File name:

dap10_full.exe

Full analysis: https://app.any.run/tasks/ac422891-3031-459c-b263-5cfc5595fd80
Verdict: Malicious activity
Analysis date: February 13, 2024, 01:03:14
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
spam
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

BEFFCE53407EC8D165693BB13C006285

SHA1:

F746A2BCAA846DE4494742F6CB39F78E15169FFF

SHA256:

40B63673A293023AE00AB3FBAACD3B906E2F06DC4B09F110B1E002D16AE07B45

SSDEEP:

98304:sIJtekPclVVrzMQLGjTpD92oDJEHxQD5Rp2FnyOT3IlIFhcZ63owLgdDmmC40nOl:6ApfECCulzhwpesJaOOZYb2e79Y

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • dap10_full.exe (PID: 2844)
      • vcredist_x86.exe (PID: 1696)
      • DAP.exe (PID: 3684)
      • GLBF702.tmp (PID: 1776)
      • csc.exe (PID: 2780)
      • csc.exe (PID: 2756)
      • csc.exe (PID: 3920)
      • csc.exe (PID: 1596)
      • csc.exe (PID: 1824)
      • csc.exe (PID: 3696)
      • csc.exe (PID: 128)
      • csc.exe (PID: 332)
      • csc.exe (PID: 2832)
      • csc.exe (PID: 1768)
      • csc.exe (PID: 2152)
      • csc.exe (PID: 2108)
      • csc.exe (PID: 1956)
      • csc.exe (PID: 3956)
      • csc.exe (PID: 1696)
      • csc.exe (PID: 3396)
      • csc.exe (PID: 2860)
      • csc.exe (PID: 2244)
      • csc.exe (PID: 3344)
      • csc.exe (PID: 1900)
      • csc.exe (PID: 3612)
      • csc.exe (PID: 1544)
      • csc.exe (PID: 3460)
      • csc.exe (PID: 3888)
      • csc.exe (PID: 3116)
      • csc.exe (PID: 3828)
      • csc.exe (PID: 2624)
      • csc.exe (PID: 3696)
      • csc.exe (PID: 2388)
      • csc.exe (PID: 332)
      • csc.exe (PID: 2268)
      • csc.exe (PID: 2192)
      • csc.exe (PID: 3284)
    • Creates a writable file in the system directory

      • GLBF702.tmp (PID: 1776)
    • Changes the autorun value in the registry

      • DAP.exe (PID: 3684)
      • GLBF702.tmp (PID: 1776)
      • DAP.exe (PID: 3232)
    • Actions looks like stealing of personal data

      • DAP.exe (PID: 3684)
      • DAP.exe (PID: 3232)
    • Modifies files in the Chrome extension folder

      • DAP.exe (PID: 3684)
    • Steals credentials from Web Browsers

      • DAP.exe (PID: 3684)
    • Starts Visual C# compiler

      • DAP.exe (PID: 3232)
  • SUSPICIOUS

    • Starts application with an unusual extension

      • dap10_full.exe (PID: 2844)
      • GLBF702.tmp (PID: 1776)
    • Executable content was dropped or overwritten

      • GLBF702.tmp (PID: 1776)
      • dap10_full.exe (PID: 2844)
      • vcredist_x86.exe (PID: 1696)
      • DAP.exe (PID: 3684)
      • csc.exe (PID: 2780)
      • csc.exe (PID: 2756)
      • csc.exe (PID: 3920)
      • csc.exe (PID: 1824)
      • csc.exe (PID: 1596)
      • csc.exe (PID: 3696)
      • csc.exe (PID: 128)
      • csc.exe (PID: 332)
      • csc.exe (PID: 2832)
      • csc.exe (PID: 2152)
      • csc.exe (PID: 1768)
      • csc.exe (PID: 2108)
      • csc.exe (PID: 1956)
      • csc.exe (PID: 3956)
      • csc.exe (PID: 1696)
      • csc.exe (PID: 3396)
      • csc.exe (PID: 2244)
      • csc.exe (PID: 3344)
      • csc.exe (PID: 2860)
      • csc.exe (PID: 1900)
      • csc.exe (PID: 3612)
      • csc.exe (PID: 1544)
      • csc.exe (PID: 3284)
      • csc.exe (PID: 3888)
      • csc.exe (PID: 3460)
      • csc.exe (PID: 3696)
      • csc.exe (PID: 3828)
      • csc.exe (PID: 3116)
      • csc.exe (PID: 2388)
      • csc.exe (PID: 332)
      • csc.exe (PID: 2624)
      • csc.exe (PID: 2268)
      • csc.exe (PID: 2192)
    • Process drops legitimate windows executable

      • GLBF702.tmp (PID: 1776)
      • vcredist_x86.exe (PID: 1696)
    • Reads the Internet Settings

      • GLBF702.tmp (PID: 1776)
      • DAP.exe (PID: 3684)
      • DAP.exe (PID: 3232)
    • Reads security settings of Internet Explorer

      • GLBF702.tmp (PID: 1776)
      • DAP.exe (PID: 3684)
      • DAP.exe (PID: 3232)
    • Starts a Microsoft application from unusual location

      • vcredist_x86.exe (PID: 1696)
    • Changes Internet Explorer settings (feature browser emulation)

      • GLBF702.tmp (PID: 1776)
    • Creates/Modifies COM task schedule object

      • GLBF702.tmp (PID: 1776)
      • GLJF742.tmp (PID: 2960)
      • GLJF742.tmp (PID: 2440)
      • GLJF742.tmp (PID: 796)
      • DAP.exe (PID: 3684)
    • Searches for installed software

      • GLBF702.tmp (PID: 1776)
    • Creates a software uninstall entry

      • GLBF702.tmp (PID: 1776)
    • Reads the BIOS version

      • DAP.exe (PID: 3684)
      • DAP.exe (PID: 3232)
      • DAP.exe (PID: 1604)
      • DAP.exe (PID: 2656)
      • DAP.exe (PID: 4044)
      • DAP.exe (PID: 2780)
      • DAP.exe (PID: 1288)
      • DAP.exe (PID: 560)
      • DAP.exe (PID: 2572)
    • Detected use of alternative data streams (AltDS)

      • DAP.exe (PID: 3684)
      • DAP.exe (PID: 3232)
      • DAP.exe (PID: 1604)
      • DAP.exe (PID: 2656)
      • DAP.exe (PID: 4044)
      • DAP.exe (PID: 2780)
      • DAP.exe (PID: 1288)
      • DAP.exe (PID: 2572)
      • DAP.exe (PID: 560)
    • Reads Microsoft Outlook installation path

      • DAP.exe (PID: 3684)
      • DAP.exe (PID: 3232)
    • Changes the Home page of Internet Explorer

      • DAP.exe (PID: 3684)
    • Changes the title of the Internet Explorer window

      • DAP.exe (PID: 3684)
    • Reads Mozilla Firefox installation path

      • DAP.exe (PID: 3684)
      • DAP.exe (PID: 3232)
    • The process executes via Task Scheduler

      • DAP.exe (PID: 3232)
    • Reads Internet Explorer settings

      • DAP.exe (PID: 3684)
      • DAP.exe (PID: 3232)
    • Reads settings of System Certificates

      • DAP.exe (PID: 3232)
    • Checks Windows Trust Settings

      • DAP.exe (PID: 3232)
    • Uses .NET C# to load dll

      • DAP.exe (PID: 3232)
  • INFO

    • Checks supported languages

      • dap10_full.exe (PID: 2844)
      • GLBF702.tmp (PID: 1776)
      • vcredist_x86.exe (PID: 1696)
      • install.exe (PID: 2860)
      • GLJF742.tmp (PID: 2960)
      • GLJF742.tmp (PID: 2440)
      • GLJF742.tmp (PID: 796)
      • DAP.exe (PID: 3684)
      • unelevate.EXE (PID: 2808)
      • DAP.exe (PID: 3232)
      • csc.exe (PID: 2780)
      • cvtres.exe (PID: 1848)
      • csc.exe (PID: 2756)
      • cvtres.exe (PID: 1888)
      • csc.exe (PID: 3920)
      • cvtres.exe (PID: 3932)
      • csc.exe (PID: 1824)
      • csc.exe (PID: 1596)
      • cvtres.exe (PID: 3820)
      • csc.exe (PID: 3696)
      • cvtres.exe (PID: 3704)
      • csc.exe (PID: 128)
      • cvtres.exe (PID: 2020)
      • csc.exe (PID: 332)
      • cvtres.exe (PID: 1428)
      • csc.exe (PID: 1768)
      • csc.exe (PID: 2832)
      • cvtres.exe (PID: 2564)
      • cvtres.exe (PID: 2488)
      • cvtres.exe (PID: 1572)
      • cvtres.exe (PID: 1124)
      • csc.exe (PID: 2108)
      • DAP.exe (PID: 1604)
      • csc.exe (PID: 2152)
      • cvtres.exe (PID: 1020)
      • csc.exe (PID: 1956)
      • cvtres.exe (PID: 1820)
      • DAP.exe (PID: 2656)
      • cvtres.exe (PID: 2808)
      • csc.exe (PID: 1696)
      • cvtres.exe (PID: 1072)
      • csc.exe (PID: 3396)
      • csc.exe (PID: 3956)
      • DAP.exe (PID: 4044)
      • cvtres.exe (PID: 3700)
      • csc.exe (PID: 2860)
      • cvtres.exe (PID: 2788)
      • cvtres.exe (PID: 3000)
      • csc.exe (PID: 2244)
      • csc.exe (PID: 3344)
      • cvtres.exe (PID: 2040)
      • cvtres.exe (PID: 2756)
      • csc.exe (PID: 3612)
      • cvtres.exe (PID: 1220)
      • csc.exe (PID: 3284)
      • csc.exe (PID: 1900)
      • cvtres.exe (PID: 2724)
      • csc.exe (PID: 1544)
      • cvtres.exe (PID: 2304)
      • csc.exe (PID: 3460)
      • cvtres.exe (PID: 2996)
      • csc.exe (PID: 3888)
      • cvtres.exe (PID: 560)
      • csc.exe (PID: 3828)
      • cvtres.exe (PID: 3928)
      • csc.exe (PID: 3116)
      • cvtres.exe (PID: 2332)
      • csc.exe (PID: 3696)
      • cvtres.exe (PID: 2184)
      • csc.exe (PID: 2624)
      • cvtres.exe (PID: 2988)
      • csc.exe (PID: 2388)
      • cvtres.exe (PID: 2128)
      • cvtres.exe (PID: 664)
      • csc.exe (PID: 2192)
      • cvtres.exe (PID: 2024)
      • csc.exe (PID: 332)
      • cvtres.exe (PID: 1820)
      • DAP.exe (PID: 2572)
      • csc.exe (PID: 2268)
      • DAP.exe (PID: 560)
      • DAP.exe (PID: 1288)
      • DAP.exe (PID: 2780)
    • Create files in a temporary directory

      • dap10_full.exe (PID: 2844)
      • GLBF702.tmp (PID: 1776)
      • install.exe (PID: 2860)
      • DAP.exe (PID: 3684)
      • DAP.exe (PID: 3232)
      • cvtres.exe (PID: 1848)
      • cvtres.exe (PID: 1888)
      • cvtres.exe (PID: 3932)
      • cvtres.exe (PID: 3820)
      • cvtres.exe (PID: 3704)
      • cvtres.exe (PID: 2020)
      • cvtres.exe (PID: 1428)
      • cvtres.exe (PID: 2564)
      • cvtres.exe (PID: 1572)
      • cvtres.exe (PID: 1124)
      • cvtres.exe (PID: 2488)
      • cvtres.exe (PID: 1020)
      • cvtres.exe (PID: 1820)
      • cvtres.exe (PID: 2808)
      • cvtres.exe (PID: 1072)
      • cvtres.exe (PID: 3700)
      • cvtres.exe (PID: 3000)
      • cvtres.exe (PID: 2040)
      • cvtres.exe (PID: 2788)
      • cvtres.exe (PID: 2756)
      • cvtres.exe (PID: 1220)
      • cvtres.exe (PID: 2304)
      • cvtres.exe (PID: 2996)
      • cvtres.exe (PID: 2724)
      • cvtres.exe (PID: 560)
      • cvtres.exe (PID: 3928)
      • cvtres.exe (PID: 2184)
      • cvtres.exe (PID: 2332)
      • cvtres.exe (PID: 2128)
      • cvtres.exe (PID: 2988)
      • cvtres.exe (PID: 664)
      • cvtres.exe (PID: 2024)
      • cvtres.exe (PID: 1820)
    • Reads the computer name

      • GLBF702.tmp (PID: 1776)
      • vcredist_x86.exe (PID: 1696)
      • install.exe (PID: 2860)
      • DAP.exe (PID: 3684)
      • unelevate.EXE (PID: 2808)
      • DAP.exe (PID: 3232)
      • DAP.exe (PID: 1604)
      • DAP.exe (PID: 2656)
      • DAP.exe (PID: 4044)
      • DAP.exe (PID: 2572)
      • DAP.exe (PID: 1288)
      • DAP.exe (PID: 560)
      • DAP.exe (PID: 2780)
    • Checks proxy server information

      • GLBF702.tmp (PID: 1776)
      • DAP.exe (PID: 3684)
      • DAP.exe (PID: 3232)
    • Reads the machine GUID from the registry

      • GLBF702.tmp (PID: 1776)
      • vcredist_x86.exe (PID: 1696)
      • install.exe (PID: 2860)
      • DAP.exe (PID: 3684)
      • DAP.exe (PID: 3232)
      • csc.exe (PID: 2780)
      • cvtres.exe (PID: 1848)
      • csc.exe (PID: 2756)
      • cvtres.exe (PID: 1888)
      • csc.exe (PID: 3920)
      • cvtres.exe (PID: 3932)
      • csc.exe (PID: 1824)
      • csc.exe (PID: 1596)
      • csc.exe (PID: 3696)
      • cvtres.exe (PID: 3820)
      • cvtres.exe (PID: 3704)
      • csc.exe (PID: 128)
      • cvtres.exe (PID: 2020)
      • csc.exe (PID: 332)
      • cvtres.exe (PID: 1428)
      • csc.exe (PID: 2832)
      • cvtres.exe (PID: 2564)
      • csc.exe (PID: 1768)
      • cvtres.exe (PID: 2488)
      • cvtres.exe (PID: 1572)
      • csc.exe (PID: 2152)
      • cvtres.exe (PID: 1124)
      • csc.exe (PID: 2108)
      • DAP.exe (PID: 1604)
      • csc.exe (PID: 1956)
      • cvtres.exe (PID: 1820)
      • DAP.exe (PID: 2656)
      • cvtres.exe (PID: 2808)
      • csc.exe (PID: 1696)
      • cvtres.exe (PID: 1072)
      • csc.exe (PID: 3396)
      • csc.exe (PID: 3956)
      • cvtres.exe (PID: 3700)
      • DAP.exe (PID: 4044)
      • csc.exe (PID: 2860)
      • cvtres.exe (PID: 2788)
      • cvtres.exe (PID: 3000)
      • csc.exe (PID: 2244)
      • csc.exe (PID: 3344)
      • cvtres.exe (PID: 2040)
      • csc.exe (PID: 3612)
      • cvtres.exe (PID: 1220)
      • csc.exe (PID: 3284)
      • csc.exe (PID: 1900)
      • cvtres.exe (PID: 2756)
      • csc.exe (PID: 1544)
      • cvtres.exe (PID: 2304)
      • cvtres.exe (PID: 2996)
      • csc.exe (PID: 3460)
      • cvtres.exe (PID: 2724)
      • csc.exe (PID: 3888)
      • cvtres.exe (PID: 560)
      • csc.exe (PID: 3828)
      • cvtres.exe (PID: 3928)
      • cvtres.exe (PID: 1020)
      • csc.exe (PID: 3116)
      • cvtres.exe (PID: 2184)
      • csc.exe (PID: 3696)
      • cvtres.exe (PID: 2332)
      • csc.exe (PID: 2388)
      • cvtres.exe (PID: 2128)
      • csc.exe (PID: 2624)
      • cvtres.exe (PID: 2988)
      • cvtres.exe (PID: 664)
      • csc.exe (PID: 2192)
      • cvtres.exe (PID: 2024)
      • csc.exe (PID: 332)
      • cvtres.exe (PID: 1820)
      • DAP.exe (PID: 2572)
      • csc.exe (PID: 2268)
      • DAP.exe (PID: 1288)
      • DAP.exe (PID: 560)
      • DAP.exe (PID: 2780)
    • Creates files in the program directory

      • GLBF702.tmp (PID: 1776)
      • DAP.exe (PID: 3684)
      • DAP.exe (PID: 3232)
      • csc.exe (PID: 2780)
      • csc.exe (PID: 2756)
      • csc.exe (PID: 3920)
      • csc.exe (PID: 1596)
      • csc.exe (PID: 1824)
      • csc.exe (PID: 128)
      • csc.exe (PID: 332)
      • csc.exe (PID: 3696)
      • csc.exe (PID: 2832)
      • csc.exe (PID: 1768)
      • csc.exe (PID: 2152)
      • csc.exe (PID: 2108)
      • csc.exe (PID: 1956)
      • csc.exe (PID: 3956)
      • csc.exe (PID: 1696)
      • csc.exe (PID: 2860)
      • csc.exe (PID: 3396)
      • csc.exe (PID: 2244)
      • csc.exe (PID: 3344)
      • csc.exe (PID: 1900)
      • csc.exe (PID: 3612)
      • csc.exe (PID: 3284)
      • csc.exe (PID: 1544)
      • csc.exe (PID: 3460)
      • csc.exe (PID: 3828)
      • csc.exe (PID: 3888)
      • csc.exe (PID: 3696)
      • csc.exe (PID: 3116)
      • csc.exe (PID: 2624)
      • csc.exe (PID: 2388)
      • csc.exe (PID: 2192)
      • csc.exe (PID: 332)
      • csc.exe (PID: 2268)
    • Creates files or folders in the user directory

      • DAP.exe (PID: 3684)
      • DAP.exe (PID: 3232)
    • Application launched itself

      • msedge.exe (PID: 3504)
      • msedge.exe (PID: 3808)
    • Manual execution by a user

      • msedge.exe (PID: 3808)
      • DAP.exe (PID: 1604)
      • DAP.exe (PID: 2656)
      • DAP.exe (PID: 4044)
      • DAP.exe (PID: 2572)
      • DAP.exe (PID: 2780)
      • DAP.exe (PID: 1288)
      • DAP.exe (PID: 560)
    • Reads the software policy settings

      • DAP.exe (PID: 3232)
    • Reads Environment values

      • vcredist_x86.exe (PID: 1696)
      • DAP.exe (PID: 3232)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Wise Installer executable (91.7)
.exe | Win64 Executable (generic) (5.3)
.dll | Win32 Dynamic Link Library (generic) (1.2)
.exe | Win32 Executable (generic) (0.8)
.exe | Generic Win/DOS Executable (0.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1999:04:08 20:24:47+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 512
InitializedDataSize: 10810368
UninitializedDataSize: -
EntryPoint: 0x1000
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 10060.4455.0.0
ProductVersionNumber: 10060.4455.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows 16-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: SpeedBit Ltd.
FileDescription: DAP 10
FileVersion: 10060 (Build 259
LegalCopyright: speedbit
XXXXXXXXXXXXXXXXXXXXXXXXXXXX: -
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
196
Monitored processes
109
Malicious processes
12
Suspicious processes
33

Behavior graph

Click at the process to see the details
start dap10_full.exe glbf702.tmp vcredist_x86.exe install.exe no specs gljf742.tmp no specs gljf742.tmp no specs gljf742.tmp no specs dap.exe unelevate.exe no specs msedge.exe no specs msedge.exe no specs dap.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs csc.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe dap.exe cvtres.exe no specs csc.exe cvtres.exe no specs dap.exe csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe dap.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs csc.exe msedge.exe no specs cvtres.exe no specs msedge.exe no specs csc.exe cvtres.exe no specs csc.exe cvtres.exe no specs msedge.exe no specs msedge.exe no specs dap.exe dap.exe dap.exe msedge.exe no specs msedge.exe no specs dap.exe PhotoViewer.dll no specs dap10_full.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
128"C:\Windows\Microsoft.NET\Framework\v3.5\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\su7rdhf2.cmdline"C:\Windows\Microsoft.NET\Framework\v3.5\csc.exe
DAP.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
3.5.30729.5420 built by: Win7SP1
Modules
Images
c:\windows\microsoft.net\framework\v3.5\csc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\system32\ole32.dll
332"C:\Windows\Microsoft.NET\Framework\v3.5\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\duw-964t.cmdline"C:\Windows\Microsoft.NET\Framework\v3.5\csc.exe
DAP.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
3.5.30729.5420 built by: Win7SP1
Modules
Images
c:\windows\microsoft.net\framework\v3.5\csc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\system32\ole32.dll
332"C:\Windows\Microsoft.NET\Framework\v3.5\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\9tuuh7on.cmdline"C:\Windows\Microsoft.NET\Framework\v3.5\csc.exe
DAP.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Visual C# Command Line Compiler
Exit code:
0
Version:
3.5.30729.5420 built by: Win7SP1
Modules
Images
c:\windows\microsoft.net\framework\v3.5\csc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\system32\ole32.dll
560C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESE631.tmp" "c:\ProgramData\SpeedBit\DAP\Plugins\189AE673-13C1-4133-A470-8C4DDD1ACB8C\1.0.1.3_0\CSCE5F1.tmp"C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
8.00.50727.5003 (Win7SP1GDR.050727-5400)
Modules
Images
c:\windows\microsoft.net\framework\v2.0.50727\cvtres.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.4940_none_d08cc06a442b34fc\msvcr80.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cryptsp.dll
560"C:\Program Files\DAP\DAP.exe" C:\Program Files\DAP\DAP.exe
explorer.exe
User:
admin
Company:
Speedbit Ltd.
Integrity Level:
MEDIUM
Description:
Download Accelerator Plus (DAP)
Exit code:
1
Version:
10.0.6.0
Modules
Images
c:\program files\dap\dap.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
664C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESF256.tmp" "c:\ProgramData\SpeedBit\DAP\Plugins\189AE673-13C1-4133-A470-8C4DDD1ACB8C\1.0.1.3_0\CSCF217.tmp"C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
8.00.50727.5003 (Win7SP1GDR.050727-5400)
Modules
Images
c:\windows\microsoft.net\framework\v2.0.50727\cvtres.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.4940_none_d08cc06a442b34fc\msvcr80.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cryptsp.dll
796"C:\Users\admin\AppData\Local\Temp\GLJF742.tmp" C:\Windows\System32\AniGIF.ocxC:\Users\admin\AppData\Local\Temp\GLJF742.tmpGLBF702.tmp
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\gljf742.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\aclayers.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
1020C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESCC7F.tmp" "c:\ProgramData\SpeedBit\DAP\Plugins\189AE673-13C1-4133-A470-8C4DDD1ACB8C\1.0.1.3_0\CSCCC10.tmp"C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
8.00.50727.5003 (Win7SP1GDR.050727-5400)
Modules
Images
c:\windows\microsoft.net\framework\v2.0.50727\cvtres.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.4940_none_d08cc06a442b34fc\msvcr80.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cryptsp.dll
1072C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESD180.tmp" "c:\ProgramData\SpeedBit\DAP\Plugins\189AE673-13C1-4133-A470-8C4DDD1ACB8C\1.0.1.3_0\CSCD111.tmp"C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
8.00.50727.5003 (Win7SP1GDR.050727-5400)
Modules
Images
c:\windows\microsoft.net\framework\v2.0.50727\cvtres.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.4940_none_d08cc06a442b34fc\msvcr80.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cryptsp.dll
1124C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RESCA5C.tmp" "c:\ProgramData\SpeedBit\DAP\Plugins\189AE673-13C1-4133-A470-8C4DDD1ACB8C\1.0.1.3_0\CSCC6D0.tmp"C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.execsc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft® Resource File To COFF Object Conversion Utility
Exit code:
0
Version:
8.00.50727.5003 (Win7SP1GDR.050727-5400)
Modules
Images
c:\windows\microsoft.net\framework\v2.0.50727\cvtres.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.4940_none_d08cc06a442b34fc\msvcr80.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cryptsp.dll
Total events
34 123
Read events
31 896
Write events
2 143
Delete events
84

Modification events

(PID) Process:(1776) GLBF702.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Operation:delete valueName:DAP10
Value:
(PID) Process:(1776) GLBF702.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(1776) GLBF702.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyServer
Value:
(PID) Process:(1776) GLBF702.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyOverride
Value:
(PID) Process:(1776) GLBF702.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoConfigURL
Value:
(PID) Process:(1776) GLBF702.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoDetect
Value:
(PID) Process:(1776) GLBF702.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
460000005C010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1776) GLBF702.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1776) GLBF702.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1776) GLBF702.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
159
Suspicious files
195
Text files
525
Unknown types
85

Dropped files

PID
Process
Filename
Type
1776GLBF702.tmpC:\Users\admin\AppData\Local\Temp\DAPINST\~GLH0005.TMP
MD5:
SHA256:
1776GLBF702.tmpC:\Users\admin\AppData\Local\Temp\DAPINST\DapLang.cab
MD5:
SHA256:
1776GLBF702.tmpC:\Users\admin\AppData\Local\Temp\GLFFF45.tmpexecutable
MD5:3B2E23D259394C701050486E642D14FA
SHA256:166D7156142F3EE09FA69EB617DD22E4FD248AA80A1AC08767DB6AD99A2705C1
1776GLBF702.tmpC:\Users\admin\AppData\Local\Temp\~GLH0001.TMPhtml
MD5:6A87B7A399327F4BCFF0572C96213C41
SHA256:7DB7B0B22A32D8A6EAF04970C8D1E5F2A9CBF9FEDAFE2C5CB00D09B79BCCA9B8
1776GLBF702.tmpC:\Users\admin\AppData\Local\Temp\GLJF742.tmpexecutable
MD5:6F608D264503796BEBD7CD66B687BE92
SHA256:49833D2820AFB1D7409DFBD916480F2CDF5787D2E2D94166725BEB9064922D5D
1776GLBF702.tmpC:\Users\admin\AppData\Local\Temp\GLMFB4B.tmpexecutable
MD5:484CB68472473A1A84FF07996BB8C1F6
SHA256:15BB390AF019D92E1D02771B02335FA360DB1BB34BCF4F0C72705027428F4FF1
1776GLBF702.tmpC:\Users\admin\AppData\Local\Temp\GLCF731.tmpexecutable
MD5:8C97D8BB1470C6498E47B12C5A03CE39
SHA256:A87F19F9FEE475D2B2E82ACFB4589BE6D816B613064CD06826E1D4C147BEB50A
1776GLBF702.tmpC:\Users\admin\AppData\Local\Temp\~GLH0000.TMPexecutable
MD5:3B2E23D259394C701050486E642D14FA
SHA256:166D7156142F3EE09FA69EB617DD22E4FD248AA80A1AC08767DB6AD99A2705C1
1776GLBF702.tmpC:\Users\admin\AppData\Local\Temp\GLKF946.tmpexecutable
MD5:9839938C16AF50B43B78B073F447A1D6
SHA256:5A0BEBB30C025B020C0FECB56B6D5C298235DFED1BD887E64237BD0CFCC3DC8B
1776GLBF702.tmpC:\Users\admin\AppData\Local\Temp\DAPINST\DAP.exeexecutable
MD5:29157E7FCBE92662DA8CC389C5FAF8EE
SHA256:8D8A2099B3D295B6C784C7BF7E7093341615E20A5F61478060CFCD73EB6CA9D2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
40
DNS requests
26
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1776
GLBF702.tmp
GET
200
173.239.4.35:80
http://stub.speedbit.com/p.aspx?e=/9ZmISdorEtde4FcBjAa0KamUw0o8OGNLUMNINn3bfXtNQqpF/SBTguiJVZAAvOypqUgV2pBp/DubYXFLcRRvxnzKW1HDIvRTPnfxsC1sLOOPx8smASgOBInS1jzS5Zd
unknown
unknown
1776
GLBF702.tmp
GET
200
173.239.4.35:80
http://stub.speedbit.com/p.aspx?e=N6dOqWm8Q95QKVDNhYrVZ55IqVYgXfBJ4XLIs55rVmXw5kzsCdcwEil0KR7+wQEAXw4PLh17YOgFj1J4iNn3pf/xnj2M+81rebpSlsRkhCxMB7SVxwb0S45MWp8MfmX99JgsGI2WhWE=
unknown
unknown
3232
DAP.exe
GET
404
208.91.196.152:80
http://shareflare.net/favicon.ico
unknown
text
10 b
unknown
3232
DAP.exe
GET
301
142.250.187.110:80
http://www.youtube.com/favicon.ico
unknown
html
232 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
1776
GLBF702.tmp
173.239.4.35:80
stub.speedbit.com
WEBAIR-INTERNET
US
unknown
3684
DAP.exe
173.239.4.82:80
client.speedbit.com
WEBAIR-INTERNET
US
unknown
3684
DAP.exe
173.239.4.63:80
www.speedbit.com
WEBAIR-INTERNET
US
unknown
3808
msedge.exe
239.255.255.250:1900
unknown
3432
msedge.exe
173.239.4.63:80
www.speedbit.com
WEBAIR-INTERNET
US
unknown
3432
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
3432
msedge.exe
204.79.197.239:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown

DNS requests

Domain
IP
Reputation
stub.speedbit.com
  • 173.239.4.35
unknown
client.speedbit.com
  • 173.239.4.82
unknown
dns.msftncsi.com
  • 131.107.255.255
shared
pix.speedbit.com
  • 173.239.4.82
unknown
update.speedbit.com
  • 173.239.4.82
unknown
www.speedbit.com
  • 173.239.4.63
malicious
config.edge.skype.com
  • 13.107.42.16
whitelisted
edge.microsoft.com
  • 204.79.197.239
  • 13.107.21.239
whitelisted
newuser.speedbit.com
  • 173.239.4.82
unknown
online.speedbit.com
  • 173.239.4.56
unknown

Threats

PID
Process
Class
Message
1776
GLBF702.tmp
Misc activity
ET POLICY Wise Solutions Install Reporting via HTTP - User Agent (Wise)
1776
GLBF702.tmp
Misc activity
ET POLICY Wise Solutions Install Reporting via HTTP - User Agent (Wise)
Process
Message
DAP.exe
%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s
DAP.exe
%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s
DAP.exe
[SbTracer::UpdateAllParameters]
DAP.exe
[SbTracer::ReadConfiguration] Trace Level: 3
DAP.exe
[SbTracer::ReadConfiguration] ___Warning - No Trace Destination
DAP.exe
[SbTracer::ReadConfiguration] ___Warning - No Trace Backup
DAP.exe
[SbTracer::ReadConfiguration] ___Warning - No Trace Time Limit
DAP.exe
[SbTracer::ReadConfiguration] ___Warning - No Trace Time Stamp
DAP.exe
[SbTracer::ReadConfiguration] Trace Max Size: 3
DAP.exe
[SbTracer::ReadConfiguration] Done