File name:

Setup.exe

Full analysis: https://app.any.run/tasks/53392a9f-1654-41ce-89ec-d4137c442526
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: April 29, 2025, 10:00:26
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
adware
adaware
webcompanion
tool
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

D78DD045031470E852EC9E945929ED18

SHA1:

0912A76B6056B0125336C1B5FE102E9468F1467C

SHA256:

4A2AB25D9D988FE587DCEF7B9C97BD0B079C0D54808B998B37F78594C99F4443

SSDEEP:

24576:mSIe5VvZ0jvUTfPfkSqO6n7KnPC2hWbWaaQJzaI:mSIe5VvZ0jvUTfPfkSqO6n7KnPC2hWbL

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • WebCompanion.exe (PID: 4188)
      • WebCompanion.exe (PID: 1196)
    • ADAWARE has been detected (SURICATA)

      • WebCompanion.exe (PID: 4188)
    • Actions looks like stealing of personal data

      • WebCompanion.exe (PID: 1196)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • Setup.exe (PID: 4756)
    • Reads security settings of Internet Explorer

      • Setup.exe (PID: 4756)
      • WebCompanion.exe (PID: 4188)
      • WebCompanion.exe (PID: 1196)
    • The process drops C-runtime libraries

      • Setup.exe (PID: 4756)
    • Drops 7-zip archiver for unpacking

      • Setup.exe (PID: 4756)
    • Executable content was dropped or overwritten

      • Setup.exe (PID: 4756)
    • The process creates files with name similar to system file names

      • Setup.exe (PID: 4756)
    • Starts CMD.EXE for commands execution

      • Setup.exe (PID: 4756)
    • Searches for installed software

      • Setup.exe (PID: 4756)
      • WebCompanion.exe (PID: 4188)
      • WebCompanion.exe (PID: 1196)
    • Creates a software uninstall entry

      • Setup.exe (PID: 4756)
    • Suspicious use of NETSH.EXE

      • cmd.exe (PID: 672)
    • Access to an unwanted program domain was detected

      • WebCompanion.exe (PID: 4188)
    • The process checks if it is being run in the virtual environment

      • WebCompanion.exe (PID: 1196)
  • INFO

    • Checks proxy server information

      • Setup.exe (PID: 4756)
      • WebCompanion.exe (PID: 4188)
      • WebCompanion.exe (PID: 1196)
    • Checks supported languages

      • Setup.exe (PID: 4756)
      • WebCompanion.exe (PID: 4188)
      • WebCompanion.exe (PID: 1196)
    • Reads the machine GUID from the registry

      • Setup.exe (PID: 4756)
      • WebCompanion.exe (PID: 4188)
      • WebCompanion.exe (PID: 1196)
    • Disables trace logs

      • Setup.exe (PID: 4756)
      • WebCompanion.exe (PID: 4188)
      • WebCompanion.exe (PID: 1196)
    • Reads the computer name

      • Setup.exe (PID: 4756)
      • WebCompanion.exe (PID: 1196)
      • WebCompanion.exe (PID: 4188)
    • Creates files or folders in the user directory

      • Setup.exe (PID: 4756)
      • WebCompanion.exe (PID: 4188)
      • WebCompanion.exe (PID: 1196)
    • Reads the software policy settings

      • Setup.exe (PID: 4756)
      • WebCompanion.exe (PID: 4188)
      • WebCompanion.exe (PID: 1196)
    • The sample compiled with english language support

      • Setup.exe (PID: 4756)
    • Create files in a temporary directory

      • Setup.exe (PID: 4756)
    • Process checks computer location settings

      • Setup.exe (PID: 4756)
    • SQLite executable

      • Setup.exe (PID: 4756)
    • Creates files in the program directory

      • WebCompanion.exe (PID: 4188)
    • Application launched itself

      • chrome.exe (PID: 4784)
    • ADAWAREWEBCOMPANION mutex has been found

      • WebCompanion.exe (PID: 1196)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:05:14 08:46:30+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 702976
InitializedDataSize: 28160
UninitializedDataSize: -
EntryPoint: 0xad8d6
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 13.900.0.1080
ProductVersionNumber: 13.900.0.1080
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
FileVersion: 13.900.0.1080
ProductVersion: 13.900.0.1080
FileDescription: Web Companion
InternalName: WebCompanion.exe
LegalCopyright: c Lavasoft Limited. All Rights Reserved.
OriginalFileName: WebCompanion.exe
ProductName: Web Companion
AssemblyVersion: 13.900.0.1080
CompanyName: Lavasoft
LegalTrademarks: (R) Lavasoft
Comments: Web Companion protects you against malicious websites and dangerous links found online
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
156
Monitored processes
25
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start setup.exe sppextcomobj.exe no specs slui.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs #ADAWARE webcompanion.exe webcompanion.exe chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
672"C:\Windows\System32\cmd.exe" /C netsh http add urlacl url=http://+:9007/ user=EveryoneC:\Windows\SysWOW64\cmd.exeSetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1040"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3224 --field-trial-handle=1952,i,8324621746471789191,9245992646904865247,262144 --variations-seed-version /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1088"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3180 --field-trial-handle=1952,i,8324621746471789191,9245992646904865247,262144 --variations-seed-version /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1196"C:\Users\admin\AppData\Roaming\Lavasoft\Web Companion\Application\WebCompanion.exe" --afterinstall C:\Users\admin\AppData\Roaming\Lavasoft\Web Companion\Application\WebCompanion.exe
Setup.exe
User:
admin
Company:
Lavasoft
Integrity Level:
MEDIUM
Description:
Web Companion
Version:
13.900.0.1080
Modules
Images
c:\users\admin\appdata\roaming\lavasoft\web companion\application\webcompanion.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
2084"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3708 --field-trial-handle=1952,i,8324621746471789191,9245992646904865247,262144 --variations-seed-version /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
2192"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=2328 --field-trial-handle=1952,i,8324621746471789191,9245992646904865247,262144 --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
3332C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
3884netsh http add urlacl url=http://+:9007/ user=EveryoneC:\Windows\SysWOW64\netsh.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Network Command Shell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\netsh.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
4188"C:\Users\admin\AppData\Roaming\Lavasoft\Web Companion\Application\WebCompanion.exe" --install --geo= C:\Users\admin\AppData\Roaming\Lavasoft\Web Companion\Application\WebCompanion.exe
Setup.exe
User:
admin
Company:
Lavasoft
Integrity Level:
MEDIUM
Description:
Web Companion
Exit code:
0
Version:
13.900.0.1080
Modules
Images
c:\users\admin\appdata\roaming\lavasoft\web companion\application\webcompanion.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
4428"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
25 088
Read events
25 033
Write events
55
Delete events
0

Modification events

(PID) Process:(4756) Setup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Lavasoft\Web Companion
Operation:writeName:MachineId
Value:
ad1f12af-3f36-3c28-b351-2ce4355f42c2
(PID) Process:(4756) Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Setup_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4756) Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Setup_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(4756) Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Setup_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(4756) Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Setup_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(4756) Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Setup_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(4756) Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Setup_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(4756) Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Setup_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(4756) Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Setup_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(4756) Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Setup_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
Executable files
69
Suspicious files
120
Text files
77
Unknown types
0

Dropped files

PID
Process
Filename
Type
4756Setup.exeC:\Users\admin\AppData\Roaming\Lavasoft\Web Companion\Application\Ionic.Zip.dllexecutable
MD5:AE643BD347EB6BF2E3AA05608924782B
SHA256:2CB3DD4E6CD2BD6DC4AAEEB48CE47BB5CE3E2C67C040AFF388E9165E655B06A2
4756Setup.exeC:\Users\admin\AppData\Roaming\Lavasoft\Web Companion\Application\FeatureComponent.dllexecutable
MD5:76F9FF88BFAB074CF3657E8CD007C858
SHA256:42087B3045C86316D2B85FA23466A0BB84935B52D0537D9B2A6C857DEC4EDA38
4756Setup.exeC:\Users\admin\AppData\Roaming\Lavasoft\Web Companion\Application\ICSharpCode.SharpZipLib.dllexecutable
MD5:BEB11BF49E70F87B3DFC3B5A51266E48
SHA256:CB51D070C1E2BDE393F2A65DB17E872C395B55D0E3C47E5CCE49A8A1ED4D69FB
4756Setup.exeC:\Users\admin\AppData\Roaming\Lavasoft\Web Companion\Application\FeatureMainComponent.exeexecutable
MD5:73C88C57F2F5B51E11870044FD31417F
SHA256:B762BA799CFCFB150B32EBC388008CF706F004344DF06C1BE94B2A25C8AAB706
4756Setup.exeC:\Users\admin\AppData\Roaming\Lavasoft\Web Companion\Application\Interop.IWshRuntimeLibrary.dllexecutable
MD5:AAEBD8816C4A3FC26D5C4FA227EE565C
SHA256:10C6C4B9A94318C4244EC36A0F211D965B10661B0BC76339067AAFB866F115FD
4756Setup.exeC:\Users\admin\AppData\Roaming\Lavasoft\Web Companion\Application\FeatureMainComponent.exe.configxml
MD5:568B93BE462E5660BDB8E9CFAE715B4D
SHA256:CF8F505544E172B3A91138D2FA71A8B3CAA2B5296B500275AC50406D2B116593
4756Setup.exeC:\Users\admin\AppData\Roaming\Lavasoft\Web Companion\Application\BCUSDK.dllexecutable
MD5:79AAF194177DC418CFB4D94AF29CDD2A
SHA256:6327ED564E521BB91791EEE54D7C18699BE1DE77DB2B9D6DCDD6FB7077CACB39
4756Setup.exeC:\Users\admin\AppData\Roaming\Lavasoft\Web Companion\Application\DotNetZip.dllexecutable
MD5:31DF678850DC2B26BCE81EED9FA7462F
SHA256:E813D2EE40FB1A403454A96592609E1250A6913F46E948DBAAD47F7760F99B07
4756Setup.exeC:\Users\admin\AppData\Roaming\Lavasoft\Web Companion\Application\Esent.Interop.dllexecutable
MD5:82DDB49786F2DFD246BCADDB37F333AF
SHA256:8A1F31AF32246A7BAFBF80A6FF78DDD0403F2FFC575E36BFB57EC58407755898
4756Setup.exeC:\Users\admin\AppData\Roaming\Lavasoft\Web Companion\Application\7za.exeexecutable
MD5:7BE563AC01DDE847D6837D38575CEA85
SHA256:6ACE813AAAE0D754B92C31178564623045B12A4F239BBC075270DB3D97F0FF2D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
17
TCP/UDP connections
81
DNS requests
95
Threats
8

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.32.238.112:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4756
Setup.exe
GET
200
104.16.149.130:80
http://geo.lavasoft.com/
unknown
whitelisted
4756
Setup.exe
GET
200
104.16.149.130:80
http://geo.lavasoft.com/
unknown
whitelisted
3096
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
3096
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
4188
WebCompanion.exe
GET
200
23.192.154.58:80
http://ocsp.entrust.net/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRr2bwARTxMtEy9aspRAZg5QFhagQQUgrrWPZfOn89x6JI3r%2F2ztWk1V88CEDWvt3udNB9q%2FI%2BERqsxNSs%3D
unknown
whitelisted
4188
WebCompanion.exe
GET
200
23.192.154.58:80
http://ocsp.entrust.net/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTLXNCzDvBhHecWjg70iJhBW0InywQUanImetAe733nO2lR1GyNn5ASZqsCEE5A5DdU7eaMAAAAAFHTlH8%3D
unknown
whitelisted
4188
WebCompanion.exe
GET
200
23.192.154.58:80
http://ocsp.entrust.net/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRp%2BmQDKauE4nIg%2FgknZHuBlLkfKgQUzolPglGqFaKEYsoxI2HSYfv4%2FngCECXQy517DWxwDNrkPSQ6scY%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
5496
MoUsoCoreWorker.exe
23.32.238.112:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.14:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
4756
Setup.exe
104.16.149.130:80
geo.lavasoft.com
CLOUDFLARENET
whitelisted
4756
Setup.exe
104.16.148.130:443
geo.lavasoft.com
CLOUDFLARENET
whitelisted
4756
Setup.exe
104.18.27.149:443
flwadw.com
CLOUDFLARENET
shared

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.124.78.146
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.32.238.112
  • 23.32.238.107
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
google.com
  • 142.250.74.206
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.160.14
  • 20.190.160.4
  • 20.190.160.130
  • 20.190.160.67
  • 40.126.32.72
  • 20.190.160.3
  • 20.190.160.2
  • 40.126.32.134
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
geo.lavasoft.com
  • 104.16.149.130
  • 104.16.148.130
whitelisted
featureflags.lavasoft.com
  • 104.16.148.130
  • 104.16.149.130
whitelisted
flwadw.com
  • 104.18.27.149
  • 104.18.26.149
unknown

Threats

PID
Process
Class
Message
4188
WebCompanion.exe
Possibly Unwanted Program Detected
ADWARE [ANY.RUN] Adaware Web Companion
4188
WebCompanion.exe
Possibly Unwanted Program Detected
ADWARE [ANY.RUN] Adaware Web Companion
4188
WebCompanion.exe
Possibly Unwanted Program Detected
ADWARE [ANY.RUN] Adaware Web Companion
4608
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Hosted Libraries (ajax .googleapis .com)
4608
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Hosted Libraries (ajax .googleapis .com)
4608
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Hosted Libraries (ajax .googleapis .com)
4608
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Hosted Libraries (ajax .googleapis .com)
4188
WebCompanion.exe
Possibly Unwanted Program Detected
ADWARE [ANY.RUN] Adaware Web Companion
No debug info