URL:

https://get.vdownloader.com/VDownloaderSetup.exe

Full analysis: https://app.any.run/tasks/1919448f-0cee-4314-837f-db602726cc79
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: January 22, 2020, 00:08:56
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
adware
Indicators:
MD5:

FDB85706ABBB001A7B418C27A6717FFB

SHA1:

EFC01A1F264E98AFF3E710DECBAFC2B06B49B988

SHA256:

43DAA09648107BE50A58B71BC41BD8541C34DC291B7AD23CC3506D105C4B9330

SSDEEP:

3:N8hXKS9KdXyKDhFt2X2QA:2hzxosA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Downloads executable files from the Internet

      • chrome.exe (PID: 324)
    • Application was dropped or rewritten from another process

      • Vdownloader.exe (PID: 656)
      • Vdownloader.exe (PID: 3532)
      • VDownloader4.exe (PID: 2748)
    • Loads dropped or rewritten executable

      • Vdownloader.exe (PID: 656)
      • VDownloader4.exe (PID: 2748)
    • Changes settings of System certificates

      • VDownloader4.exe (PID: 2748)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • chrome.exe (PID: 1316)
      • chrome.exe (PID: 324)
      • 6ED506B1_stp.exe (PID: 2276)
      • Vdownloader.exe (PID: 656)
      • 6ED506B1_stp.tmp (PID: 2988)
    • Application launched itself

      • Vdownloader.exe (PID: 3532)
    • Cleans NTFS data-stream (Zone Identifier)

      • Vdownloader.exe (PID: 3532)
    • Modifies files in Chrome extension folder

      • chrome.exe (PID: 1316)
    • Reads internet explorer settings

      • Vdownloader.exe (PID: 656)
      • VDownloader4.exe (PID: 2748)
    • Reads Environment values

      • Vdownloader.exe (PID: 656)
      • VDownloader4.exe (PID: 2748)
    • Creates files in the program directory

      • Vdownloader.exe (PID: 656)
    • Reads Windows owner or organization settings

      • 6ED506B1_stp.tmp (PID: 2988)
    • Reads the Windows organization settings

      • 6ED506B1_stp.tmp (PID: 2988)
    • Reads the machine GUID from the registry

      • 6ED506B1_stp.tmp (PID: 2988)
    • Starts Internet Explorer

      • 6ED506B1_stp.tmp (PID: 2988)
    • Reads Internet Cache Settings

      • VDownloader4.exe (PID: 2748)
    • Changes IE settings (feature browser emulation)

      • VDownloader4.exe (PID: 2748)
    • Creates files in the user directory

      • VDownloader4.exe (PID: 2748)
    • Adds / modifies Windows certificates

      • VDownloader4.exe (PID: 2748)
  • INFO

    • Reads the hosts file

      • chrome.exe (PID: 1316)
      • chrome.exe (PID: 324)
    • Application launched itself

      • chrome.exe (PID: 1316)
      • iexplore.exe (PID: 2064)
    • Reads Internet Cache Settings

      • chrome.exe (PID: 1316)
      • iexplore.exe (PID: 1880)
    • Changes settings of System certificates

      • chrome.exe (PID: 1316)
      • iexplore.exe (PID: 1880)
    • Loads dropped or rewritten executable

      • 6ED506B1_stp.tmp (PID: 2988)
    • Dropped object may contain Bitcoin addresses

      • 6ED506B1_stp.tmp (PID: 2988)
    • Application was dropped or rewritten from another process

      • 6ED506B1_stp.tmp (PID: 2988)
    • Creates a software uninstall entry

      • 6ED506B1_stp.tmp (PID: 2988)
    • Creates files in the user directory

      • iexplore.exe (PID: 1880)
    • Changes internet zones settings

      • iexplore.exe (PID: 2064)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 1880)
    • Reads internet explorer settings

      • iexplore.exe (PID: 1880)
    • Reads settings of System Certificates

      • VDownloader4.exe (PID: 2748)
    • Creates files in the program directory

      • 6ED506B1_stp.tmp (PID: 2988)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
80
Monitored processes
40
Malicious processes
5
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start start drop and start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs vdownloader.exe no specs vdownloader.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs 6ed506b1_stp.exe 6ed506b1_stp.tmp iexplore.exe iexplore.exe vdownloader4.exe

Process information

PID
CMD
Path
Indicators
Parent process
324"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1008,2509628414452987284,11536804123351075905,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=16623071589508666461 --mojo-platform-channel-handle=1636 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
656"C:\Users\admin\Downloads\Vdownloader.exe" /RSF /ppn:YHhybg0dXAt1eGqREw /ads:1 /mnlC:\Users\admin\Downloads\Vdownloader.exe
Vdownloader.exe
User:
admin
Company:
Integrity Level:
HIGH
Description:
Cokabi Setup
Exit code:
0
Version:
2.8.3.6
Modules
Images
c:\users\admin\downloads\vdownloader.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
688"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1008,2509628414452987284,11536804123351075905,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=14754932212292180512 --mojo-platform-channel-handle=4620 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
944"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1008,2509628414452987284,11536804123351075905,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=17481070460978646730 --mojo-platform-channel-handle=4316 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
956"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1008,2509628414452987284,11536804123351075905,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=17586354902633048421 --mojo-platform-channel-handle=4984 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1024"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1008,2509628414452987284,11536804123351075905,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=11364345853063609732 --mojo-platform-channel-handle=1336 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1212"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1008,2509628414452987284,11536804123351075905,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=16074577027772898591 --mojo-platform-channel-handle=1988 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\windows\system32\iertutil.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\clbcatq.dll
c:\users\admin\downloads\vdownloader.exe
c:\windows\system32\wldap32.dll
c:\windows\system32\gpapi.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\imagehlp.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\cryptbase.dll
1216"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1008,2509628414452987284,11536804123351075905,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=2822378638984626554 --mojo-platform-channel-handle=4800 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1316"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://get.vdownloader.com/VDownloaderSetup.exe"C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1636"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1008,2509628414452987284,11536804123351075905,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=2004834671372022939 --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4556 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
Total events
2 810
Read events
2 447
Write events
349
Delete events
14

Modification events

(PID) Process:(1316) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(1316) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(1316) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(1316) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(1316) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(2600) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:writeName:1316-13224125351206375
Value:
259
(PID) Process:(1316) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(1316) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(1316) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:delete valueName:1512-13197841398593750
Value:
0
(PID) Process:(1316) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
Executable files
98
Suspicious files
77
Text files
516
Unknown types
33

Dropped files

PID
Process
Filename
Type
1316chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.old
MD5:
SHA256:
1316chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\95ed2809-6162-45c1-b950-db45e7d48c13.tmp
MD5:
SHA256:
1316chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000020.dbtmp
MD5:
SHA256:
1316chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.oldtext
MD5:
SHA256:
1316chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old
MD5:
SHA256:
1316chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RF39a8dd.TMPtext
MD5:
SHA256:
1316chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase\LOG.oldtext
MD5:
SHA256:
1316chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\ShaderCache\GPUCache\data_1
MD5:
SHA256:
1316chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB\LOG.oldtext
MD5:
SHA256:
1316chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old~RF39a8dd.TMPtext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
44
TCP/UDP connections
116
DNS requests
61
Threats
8

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
656
Vdownloader.exe
HEAD
200
95.211.184.67:80
http://ww42.netaven-sudi.com/ofr/Solululadul/icut_v2_2
NL
malicious
324
chrome.exe
GET
302
52.39.41.112:80
http://vdownloadermediafiles.com/vfile_dnld?dl=1
US
text
118 b
unknown
324
chrome.exe
GET
200
13.35.254.221:80
http://d2kr4di03r9efc.cloudfront.net/gq0kzi%3Elaga4d/Vdownloader.exe
US
executable
3.92 Mb
malicious
1316
chrome.exe
GET
200
91.199.212.52:80
http://crt.usertrust.com/USERTrustRSAAddTrustCA.crt
GB
der
1.37 Kb
whitelisted
324
chrome.exe
GET
302
52.39.41.112:80
http://vdownloadermediafiles.com/vfile_dnld?dl=1
US
text
118 b
unknown
656
Vdownloader.exe
POST
200
52.51.217.55:80
http://vpn.netaven-sudi.com/
IE
malicious
324
chrome.exe
GET
200
13.35.254.221:80
http://d2kr4di03r9efc.cloudfront.net/58tmr1a%3C91zk2/Vdownloader.exe
US
executable
3.92 Mb
malicious
656
Vdownloader.exe
GET
200
192.96.201.162:80
http://app.netaven-sudi.com/img/Sibarasawi/logo_comp.png
US
image
12.4 Kb
malicious
656
Vdownloader.exe
GET
200
192.96.201.162:80
http://app.netaven-sudi.com/img/Sibarasawi/bg_comp.png
US
image
25.2 Kb
malicious
656
Vdownloader.exe
HEAD
200
192.96.201.162:80
http://app.netaven-sudi.com/ofr/Niniwic/YL/Niniwic_Tefenece_12Apr16
US
image
12.4 Kb
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
324
chrome.exe
216.58.205.227:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
324
chrome.exe
104.26.5.31:443
get.vdownloader.com
Cloudflare Inc
US
unknown
324
chrome.exe
172.217.16.173:443
accounts.google.com
Google Inc.
US
whitelisted
324
chrome.exe
52.39.41.112:80
vdownloadermediafiles.com
Amazon.com, Inc.
US
unknown
324
chrome.exe
13.35.254.221:80
d2kr4di03r9efc.cloudfront.net
US
suspicious
324
chrome.exe
216.58.207.78:443
sb-ssl.google.com
Google Inc.
US
whitelisted
324
chrome.exe
172.217.18.164:443
www.google.com
Google Inc.
US
whitelisted
324
chrome.exe
172.217.16.131:443
ssl.gstatic.com
Google Inc.
US
whitelisted
1316
chrome.exe
91.199.212.52:80
crt.usertrust.com
Comodo CA Ltd
GB
suspicious
656
Vdownloader.exe
52.51.217.55:80
vpn.netaven-sudi.com
Amazon.com, Inc.
IE
malicious

DNS requests

Domain
IP
Reputation
clientservices.googleapis.com
  • 216.58.205.227
whitelisted
get.vdownloader.com
  • 104.26.5.31
  • 104.26.4.31
unknown
accounts.google.com
  • 172.217.16.173
shared
vdownloadermediafiles.com
  • 52.39.41.112
  • 34.217.202.115
unknown
d2kr4di03r9efc.cloudfront.net
  • 13.35.254.221
  • 13.35.254.6
  • 13.35.254.128
  • 13.35.254.181
malicious
sb-ssl.google.com
  • 216.58.207.78
whitelisted
www.google.com
  • 172.217.18.164
malicious
ssl.gstatic.com
  • 172.217.16.131
whitelisted
crt.usertrust.com
  • 91.199.212.52
whitelisted
vpn.netaven-sudi.com
  • 52.51.217.55
  • 52.214.40.70
malicious

Threats

PID
Process
Class
Message
324
chrome.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
324
chrome.exe
Misc activity
ET INFO EXE - Served Attached HTTP
656
Vdownloader.exe
Misc activity
ADWARE [PTsecurity] InstallCore
656
Vdownloader.exe
Misc activity
ADWARE [PTsecurity] InstallCore
656
Vdownloader.exe
Misc activity
ADWARE [PTsecurity] InstallCore
656
Vdownloader.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
656
Vdownloader.exe
Misc activity
ADWARE [PTsecurity] InstallCore
656
Vdownloader.exe
Misc activity
ADWARE [PTsecurity] InstallCore
Process
Message
VDownloader4.exe
Native library pre-loader is trying to load native SQLite library "C:\Program Files\VDownloader\x86\SQLite.Interop.dll"...