URL:

https://www.cheatengine.org/

Full analysis: https://app.any.run/tasks/2c12bac3-933a-44bb-803a-b6f21fc183af
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: February 20, 2022, 19:36:49
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MD5:

1DD9F14AD3EE66B4B3FC7CB3318B2557

SHA1:

4439081AE9D03FAD96C0139E2AD70C74D835385B

SHA256:

5ABCD667F4FA7622E3EC58A7E273761BE6BCE0C9077F0E8E8872F84FF884C357

SSDEEP:

3:N8DSLHJ:2OLHJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • CheatEngine74.exe (PID: 2912)
      • CheatEngine74.exe (PID: 2788)
      • Kernelmoduleunloader.exe (PID: 1372)
      • windowsrepair.exe (PID: 1580)
      • cookie_mmm_irs_ppi_902_451_o.exe (PID: 1124)
      • saBSI.exe (PID: 1076)
      • cheatengine-i386.exe (PID: 3100)
      • saBSI.exe (PID: 2564)
      • Cheat Engine.exe (PID: 2008)
      • avg_antivirus_free_setup.exe (PID: 2784)
      • instup.exe (PID: 3092)
      • instup.exe (PID: 2100)
      • sbr.exe (PID: 1272)
      • installer.exe (PID: 3680)
      • installer.exe (PID: 3956)
      • ServiceHost.exe (PID: 2624)
      • UIHost.exe (PID: 3696)
      • updater.exe (PID: 300)
      • SetupInf.exe (PID: 1156)
      • SetupInf.exe (PID: 1544)
      • SetupInf.exe (PID: 1020)
      • SetupInf.exe (PID: 3784)
      • AvEmUpdate.exe (PID: 2548)
      • AvEmUpdate.exe (PID: 560)
      • browserhost.exe (PID: 2320)
      • AvEmUpdate.exe (PID: 2180)
      • AvEmUpdate.exe (PID: 452)
      • avBugReport.exe (PID: 4704)
      • avBugReport.exe (PID: 4756)
      • SetupInf.exe (PID: 5444)
      • SetupInf.exe (PID: 5656)
    • Drops executable file immediately after starts

      • CheatEngine74.exe (PID: 2912)
      • CheatEngine74.exe (PID: 2788)
      • CheatEngine74.exe (PID: 4004)
      • CheatEngine74.tmp (PID: 3828)
      • avg_antivirus_free_setup.exe (PID: 2784)
      • installer.exe (PID: 3680)
      • SetupInf.exe (PID: 5656)
      • DrvInst.exe (PID: 5900)
    • Starts NET.EXE for service management

      • CheatEngine74.tmp (PID: 3828)
    • Changes settings of System certificates

      • saBSI.exe (PID: 1076)
      • saBSI.exe (PID: 2564)
      • installer.exe (PID: 3956)
      • ServiceHost.exe (PID: 2624)
      • SetupInf.exe (PID: 5656)
    • Loads dropped or rewritten executable

      • cheatengine-i386.exe (PID: 3100)
      • instup.exe (PID: 3092)
      • instup.exe (PID: 2100)
      • regsvr32.exe (PID: 3312)
      • regsvr32.exe (PID: 2680)
      • ServiceHost.exe (PID: 2624)
      • UIHost.exe (PID: 3696)
      • regsvr32.exe (PID: 1232)
      • Explorer.EXE (PID: 964)
      • AvEmUpdate.exe (PID: 560)
      • AvEmUpdate.exe (PID: 2180)
      • avBugReport.exe (PID: 4704)
      • avBugReport.exe (PID: 4756)
    • Changes the autorun value in the registry

      • instup.exe (PID: 2100)
    • Registers / Runs the DLL via REGSVR32.EXE

      • installer.exe (PID: 3956)
      • ServiceHost.exe (PID: 2624)
    • Steals credentials from Web Browsers

      • ServiceHost.exe (PID: 2624)
      • UIHost.exe (PID: 3696)
    • Actions looks like stealing of personal data

      • ServiceHost.exe (PID: 2624)
      • UIHost.exe (PID: 3696)
    • Loads the Task Scheduler COM API

      • AvEmUpdate.exe (PID: 2548)
      • AvEmUpdate.exe (PID: 560)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • firefox.exe (PID: 4036)
      • CheatEngine74.exe (PID: 2912)
      • CheatEngine74.exe (PID: 2788)
      • CheatEngine74.tmp (PID: 3852)
      • CheatEngine74.exe (PID: 4004)
      • CheatEngine74.tmp (PID: 3828)
      • saBSI.exe (PID: 1076)
      • cookie_mmm_irs_ppi_902_451_o.exe (PID: 1124)
      • avg_antivirus_free_setup.exe (PID: 2784)
      • instup.exe (PID: 3092)
      • saBSI.exe (PID: 2564)
      • instup.exe (PID: 2100)
      • installer.exe (PID: 3680)
      • installer.exe (PID: 3956)
      • AvEmUpdate.exe (PID: 560)
      • SetupInf.exe (PID: 5656)
      • DrvInst.exe (PID: 5900)
    • Checks supported languages

      • CheatEngine74.exe (PID: 2912)
      • CheatEngine74.tmp (PID: 3760)
      • CheatEngine74.tmp (PID: 3852)
      • CheatEngine74.exe (PID: 4004)
      • CheatEngine74.tmp (PID: 3828)
      • CheatEngine74.exe (PID: 2788)
      • Kernelmoduleunloader.exe (PID: 1372)
      • windowsrepair.exe (PID: 1580)
      • cookie_mmm_irs_ppi_902_451_o.exe (PID: 1124)
      • saBSI.exe (PID: 1076)
      • Cheat Engine.exe (PID: 2008)
      • cheatengine-i386.exe (PID: 3100)
      • saBSI.exe (PID: 2564)
      • avg_antivirus_free_setup.exe (PID: 2784)
      • instup.exe (PID: 2100)
      • sbr.exe (PID: 1272)
      • installer.exe (PID: 3680)
      • installer.exe (PID: 3956)
      • instup.exe (PID: 3092)
      • ServiceHost.exe (PID: 2624)
      • UIHost.exe (PID: 3696)
      • updater.exe (PID: 300)
      • cmd.exe (PID: 748)
      • cmd.exe (PID: 1580)
      • SetupInf.exe (PID: 1156)
      • SetupInf.exe (PID: 1544)
      • SetupInf.exe (PID: 3784)
      • SetupInf.exe (PID: 1020)
      • AvEmUpdate.exe (PID: 2548)
      • AvEmUpdate.exe (PID: 560)
      • cmd.exe (PID: 444)
      • browserhost.exe (PID: 2320)
      • AvEmUpdate.exe (PID: 2180)
      • AvEmUpdate.exe (PID: 452)
      • avBugReport.exe (PID: 4704)
      • avBugReport.exe (PID: 4756)
      • SetupInf.exe (PID: 5444)
      • SetupInf.exe (PID: 5656)
      • DrvInst.exe (PID: 5900)
    • Reads the computer name

      • CheatEngine74.tmp (PID: 3760)
      • CheatEngine74.tmp (PID: 3852)
      • CheatEngine74.tmp (PID: 3828)
      • Kernelmoduleunloader.exe (PID: 1372)
      • cookie_mmm_irs_ppi_902_451_o.exe (PID: 1124)
      • saBSI.exe (PID: 1076)
      • Cheat Engine.exe (PID: 2008)
      • cheatengine-i386.exe (PID: 3100)
      • saBSI.exe (PID: 2564)
      • avg_antivirus_free_setup.exe (PID: 2784)
      • instup.exe (PID: 3092)
      • instup.exe (PID: 2100)
      • installer.exe (PID: 3956)
      • ServiceHost.exe (PID: 2624)
      • UIHost.exe (PID: 3696)
      • updater.exe (PID: 300)
      • SetupInf.exe (PID: 1156)
      • SetupInf.exe (PID: 1544)
      • SetupInf.exe (PID: 3784)
      • SetupInf.exe (PID: 1020)
      • AvEmUpdate.exe (PID: 2548)
      • AvEmUpdate.exe (PID: 560)
      • browserhost.exe (PID: 2320)
      • AvEmUpdate.exe (PID: 2180)
      • AvEmUpdate.exe (PID: 452)
      • avBugReport.exe (PID: 4756)
      • SetupInf.exe (PID: 5656)
      • SetupInf.exe (PID: 5444)
      • avBugReport.exe (PID: 4704)
      • DrvInst.exe (PID: 5900)
    • Reads Windows owner or organization settings

      • CheatEngine74.tmp (PID: 3852)
      • CheatEngine74.tmp (PID: 3828)
    • Reads the Windows organization settings

      • CheatEngine74.tmp (PID: 3852)
      • CheatEngine74.tmp (PID: 3828)
    • Drops a file with too old compile date

      • CheatEngine74.tmp (PID: 3852)
      • CheatEngine74.tmp (PID: 3828)
      • instup.exe (PID: 2100)
    • Drops a file that was compiled in debug mode

      • CheatEngine74.tmp (PID: 3852)
      • CheatEngine74.tmp (PID: 3828)
      • cookie_mmm_irs_ppi_902_451_o.exe (PID: 1124)
      • saBSI.exe (PID: 1076)
      • avg_antivirus_free_setup.exe (PID: 2784)
      • instup.exe (PID: 3092)
      • instup.exe (PID: 2100)
      • saBSI.exe (PID: 2564)
      • installer.exe (PID: 3680)
      • installer.exe (PID: 3956)
      • AvEmUpdate.exe (PID: 560)
      • SetupInf.exe (PID: 5656)
      • DrvInst.exe (PID: 5900)
    • Starts SC.EXE for service management

      • CheatEngine74.tmp (PID: 3828)
      • installer.exe (PID: 3956)
    • Uses ICACLS.EXE to modify access control list

      • CheatEngine74.tmp (PID: 3828)
    • Creates a directory in Program Files

      • CheatEngine74.tmp (PID: 3828)
      • instup.exe (PID: 2100)
      • installer.exe (PID: 3680)
      • installer.exe (PID: 3956)
      • AvEmUpdate.exe (PID: 560)
    • Drops a file with a compile date too recent

      • CheatEngine74.tmp (PID: 3828)
      • cookie_mmm_irs_ppi_902_451_o.exe (PID: 1124)
      • avg_antivirus_free_setup.exe (PID: 2784)
      • instup.exe (PID: 3092)
      • instup.exe (PID: 2100)
      • installer.exe (PID: 3680)
      • installer.exe (PID: 3956)
      • AvEmUpdate.exe (PID: 560)
    • Changes default file association

      • CheatEngine74.tmp (PID: 3828)
      • instup.exe (PID: 2100)
    • Creates files in the Windows directory

      • cookie_mmm_irs_ppi_902_451_o.exe (PID: 1124)
      • avg_antivirus_free_setup.exe (PID: 2784)
      • instup.exe (PID: 3092)
      • instup.exe (PID: 2100)
      • AvEmUpdate.exe (PID: 560)
      • DrvInst.exe (PID: 5900)
    • Adds / modifies Windows certificates

      • saBSI.exe (PID: 1076)
      • saBSI.exe (PID: 2564)
      • installer.exe (PID: 3956)
      • ServiceHost.exe (PID: 2624)
    • Creates files in the program directory

      • saBSI.exe (PID: 1076)
      • cheatengine-i386.exe (PID: 3100)
      • avg_antivirus_free_setup.exe (PID: 2784)
      • instup.exe (PID: 3092)
      • saBSI.exe (PID: 2564)
      • instup.exe (PID: 2100)
      • installer.exe (PID: 3680)
      • installer.exe (PID: 3956)
      • ServiceHost.exe (PID: 2624)
      • updater.exe (PID: 300)
      • UIHost.exe (PID: 3696)
      • AvEmUpdate.exe (PID: 2548)
      • browserhost.exe (PID: 2320)
      • AvEmUpdate.exe (PID: 560)
      • avBugReport.exe (PID: 4756)
      • avBugReport.exe (PID: 4704)
    • Reads CPU info

      • avg_antivirus_free_setup.exe (PID: 2784)
      • instup.exe (PID: 3092)
      • instup.exe (PID: 2100)
      • SetupInf.exe (PID: 1156)
      • SetupInf.exe (PID: 1544)
      • SetupInf.exe (PID: 3784)
      • SetupInf.exe (PID: 1020)
      • AvEmUpdate.exe (PID: 2548)
      • AvEmUpdate.exe (PID: 560)
      • AvEmUpdate.exe (PID: 2180)
      • AvEmUpdate.exe (PID: 452)
      • avBugReport.exe (PID: 4704)
      • SetupInf.exe (PID: 5656)
      • avBugReport.exe (PID: 4756)
      • SetupInf.exe (PID: 5444)
    • Creates or modifies windows services

      • instup.exe (PID: 3092)
      • instup.exe (PID: 2100)
    • Reads Environment values

      • instup.exe (PID: 3092)
      • instup.exe (PID: 2100)
      • ServiceHost.exe (PID: 2624)
      • AvEmUpdate.exe (PID: 2548)
      • AvEmUpdate.exe (PID: 560)
      • AvEmUpdate.exe (PID: 2180)
      • AvEmUpdate.exe (PID: 452)
      • vssvc.exe (PID: 5880)
    • Reads default file associations for system extensions

      • Explorer.EXE (PID: 964)
    • Starts itself from another location

      • instup.exe (PID: 3092)
    • Removes files from Windows directory

      • instup.exe (PID: 3092)
      • instup.exe (PID: 2100)
      • AvEmUpdate.exe (PID: 560)
      • DrvInst.exe (PID: 5900)
    • Creates/Modifies COM task schedule object

      • regsvr32.exe (PID: 3312)
      • regsvr32.exe (PID: 2680)
      • regsvr32.exe (PID: 1232)
      • instup.exe (PID: 2100)
    • Creates a software uninstall entry

      • installer.exe (PID: 3956)
      • ServiceHost.exe (PID: 2624)
      • instup.exe (PID: 2100)
    • Executed as Windows Service

      • ServiceHost.exe (PID: 2624)
      • vssvc.exe (PID: 5880)
    • Searches for installed software

      • updater.exe (PID: 300)
    • Starts CMD.EXE for commands execution

      • updater.exe (PID: 300)
      • chrome.exe (PID: 3480)
    • Creates files in the driver directory

      • instup.exe (PID: 2100)
      • AvEmUpdate.exe (PID: 560)
      • DrvInst.exe (PID: 5900)
    • Modifies files in Chrome extension folder

      • chrome.exe (PID: 3480)
    • Reads internet explorer settings

      • UIHost.exe (PID: 3696)
    • Reads Microsoft Outlook installation path

      • UIHost.exe (PID: 3696)
    • Application launched itself

      • AvEmUpdate.exe (PID: 560)
    • Executed via COM

      • DrvInst.exe (PID: 5900)
  • INFO

    • Application launched itself

      • firefox.exe (PID: 3636)
      • firefox.exe (PID: 4036)
      • chrome.exe (PID: 3480)
    • Checks supported languages

      • firefox.exe (PID: 3636)
      • firefox.exe (PID: 4036)
      • firefox.exe (PID: 2764)
      • firefox.exe (PID: 2636)
      • firefox.exe (PID: 3624)
      • firefox.exe (PID: 2532)
      • firefox.exe (PID: 1424)
      • net.exe (PID: 2968)
      • net1.exe (PID: 1984)
      • net.exe (PID: 2964)
      • net1.exe (PID: 3744)
      • sc.exe (PID: 3388)
      • sc.exe (PID: 2100)
      • icacls.exe (PID: 3460)
      • icacls.exe (PID: 2712)
      • verclsid.exe (PID: 2956)
      • Explorer.EXE (PID: 964)
      • regsvr32.exe (PID: 3312)
      • sc.exe (PID: 832)
      • sc.exe (PID: 3660)
      • regsvr32.exe (PID: 2680)
      • sc.exe (PID: 2148)
      • regsvr32.exe (PID: 1232)
      • chrome.exe (PID: 3480)
      • chrome.exe (PID: 2620)
      • chrome.exe (PID: 2816)
      • chrome.exe (PID: 2232)
      • chrome.exe (PID: 3060)
      • chrome.exe (PID: 1472)
      • chrome.exe (PID: 3516)
      • chrome.exe (PID: 2544)
      • chrome.exe (PID: 2256)
      • chrome.exe (PID: 128)
      • chrome.exe (PID: 1156)
      • chrome.exe (PID: 2028)
      • chrome.exe (PID: 3512)
      • chrome.exe (PID: 2416)
      • chrome.exe (PID: 3844)
      • chrome.exe (PID: 3432)
      • chrome.exe (PID: 3756)
      • chrome.exe (PID: 2980)
      • chrome.exe (PID: 2180)
      • sc.exe (PID: 2888)
      • chrome.exe (PID: 3652)
      • chrome.exe (PID: 2620)
      • chrome.exe (PID: 3812)
      • chrome.exe (PID: 2712)
      • chrome.exe (PID: 400)
      • chrome.exe (PID: 2964)
      • chrome.exe (PID: 2520)
      • vssvc.exe (PID: 5880)
    • Reads the computer name

      • firefox.exe (PID: 4036)
      • firefox.exe (PID: 2636)
      • firefox.exe (PID: 2532)
      • firefox.exe (PID: 3624)
      • firefox.exe (PID: 2764)
      • firefox.exe (PID: 1424)
      • net1.exe (PID: 1984)
      • net1.exe (PID: 3744)
      • sc.exe (PID: 3388)
      • sc.exe (PID: 2100)
      • icacls.exe (PID: 3460)
      • icacls.exe (PID: 2712)
      • sc.exe (PID: 832)
      • sc.exe (PID: 3660)
      • sc.exe (PID: 2888)
      • sc.exe (PID: 2148)
      • regsvr32.exe (PID: 2680)
      • regsvr32.exe (PID: 1232)
      • chrome.exe (PID: 3480)
      • chrome.exe (PID: 2232)
      • chrome.exe (PID: 2620)
      • chrome.exe (PID: 128)
      • chrome.exe (PID: 2416)
      • chrome.exe (PID: 2520)
      • vssvc.exe (PID: 5880)
    • Reads CPU info

      • firefox.exe (PID: 4036)
    • Creates files in the program directory

      • firefox.exe (PID: 4036)
      • CheatEngine74.tmp (PID: 3828)
    • Checks Windows Trust Settings

      • firefox.exe (PID: 4036)
      • saBSI.exe (PID: 1076)
      • cheatengine-i386.exe (PID: 3100)
      • saBSI.exe (PID: 2564)
      • installer.exe (PID: 3956)
      • ServiceHost.exe (PID: 2624)
      • UIHost.exe (PID: 3696)
      • updater.exe (PID: 300)
      • DrvInst.exe (PID: 5900)
    • Reads settings of System Certificates

      • firefox.exe (PID: 4036)
      • CheatEngine74.tmp (PID: 3852)
      • saBSI.exe (PID: 1076)
      • cheatengine-i386.exe (PID: 3100)
      • saBSI.exe (PID: 2564)
      • instup.exe (PID: 3092)
      • instup.exe (PID: 2100)
      • installer.exe (PID: 3956)
      • avg_antivirus_free_setup.exe (PID: 2784)
      • ServiceHost.exe (PID: 2624)
      • UIHost.exe (PID: 3696)
      • updater.exe (PID: 300)
      • chrome.exe (PID: 2232)
      • AvEmUpdate.exe (PID: 560)
      • AvEmUpdate.exe (PID: 2180)
      • AvEmUpdate.exe (PID: 452)
      • avBugReport.exe (PID: 4756)
      • avBugReport.exe (PID: 4704)
      • DrvInst.exe (PID: 5900)
    • Application was dropped or rewritten from another process

      • CheatEngine74.tmp (PID: 3760)
      • CheatEngine74.tmp (PID: 3852)
      • CheatEngine74.tmp (PID: 3828)
      • CheatEngine74.exe (PID: 4004)
    • Creates files in the user directory

      • firefox.exe (PID: 4036)
    • Loads dropped or rewritten executable

      • CheatEngine74.tmp (PID: 3852)
    • Creates a software uninstall entry

      • CheatEngine74.tmp (PID: 3828)
    • Reads the date of Windows installation

      • firefox.exe (PID: 4036)
    • Reads the hosts file

      • instup.exe (PID: 3092)
      • instup.exe (PID: 2100)
      • chrome.exe (PID: 2232)
      • chrome.exe (PID: 3480)
    • Manual execution by user

      • verclsid.exe (PID: 2956)
    • Reads Microsoft Office registry keys

      • Explorer.EXE (PID: 964)
    • Dropped object may contain Bitcoin addresses

      • installer.exe (PID: 3680)
      • instup.exe (PID: 2100)
      • chrome.exe (PID: 3480)
    • Changes settings of System certificates

      • DrvInst.exe (PID: 5900)
    • Adds / modifies Windows certificates

      • DrvInst.exe (PID: 5900)
    • Searches for installed software

      • DrvInst.exe (PID: 5900)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
152
Monitored processes
90
Malicious processes
26
Suspicious processes
7

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs cheatengine74.exe cheatengine74.tmp no specs cheatengine74.exe cheatengine74.tmp cheatengine74.exe cheatengine74.tmp net.exe no specs net1.exe no specs net.exe no specs net1.exe no specs sc.exe no specs sc.exe no specs icacls.exe no specs kernelmoduleunloader.exe windowsrepair.exe no specs icacls.exe no specs cookie_mmm_irs_ppi_902_451_o.exe sabsi.exe cheat engine.exe no specs cheatengine-i386.exe sabsi.exe avg_antivirus_free_setup.exe instup.exe instup.exe sbr.exe no specs verclsid.exe no specs installer.exe installer.exe regsvr32.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs regsvr32.exe no specs servicehost.exe uihost.exe regsvr32.exe no specs updater.exe cmd.exe no specs cmd.exe no specs explorer.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs setupinf.exe no specs setupinf.exe no specs setupinf.exe no specs setupinf.exe no specs avemupdate.exe no specs chrome.exe no specs avemupdate.exe cmd.exe no specs browserhost.exe no specs chrome.exe no specs avemupdate.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs avemupdate.exe chrome.exe no specs avbugreport.exe avbugreport.exe setupinf.exe no specs setupinf.exe drvinst.exe vssvc.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
128"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=876,11909038321783824968,14085004722323912577,131072 --enable-features=PasswordImport --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1144 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\86.0.4240.198\chrome_elf.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\version.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\api-ms-win-downlevel-shell32-l1-1-0.dll
c:\windows\system32\shlwapi.dll
300"C:\Program Files\McAfee\WebAdvisor\updater.exe" C:\Program Files\McAfee\WebAdvisor\updater.exe
ServiceHost.exe
User:
SYSTEM
Company:
McAfee, LLC
Integrity Level:
SYSTEM
Description:
McAfee WebAdvisor(updater)
Exit code:
0
Version:
4,1,1,682
Modules
Images
c:\program files\mcafee\webadvisor\updater.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
400"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=876,11909038321783824968,14085004722323912577,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2088 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\86.0.4240.198\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\api-ms-win-downlevel-shell32-l1-1-0.dll
c:\windows\system32\shlwapi.dll
444C:\Windows\system32\cmd.exe /d /c "C:\Program Files\McAfee\WebAdvisor\BrowserHost.exe" chrome-extension://fheoggkfdfchfphceeifdbepaooicaho/ --parent-window=0 < \\.\pipe\chrome.nativeMessaging.in.3ac57917a01a8b1c > \\.\pipe\chrome.nativeMessaging.out.3ac57917a01a8b1cC:\Windows\system32\cmd.exechrome.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imm32.dll
452AvEmUpdate.exe /installer1 /emupdater /applydll "C:\Program Files\AVG\Antivirus\Setup\6e15c61b-e780-4c2c-b4e4-85783d7ab96d.dll"C:\Program Files\AVG\Antivirus\AvEmUpdate.exe
AvEmUpdate.exe
User:
admin
Company:
AVG Technologies CZ, s.r.o.
Integrity Level:
HIGH
Description:
AVG Emergency Update
Exit code:
0
Version:
22.1.6921.0
Modules
Images
c:\program files\avg\antivirus\avemupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\webio.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
560"C:\Program Files\AVG\Antivirus\AvEmUpdate.exe" /installer1C:\Program Files\AVG\Antivirus\AvEmUpdate.exe
instup.exe
User:
admin
Company:
AVG Technologies CZ, s.r.o.
Integrity Level:
HIGH
Description:
AVG Emergency Update
Exit code:
0
Version:
22.1.6921.0
Modules
Images
c:\program files\avg\antivirus\avemupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\webio.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\nsi.dll
748C:\Windows\system32\cmd.exe /c DEL "C:\Program Files\McAfee\WebAdvisor\*.tmp" C:\Windows\system32\cmd.exeupdater.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
832sc.exe create "McAfee WebAdvisor" binPath= "\"C:\Program Files\McAfee\WebAdvisor\ServiceHost.exe\"" start= auto DisplayName= "McAfee WebAdvisor"C:\Windows\system32\sc.exeinstaller.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
A tool to aid in developing services for WindowsNT
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\sc.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\apphelp.dll
964C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1020"C:\Program Files\AVG\Antivirus\SetupInf.exe" /uninstall /catalog:avgRvrt.catC:\Program Files\AVG\Antivirus\SetupInf.exeinstup.exe
User:
admin
Company:
AVG Technologies CZ, s.r.o.
Integrity Level:
HIGH
Description:
AVG Antivirus Installer
Exit code:
0
Version:
22.1.6921.0
Modules
Images
c:\program files\avg\antivirus\setupinf.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
147 988
Read events
140 274
Write events
7 671
Delete events
43

Modification events

(PID) Process:(3636) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
Value:
2B30F66991000000
(PID) Process:(4036) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Browser
Value:
8037F66991000000
(PID) Process:(4036) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Telemetry
Value:
0
(PID) Process:(4036) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\DllPrefetchExperiment
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe
Value:
0
(PID) Process:(4036) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|DisableTelemetry
Value:
1
(PID) Process:(4036) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|DisableDefaultBrowserAgent
Value:
0
(PID) Process:(4036) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|ServicesSettingsServer
Value:
https://firefox.settings.services.mozilla.com/v1
(PID) Process:(4036) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|SecurityContentSignatureRootHash
Value:
97:E8:BA:9C:F1:2F:B3:DE:53:CC:42:A4:E6:57:7E:D6:4D:F4:93:C2:47:B4:14:FE:A0:36:81:8D:38:23:56:0E
(PID) Process:(964) Explorer.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Operation:writeName:308046O0NS4N39PO
Value:
000000001A000000250000003CFC1C00000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BFFFFFFFFFF0EAC7FE9B2FD70100000000
(PID) Process:(964) Explorer.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Operation:writeName:HRZR_PGYFRFFVBA
Value:
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
Executable files
645
Suspicious files
709
Text files
1 810
Unknown types
108

Dropped files

PID
Process
Filename
Type
4036firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-current.bin
MD5:
SHA256:
4036firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
MD5:
SHA256:
4036firefox.exeC:\Users\admin\AppData\Local\Temp\mz_etilqs_B1Wa1HgX5jHdCIVbinary
MD5:
SHA256:
4036firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\QLDYZ5~1.DEF\cert9.db-journalbinary
MD5:
SHA256:
4036firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite-walbinary
MD5:
SHA256:
4036firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\settings\main\ms-language-packs\asrouter.ftl.tmptext
MD5:
SHA256:
4036firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\places.sqlite-walsqlite-wal
MD5:
SHA256:
4036firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\settings\main\ms-language-packs\asrouter.ftltext
MD5:
SHA256:
4036firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
4036firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs-1.jstext
MD5:299A2B747C11E4BDA194E563FEA4A699
SHA256:94EE461F62E8B4A0A65471A41E10C8C56722B73C0A019D76ACA7F5BAF109813E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
105
TCP/UDP connections
250
DNS requests
304
Threats
8

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4036
firefox.exe
POST
200
216.58.212.131:80
http://ocsp.pki.goog/gts1c3
US
der
471 b
whitelisted
4036
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
4036
firefox.exe
POST
200
216.58.212.131:80
http://ocsp.pki.goog/gts1c3
US
der
472 b
whitelisted
4036
firefox.exe
POST
93.184.220.29:80
http://ocsp.digicert.com/
US
whitelisted
4036
firefox.exe
POST
200
216.58.212.131:80
http://ocsp.pki.goog/gts1c3
US
der
472 b
whitelisted
4036
firefox.exe
POST
200
216.58.212.131:80
http://ocsp.pki.goog/gts1c3
US
der
472 b
whitelisted
4036
firefox.exe
POST
200
216.58.212.131:80
http://ocsp.pki.goog/gts1c3
US
der
472 b
whitelisted
4036
firefox.exe
POST
200
216.58.212.131:80
http://ocsp.pki.goog/gts1c3
US
der
471 b
whitelisted
4036
firefox.exe
POST
200
216.58.212.131:80
http://ocsp.pki.goog/gts1c3
US
der
471 b
whitelisted
4036
firefox.exe
POST
216.58.212.131:80
http://ocsp.pki.goog/gts1c3
US
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4036
firefox.exe
34.107.221.82:80
detectportal.firefox.com
US
whitelisted
4036
firefox.exe
143.204.98.23:443
firefox.settings.services.mozilla.com
US
malicious
4036
firefox.exe
104.20.174.30:443
www.cheatengine.org
Cloudflare Inc
US
shared
4036
firefox.exe
216.58.212.170:443
safebrowsing.googleapis.com
Google Inc.
US
whitelisted
4036
firefox.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
4036
firefox.exe
216.58.212.131:80
ocsp.pki.goog
Google Inc.
US
whitelisted
4036
firefox.exe
18.64.103.77:443
content-signature-2.cdn.mozilla.net
Massachusetts Institute of Technology
US
unknown
4036
firefox.exe
52.89.17.198:443
push.services.mozilla.com
Amazon.com, Inc.
US
unknown
4036
firefox.exe
204.79.197.200:443
bat.bing.com
Microsoft Corporation
US
whitelisted
4036
firefox.exe
54.187.53.15:443
location.services.mozilla.com
Amazon.com, Inc.
US
unknown

DNS requests

Domain
IP
Reputation
detectportal.firefox.com
  • 34.107.221.82
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
www.cheatengine.org
  • 104.20.174.30
  • 104.20.175.30
  • 172.67.33.171
  • 2606:4700:10::6814:af1e
  • 2606:4700:10::ac43:21ab
  • 2606:4700:10::6814:ae1e
unknown
firefox.settings.services.mozilla.com
  • 143.204.98.23
  • 143.204.98.76
  • 143.204.98.33
  • 143.204.98.29
  • 2606:4700::6810:731
  • 2606:4700::6810:631
whitelisted
location.services.mozilla.com
  • 54.187.53.15
  • 52.40.22.163
  • 35.161.134.161
  • 52.41.42.176
  • 34.217.232.122
  • 52.89.43.233
whitelisted
locprod2-elb-us-west-2.prod.mozaws.net
  • 52.89.43.233
  • 34.217.232.122
  • 52.41.42.176
  • 35.161.134.161
  • 52.40.22.163
  • 54.187.53.15
whitelisted
example.org
  • 93.184.216.34
whitelisted
ipv4only.arpa
  • 192.0.0.170
  • 192.0.0.171
whitelisted
safebrowsing.googleapis.com
  • 216.58.212.170
  • 2a00:1450:4001:830::200a
  • 142.250.186.138
whitelisted
push.services.mozilla.com
  • 52.89.17.198
whitelisted

Threats

PID
Process
Class
Message
4036
firefox.exe
Potentially Bad Traffic
ET INFO Terse Request for .txt - Likely Hostile
4036
firefox.exe
Potentially Bad Traffic
ET INFO Terse Request for .txt - Likely Hostile
1124
cookie_mmm_irs_ppi_902_451_o.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
4036
firefox.exe
Potentially Bad Traffic
ET INFO Terse Request for .txt - Likely Hostile
4036
firefox.exe
Potentially Bad Traffic
ET INFO Terse Request for .txt - Likely Hostile
560
AvEmUpdate.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Potentially Bad Traffic
ET INFO Terse Request for .txt - Likely Hostile
Potentially Bad Traffic
ET INFO Terse Request for .txt - Likely Hostile
Process
Message
Kernelmoduleunloader.exe
Kernelmodule unloader
Kernelmoduleunloader.exe
Setup. So do not show messages
Kernelmoduleunloader.exe
attempting to unload
Kernelmoduleunloader.exe
SCManager opened
Kernelmoduleunloader.exe
count=0
Kernelmoduleunloader.exe
setup=true
saBSI.exe
NotComDllGetInterface: DLL not found in install location, looking in current directory
saBSI.exe
NotComDllGetInterface: C:\Users\admin\AppData\Local\Temp\is-JTTME.tmp\prod1_extract\saBSI.exe loading C:\Users\admin\AppData\Local\Temp\is-JTTME.tmp\prod1_extract\mfeaaca.dll, WinVerifyTrust failed with 80092003
saBSI.exe
NotComDllGetInterface: DLL not found in install location, looking in current directory
saBSI.exe
NotComDllGetInterface: C:\Users\admin\AppData\Local\Temp\is-JTTME.tmp\prod1_extract\saBSI.exe loading C:\Users\admin\AppData\Local\Temp\is-JTTME.tmp\prod1_extract\mfeaaca.dll, WinVerifyTrust failed with 80092003