File name:

dap10_full.exe

Full analysis: https://app.any.run/tasks/ac422891-3031-459c-b263-5cfc5595fd80
Verdict: Malicious activity
Analysis date: February 13, 2024, 01:03:14
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
spam
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

BEFFCE53407EC8D165693BB13C006285

SHA1:

F746A2BCAA846DE4494742F6CB39F78E15169FFF

SHA256:

40B63673A293023AE00AB3FBAACD3B906E2F06DC4B09F110B1E002D16AE07B45

SSDEEP:

98304:sIJtekPclVVrzMQLGjTpD92oDJEHxQD5Rp2FnyOT3IlIFhcZ63owLgdDmmC40nOl:6ApfECCulzhwpesJaOOZYb2e79Y

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • dap10_full.exe (PID: 2844)
      • vcredist_x86.exe (PID: 1696)
      • GLBF702.tmp (PID: 1776)
      • DAP.exe (PID: 3684)
      • csc.exe (PID: 2780)
      • csc.exe (PID: 2756)
      • csc.exe (PID: 3920)
      • csc.exe (PID: 1596)
      • csc.exe (PID: 1824)
      • csc.exe (PID: 128)
      • csc.exe (PID: 3696)
      • csc.exe (PID: 2832)
      • csc.exe (PID: 1768)
      • csc.exe (PID: 332)
      • csc.exe (PID: 2152)
      • csc.exe (PID: 2108)
      • csc.exe (PID: 1956)
      • csc.exe (PID: 1696)
      • csc.exe (PID: 3956)
      • csc.exe (PID: 3396)
      • csc.exe (PID: 2860)
      • csc.exe (PID: 2244)
      • csc.exe (PID: 3344)
      • csc.exe (PID: 1900)
      • csc.exe (PID: 3612)
      • csc.exe (PID: 3284)
      • csc.exe (PID: 1544)
      • csc.exe (PID: 3460)
      • csc.exe (PID: 3888)
      • csc.exe (PID: 3116)
      • csc.exe (PID: 3828)
      • csc.exe (PID: 2388)
      • csc.exe (PID: 3696)
      • csc.exe (PID: 332)
      • csc.exe (PID: 2624)
      • csc.exe (PID: 2268)
      • csc.exe (PID: 2192)
    • Creates a writable file in the system directory

      • GLBF702.tmp (PID: 1776)
    • Changes the autorun value in the registry

      • DAP.exe (PID: 3684)
      • GLBF702.tmp (PID: 1776)
      • DAP.exe (PID: 3232)
    • Modifies files in the Chrome extension folder

      • DAP.exe (PID: 3684)
    • Steals credentials from Web Browsers

      • DAP.exe (PID: 3684)
    • Actions looks like stealing of personal data

      • DAP.exe (PID: 3684)
      • DAP.exe (PID: 3232)
    • Starts Visual C# compiler

      • DAP.exe (PID: 3232)
  • SUSPICIOUS

    • Starts application with an unusual extension

      • dap10_full.exe (PID: 2844)
      • GLBF702.tmp (PID: 1776)
    • Executable content was dropped or overwritten

      • dap10_full.exe (PID: 2844)
      • GLBF702.tmp (PID: 1776)
      • vcredist_x86.exe (PID: 1696)
      • DAP.exe (PID: 3684)
      • csc.exe (PID: 2780)
      • csc.exe (PID: 2756)
      • csc.exe (PID: 3920)
      • csc.exe (PID: 1596)
      • csc.exe (PID: 1824)
      • csc.exe (PID: 128)
      • csc.exe (PID: 3696)
      • csc.exe (PID: 2832)
      • csc.exe (PID: 332)
      • csc.exe (PID: 1768)
      • csc.exe (PID: 2152)
      • csc.exe (PID: 2108)
      • csc.exe (PID: 1956)
      • csc.exe (PID: 1696)
      • csc.exe (PID: 3956)
      • csc.exe (PID: 3396)
      • csc.exe (PID: 2860)
      • csc.exe (PID: 2244)
      • csc.exe (PID: 3344)
      • csc.exe (PID: 3612)
      • csc.exe (PID: 1900)
      • csc.exe (PID: 3284)
      • csc.exe (PID: 1544)
      • csc.exe (PID: 3888)
      • csc.exe (PID: 3460)
      • csc.exe (PID: 3828)
      • csc.exe (PID: 3116)
      • csc.exe (PID: 2388)
      • csc.exe (PID: 3696)
      • csc.exe (PID: 332)
      • csc.exe (PID: 2624)
      • csc.exe (PID: 2268)
      • csc.exe (PID: 2192)
    • Process drops legitimate windows executable

      • GLBF702.tmp (PID: 1776)
      • vcredist_x86.exe (PID: 1696)
    • Reads the Internet Settings

      • GLBF702.tmp (PID: 1776)
      • DAP.exe (PID: 3684)
      • DAP.exe (PID: 3232)
    • Reads security settings of Internet Explorer

      • GLBF702.tmp (PID: 1776)
      • DAP.exe (PID: 3684)
      • DAP.exe (PID: 3232)
    • Starts a Microsoft application from unusual location

      • vcredist_x86.exe (PID: 1696)
    • Creates/Modifies COM task schedule object

      • GLBF702.tmp (PID: 1776)
      • GLJF742.tmp (PID: 2960)
      • DAP.exe (PID: 3684)
      • GLJF742.tmp (PID: 2440)
      • GLJF742.tmp (PID: 796)
    • Searches for installed software

      • GLBF702.tmp (PID: 1776)
    • Creates a software uninstall entry

      • GLBF702.tmp (PID: 1776)
    • Changes Internet Explorer settings (feature browser emulation)

      • GLBF702.tmp (PID: 1776)
    • Reads the BIOS version

      • DAP.exe (PID: 3684)
      • DAP.exe (PID: 3232)
      • DAP.exe (PID: 1604)
      • DAP.exe (PID: 2656)
      • DAP.exe (PID: 4044)
      • DAP.exe (PID: 2780)
      • DAP.exe (PID: 1288)
      • DAP.exe (PID: 2572)
      • DAP.exe (PID: 560)
    • Detected use of alternative data streams (AltDS)

      • DAP.exe (PID: 3684)
      • DAP.exe (PID: 3232)
      • DAP.exe (PID: 1604)
      • DAP.exe (PID: 2656)
      • DAP.exe (PID: 4044)
      • DAP.exe (PID: 2780)
      • DAP.exe (PID: 1288)
      • DAP.exe (PID: 2572)
      • DAP.exe (PID: 560)
    • Reads Microsoft Outlook installation path

      • DAP.exe (PID: 3684)
      • DAP.exe (PID: 3232)
    • Changes the Home page of Internet Explorer

      • DAP.exe (PID: 3684)
    • Changes the title of the Internet Explorer window

      • DAP.exe (PID: 3684)
    • Reads Mozilla Firefox installation path

      • DAP.exe (PID: 3684)
      • DAP.exe (PID: 3232)
    • The process executes via Task Scheduler

      • DAP.exe (PID: 3232)
    • Reads Internet Explorer settings

      • DAP.exe (PID: 3684)
      • DAP.exe (PID: 3232)
    • Reads settings of System Certificates

      • DAP.exe (PID: 3232)
    • Checks Windows Trust Settings

      • DAP.exe (PID: 3232)
    • Uses .NET C# to load dll

      • DAP.exe (PID: 3232)
  • INFO

    • Create files in a temporary directory

      • dap10_full.exe (PID: 2844)
      • GLBF702.tmp (PID: 1776)
      • install.exe (PID: 2860)
      • DAP.exe (PID: 3684)
      • DAP.exe (PID: 3232)
      • cvtres.exe (PID: 1848)
      • cvtres.exe (PID: 1888)
      • cvtres.exe (PID: 3932)
      • cvtres.exe (PID: 3820)
      • cvtres.exe (PID: 3704)
      • cvtres.exe (PID: 2020)
      • cvtres.exe (PID: 1572)
      • cvtres.exe (PID: 1428)
      • cvtres.exe (PID: 2564)
      • cvtres.exe (PID: 2488)
      • cvtres.exe (PID: 1124)
      • cvtres.exe (PID: 1020)
      • cvtres.exe (PID: 1820)
      • cvtres.exe (PID: 1072)
      • cvtres.exe (PID: 2808)
      • cvtres.exe (PID: 3700)
      • cvtres.exe (PID: 2788)
      • cvtres.exe (PID: 3000)
      • cvtres.exe (PID: 2040)
      • cvtres.exe (PID: 2756)
      • cvtres.exe (PID: 1220)
      • cvtres.exe (PID: 2304)
      • cvtres.exe (PID: 2724)
      • cvtres.exe (PID: 560)
      • cvtres.exe (PID: 2996)
      • cvtres.exe (PID: 2184)
      • cvtres.exe (PID: 2332)
      • cvtres.exe (PID: 3928)
      • cvtres.exe (PID: 2128)
      • cvtres.exe (PID: 2988)
      • cvtres.exe (PID: 664)
      • cvtres.exe (PID: 2024)
      • cvtres.exe (PID: 1820)
    • Checks supported languages

      • dap10_full.exe (PID: 2844)
      • GLBF702.tmp (PID: 1776)
      • vcredist_x86.exe (PID: 1696)
      • install.exe (PID: 2860)
      • GLJF742.tmp (PID: 2960)
      • DAP.exe (PID: 3684)
      • GLJF742.tmp (PID: 2440)
      • GLJF742.tmp (PID: 796)
      • DAP.exe (PID: 3232)
      • unelevate.EXE (PID: 2808)
      • csc.exe (PID: 2780)
      • cvtres.exe (PID: 1848)
      • csc.exe (PID: 2756)
      • csc.exe (PID: 3920)
      • cvtres.exe (PID: 1888)
      • cvtres.exe (PID: 3704)
      • csc.exe (PID: 1824)
      • cvtres.exe (PID: 3932)
      • csc.exe (PID: 3696)
      • csc.exe (PID: 1596)
      • cvtres.exe (PID: 3820)
      • cvtres.exe (PID: 1428)
      • cvtres.exe (PID: 2020)
      • csc.exe (PID: 332)
      • csc.exe (PID: 128)
      • cvtres.exe (PID: 1572)
      • cvtres.exe (PID: 2564)
      • csc.exe (PID: 1768)
      • cvtres.exe (PID: 2488)
      • csc.exe (PID: 2832)
      • csc.exe (PID: 2108)
      • csc.exe (PID: 2152)
      • cvtres.exe (PID: 1124)
      • DAP.exe (PID: 1604)
      • csc.exe (PID: 1956)
      • cvtres.exe (PID: 1820)
      • cvtres.exe (PID: 1020)
      • csc.exe (PID: 3956)
      • DAP.exe (PID: 2656)
      • csc.exe (PID: 3396)
      • DAP.exe (PID: 4044)
      • cvtres.exe (PID: 2808)
      • csc.exe (PID: 1696)
      • cvtres.exe (PID: 1072)
      • csc.exe (PID: 2860)
      • cvtres.exe (PID: 2788)
      • csc.exe (PID: 2244)
      • cvtres.exe (PID: 3700)
      • cvtres.exe (PID: 3000)
      • csc.exe (PID: 3344)
      • cvtres.exe (PID: 2040)
      • csc.exe (PID: 1900)
      • csc.exe (PID: 3612)
      • cvtres.exe (PID: 1220)
      • csc.exe (PID: 3284)
      • cvtres.exe (PID: 2724)
      • cvtres.exe (PID: 2756)
      • cvtres.exe (PID: 2304)
      • csc.exe (PID: 3460)
      • csc.exe (PID: 1544)
      • csc.exe (PID: 3888)
      • cvtres.exe (PID: 560)
      • csc.exe (PID: 3828)
      • cvtres.exe (PID: 2996)
      • csc.exe (PID: 3116)
      • cvtres.exe (PID: 2184)
      • csc.exe (PID: 3696)
      • cvtres.exe (PID: 2332)
      • cvtres.exe (PID: 3928)
      • cvtres.exe (PID: 2128)
      • csc.exe (PID: 2624)
      • cvtres.exe (PID: 2988)
      • csc.exe (PID: 2388)
      • cvtres.exe (PID: 664)
      • cvtres.exe (PID: 2024)
      • csc.exe (PID: 332)
      • csc.exe (PID: 2192)
      • cvtres.exe (PID: 1820)
      • DAP.exe (PID: 2572)
      • csc.exe (PID: 2268)
      • DAP.exe (PID: 1288)
      • DAP.exe (PID: 560)
      • DAP.exe (PID: 2780)
    • Reads the computer name

      • GLBF702.tmp (PID: 1776)
      • vcredist_x86.exe (PID: 1696)
      • install.exe (PID: 2860)
      • DAP.exe (PID: 3684)
      • unelevate.EXE (PID: 2808)
      • DAP.exe (PID: 3232)
      • DAP.exe (PID: 1604)
      • DAP.exe (PID: 2656)
      • DAP.exe (PID: 4044)
      • DAP.exe (PID: 2572)
      • DAP.exe (PID: 1288)
      • DAP.exe (PID: 2780)
      • DAP.exe (PID: 560)
    • Checks proxy server information

      • GLBF702.tmp (PID: 1776)
      • DAP.exe (PID: 3684)
      • DAP.exe (PID: 3232)
    • Reads Environment values

      • vcredist_x86.exe (PID: 1696)
      • DAP.exe (PID: 3232)
    • Reads the machine GUID from the registry

      • GLBF702.tmp (PID: 1776)
      • vcredist_x86.exe (PID: 1696)
      • install.exe (PID: 2860)
      • DAP.exe (PID: 3684)
      • DAP.exe (PID: 3232)
      • csc.exe (PID: 2780)
      • cvtres.exe (PID: 1848)
      • csc.exe (PID: 2756)
      • csc.exe (PID: 3920)
      • cvtres.exe (PID: 1888)
      • cvtres.exe (PID: 3704)
      • cvtres.exe (PID: 3932)
      • csc.exe (PID: 1824)
      • csc.exe (PID: 1596)
      • cvtres.exe (PID: 3820)
      • csc.exe (PID: 3696)
      • cvtres.exe (PID: 1428)
      • csc.exe (PID: 128)
      • cvtres.exe (PID: 2020)
      • csc.exe (PID: 332)
      • cvtres.exe (PID: 1572)
      • cvtres.exe (PID: 2564)
      • csc.exe (PID: 1768)
      • cvtres.exe (PID: 2488)
      • cvtres.exe (PID: 1124)
      • csc.exe (PID: 2108)
      • csc.exe (PID: 2152)
      • cvtres.exe (PID: 1820)
      • DAP.exe (PID: 1604)
      • cvtres.exe (PID: 1020)
      • csc.exe (PID: 1956)
      • csc.exe (PID: 3956)
      • DAP.exe (PID: 2656)
      • cvtres.exe (PID: 1072)
      • csc.exe (PID: 3396)
      • cvtres.exe (PID: 2808)
      • csc.exe (PID: 1696)
      • cvtres.exe (PID: 3700)
      • DAP.exe (PID: 4044)
      • csc.exe (PID: 2860)
      • cvtres.exe (PID: 2788)
      • csc.exe (PID: 2244)
      • cvtres.exe (PID: 3000)
      • csc.exe (PID: 3344)
      • cvtres.exe (PID: 2040)
      • csc.exe (PID: 1900)
      • csc.exe (PID: 3612)
      • cvtres.exe (PID: 1220)
      • csc.exe (PID: 3284)
      • csc.exe (PID: 2832)
      • cvtres.exe (PID: 2756)
      • csc.exe (PID: 1544)
      • cvtres.exe (PID: 2304)
      • csc.exe (PID: 3460)
      • cvtres.exe (PID: 2724)
      • csc.exe (PID: 3888)
      • cvtres.exe (PID: 560)
      • csc.exe (PID: 3828)
      • cvtres.exe (PID: 2996)
      • cvtres.exe (PID: 2184)
      • csc.exe (PID: 3116)
      • cvtres.exe (PID: 2332)
      • csc.exe (PID: 3696)
      • cvtres.exe (PID: 3928)
      • cvtres.exe (PID: 2128)
      • csc.exe (PID: 2624)
      • cvtres.exe (PID: 2988)
      • csc.exe (PID: 2388)
      • cvtres.exe (PID: 664)
      • csc.exe (PID: 2192)
      • csc.exe (PID: 332)
      • cvtres.exe (PID: 2024)
      • cvtres.exe (PID: 1820)
      • DAP.exe (PID: 2572)
      • csc.exe (PID: 2268)
      • DAP.exe (PID: 1288)
      • DAP.exe (PID: 560)
      • DAP.exe (PID: 2780)
    • Creates files in the program directory

      • GLBF702.tmp (PID: 1776)
      • DAP.exe (PID: 3684)
      • DAP.exe (PID: 3232)
      • csc.exe (PID: 2780)
      • csc.exe (PID: 3920)
      • csc.exe (PID: 2756)
      • csc.exe (PID: 1824)
      • csc.exe (PID: 3696)
      • csc.exe (PID: 1596)
      • csc.exe (PID: 332)
      • csc.exe (PID: 128)
      • csc.exe (PID: 1768)
      • csc.exe (PID: 2832)
      • csc.exe (PID: 2152)
      • csc.exe (PID: 2108)
      • csc.exe (PID: 1956)
      • csc.exe (PID: 3956)
      • csc.exe (PID: 3396)
      • csc.exe (PID: 1696)
      • csc.exe (PID: 2860)
      • csc.exe (PID: 3344)
      • csc.exe (PID: 2244)
      • csc.exe (PID: 3612)
      • csc.exe (PID: 3284)
      • csc.exe (PID: 1900)
      • csc.exe (PID: 1544)
      • csc.exe (PID: 3460)
      • csc.exe (PID: 3888)
      • csc.exe (PID: 3828)
      • csc.exe (PID: 3116)
      • csc.exe (PID: 3696)
      • csc.exe (PID: 2388)
      • csc.exe (PID: 2624)
      • csc.exe (PID: 332)
      • csc.exe (PID: 2192)
      • csc.exe (PID: 2268)
    • Creates files or folders in the user directory

      • DAP.exe (PID: 3684)
      • DAP.exe (PID: 3232)
    • Application launched itself

      • msedge.exe (PID: 3504)
      • msedge.exe (PID: 3808)
    • Reads the software policy settings

      • DAP.exe (PID: 3232)
    • Manual execution by a user

      • msedge.exe (PID: 3808)
      • DAP.exe (PID: 1604)
      • DAP.exe (PID: 2656)
      • DAP.exe (PID: 4044)
      • DAP.exe (PID: 2572)
      • DAP.exe (PID: 2780)
      • DAP.exe (PID: 1288)
      • DAP.exe (PID: 560)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Wise Installer executable (91.7)
.exe | Win64 Executable (generic) (5.3)
.dll | Win32 Dynamic Link Library (generic) (1.2)
.exe | Win32 Executable (generic) (0.8)
.exe | Generic Win/DOS Executable (0.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1999:04:08 20:24:47+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 512
InitializedDataSize: 10810368
UninitializedDataSize: -
EntryPoint: 0x1000
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 10060.4455.0.0
ProductVersionNumber: 10060.4455.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows 16-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: SpeedBit Ltd.
FileDescription: DAP 10
FileVersion: 10060 (Build 259
LegalCopyright: speedbit
XXXXXXXXXXXXXXXXXXXXXXXXXXXX: -
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
196
Monitored processes
109
Malicious processes
12
Suspicious processes
33

Behavior graph

Click at the process to see the details
start dap10_full.exe glbf702.tmp vcredist_x86.exe install.exe no specs gljf742.tmp no specs gljf742.tmp no specs gljf742.tmp no specs dap.exe unelevate.exe no specs msedge.exe no specs msedge.exe no specs dap.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs csc.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe dap.exe cvtres.exe no specs csc.exe cvtres.exe no specs dap.exe csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe dap.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe msedge.exe no specs cvtres.exe no specs msedge.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs msedge.exe no specs msedge.exe no specs dap.exe dap.exe dap.exe msedge.exe no specs msedge.exe no specs dap.exe PhotoViewer.dll no specs dap10_full.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
128"C:\Windows\Microsoft.NET\Framework\v3.5\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\su7rdhf2.cmdline"C:\Windows\Microsoft.NET\Framework\v3.5\csc.exe
DAP.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
3.5.30729.5420 built by: Win7SP1
Modules
Images
c:\windows\microsoft.net\framework\v3.5\csc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\system32\ole32.dll
332"C:\Windows\Microsoft.NET\Framework\v3.5\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\duw-964t.cmdline"C:\Windows\Microsoft.NET\Framework\v3.5\csc.exe
DAP.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
3.5.30729.5420 built by: Win7SP1
Modules
Images
c:\windows\microsoft.net\framework\v3.5\csc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\system32\ole32.dll
332"C:\Windows\Microsoft.NET\Framework\v3.5\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\9tuuh7on.cmdline"C:\Windows\Microsoft.NET\Framework\v3.5\csc.exe
DAP.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
3.5.30729.5420 built by: Win7SP1
Modules
Images
c:\windows\microsoft.net\framework\v3.5\csc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\system32\ole32.dll
560C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESE631.tmp" "c:\ProgramData\SpeedBit\DAP\Plugins\189AE673-13C1-4133-A470-8C4DDD1ACB8C\1.0.1.3_0\CSCE5F1.tmp"C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
8.00.50727.5003 (Win7SP1GDR.050727-5400)
Modules
Images
c:\windows\microsoft.net\framework\v2.0.50727\cvtres.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.4940_none_d08cc06a442b34fc\msvcr80.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cryptsp.dll
560"C:\Program Files\DAP\DAP.exe" C:\Program Files\DAP\DAP.exe
explorer.exe
User:
admin
Company:
Speedbit Ltd.
Integrity Level:
MEDIUM
Description:
Download Accelerator Plus (DAP)
Exit code:
1
Version:
10.0.6.0
Modules
Images
c:\program files\dap\dap.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
664C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESF256.tmp" "c:\ProgramData\SpeedBit\DAP\Plugins\189AE673-13C1-4133-A470-8C4DDD1ACB8C\1.0.1.3_0\CSCF217.tmp"C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
8.00.50727.5003 (Win7SP1GDR.050727-5400)
Modules
Images
c:\windows\microsoft.net\framework\v2.0.50727\cvtres.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.4940_none_d08cc06a442b34fc\msvcr80.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cryptsp.dll
796"C:\Users\admin\AppData\Local\Temp\GLJF742.tmp" C:\Windows\System32\AniGIF.ocxC:\Users\admin\AppData\Local\Temp\GLJF742.tmpGLBF702.tmp
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\gljf742.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\aclayers.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
1020C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESCC7F.tmp" "c:\ProgramData\SpeedBit\DAP\Plugins\189AE673-13C1-4133-A470-8C4DDD1ACB8C\1.0.1.3_0\CSCCC10.tmp"C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
8.00.50727.5003 (Win7SP1GDR.050727-5400)
Modules
Images
c:\windows\microsoft.net\framework\v2.0.50727\cvtres.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.4940_none_d08cc06a442b34fc\msvcr80.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cryptsp.dll
1072C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESD180.tmp" "c:\ProgramData\SpeedBit\DAP\Plugins\189AE673-13C1-4133-A470-8C4DDD1ACB8C\1.0.1.3_0\CSCD111.tmp"C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
8.00.50727.5003 (Win7SP1GDR.050727-5400)
Modules
Images
c:\windows\microsoft.net\framework\v2.0.50727\cvtres.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.4940_none_d08cc06a442b34fc\msvcr80.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cryptsp.dll
1124C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESCA5C.tmp" "c:\ProgramData\SpeedBit\DAP\Plugins\189AE673-13C1-4133-A470-8C4DDD1ACB8C\1.0.1.3_0\CSCC6D0.tmp"C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
8.00.50727.5003 (Win7SP1GDR.050727-5400)
Modules
Images
c:\windows\microsoft.net\framework\v2.0.50727\cvtres.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.4940_none_d08cc06a442b34fc\msvcr80.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cryptsp.dll
Total events
34 123
Read events
31 896
Write events
2 143
Delete events
84

Modification events

(PID) Process:(1776) GLBF702.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:delete valueName:DAP10
Value:
(PID) Process:(1776) GLBF702.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(1776) GLBF702.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyServer
Value:
(PID) Process:(1776) GLBF702.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyOverride
Value:
(PID) Process:(1776) GLBF702.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoConfigURL
Value:
(PID) Process:(1776) GLBF702.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoDetect
Value:
(PID) Process:(1776) GLBF702.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
460000005C010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1776) GLBF702.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1776) GLBF702.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1776) GLBF702.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
159
Suspicious files
195
Text files
525
Unknown types
85

Dropped files

PID
Process
Filename
Type
1776GLBF702.tmpC:\Users\admin\AppData\Local\Temp\DAPINST\~GLH0005.TMP
MD5:
SHA256:
1776GLBF702.tmpC:\Users\admin\AppData\Local\Temp\DAPINST\DapLang.cab
MD5:
SHA256:
2844dap10_full.exeC:\Users\admin\AppData\Local\Temp\GLBF702.tmpexecutable
MD5:A2A23CAC7804D70091495099C0D83613
SHA256:6CA1E1E03292B088832CD5DD5CA8CC94E97B744C719E8A98DFC652A757C5F1DE
1776GLBF702.tmpC:\Users\admin\AppData\Local\Temp\GLCF731.tmpexecutable
MD5:8C97D8BB1470C6498E47B12C5A03CE39
SHA256:A87F19F9FEE475D2B2E82ACFB4589BE6D816B613064CD06826E1D4C147BEB50A
1776GLBF702.tmpC:\Users\admin\AppData\Local\Temp\dapextie.htmhtml
MD5:6A87B7A399327F4BCFF0572C96213C41
SHA256:7DB7B0B22A32D8A6EAF04970C8D1E5F2A9CBF9FEDAFE2C5CB00D09B79BCCA9B8
1776GLBF702.tmpC:\Users\admin\AppData\Local\Temp\~GLH0001.TMPhtml
MD5:6A87B7A399327F4BCFF0572C96213C41
SHA256:7DB7B0B22A32D8A6EAF04970C8D1E5F2A9CBF9FEDAFE2C5CB00D09B79BCCA9B8
1776GLBF702.tmpC:\Users\admin\AppData\Local\Temp\GLFFF46.tmptext
MD5:286ECF08ED718A85321D19D7E7472865
SHA256:68D310E218038D2BC9D65164F0067A9975DD63F38ABFF16762E49CDC971617DC
1776GLBF702.tmpC:\Users\admin\AppData\Local\Temp\cabex.dllexecutable
MD5:0A70935AC8BD68BB40D649849CE0EBEF
SHA256:BCC5DB00EA6FD4E83D04D7A26D77EC85D084BE3F80697FA1DA8CF0776F194A29
1776GLBF702.tmpC:\Users\admin\AppData\Local\Temp\DAPINST\DAPFireFox.exeexecutable
MD5:9228A9DBC4C6A28E4652C40593898A98
SHA256:E630559972667A7159108E4F5D2A7008BB06B8FAC3FC4630A60A8FFAD21E2115
1776GLBF702.tmpC:\Users\admin\AppData\Local\Temp\DAPINST\DapRemove.exeexecutable
MD5:8BF069204E5C44215B5F41D43EC8B349
SHA256:25A3DA198CA0A069518A5D3B7F6235F1CEE76E484F854A61C9136B3C940E0BD9
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
40
DNS requests
26
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1776
GLBF702.tmp
GET
200
173.239.4.35:80
http://stub.speedbit.com/p.aspx?e=/9ZmISdorEtde4FcBjAa0KamUw0o8OGNLUMNINn3bfXtNQqpF/SBTguiJVZAAvOypqUgV2pBp/DubYXFLcRRvxnzKW1HDIvRTPnfxsC1sLOOPx8smASgOBInS1jzS5Zd
unknown
unknown
1776
GLBF702.tmp
GET
200
173.239.4.35:80
http://stub.speedbit.com/p.aspx?e=N6dOqWm8Q95QKVDNhYrVZ55IqVYgXfBJ4XLIs55rVmXw5kzsCdcwEil0KR7+wQEAXw4PLh17YOgFj1J4iNn3pf/xnj2M+81rebpSlsRkhCxMB7SVxwb0S45MWp8MfmX99JgsGI2WhWE=
unknown
unknown
3232
DAP.exe
GET
404
208.91.196.152:80
http://shareflare.net/favicon.ico
unknown
text
10 b
unknown
3232
DAP.exe
GET
301
142.250.187.110:80
http://www.youtube.com/favicon.ico
unknown
html
232 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
1776
GLBF702.tmp
173.239.4.35:80
stub.speedbit.com
WEBAIR-INTERNET
US
unknown
3684
DAP.exe
173.239.4.82:80
client.speedbit.com
WEBAIR-INTERNET
US
unknown
3684
DAP.exe
173.239.4.63:80
www.speedbit.com
WEBAIR-INTERNET
US
unknown
3808
msedge.exe
239.255.255.250:1900
unknown
3432
msedge.exe
173.239.4.63:80
www.speedbit.com
WEBAIR-INTERNET
US
unknown
3432
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
3432
msedge.exe
204.79.197.239:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown

DNS requests

Domain
IP
Reputation
stub.speedbit.com
  • 173.239.4.35
unknown
client.speedbit.com
  • 173.239.4.82
unknown
dns.msftncsi.com
  • 131.107.255.255
shared
pix.speedbit.com
  • 173.239.4.82
unknown
update.speedbit.com
  • 173.239.4.82
unknown
www.speedbit.com
  • 173.239.4.63
malicious
config.edge.skype.com
  • 13.107.42.16
whitelisted
edge.microsoft.com
  • 204.79.197.239
  • 13.107.21.239
whitelisted
newuser.speedbit.com
  • 173.239.4.82
unknown
online.speedbit.com
  • 173.239.4.56
unknown

Threats

PID
Process
Class
Message
1776
GLBF702.tmp
Misc activity
ET POLICY Wise Solutions Install Reporting via HTTP - User Agent (Wise)
1776
GLBF702.tmp
Misc activity
ET POLICY Wise Solutions Install Reporting via HTTP - User Agent (Wise)
Process
Message
DAP.exe
%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s
DAP.exe
%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s
DAP.exe
[SbTracer::UpdateAllParameters]
DAP.exe
[SbTracer::ReadConfiguration] Trace Level: 3
DAP.exe
[SbTracer::ReadConfiguration] ___Warning - No Trace Destination
DAP.exe
[SbTracer::ReadConfiguration] ___Warning - No Trace Backup
DAP.exe
[SbTracer::ReadConfiguration] ___Warning - No Trace Time Limit
DAP.exe
[SbTracer::ReadConfiguration] ___Warning - No Trace Time Stamp
DAP.exe
[SbTracer::ReadConfiguration] Trace Max Size: 3
DAP.exe
[SbTracer::ReadConfiguration] Done