File name:

48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe

Full analysis: https://app.any.run/tasks/d8e798f1-267d-412b-bb65-81c6aa2c815d
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: July 19, 2024, 15:08:00
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
adware
innosetup
loader
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

3CB0739401D24B6BC0C65E337E15C104

SHA1:

AEFCA0E1D01E9FFECD8CC2A0C9DC495D6F5FE9D8

SHA256:

48053935A1B62D13F2A1301D42A3BE930BB4718E8476C32B5050512209FDB3BB

SSDEEP:

98304:a+QqZ8fQJ1kKEW6v7SoSLerx5uO4QBAOOVm2Jah5nn+oFkPlcCvPrEMv0T9WQQ11:VydlGoq

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe (PID: 2116)
      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe (PID: 5400)
      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp (PID: 6980)
      • BitComet_2.08a_setup.exe (PID: 3892)
    • Scans artifacts that could help determine the target

      • BitComet_stats.exe (PID: 6256)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp (PID: 7316)
      • BitComet_2.08a_setup.exe (PID: 3892)
      • BitComet_stats.exe (PID: 6256)
      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp (PID: 6980)
    • Executable content was dropped or overwritten

      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe (PID: 2116)
      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe (PID: 5400)
      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp (PID: 6980)
      • BitComet_2.08a_setup.exe (PID: 3892)
    • Reads the date of Windows installation

      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp (PID: 7316)
      • BitComet_2.08a_setup.exe (PID: 3892)
      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp (PID: 6980)
    • Reads the Windows owner or organization settings

      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp (PID: 6980)
    • Process drops legitimate windows executable

      • BitComet_2.08a_setup.exe (PID: 3892)
    • Creates/Modifies COM task schedule object

      • BitComet_2.08a_setup.exe (PID: 3892)
    • Creates or modifies Windows services

      • BitCometService.exe (PID: 5984)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • BitComet_2.08a_setup.exe (PID: 3892)
    • The process creates files with name similar to system file names

      • BitComet_2.08a_setup.exe (PID: 3892)
    • Reads Microsoft Outlook installation path

      • BitComet_stats.exe (PID: 6256)
    • Checks Windows Trust Settings

      • BitComet_stats.exe (PID: 6256)
  • INFO

    • Checks supported languages

      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe (PID: 2116)
      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp (PID: 7316)
      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe (PID: 5400)
      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp (PID: 6980)
      • BitComet_2.08a_setup.exe (PID: 3892)
      • BitCometService.exe (PID: 5984)
      • BitComet_stats.exe (PID: 6256)
      • prod0.exe (PID: 8044)
    • Reads the computer name

      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp (PID: 7316)
      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp (PID: 6980)
      • BitComet_2.08a_setup.exe (PID: 3892)
      • BitCometService.exe (PID: 5984)
      • BitComet_stats.exe (PID: 6256)
      • prod0.exe (PID: 8044)
    • Create files in a temporary directory

      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe (PID: 2116)
      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe (PID: 5400)
      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp (PID: 6980)
      • BitComet_2.08a_setup.exe (PID: 3892)
      • prod0.exe (PID: 8044)
    • Process checks computer location settings

      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp (PID: 7316)
      • BitComet_2.08a_setup.exe (PID: 3892)
      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp (PID: 6980)
    • Reads the software policy settings

      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp (PID: 6980)
      • slui.exe (PID: 6364)
      • BitComet_stats.exe (PID: 6256)
      • prod0.exe (PID: 8044)
    • Checks proxy server information

      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp (PID: 6980)
      • slui.exe (PID: 6364)
      • BitComet_stats.exe (PID: 6256)
      • prod0.exe (PID: 8044)
    • Creates files in the program directory

      • BitComet_2.08a_setup.exe (PID: 3892)
    • Creates files or folders in the user directory

      • BitComet_2.08a_setup.exe (PID: 3892)
    • Reads the machine GUID from the registry

      • 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp (PID: 6980)
      • BitComet_stats.exe (PID: 6256)
      • prod0.exe (PID: 8044)
    • Creates a software uninstall entry

      • BitComet_2.08a_setup.exe (PID: 3892)
    • Reads Environment values

      • prod0.exe (PID: 8044)
    • Disables trace logs

      • prod0.exe (PID: 8044)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (67.7)
.exe | Win32 EXE PECompact compressed (generic) (25.6)
.exe | Win32 Executable (generic) (2.7)
.exe | Win16/32 Executable Delphi generic (1.2)
.exe | Generic Win/DOS Executable (1.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2020:11:15 09:48:30+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 741376
InitializedDataSize: 135680
UninitializedDataSize: -
EntryPoint: 0xb5eec
OSVersion: 6.1
ImageVersion: 6
SubsystemVersion: 6.1
Subsystem: Windows GUI
FileVersionNumber: 2.0.8.7
ProductVersionNumber: 2.0.8.7
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription: BitComet Installer
FileVersion: 2.0.8.7
LegalCopyright: © BitComet
OriginalFileName:
ProductName: BitComet
ProductVersion: 2.0.8.7
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
147
Monitored processes
9
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp no specs 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp slui.exe bitcomet_2.08a_setup.exe bitcometservice.exe no specs bitcomet_stats.exe prod0.exe

Process information

PID
CMD
Path
Indicators
Parent process
2116"C:\Users\admin\Desktop\48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe" C:\Users\admin\Desktop\48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe
explorer.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
BitComet Installer
Version:
2.0.8.7
Modules
Images
c:\users\admin\desktop\48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
3892"C:\Users\admin\AppData\Local\Temp\is-1DK3T.tmp\BitComet_2.08a_setup.exe" /SC:\Users\admin\AppData\Local\Temp\is-1DK3T.tmp\BitComet_2.08a_setup.exe
48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp
User:
admin
Integrity Level:
HIGH
Description:
BitComet Full Installer
Exit code:
0
Version:
2.08.07.02
Modules
Images
c:\users\admin\appdata\local\temp\is-1dk3t.tmp\bitcomet_2.08a_setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
5400"C:\Users\admin\Desktop\48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe" /SPAWNWND=$30280 /NOTIFYWND=$60262 C:\Users\admin\Desktop\48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe
48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp
User:
admin
Company:
Integrity Level:
HIGH
Description:
BitComet Installer
Version:
2.0.8.7
Modules
Images
c:\users\admin\desktop\48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
5984"C:\Program Files\BitComet\tools\BitCometService.exe" /regC:\Program Files\BitComet\tools\BitCometService.exeBitComet_2.08a_setup.exe
User:
admin
Company:
www.BitComet.com
Integrity Level:
HIGH
Description:
BitComet disk boost service
Exit code:
0
Version:
1.83
Modules
Images
c:\program files\bitcomet\tools\bitcometservice.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6256"C:\Users\admin\AppData\Local\Temp\nsjFBB1.tmp\BitComet_stats.exe" https://www.bitcomet.com/client/install-stats/?l=en_us&file=BitComet_2.08a_setup.exe&p=x64C:\Users\admin\AppData\Local\Temp\nsjFBB1.tmp\BitComet_stats.exe
BitComet_2.08a_setup.exe
User:
admin
Integrity Level:
HIGH
Description:
stats Module
Version:
1, 0, 0, 1
Modules
Images
c:\users\admin\appdata\local\temp\nsjfbb1.tmp\bitcomet_stats.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6364C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6980"C:\Users\admin\AppData\Local\Temp\is-AQNMQ.tmp\48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp" /SL5="$40254,1635575,878080,C:\Users\admin\Desktop\48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe" /SPAWNWND=$30280 /NOTIFYWND=$60262 C:\Users\admin\AppData\Local\Temp\is-AQNMQ.tmp\48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp
48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe
User:
admin
Company:
Integrity Level:
HIGH
Description:
Setup/Uninstall
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-aqnmq.tmp\48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comdlg32.dll
7316"C:\Users\admin\AppData\Local\Temp\is-UF0TF.tmp\48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp" /SL5="$60262,1635575,878080,C:\Users\admin\Desktop\48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe" C:\Users\admin\AppData\Local\Temp\is-UF0TF.tmp\48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exe
User:
admin
Company:
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-uf0tf.tmp\48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comdlg32.dll
8044"C:\Users\admin\AppData\Local\Temp\is-1DK3T.tmp\prod0.exe" -ip:"dui=bb926e54-e3ca-40fd-ae90-2764341e7792&dit=20240719150814&is_silent=true&oc=ZB_RAV_Cross_Tri_NCB&p=1abd&a=100&b=&se=true" -vp:"dui=bb926e54-e3ca-40fd-ae90-2764341e7792&dit=20240719150814&oc=ZB_RAV_Cross_Tri_NCB&p=1abd&a=100&oip=26&ptl=7&dta=true" -dp:"dui=bb926e54-e3ca-40fd-ae90-2764341e7792&dit=20240719150814&oc=ZB_RAV_Cross_Tri_NCB&p=1abd&a=100" -i -v -d -se=trueC:\Users\admin\AppData\Local\Temp\is-1DK3T.tmp\prod0.exe
48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp
User:
admin
Company:
Reason Software Company Inc.
Integrity Level:
HIGH
Description:
rsStubActivator
Version:
1.6.1.0
Modules
Images
c:\users\admin\appdata\local\temp\is-1dk3t.tmp\prod0.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
22 581
Read events
22 504
Write events
77
Delete events
0

Modification events

(PID) Process:(6980) 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Owner
Value:
441B0000F502E877EDD9DA01
(PID) Process:(6980) 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:SessionHash
Value:
E0E80D201C1F908AA606CAEF62D28D3202613B1B79BD6FF9A14DA56BF9D6E830
(PID) Process:(6980) 48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Sequence
Value:
1
(PID) Process:(3892) BitComet_2.08a_setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\BitCometAgent.DLL
Operation:writeName:AppID
Value:
{B99B5DF3-3AD2-463F-8F8C-86787623E1D5}
(PID) Process:(3892) BitComet_2.08a_setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C8FF2A06-638A-4913-8403-50294CFF6608}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Apartment
(PID) Process:(3892) BitComet_2.08a_setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C8FF2A06-638A-4913-8403-50294CFF6608}
Operation:writeName:AppID
Value:
{B99B5DF3-3AD2-463F-8F8C-86787623E1D5}
(PID) Process:(3892) BitComet_2.08a_setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E8A058D1-C830-437F-A029-10D777A8DD40}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(3892) BitComet_2.08a_setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{E8A058D1-C830-437F-A029-10D777A8DD40}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(3892) BitComet_2.08a_setup.exeKey:HKEY_CURRENT_USER\SOFTWARE\BitComet
Operation:writeName:InstallSettingCaptureIEDownload
Value:
0
(PID) Process:(3892) BitComet_2.08a_setup.exeKey:HKEY_CURRENT_USER\SOFTWARE\BitComet\BitComet
Operation:writeName:CaptureIEDownload
Value:
0
Executable files
27
Suspicious files
69
Text files
22
Unknown types
2

Dropped files

PID
Process
Filename
Type
211648053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exeC:\Users\admin\AppData\Local\Temp\is-UF0TF.tmp\48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmpexecutable
MD5:DD40149397C65DB7E46877143552AAC5
SHA256:F4E460EDDF3D8408AE887AC53FE96906A3B534D99A5FD9C3FE7777948293D1F7
698048053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmpC:\Users\admin\AppData\Local\Temp\is-1DK3T.tmp\logo.pngimage
MD5:5078AAB74E06AA597E66D92C9DBFE5FD
SHA256:597EF7036D93670839F088C50328673AE7B8532F276CAB6BB33F1FD2C568D7DA
540048053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.exeC:\Users\admin\AppData\Local\Temp\is-AQNMQ.tmp\48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmpexecutable
MD5:DD40149397C65DB7E46877143552AAC5
SHA256:F4E460EDDF3D8408AE887AC53FE96906A3B534D99A5FD9C3FE7777948293D1F7
698048053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmpC:\Users\admin\AppData\Local\Temp\is-1DK3T.tmp\is-J6U8T.tmpimage
MD5:CD09F361286D1AD2622BA8A57B7613BD
SHA256:B92A31D4853D1B2C4E5B9D9624F40B439856D0C6A517E100978CBDE8D3C47DC8
698048053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmpC:\Users\admin\AppData\Local\Temp\is-1DK3T.tmp\zbShieldUtils.dllexecutable
MD5:CBDBBFBBCA6093D9DC462A59CCEA2713
SHA256:8AA3ECA63350A70CA97F39867F842DDCBB153254F58C0E97FADBDB528E2CAB79
698048053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmpC:\Users\admin\AppData\Local\Temp\is-1DK3T.tmp\is-H7HSP.tmpexecutable
MD5:EC47F990AF50978071731E58792173C4
SHA256:3CE83809A36094276453BAEF460007A2297655C101311F8FDCA0D23933B14E51
698048053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmpC:\Users\admin\AppData\Local\Temp\is-1DK3T.tmp\finish.pngimage
MD5:7A06E342E34F0E4833756F71275E8168
SHA256:8C6498EF75B73C26B5D2498DDD7444F4C9735D62FFACA947C6CDC65EA40A9BEF
698048053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmpC:\Users\admin\AppData\Local\Temp\is-1DK3T.tmp\prod0executable
MD5:EC47F990AF50978071731E58792173C4
SHA256:3CE83809A36094276453BAEF460007A2297655C101311F8FDCA0D23933B14E51
698048053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmpC:\Users\admin\AppData\Local\Temp\is-1DK3T.tmp\is-JTVCA.tmpexecutable
MD5:4F45F9BD3CC4739BDC91A4D183C0DC01
SHA256:E0CBC854E5F0FC653C3E1E68988CC5E0AAB1F66A4B7264CB09F490A28439061F
698048053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmpC:\Users\admin\AppData\Local\Temp\is-1DK3T.tmp\prod1compressed
MD5:F68008B70822BD28C82D13A289DEB418
SHA256:CC6F4FAF4E8A9F4D2269D1D69A69EA326F789620FB98078CC98597F3CB998589
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
18
TCP/UDP connections
45
DNS requests
26
Threats
18

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
143.204.205.88:443
https://d11iilsblp9z11.cloudfront.net/f/WebAdvisor/images/943/EN.png
unknown
image
47.6 Kb
unknown
POST
200
143.204.205.88:443
https://d11iilsblp9z11.cloudfront.net/o
unknown
binary
10.6 Kb
unknown
POST
20.190.160.17:443
https://login.live.com/RST2.srf
unknown
unknown
GET
200
184.86.251.31:443
https://www.bing.com/client/config?cc=US&setlang=en-US
unknown
binary
2.15 Kb
unknown
GET
200
143.204.205.105:443
https://d11iilsblp9z11.cloudfront.net/f/RAV_Triple_NCB/images/DOTPS-855/EN.png
unknown
image
74.1 Kb
unknown
POST
200
143.204.205.21:443
https://d11iilsblp9z11.cloudfront.net/zbd
unknown
binary
15 b
unknown
GET
200
18.172.112.11:443
https://shield.reasonsecurity.com/rsStubActivator.exe
unknown
executable
32.6 Kb
unknown
GET
200
20.223.36.55:443
https://fd.api.iris.microsoft.com/v4/api/selection?&asid=55E0780A5AAE4AD1AB7DA72EA208EB3A&nct=1&placement=88000677&bcnt=30&country=US&locale=en-US&poptin=0&fmt=json&arch=AMD64&chassis=1&concp=0&d3dfl=D3D_FEATURE_LEVEL_12_1&devfam=Windows.Desktop&devosver=10.0.19045.4046&dinst=1661339444&dmret=0&flightbranch=&flightring=Retail&icluc=0&localid=w%3AAC7699B0-48EA-FD22-C8DC-06A02098A0F0&oem=DELL&osbranch=vb_release&oslocale=en-US&osret=1&ossku=Professional&osskuid=48&prccn=4&prccs=3094&prcmf=AuthenticAMD&procm=Intel%28R%29%20Core%28TM%29%20i5-6400%20CPU%20%40%202.70GHz&ram=4096&tinst=Client&tl=1&pat=0&smc=0&sac=0&disphorzres=1280&dispsize=15.3&dispvertres=720&ldisphorzres=1280&ldispvertres=720&moncnt=1&cpdsk=260281&frdsk=218542&lo=3610507&tsu=1001037
unknown
binary
102 b
unknown
POST
200
143.204.205.208:443
https://d11iilsblp9z11.cloudfront.net/zbd
unknown
unknown
GET
200
161.97.135.85:443
https://www.bitcomet.com/client/install-stats/?l=en_us&file=BitComet_2.08a_setup.exe&p=x64
unknown
html
835 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4716
svchost.exe
20.190.160.22:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
5620
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7856
svchost.exe
4.208.221.206:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
40.113.110.67:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4032
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
2760
svchost.exe
40.113.110.67:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6980
48053935a1b62d13f2a1301d42a3be930bb4718e8476c32b5050512209fdb3bb.tmp
143.204.205.21:443
d11iilsblp9z11.cloudfront.net
AMAZON-02
US
unknown
3548
slui.exe
20.83.72.98:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
login.live.com
  • 20.190.160.22
  • 40.126.32.76
  • 20.190.160.17
  • 40.126.32.74
  • 40.126.32.133
  • 40.126.32.140
  • 40.126.32.72
  • 40.126.32.138
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
google.com
  • 142.250.185.110
whitelisted
d11iilsblp9z11.cloudfront.net
  • 143.204.205.21
  • 143.204.205.105
  • 143.204.205.208
  • 143.204.205.88
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted
arc.msn.com
  • 20.223.36.55
whitelisted
www.bing.com
  • 184.86.251.4
  • 184.86.251.27
  • 184.86.251.26
  • 184.86.251.9
  • 184.86.251.30
  • 184.86.251.10
  • 184.86.251.29
  • 184.86.251.28
  • 184.86.251.31
whitelisted
fd.api.iris.microsoft.com
  • 20.223.36.55
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.166.126.56
whitelisted
shield.reasonsecurity.com
  • 18.172.112.11
  • 18.172.112.38
  • 18.172.112.34
  • 18.172.112.22
unknown

Threats

PID
Process
Class
Message
Generic Protocol Command Decode
SURICATA HTTP Request unrecognized authorization method
A Network Trojan was detected
ET ADWARE_PUP Win32/OfferCore Checkin M1
Generic Protocol Command Decode
SURICATA HTTP Request unrecognized authorization method
A Network Trojan was detected
ET ADWARE_PUP Win32/OfferCore Checkin M2
Possibly Unwanted Program Detected
ADWARE [ANY.RUN] InnoSetup Installer
Generic Protocol Command Decode
SURICATA HTTP Request unrecognized authorization method
A Network Trojan was detected
ET ADWARE_PUP Win32/OfferCore Checkin M2
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Potentially Bad Traffic
ET POLICY Executable served from Amazon S3
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
No debug info