analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

BLTools_Final.zip

Full analysis: https://app.any.run/tasks/c9d9dea3-01c0-4e24-9f79-ac4d6390c15a
Verdict: Malicious activity
Analysis date: May 21, 2022, 03:28:08
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

F3FDCBC17B20F58CE3AF721D55F2B267

SHA1:

BDEB2736E9944106E161BFBEBFE65E6B0A43F93B

SHA256:

60336BD27CE659C18ABE50E95CE9F5BF825E88380D71F587E8FF8DE9EB148FCC

SSDEEP:

49152:bv+3k/tQRfTNI+EdvjttQLz71bTJ9O30r0XJgWiGnMDAllpqanER8uLwe1lVI9wn:rQksu5dvjttoRb7O3e0XLnbsanL2bS9m

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • BLTools_Final.exe (PID: 916)
      • ctools.exe (PID: 148)
      • CTools_Cracked.exe (PID: 1988)
      • reviewsessionhostrefcommon.exe (PID: 3300)
      • ctools.exe (PID: 2616)
      • dwm.exe (PID: 1024)
      • BLTools_Final.exe (PID: 2644)
      • CTools_Cracked.exe (PID: 3104)
      • reviewsessionhostrefcommon.exe (PID: 3452)
      • CTools_Cracked.exe (PID: 2432)
      • CTools_Cracked.exe (PID: 1988)
    • Loads dropped or rewritten executable

      • SearchProtocolHost.exe (PID: 3448)
      • CTools_Cracked.exe (PID: 1988)
      • WerFault.exe (PID: 1544)
      • CTools_Cracked.exe (PID: 3104)
      • Explorer.EXE (PID: 1080)
      • CTools_Cracked.exe (PID: 2432)
    • Drops executable file immediately after starts

      • WinRAR.exe (PID: 2840)
      • BLTools_Final.exe (PID: 916)
      • ctools.exe (PID: 148)
      • Explorer.EXE (PID: 1080)
      • reviewsessionhostrefcommon.exe (PID: 3300)
    • Loads the Task Scheduler COM API

      • schtasks.exe (PID: 2616)
      • schtasks.exe (PID: 1068)
      • schtasks.exe (PID: 3028)
      • schtasks.exe (PID: 4044)
      • schtasks.exe (PID: 3436)
      • schtasks.exe (PID: 1844)
      • schtasks.exe (PID: 2308)
      • schtasks.exe (PID: 3004)
      • schtasks.exe (PID: 3828)
      • schtasks.exe (PID: 668)
      • schtasks.exe (PID: 4080)
      • schtasks.exe (PID: 2708)
      • schtasks.exe (PID: 3616)
      • schtasks.exe (PID: 3052)
      • schtasks.exe (PID: 2336)
      • schtasks.exe (PID: 4056)
      • schtasks.exe (PID: 3552)
      • schtasks.exe (PID: 3036)
      • schtasks.exe (PID: 964)
      • schtasks.exe (PID: 3224)
    • Changes the autorun value in the registry

      • reviewsessionhostrefcommon.exe (PID: 3300)
    • Changes the login/logoff helper path in the registry

      • reviewsessionhostrefcommon.exe (PID: 3300)
  • SUSPICIOUS

    • Reads the computer name

      • WinRAR.exe (PID: 2840)
      • BLTools_Final.exe (PID: 916)
      • ctools.exe (PID: 148)
      • CTools_Cracked.exe (PID: 1988)
      • WScript.exe (PID: 2928)
      • reviewsessionhostrefcommon.exe (PID: 3300)
      • dwm.exe (PID: 1024)
      • BLTools_Final.exe (PID: 2644)
      • ctools.exe (PID: 2616)
      • CTools_Cracked.exe (PID: 3104)
      • CTools_Cracked.exe (PID: 2432)
      • WScript.exe (PID: 2128)
      • reviewsessionhostrefcommon.exe (PID: 3452)
      • CTools_Cracked.exe (PID: 1988)
    • Checks supported languages

      • WinRAR.exe (PID: 2840)
      • BLTools_Final.exe (PID: 916)
      • CTools_Cracked.exe (PID: 1988)
      • ctools.exe (PID: 148)
      • WScript.exe (PID: 2928)
      • cmd.exe (PID: 1224)
      • reviewsessionhostrefcommon.exe (PID: 3300)
      • cmd.exe (PID: 1656)
      • BLTools_Final.exe (PID: 2644)
      • dwm.exe (PID: 1024)
      • ctools.exe (PID: 2616)
      • WScript.exe (PID: 2128)
      • CTools_Cracked.exe (PID: 3104)
      • reviewsessionhostrefcommon.exe (PID: 3452)
      • cmd.exe (PID: 2868)
      • CTools_Cracked.exe (PID: 1988)
      • CTools_Cracked.exe (PID: 2432)
    • Drops a file with a compile date too recent

      • WinRAR.exe (PID: 2840)
      • BLTools_Final.exe (PID: 916)
      • ctools.exe (PID: 148)
      • Explorer.EXE (PID: 1080)
      • reviewsessionhostrefcommon.exe (PID: 3300)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2840)
      • BLTools_Final.exe (PID: 916)
      • ctools.exe (PID: 148)
      • reviewsessionhostrefcommon.exe (PID: 3300)
    • Creates files in the user directory

      • BLTools_Final.exe (PID: 916)
    • Executes scripts

      • ctools.exe (PID: 148)
      • ctools.exe (PID: 2616)
    • Starts CMD.EXE for commands execution

      • WScript.exe (PID: 2928)
      • reviewsessionhostrefcommon.exe (PID: 3300)
      • WScript.exe (PID: 2128)
    • Reads Environment values

      • reviewsessionhostrefcommon.exe (PID: 3300)
      • dwm.exe (PID: 1024)
      • WerFault.exe (PID: 1544)
      • reviewsessionhostrefcommon.exe (PID: 3452)
    • Executed via WMI

      • schtasks.exe (PID: 2616)
      • schtasks.exe (PID: 1068)
      • schtasks.exe (PID: 4044)
      • schtasks.exe (PID: 3028)
      • schtasks.exe (PID: 1844)
      • schtasks.exe (PID: 3436)
      • schtasks.exe (PID: 2308)
      • schtasks.exe (PID: 668)
      • schtasks.exe (PID: 3004)
      • schtasks.exe (PID: 3828)
      • schtasks.exe (PID: 4080)
      • schtasks.exe (PID: 3052)
      • schtasks.exe (PID: 2336)
      • schtasks.exe (PID: 4056)
      • schtasks.exe (PID: 2708)
      • schtasks.exe (PID: 3616)
      • schtasks.exe (PID: 3036)
      • schtasks.exe (PID: 3552)
      • schtasks.exe (PID: 3224)
      • schtasks.exe (PID: 964)
    • Creates files in the Windows directory

      • reviewsessionhostrefcommon.exe (PID: 3300)
    • Creates files in the program directory

      • reviewsessionhostrefcommon.exe (PID: 3300)
    • Creates executable files which already exist in Windows

      • reviewsessionhostrefcommon.exe (PID: 3300)
    • Reads default file associations for system extensions

      • Explorer.EXE (PID: 1080)
  • INFO

    • Manual execution by user

      • BLTools_Final.exe (PID: 916)
      • BLTools_Final.exe (PID: 2644)
    • Checks Windows Trust Settings

      • WScript.exe (PID: 2928)
      • WScript.exe (PID: 2128)
    • Reads the computer name

      • WerFault.exe (PID: 1544)
      • schtasks.exe (PID: 2616)
      • schtasks.exe (PID: 1068)
      • schtasks.exe (PID: 3028)
      • schtasks.exe (PID: 4044)
      • schtasks.exe (PID: 1844)
      • schtasks.exe (PID: 3436)
      • schtasks.exe (PID: 2308)
      • schtasks.exe (PID: 668)
      • schtasks.exe (PID: 3004)
      • schtasks.exe (PID: 4080)
      • schtasks.exe (PID: 3828)
      • schtasks.exe (PID: 3052)
      • schtasks.exe (PID: 2336)
      • schtasks.exe (PID: 2708)
      • schtasks.exe (PID: 3616)
      • schtasks.exe (PID: 4056)
      • schtasks.exe (PID: 3036)
      • schtasks.exe (PID: 3224)
      • schtasks.exe (PID: 964)
      • schtasks.exe (PID: 3552)
      • w32tm.exe (PID: 4032)
    • Checks supported languages

      • WerFault.exe (PID: 1544)
      • schtasks.exe (PID: 1068)
      • schtasks.exe (PID: 2616)
      • schtasks.exe (PID: 4044)
      • schtasks.exe (PID: 3028)
      • schtasks.exe (PID: 1844)
      • schtasks.exe (PID: 2308)
      • schtasks.exe (PID: 3436)
      • schtasks.exe (PID: 668)
      • schtasks.exe (PID: 3828)
      • schtasks.exe (PID: 4080)
      • schtasks.exe (PID: 3004)
      • schtasks.exe (PID: 3052)
      • schtasks.exe (PID: 2708)
      • schtasks.exe (PID: 4056)
      • schtasks.exe (PID: 2336)
      • schtasks.exe (PID: 3616)
      • schtasks.exe (PID: 3036)
      • schtasks.exe (PID: 964)
      • schtasks.exe (PID: 3224)
      • schtasks.exe (PID: 3552)
      • w32tm.exe (PID: 4032)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipFileName: BLTools_Final/
ZipUncompressedSize: -
ZipCompressedSize: -
ZipCRC: 0x00000000
ZipModifyDate: 2022:05:20 21:24:25
ZipCompression: None
ZipBitFlag: -
ZipRequiredVersion: 20
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
84
Monitored processes
41
Malicious processes
15
Suspicious processes
5

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start winrar.exe searchprotocolhost.exe no specs bltools_final.exe ctools.exe ctools_cracked.exe wscript.exe no specs cmd.exe no specs reviewsessionhostrefcommon.exe schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs cmd.exe no specs w32tm.exe no specs dwm.exe werfault.exe bltools_final.exe no specs ctools.exe no specs ctools_cracked.exe wscript.exe no specs explorer.exe no specs cmd.exe no specs reviewsessionhostrefcommon.exe no specs ctools_cracked.exe ctools_cracked.exe

Process information

PID
CMD
Path
Indicators
Parent process
2840"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\BLTools_Final.zip"C:\Program Files\WinRAR\WinRAR.exe
Explorer.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
3448"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe3_ Global\UsGthrCtrlFltPipeMssGthrPipe3 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\system32\SearchProtocolHost.exeSearchIndexer.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft Windows Search Protocol Host
Version:
7.00.7601.24542 (win7sp1_ldr_escrow.191209-2211)
Modules
Images
c:\windows\system32\searchprotocolhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
916"C:\Users\admin\Desktop\BLTools_Final\BLTools_Final\BLTools_Final.exe" C:\Users\admin\Desktop\BLTools_Final\BLTools_Final\BLTools_Final.exe
Explorer.EXE
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\bltools_final\bltools_final\bltools_final.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\shell32.dll
148C:\Users\admin\AppData\Roaming\ctools.exeC:\Users\admin\AppData\Roaming\ctools.exe
BLTools_Final.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\roaming\ctools.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.24542_none_5c0717c7a00ddc6d\gdiplus.dll
c:\windows\system32\user32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\lpk.dll
1988C:\Users\admin\Desktop\BLTools_Final\BLTools_Final\CTools_Cracked.exeC:\Users\admin\Desktop\BLTools_Final\BLTools_Final\CTools_Cracked.exe
BLTools_Final.exe
User:
admin
Integrity Level:
MEDIUM
Description:
BLTools
Exit code:
3762504530
Version:
1.7.0.0
Modules
Images
c:\users\admin\desktop\bltools_final\bltools_final\ctools_cracked.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2928"C:\Windows\System32\WScript.exe" "C:\reviewsessionhost\D6Xan8JJYBjDKbexO8eqOdSVNaW.vbe" C:\Windows\System32\WScript.exectools.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1224C:\Windows\system32\cmd.exe /c ""C:\reviewsessionhost\2bFb8.bat" "C:\Windows\system32\cmd.exeWScript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
3300"C:\reviewsessionhost\reviewsessionhostrefcommon.exe"C:\reviewsessionhost\reviewsessionhostrefcommon.exe
cmd.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Version:
3.06
Modules
Images
c:\reviewsessionhost\reviewsessionhostrefcommon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\advapi32.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2616schtasks.exe /create /tn "csrss" /sc MINUTE /mo 5 /tr "'C:\Windows\Tasks\csrss.exe'" /rl HIGHEST /fC:\Windows\system32\schtasks.exewmiprvse.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Manages scheduled tasks
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
1068schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\Tasks\csrss.exe'" /rl HIGHEST /fC:\Windows\system32\schtasks.exewmiprvse.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Manages scheduled tasks
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
Total events
14 532
Read events
14 269
Write events
263
Delete events
0

Modification events

(PID) Process:(2840) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2840) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2840) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2840) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(2840) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(2840) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\BLTools_Final.zip
(PID) Process:(2840) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2840) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2840) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2840) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
14
Suspicious files
0
Text files
13
Unknown types
1

Dropped files

PID
Process
Filename
Type
2840WinRAR.exeC:\Users\admin\Desktop\BLTools_Final\BLTools_Final\Settings.initext
MD5:9BB6D12BBD9A71286AF2868C6B7582D0
SHA256:73A54064BF568F6DE2C1534CE3E7F204037DAAF5AC6C6DD305D477EF8186E8D1
916BLTools_Final.exeC:\Users\admin\Desktop\BLTools_Final\BLTools_Final\CTools_Cracked.exeexecutable
MD5:36EEFF46768711B999C33E4231CEE85A
SHA256:068259BCCA090AF57215639F22230FC1DEE37693CF44F3A1ED6FF50C916B805D
148ctools.exeC:\reviewsessionhost\2bFb8.battext
MD5:4476298D66CDDB0C9BD5684FEFC26148
SHA256:5D2FC877BE0911F30C9DEB024F6A7537210DA47CD9F121206B3DC12C34DB1CF6
1080Explorer.EXEC:\Users\admin\Desktop\CTools_Cracked.exeexecutable
MD5:36EEFF46768711B999C33E4231CEE85A
SHA256:068259BCCA090AF57215639F22230FC1DEE37693CF44F3A1ED6FF50C916B805D
3300reviewsessionhostrefcommon.exeC:\Windows\Tasks\886983d96e3d3etext
MD5:65B902B836764747D41F6BE37AE66A92
SHA256:96965A3614AAE6EEDF21E23B5076929304850CACF9E69B61F7CBEABA5617A4DE
148ctools.exeC:\reviewsessionhost\reviewsessionhostrefcommon.exeexecutable
MD5:51D2168D64ACDB418C4579AA1782349C
SHA256:CAEFF4A54FDAE31D92B07A8657D85FE987337D154540F8FEFB3F246DF1C9CF70
3300reviewsessionhostrefcommon.exeC:\Windows\Tasks\csrss.exeexecutable
MD5:51D2168D64ACDB418C4579AA1782349C
SHA256:CAEFF4A54FDAE31D92B07A8657D85FE987337D154540F8FEFB3F246DF1C9CF70
1544WerFault.exeC:\Users\admin\AppData\Local\Temp\WEREAA2.tmp.hdmp
MD5:
SHA256:
1544WerFault.exeC:\Users\admin\AppData\Local\Temp\WERBF6.tmp.mdmp
MD5:
SHA256:
3300reviewsessionhostrefcommon.exeC:\reviewsessionhost\6cb0b6c459d5d3text
MD5:BF45D446AE80440EFFD0419C4E5AD658
SHA256:8932A7E4B4C7EB6CE70AD6FF338642FB7D37018C740F9E89702D5CA79D762401
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
6
DNS requests
3
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1024
dwm.exe
GET
31.44.184.55:80
http://racoons1k.cyberhost.cf/httpGeneratortestUploads.php?R97D5K23MtglQIYC6=fWvi3jhZ&330b2136a6d0326a5b3565ce531f5b86=73baa74b47daff2f1a8b8f10ffbb8207&1e8f6e8ac9bc02ab983ff9c0e68bc6be=gZlBTOiVTOzAzY2IWM5ATY2MjM2MWM4YmMilzYwYWNjJmYkZzM2QTM&R97D5K23MtglQIYC6=fWvi3jhZ
RU
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
193.109.246.157:443
bltools.moy.su
Filanco, ltd.
RU
suspicious
1544
WerFault.exe
104.208.16.93:443
watson.microsoft.com
Microsoft Corporation
US
suspicious
2432
CTools_Cracked.exe
193.109.246.157:443
bltools.moy.su
Filanco, ltd.
RU
suspicious
1024
dwm.exe
31.44.184.55:80
racoons1k.cyberhost.cf
Petersburg Internet Network ltd.
RU
malicious

DNS requests

Domain
IP
Reputation
bltools.moy.su
  • 193.109.246.157
suspicious
watson.microsoft.com
  • 104.208.16.93
whitelisted
racoons1k.cyberhost.cf
  • 31.44.184.55
malicious

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET DNS Query for .su TLD (Soviet Union) Often Malware Related
Potentially Bad Traffic
ET INFO DNS Query for Suspicious .cf Domain
No debug info