (PID: 7272)
    • Reads Environment values

      • identity_helper.exe (PID: 7904)
      • identity_helper.exe (PID: 2088)
    • Create files in a temporary directory

      • iobituninstaller.exe (PID: 7924)
      • iobituninstaller.exe (PID: 848)
      • iobituninstaller.tmp (PID: 5752)
      • Setup.exe (PID: 7588)
      • iobituninstaller.exe (PID: 7184)
      • iobituninstaller.tmp (PID: 3840)
      • iushrun.exe (PID: 8100)
      • IObitUninstaler.exe (PID: 1612)
      • explorer.exe (PID: 4488)
      • powershell.exe (PID: 1876)
      • iTopSetup.exe.exe (PID: 7152)
      • iTopSetup.exe.tmp (PID: 5432)
      • icop64.exe (PID: 7092)
      • ISRSetup.exe.exe (PID: 3420)
      • ISRSetup.exe.tmp (PID: 524)
      • _iu14D2N.tmp (PID: 6616)
      • unins000.exe (PID: 5004)
      • _iu14D2N.tmp (PID: 6908)
      • iush.exe (PID: 7936)
      • powershell.exe (PID: 7636)
      • iTopVPN.exe (PID: 8168)
      • SecEdit.exe (PID: 6824)
      • iScrRec.exe (PID: 6920)
    • Process checks computer location settings

      • iobituninstaller.tmp (PID: 7940)
      • iobituninstaller.tmp (PID: 5752)
      • iobituninstaller.tmp (PID: 3840)
      • iush.exe (PID: 7524)
      • Setup.exe (PID: 7588)
      • IObitUninstaler.exe (PID: 1612)
      • IObitDownloader.exe (PID: 1512)
      • iTopSetup.exe.tmp (PID: 5432)
      • ugin.exe (PID: 7176)
      • iTopVPN.exe (PID: 8168)
      • iush.exe (PID: 4360)
      • _iu14D2N.tmp (PID: 6616)
      • _iu14D2N.tmp (PID: 6908)
      • PPUninstaller.exe (PID: 6816)
      • iush.exe (PID: 7936)
      • ISRSetup.exe.tmp (PID: 524)
      • atud.exe (PID: 5752)
      • iScrInit.exe (PID: 6952)
      • iScrInit.exe (PID: 848)
      • iScrRec.exe (PID: 7172)
      • iScrRec.exe (PID: 6920)
      • AutoUpdate.exe (PID: 8056)
      • iScrInit.exe (PID: 7272)
      • iScrInit.exe (PID: 7084)
    • Creates files in the program directory

      • Setup.exe (PID: 7588)
      • iobituninstaller.tmp (PID: 3840)
      • iush.exe (PID: 7524)
      • CrRestore.exe (PID: 5004)
      • UninstallPromote.exe (PID: 6972)
      • iushrun.exe (PID: 8100)
      • IObitUninstaler.exe (PID: 1612)
      • IObitDownloader.exe (PID: 1512)
      • AutoUpdate.exe (PID: 7576)
      • iTopSetup.exe.tmp (PID: 5432)
      • ugin.exe (PID: 4136)
      • ugin.exe (PID: 7176)
      • iTopVPN.exe (PID: 7188)
      • UninstallMonitor.exe (PID: 3544)
      • ugin.exe (PID: 7236)
      • iTopVPN.exe (PID: 8168)
      • atud.exe (PID: 5752)
      • iScrInit.exe (PID: 5244)
      • itopxmasdayp24.exe (PID: 5712)
      • ISRSetup.exe.tmp (PID: 524)
      • ibfn204.exe (PID: 5964)
      • iScrInit.exe (PID: 6952)
      • iScrRec.exe (PID: 6920)
      • AutoUpdate.exe (PID: 8056)
      • iScrExtDown.exe (PID: 7848)
    • Creates files or folders in the user directory

      • Setup.exe (PID: 7588)
      • iush.exe (PID: 7524)
      • explorer.exe (PID: 4488)
      • CrRestore.exe (PID: 5004)
      • UninstallPromote.exe (PID: 6972)
      • IObitUninstaler.exe (PID: 1612)
      • IObitDownloader.exe (PID: 1512)
      • AUpdate.exe (PID: 6116)
      • AutoUpdate.exe (PID: 7576)
      • ugin.exe (PID: 7480)
      • iTopVPN.exe (PID: 7188)
      • UninstallMonitor.exe (PID: 3544)
      • iTopSetup.exe.tmp (PID: 5432)
      • atud.exe (PID: 5752)
      • iTopVPN.exe (PID: 8168)
      • iTopVPNMini.exe (PID: 3488)
      • _iu14D2N.tmp (PID: 6908)
      • ISRSetup.exe.tmp (PID: 524)
      • iScrInit.exe (PID: 6952)
      • Gpucheck.exe (PID: 2392)
      • iScrMagnifier.exe (PID: 1876)
      • iScrRec.exe (PID: 7172)
      • iScrGPURecording.exe (PID: 4872)
      • iScrRec.exe (PID: 6920)
      • iScrExtDown.exe (PID: 7848)
      • Gpucheck.exe (PID: 7836)
      • AutoUpdate.exe (PID: 8056)
      • iScrVoiceCapture.exe (PID: 5916)
      • iScrRec.exe (PID: 4540)
      • iScrFileMover.exe (PID: 7440)
    • Sends debugging messages

      • Setup.exe (PID: 7588)
      • iush.exe (PID: 7524)
      • regsvr32.exe (PID: 7720)
      • regsvr32.exe (PID: 4388)
      • ICONPIN64.exe (PID: 8092)
      • IUService.exe (PID: 7736)
      • explorer.exe (PID: 4488)
      • UninstallPromote.exe (PID: 6972)
      • iushrun.exe (PID: 8100)
      • UninstallMonitor.exe (PID: 3544)
      • regsvr32.exe (PID: 7240)
      • IObitDownloader.exe (PID: 1512)
      • IObitUninstaler.exe (PID: 1612)
      • iush.exe (PID: 3364)
      • AutoUpdate.exe (PID: 7576)
    • Reads the machine GUID from the registry

      • Setup.exe (PID: 7588)
      • UninstallPromote.exe (PID: 6972)
      • IObitUninstaler.exe (PID: 1612)
      • IObitDownloader.exe (PID: 1512)
      • AUpdate.exe (PID: 6116)
      • AutoUpdate.exe (PID: 7576)
      • iTopVPN.exe (PID: 7188)
      • icop64.exe (PID: 7092)
      • unpr.exe (PID: 4328)
      • ugin.exe (PID: 7176)
      • aud.exe (PID: 2132)
      • atud.exe (PID: 5752)
      • aud.exe (PID: 8044)
      • iTopVPN.exe (PID: 8168)
      • iTopVPNMini.exe (PID: 3488)
      • UninstallPromote.exe (PID: 5892)
      • PPUninstaller.exe (PID: 6816)
      • aud.exe (PID: 7720)
      • iScrInit.exe (PID: 6952)
      • iScrRec.exe (PID: 6920)
      • iScrInit.exe (PID: 7084)
      • AUpdate.exe (PID: 7488)
    • Creates a software uninstall entry

      • iobituninstaller.tmp (PID: 3840)
      • iTopSetup.exe.tmp (PID: 5432)
      • ISRSetup.exe.tmp (PID: 524)
    • Reads security settings of Internet Explorer

      • explorer.exe (PID: 4488)
      • powershell.exe (PID: 1876)
      • powershell.exe (PID: 7636)
    • Reads the software policy settings

      • IObitUninstaler.exe (PID: 1612)
      • powershell.exe (PID: 1876)
      • atud.exe (PID: 5752)
      • powershell.exe (PID: 7636)
      • iScrRec.exe (PID: 6920)
    • Changes the display of characters in the console

      • powershell.exe (PID: 1876)
      • powershell.exe (PID: 7636)
    • Disables trace logs

      • netsh.exe (PID: 3816)
    • Checks proxy server information

      • atud.exe (PID: 5752)
      • iScrRec.exe (PID: 6920)
    • Process checks whether UAC notifications are on

      • iTopVPN.exe (PID: 8168)
    • Manual execution by a user

      • iScrRec.exe (PID: 7172)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
333
Monitored processes
198
Malicious processes
26
Suspicious processes
6

Behavior graph

Click at the process to see the details
start msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs iobituninstaller.exe iobituninstaller.tmp no specs iobituninstaller.exe msedge.exe no specs iobituninstaller.tmp msedge.exe no specs setup.exe iobituninstaller.exe iobituninstaller.tmp iushrun.exe iush.exe regsvr32.exe no specs regsvr32.exe no specs iuservice.exe regsvr32.exe regsvr32.exe msedge.exe no specs iconpin64.exe conhost.exe no specs crrestore.exe uninstallpromote.exe msedge.exe no specs iobituninstaler.exe uninstallmonitor.exe iobitdownloader.exe iush.exe regsvr32.exe no specs regsvr32.exe cmd.exe no specs conhost.exe no specs powershell.exe no specs aupdate.exe autoupdate.exe itopsetup.exe.exe itopsetup.exe.tmp chcp.com no specs ugin.exe no specs taskkill.exe no specs conhost.exe no specs ugin.exe no specs ugin.exe no specs ullc.exe no specs conhost.exe no specs itopvpn.exe ugin.exe cmd.exe no specs conhost.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs msedge.exe no specs sc.exe no specs cmd.exe no specs conhost.exe no specs sc.exe no specs msedge.exe no specs icop64.exe no specs ugin.exe no specs ugin.exe no specs unpr.exe itopvpn.exe ugin.exe no specs svchost.exe atud.exe aud.exe aud.exe cmd.exe no specs conhost.exe no specs ipconfig.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs isrsetup.exe.exe isrsetup.exe.tmp itopvpnmini.exe cmd.exe no specs conhost.exe no specs unins000.exe _iu14d2n.tmp iush.exe no specs unins000.exe no specs _iu14d2n.tmp no specs uninstallpromote.exe ppuninstaller.exe iush.exe uninstallmonitor.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs cmd.exe no specs conhost.exe no specs wstr.exe no specs ipconfig.exe no specs iscrinit.exe no specs iscrinit.exe no specs iscrinit.exe no specs aud.exe iscrinit.exe no specs chcp.com no specs secedit.exe no specs conhost.exe no specs secedit.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs itopxmasdayp24.exe ibfn204.exe no specs msedge.exe no specs locallang.exe no specs conhost.exe no specs iscrinit.exe no specs iscrinit.exe gpucheck.exe no specs iscrmagnifier.exe no specs iscrgpurecording.exe no specs iscrinit.exe no specs iconpin64.exe no specs conhost.exe no specs uninstallinfo.exe cmd.exe no specs conhost.exe no specs ping.exe no specs iscrrec.exe no specs schtasks.exe no specs conhost.exe no specs iscrrec.exe iscrextdown.exe gpucheck.exe no specs graphics-check.exe no specs iscrvoicecapture.exe no specs autoupdate.exe iscrinit.exe no specs iscrinit.exe no specs aupdate.exe cmd.exe no specs conhost.exe no specs iscrinit.exe ping.exe no specs aupdate.exe iscrrec.exe no specs autoupdate.exe no specs autoupdate.exe no specs system iscrfilemover.exe no specs iscrfilemover.exe no specs iscrinit.exe no specs msedge.exe no specs explorer.exe

Process information

PID
CMD
Path
Indicators
Parent process
4System
[System Process]
User:
SYSTEM
Integrity Level:
SYSTEM
8cmd.exe /c ipconfig /flushdnsC:\Windows\SysWOW64\cmd.exeiTopVPN.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
236"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5508 --field-trial-handle=2416,i,16996708931422966488,10512537049252254585,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
524"C:\Users\admin\AppData\Local\Temp\is-1ON1C.tmp\ISRSetup.exe.tmp" /SL5="$104D0,115295788,230912,C:\ProgramData\IObit\IObit Uninstaller\Downloader\ISRSetup.exe.exe" /sp- /verysilent /suppressmsgboxes /insur=iu_inC:\Users\admin\AppData\Local\Temp\is-1ON1C.tmp\ISRSetup.exe.tmp
ISRSetup.exe.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
732"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.3636 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAABEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=7416 --field-trial-handle=2416,i,16996708931422966488,10512537049252254585,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
776sc start MpsSvcC:\Windows\SysWOW64\sc.exeiTopVPN.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Service Control Manager Configuration Tool
Exit code:
1056
Version:
10.0.19041.1 (WinBuild.160101.0800)
848"C:\Users\admin\Downloads\iobituninstaller.exe" /SPAWNWND=$60294 /NOTIFYWND=$60204 C:\Users\admin\Downloads\iobituninstaller.exe
iobituninstaller.tmp
User:
admin
Company:
IObit
Integrity Level:
HIGH
Description:
Setup File
Exit code:
0
Version:
14.0.1.19
Modules
Images
c:\users\admin\downloads\iobituninstaller.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
848"C:\Program Files\iTop Screen Recorder\iScrInit.exe" /pin=1C:\Program Files\iTop Screen Recorder\iScrInit.exeISRSetup.exe.tmp
User:
admin
Company:
iTop Inc.
Integrity Level:
HIGH
Description:
iTop Screen Recorderr Ini
Exit code:
0
Version:
5.0.0.465
1292sc start MpsSvcC:\Windows\SysWOW64\sc.exeiTopVPN.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Service Control Manager Configuration Tool
Exit code:
1056
Version:
10.0.19041.1 (WinBuild.160101.0800)
1496\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeICONPIN64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Total events
92 047
Read events
91 540
Write events
398
Delete events
109

Modification events

(PID) Process:(4488) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000502E2
Operation:writeName:VirtualDesktop
Value:
1000000030304456A48A294F7A40804AB924005FF030B61F
(PID) Process:(4488) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000702CA
Operation:writeName:VirtualDesktop
Value:
1000000030304456A48A294F7A40804AB924005FF030B61F
(PID) Process:(6016) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
3673C0745C872F00
(PID) Process:(6016) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328418
Operation:writeName:WindowTabManagerFileMappingId
Value:
{6587A825-7501-4300-8A38-393256C2CB27}
(PID) Process:(6016) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328418
Operation:writeName:WindowTabManagerFileMappingId
Value:
{B9C3532B-B954-45CF-86D2-9CEC61119EDC}
(PID) Process:(6016) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328418
Operation:writeName:WindowTabManagerFileMappingId
Value:
{8AFBC8C5-848C-4001-BB76-400A708BDA40}
(PID) Process:(6016) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\328418
Operation:writeName:WindowTabManagerFileMappingId
Value:
{1D2F1AAD-B504-4D43-99CB-9F78D0438BF5}
(PID) Process:(6016) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(6016) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(6016) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
Executable files
672
Suspicious files
495
Text files
665
Unknown types
33

Dropped files

PID
Process
Filename
Type
6016msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old~RF13545d.TMP
MD5:
SHA256:
6016msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old~RF13545d.TMP
MD5:
SHA256:
6016msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
6016msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
6016msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF13545d.TMP
MD5:
SHA256:
6016msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
6016msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old~RF13546c.TMP
MD5:
SHA256:
6016msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
6016msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF13548c.TMP
MD5:
SHA256:
6016msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
58
TCP/UDP connections
514
DNS requests
120
Threats
38

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
184.24.77.35:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
7488
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7488
SIHClient.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6924
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6016
msedge.exe
GET
200
172.64.149.23:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEEj8k7RgVZSNNqfJionWlBY%3D
unknown
whitelisted
6016
msedge.exe
GET
200
172.64.149.23:80
http://ocsp.sectigo.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQVD%2BnGf79Hpedv3mhy6uKMVZkPCQQUDyrLIIcouOxvSK4rVKYpqhekzQwCEA5GibtScxO5s5CqaFARGvg%3D
unknown
whitelisted
6016
msedge.exe
GET
200
172.64.149.23:80
http://ocsp.sectigo.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSdE3gf41WAic8Uh9lF92%2BIJqh5qwQUMuuSmv81lkgvKEBCcCA2kVwXheYCEGIdbQxSAZ47kHkVIIkhHAo%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
440
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
184.24.77.35:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5064
SearchApp.exe
23.212.110.208:443
www.bing.com
Akamai International B.V.
CZ
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
6432
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 4.231.128.59
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 184.24.77.35
  • 184.24.77.37
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted
www.bing.com
  • 23.212.110.208
  • 23.212.110.211
  • 23.212.110.219
  • 23.212.110.136
  • 23.212.110.217
  • 23.212.110.187
  • 23.212.110.137
  • 23.212.110.200
  • 23.212.110.210
  • 2.23.209.187
  • 2.23.209.133
  • 2.23.209.185
  • 2.23.209.179
  • 2.23.209.189
  • 2.23.209.182
  • 2.23.209.149
  • 2.23.209.176
  • 2.23.209.130
whitelisted
google.com
  • 142.250.185.206
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
edge.microsoft.com
  • 204.79.197.239
  • 13.107.21.239
whitelisted
edge-mobile-static.azureedge.net
  • 13.107.246.45
whitelisted
www.iobit.com
  • 35.171.215.200
  • 44.213.255.223
  • 54.147.123.22
whitelisted

Threats

PID
Process
Class
Message
6432
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code .jquery .com)
6432
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code .jquery .com)
6432
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code .jquery .com)
6432
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code .jquery .com)
1612
IObitUninstaler.exe
Potentially Bad Traffic
ET HUNTING Suspicious Mozilla User-Agent - Likely Fake (Mozilla/4.0)
1612
IObitUninstaler.exe
Potentially Bad Traffic
ET HUNTING Suspicious Mozilla User-Agent - Likely Fake (Mozilla/4.0)
7576
AutoUpdate.exe
Potentially Bad Traffic
ET HUNTING Suspicious Mozilla User-Agent - Likely Fake (Mozilla/4.0)
7576
AutoUpdate.exe
Potentially Bad Traffic
ET HUNTING Suspicious Mozilla User-Agent - Likely Fake (Mozilla/4.0)
2192
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
2192
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
Process
Message
Setup.exe
OpenKeyReadOnly error
Setup.exe
Install un14 : NotInstall
Setup.exe
Result: 1
Setup.exe
LanID=1033
Setup.exe
NowVer: 14.0.1.19
Setup.exe
TFrmWizard.FormCreate
Setup.exe
LanID=1033
Setup.exe
ALangID=1033
Setup.exe
time1
Setup.exe
time3