File name:

48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe

Full analysis: https://app.any.run/tasks/d8e798f1-267d-412b-bb65-81c6aa2c815d
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: July 19, 2024, 15:08:00
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
adware
innosetup
loader
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

3CB0739401D24B6BC0C65E337E15C104

SHA1:

AEFCA0E1D01E9FFECD8CC2A0C9DC495D6F5FE9D8

SHA256:

48053935A1B62D13F2A1301D42A3BE930BB4718E8476C32B5050512209FDB3BB

SSDEEP:

98304:a+QqZ8fQJ1kKEW6v7SoSLerx5uO4QBAOOVm2Jah5nn+oFkPlcCvPrEMv0T9WQQ11:VydlGoq

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe (PID: 2116)
      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe (PID: 5400)
      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp (PID: 6980)
      • BitComet_2.08a_setup.exe (PID: 3892)
    • Scans artifacts that could help determine the target

      • BitComet_stats.exe (PID: 6256)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe (PID: 2116)
      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe (PID: 5400)
      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp (PID: 6980)
      • BitComet_2.08a_setup.exe (PID: 3892)
    • Reads security settings of Internet Explorer

      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp (PID: 7316)
      • BitComet_2.08a_setup.exe (PID: 3892)
      • BitComet_stats.exe (PID: 6256)
      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp (PID: 6980)
    • Reads the date of Windows installation

      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp (PID: 7316)
      • BitComet_2.08a_setup.exe (PID: 3892)
      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp (PID: 6980)
    • Reads the Windows owner or organization settings

      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp (PID: 6980)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • BitComet_2.08a_setup.exe (PID: 3892)
    • Process drops legitimate windows executable

      • BitComet_2.08a_setup.exe (PID: 3892)
    • Creates or modifies Windows services

      • BitCometService.exe (PID: 5984)
    • Checks Windows Trust Settings

      • BitComet_stats.exe (PID: 6256)
    • Reads Microsoft Outlook installation path

      • BitComet_stats.exe (PID: 6256)
    • Creates/Modifies COM task schedule object

      • BitComet_2.08a_setup.exe (PID: 3892)
    • The process creates files with name similar to system file names

      • BitComet_2.08a_setup.exe (PID: 3892)
  • INFO

    • Checks supported languages

      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe (PID: 2116)
      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp (PID: 7316)
      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe (PID: 5400)
      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp (PID: 6980)
      • BitComet_2.08a_setup.exe (PID: 3892)
      • BitComet_stats.exe (PID: 6256)
      • BitCometService.exe (PID: 5984)
      • prod0.exe (PID: 8044)
    • Create files in a temporary directory

      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe (PID: 2116)
      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe (PID: 5400)
      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp (PID: 6980)
      • BitComet_2.08a_setup.exe (PID: 3892)
      • prod0.exe (PID: 8044)
    • Reads the computer name

      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp (PID: 7316)
      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp (PID: 6980)
      • BitCometService.exe (PID: 5984)
      • BitComet_stats.exe (PID: 6256)
      • BitComet_2.08a_setup.exe (PID: 3892)
      • prod0.exe (PID: 8044)
    • Process checks computer location settings

      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp (PID: 7316)
      • BitComet_2.08a_setup.exe (PID: 3892)
      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp (PID: 6980)
    • Reads the software policy settings

      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp (PID: 6980)
      • slui.exe (PID: 6364)
      • BitComet_stats.exe (PID: 6256)
      • prod0.exe (PID: 8044)
    • Reads the machine GUID from the registry

      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp (PID: 6980)
      • BitComet_stats.exe (PID: 6256)
      • prod0.exe (PID: 8044)
    • Checks proxy server information

      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp (PID: 6980)
      • slui.exe (PID: 6364)
      • BitComet_stats.exe (PID: 6256)
      • prod0.exe (PID: 8044)
    • Creates files in the program directory

      • BitComet_2.08a_setup.exe (PID: 3892)
    • Creates files or folders in the user directory

      • BitComet_2.08a_setup.exe (PID: 3892)
    • Creates a software uninstall entry

      • BitComet_2.08a_setup.exe (PID: 3892)
    • Reads Environment values

      • prod0.exe (PID: 8044)
    • Disables trace logs

      • prod0.exe (PID: 8044)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (67.7)
.exe | Win32 EXE PECompact compressed (generic) (25.6)
.exe | Win32 Executable (generic) (2.7)
.exe | Win16/32 Executable Delphi generic (1.2)
.exe | Generic Win/DOS Executable (1.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2020:11:15 09:48:30+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 741376
InitializedDataSize: 135680
UninitializedDataSize: -
EntryPoint: 0xb5eec
OSVersion: 6.1
ImageVersion: 6
SubsystemVersion: 6.1
Subsystem: Windows GUI
FileVersionNumber: 2.0.8.7
ProductVersionNumber: 2.0.8.7
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription: BitComet Installer
FileVersion: 2.0.8.7
LegalCopyright: © BitComet
OriginalFileName:
ProductName: BitComet
ProductVersion: 2.0.8.7
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
147
Monitored processes
9
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp no specs 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp slui.exe bitcomet_2.08a_setup.exe bitcometservice.exe no specs bitcomet_stats.exe prod0.exe

Process information

PID
CMD
Path
Indicators
Parent process
2116"C:\Users\admin\Desktop\48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe" C:\Users\admin\Desktop\48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe
explorer.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
BitComet Installer
Version:
2.0.8.7
Modules
Images
c:\users\admin\desktop\48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
3892"C:\Users\admin\AppData\Local\Temp\is-1DK3T.tmp\BitComet_2.08a_setup.exe" /SC:\Users\admin\AppData\Local\Temp\is-1DK3T.tmp\BitComet_2.08a_setup.exe
48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp
User:
admin
Integrity Level:
HIGH
Description:
BitComet Full Installer
Exit code:
0
Version:
2.08.07.02
Modules
Images
c:\users\admin\appdata\local\temp\is-1dk3t.tmp\bitcomet_2.08a_setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
5400"C:\Users\admin\Desktop\48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe" /SPAWNWND=$30280 /NOTIFYWND=$60262 C:\Users\admin\Desktop\48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe
48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp
User:
admin
Company:
Integrity Level:
HIGH
Description:
BitComet Installer
Version:
2.0.8.7
Modules
Images
c:\users\admin\desktop\48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
5984"C:\Program Files\BitComet\tools\BitCometService.exe" /regC:\Program Files\BitComet\tools\BitCometService.exeBitComet_2.08a_setup.exe
User:
admin
Company:
www.BitComet.com
Integrity Level:
HIGH
Description:
BitComet disk boost service
Exit code:
0
Version:
1.83
Modules
Images
c:\program files\bitcomet\tools\bitcometservice.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6256"C:\Users\admin\AppData\Local\Temp\nsjFBB1.tmp\BitComet_stats.exe" https://www.bitcomet.com/client/install-stats/?l=en_us&file=BitComet_2.08a_setup.exe&p=x64C:\Users\admin\AppData\Local\Temp\nsjFBB1.tmp\BitComet_stats.exe
BitComet_2.08a_setup.exe
User:
admin
Integrity Level:
HIGH
Description:
stats Module
Version:
1, 0, 0, 1
Modules
Images
c:\users\admin\appdata\local\temp\nsjfbb1.tmp\bitcomet_stats.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6364C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6980"C:\Users\admin\AppData\Local\Temp\is-AQNMQ.tmp\48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp" /SL5="$40254,1635575,878080,C:\Users\admin\Desktop\48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe" /SPAWNWND=$30280 /NOTIFYWND=$60262 C:\Users\admin\AppData\Local\Temp\is-AQNMQ.tmp\48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp
48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe
User:
admin
Company:
Integrity Level:
HIGH
Description:
Setup/Uninstall
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-aqnmq.tmp\48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comdlg32.dll
7316"C:\Users\admin\AppData\Local\Temp\is-UF0TF.tmp\48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp" /SL5="$60262,1635575,878080,C:\Users\admin\Desktop\48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe" C:\Users\admin\AppData\Local\Temp\is-UF0TF.tmp\48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-uf0tf.tmp\48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comdlg32.dll
8044"C:\Users\admin\AppData\Local\Temp\is-1DK3T.tmp\prod0.exe" -ip:"dui=bb926e54-e3ca-40fd-ae90-2764341e7792&dit=20240719150814&is_silent=true&oc=ZB_RAV_Cross_Tri_NCB&p=1abd&a=100&b=&se=true" -vp:"dui=bb926e54-e3ca-40fd-ae90-2764341e7792&dit=20240719150814&oc=ZB_RAV_Cross_Tri_NCB&p=1abd&a=100&oip=26&ptl=7&dta=true" -dp:"dui=bb926e54-e3ca-40fd-ae90-2764341e7792&dit=20240719150814&oc=ZB_RAV_Cross_Tri_NCB&p=1abd&a=100" -i -v -d -se=trueC:\Users\admin\AppData\Local\Temp\is-1DK3T.tmp\prod0.exe
48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp
User:
admin
Company:
Reason Software Company Inc.
Integrity Level:
HIGH
Description:
rsStubActivator
Version:
1.6.1.0
Modules
Images
c:\users\admin\appdata\local\temp\is-1dk3t.tmp\prod0.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
22 581
Read events
22 504
Write events
77
Delete events
0

Modification events

(PID) Process:(6980) 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Owner
Value:
441B0000F502E877EDD9DA01
(PID) Process:(6980) 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:SessionHash
Value:
E0E80D201C1F908AA606CAEF62D28D3202613B1B79BD6FF9A14DA56BF9D6E830
(PID) Process:(6980) 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Sequence
Value:
1
(PID) Process:(3892) BitComet_2.08a_setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\BitCometAgent.DLL
Operation:writeName:AppID
Value:
{B99B5DF3-3AD2-463F-8F8C-86787623E1D5}
(PID) Process:(3892) BitComet_2.08a_setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C8FF2A06-638A-4913-8403-50294CFF6608}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Apartment
(PID) Process:(3892) BitComet_2.08a_setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C8FF2A06-638A-4913-8403-50294CFF6608}
Operation:writeName:AppID
Value:
{B99B5DF3-3AD2-463F-8F8C-86787623E1D5}
(PID) Process:(3892) BitComet_2.08a_setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E8A058D1-C830-437F-A029-10D777A8DD40}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(3892) BitComet_2.08a_setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{E8A058D1-C830-437F-A029-10D777A8DD40}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(3892) BitComet_2.08a_setup.exeKey:HKEY_CURRENT_USER\SOFTWARE\BitComet
Operation:writeName:InstallSettingCaptureIEDownload
Value:
0
(PID) Process:(3892) BitComet_2.08a_setup.exeKey:HKEY_CURRENT_USER\SOFTWARE\BitComet\BitComet
Operation:writeName:CaptureIEDownload
Value:
0
Executable files
27
Suspicious files
69
Text files
22
Unknown types
2

Dropped files

PID
Process
Filename
Type
211648053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exeC:\Users\admin\AppData\Local\Temp\is-UF0TF.tmp\48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmpexecutable
MD5:DD40149397C65DB7E46877143552AAC5
SHA256:F4E460EDDF3D8408AE887AC53FE96906A3B534D99A5FD9C3FE7777948293D1F7
698048053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmpC:\Users\admin\AppData\Local\Temp\is-1DK3T.tmp\_isetup\_setup64.tmpexecutable
MD5:E4211D6D009757C078A9FAC7FF4F03D4
SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
698048053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmpC:\Users\admin\AppData\Local\Temp\is-1DK3T.tmp\zbShieldUtils.dllexecutable
MD5:CBDBBFBBCA6093D9DC462A59CCEA2713
SHA256:8AA3ECA63350A70CA97F39867F842DDCBB153254F58C0E97FADBDB528E2CAB79
698048053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmpC:\Users\admin\AppData\Local\Temp\is-1DK3T.tmp\prod0executable
MD5:EC47F990AF50978071731E58792173C4
SHA256:3CE83809A36094276453BAEF460007A2297655C101311F8FDCA0D23933B14E51
698048053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmpC:\Users\admin\AppData\Local\Temp\is-1DK3T.tmp\WebAdvisor.pngimage
MD5:4CFFF8DC30D353CD3D215FD3A5DBAC24
SHA256:0C430E56D69435D8AB31CBB5916A73A47D11EF65B37D289EE7D11130ADF25856
540048053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exeC:\Users\admin\AppData\Local\Temp\is-AQNMQ.tmp\48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmpexecutable
MD5:DD40149397C65DB7E46877143552AAC5
SHA256:F4E460EDDF3D8408AE887AC53FE96906A3B534D99A5FD9C3FE7777948293D1F7
698048053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmpC:\Users\admin\AppData\Local\Temp\is-1DK3T.tmp\finish.pngimage
MD5:7A06E342E34F0E4833756F71275E8168
SHA256:8C6498EF75B73C26B5D2498DDD7444F4C9735D62FFACA947C6CDC65EA40A9BEF
698048053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmpC:\Users\admin\AppData\Local\Temp\is-1DK3T.tmp\is-J6U8T.tmpimage
MD5:CD09F361286D1AD2622BA8A57B7613BD
SHA256:B92A31D4853D1B2C4E5B9D9624F40B439856D0C6A517E100978CBDE8D3C47DC8
698048053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmpC:\Users\admin\AppData\Local\Temp\is-1DK3T.tmp\RAV_Cross.pngimage
MD5:CD09F361286D1AD2622BA8A57B7613BD
SHA256:B92A31D4853D1B2C4E5B9D9624F40B439856D0C6A517E100978CBDE8D3C47DC8
698048053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmpC:\Users\admin\AppData\Local\Temp\is-1DK3T.tmp\is-H7HSP.tmpexecutable
MD5:EC47F990AF50978071731E58792173C4
SHA256:3CE83809A36094276453BAEF460007A2297655C101311F8FDCA0D23933B14E51
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
18
TCP/UDP connections
45
DNS requests
26
Threats
18

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
161.97.135.85:443
https://www.bitcomet.com/client/install-stats/?l=en_us&file=BitComet_2.08a_setup.exe&p=x64
unknown
html
835 b
POST
401
4.209.32.67:443
https://licensing.mp.microsoft.com/v7.0/licenses/content
unknown
binary
340 b
GET
200
18.172.112.22:443
https://shield.reasonsecurity.com/ReasonLabs-Setup-Wizard.exe?dui=bb926e54-e3ca-40fd-ae90-2764341e7792&dit=20240719150814&is_silent=true&oc=ZB_RAV_Cross_Tri_NCB&p=1abd&a=100&b=&se=true&oip=26&ptl=7&dta=true&pds=%5bepp%2cvpn%2cdns%5d
unknown
executable
2.26 Mb
GET
200
184.86.251.31:443
https://www.bing.com/client/config?cc=US&setlang=en-US
unknown
binary
2.15 Kb
POST
20.190.160.17:443
https://login.live.com/RST2.srf
unknown
POST
200
143.204.205.88:443
https://d11iilsblp9z11.cloudfront.net/o
unknown
binary
10.6 Kb
POST
500
20.83.72.98:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
POST
200
20.223.36.55:443
https://arc.msn.com/v4/api/register?asid=C16689F088444CB0A4943E00D271D95B&placement=cdmdevreg&country=US&locale=en-US&poptin=0&fmt=json&arch=AMD64&chassis=1&concp=0&d3dfl=D3D_FEATURE_LEVEL_12_1&devfam=Windows.Desktop&devosver=10.0.19045.4046&dinst=1661339444&dmret=0&flightbranch=&flightring=Retail&icluc=0&localid=w%3AAC7699B0-48EA-FD22-C8DC-06A02098A0F0&oem=DELL&osbranch=vb_release&oslocale=en-US&osret=1&ossku=Professional&osskuid=48&prccn=4&prccs=3094&prcmf=AuthenticAMD&procm=Intel%28R%29%20Core%28TM%29%20i5-6400%20CPU%20%40%202.70GHz&ram=4096&tinst=Client&tl=1&pat=0&smc=0&sac=0&disphorzres=1280&dispsize=15.3&dispvertres=720&ldisphorzres=1280&ldispvertres=720&moncnt=1&cpdsk=260281&frdsk=218542&lo=3610507&tsu=1001037
unknown
POST
200
143.204.205.208:443
https://d11iilsblp9z11.cloudfront.net/zbd
unknown
POST
200
143.204.205.21:443
https://d11iilsblp9z11.cloudfront.net/zbd
unknown
binary
15 b
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4716
svchost.exe
20.190.160.22:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
5620
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7856
svchost.exe
4.208.221.206:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
40.113.110.67:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4032
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
2760
svchost.exe
40.113.110.67:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6980
48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp
143.204.205.21:443
d11iilsblp9z11.cloudfront.net
AMAZON-02
US
unknown
3548
slui.exe
20.83.72.98:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
login.live.com
  • 20.190.160.22
  • 40.126.32.76
  • 20.190.160.17
  • 40.126.32.74
  • 40.126.32.133
  • 40.126.32.140
  • 40.126.32.72
  • 40.126.32.138
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
google.com
  • 142.250.185.110
whitelisted
d11iilsblp9z11.cloudfront.net
  • 143.204.205.21
  • 143.204.205.105
  • 143.204.205.208
  • 143.204.205.88
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted
arc.msn.com
  • 20.223.36.55
whitelisted
www.bing.com
  • 184.86.251.4
  • 184.86.251.27
  • 184.86.251.26
  • 184.86.251.9
  • 184.86.251.30
  • 184.86.251.10
  • 184.86.251.29
  • 184.86.251.28
  • 184.86.251.31
whitelisted
fd.api.iris.microsoft.com
  • 20.223.36.55
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.166.126.56
whitelisted
shield.reasonsecurity.com
  • 18.172.112.11
  • 18.172.112.38
  • 18.172.112.34
  • 18.172.112.22
unknown

Threats

PID
Process
Class
Message
Generic Protocol Command Decode
SURICATA HTTP Request unrecognized authorization method
A Network Trojan was detected
ET ADWARE_PUP Win32/OfferCore Checkin M1
Generic Protocol Command Decode
SURICATA HTTP Request unrecognized authorization method
A Network Trojan was detected
ET ADWARE_PUP Win32/OfferCore Checkin M2
Possibly Unwanted Program Detected
ADWARE [ANY.RUN] InnoSetup Installer
Generic Protocol Command Decode
SURICATA HTTP Request unrecognized authorization method
A Network Trojan was detected
ET ADWARE_PUP Win32/OfferCore Checkin M2
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Potentially Bad Traffic
ET POLICY Executable served from Amazon S3
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
No debug info