File name:

Swift Exploit_37393402(1).exe

Full analysis: https://app.any.run/tasks/1bc46048-0049-46ad-a503-d13afd5741a7
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: December 28, 2024, 08:23:09
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
stealer
pua
ossproxy
adware
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

15D1C495FF66BF7CEA8A6D14BFDF0A20

SHA1:

942814521FA406A225522F208AC67F90DBDE0AE7

SHA256:

61C2C4A5D7C14F77EE88871DED4CC7F1E49DAE3E4EF209504C66FEDF4D22DE42

SSDEEP:

98304:DtjM+LgnHM8mNLNpOmMGl2p9tjIQh+1GHp8PGmDFzMVv3kdcpR41TBN14BC6SkPT:Kw8

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was injected by another process

      • svchost.exe (PID: 1276)
    • Runs injected code in another process

      • rundll32.exe (PID: 6800)
    • Actions looks like stealing of personal data

      • pmropn.exe (PID: 5864)
      • opera.exe (PID: 1020)
    • Change Internet Settings

      • pmropn.exe (PID: 5864)
    • Changes the autorun value in the registry

      • opera.exe (PID: 1020)
    • Steals credentials from Web Browsers

      • opera.exe (PID: 1020)
    • OSSPROXY has been detected (SURICATA)

      • pmropn.exe (PID: 5864)
    • ADWARE has been detected (SURICATA)

      • pmropn.exe (PID: 5864)
  • SUSPICIOUS

    • Checks Windows Trust Settings

      • Swift Exploit_37393402(1).exe (PID: 6616)
      • setup.exe (PID: 4824)
      • pmropn.exe (PID: 6732)
      • pmropn.exe (PID: 5864)
    • Executable content was dropped or overwritten

      • OperaGX.exe (PID: 644)
      • Swift Exploit_37393402(1).exe (PID: 6616)
      • setup.exe (PID: 5880)
      • setup.exe (PID: 4824)
      • setup.exe (PID: 5548)
      • setup.exe (PID: 5544)
      • setup.exe (PID: 4052)
      • ContentI3.exe (PID: 5916)
      • pmropn.exe (PID: 6732)
      • Opera_GX_assistant_73.0.3856.382_Setup.exe_sfx.exe (PID: 1804)
      • installer.exe (PID: 1760)
      • installer.exe (PID: 6476)
    • Application launched itself

      • setup.exe (PID: 4824)
      • setup.exe (PID: 4052)
      • installer.exe (PID: 6476)
      • assistant_installer.exe (PID: 6792)
      • opera.exe (PID: 1020)
      • opera_autoupdate.exe (PID: 8556)
      • opera_autoupdate.exe (PID: 7464)
      • installer.exe (PID: 8380)
      • opera_autoupdate.exe (PID: 8908)
    • Reads security settings of Internet Explorer

      • Swift Exploit_37393402(1).exe (PID: 6616)
      • ContentI3.exe (PID: 5916)
      • setup.exe (PID: 4824)
      • pmropn.exe (PID: 6732)
      • pmropn.exe (PID: 5864)
      • installer.exe (PID: 6476)
      • opera.exe (PID: 8628)
      • pmropn.exe (PID: 5256)
    • Starts itself from another location

      • setup.exe (PID: 4824)
    • Searches for installed software

      • pmropn.exe (PID: 6732)
      • rundll32.exe (PID: 6800)
      • svchost.exe (PID: 1276)
      • reg.exe (PID: 2996)
      • ContentI3.exe (PID: 5916)
      • pmservice.exe (PID: 6328)
      • pmropn.exe (PID: 5864)
      • Opera_GX_assistant_73.0.3856.382_Setup.exe_sfx.exe (PID: 1804)
      • pmropn64.exe (PID: 6632)
      • pmropn32.exe (PID: 6256)
      • notepad.exe (PID: 4548)
      • unsecapp.exe (PID: 1348)
      • pmropn.exe (PID: 4360)
      • assistant_installer.exe (PID: 6792)
      • assistant_installer.exe (PID: 3640)
      • installer.exe (PID: 6476)
      • installer.exe (PID: 1760)
      • dllhost.exe (PID: 6680)
      • Swift Exploit_37393402(1).exe (PID: 6616)
      • setup.exe (PID: 5880)
      • setup.exe (PID: 5544)
      • setup.exe (PID: 4824)
      • setup.exe (PID: 4052)
      • opera.exe (PID: 7008)
      • opera_crashreporter.exe (PID: 6624)
      • opera_crashreporter.exe (PID: 6260)
      • opera.exe (PID: 4976)
      • opera.exe (PID: 3552)
      • opera.exe (PID: 1020)
      • opera_gx_splash.exe (PID: 2356)
      • opera.exe (PID: 7032)
      • opera.exe (PID: 7036)
      • opera.exe (PID: 6232)
      • opera.exe (PID: 5920)
      • opera.exe (PID: 624)
      • CompPkgSrv.exe (PID: 8080)
      • installer.exe (PID: 8380)
      • installer.exe (PID: 8648)
      • opera_autoupdate.exe (PID: 8592)
      • opera_autoupdate.exe (PID: 8556)
      • opera_autoupdate.exe (PID: 8876)
      • opera_autoupdate.exe (PID: 7464)
      • opera.exe (PID: 8628)
      • pmropn.exe (PID: 5256)
      • opera_autoupdate.exe (PID: 8908)
      • opera_autoupdate.exe (PID: 9116)
    • Creates a software uninstall entry

      • pmropn.exe (PID: 6732)
      • ContentI3.exe (PID: 5916)
      • pmservice.exe (PID: 6328)
      • pmropn.exe (PID: 5864)
      • installer.exe (PID: 6476)
    • Start notepad (likely ransomware note)

      • Swift Exploit_37393402(1).exe (PID: 6616)
    • Executes as Windows Service

      • pmservice.exe (PID: 6328)
    • Uses RUNDLL32.EXE to load library

      • pmservice.exe (PID: 6328)
    • Adds/modifies Windows certificates

      • pmservice.exe (PID: 6328)
      • pmropn.exe (PID: 6732)
    • Starts CMD.EXE for commands execution

      • pmservice.exe (PID: 6328)
    • Reads the date of Windows installation

      • installer.exe (PID: 6476)
      • opera.exe (PID: 1020)
      • pmropn.exe (PID: 5864)
    • The process checks if it is being run in the virtual environment

      • opera.exe (PID: 1020)
    • The process executes via Task Scheduler

      • opera_autoupdate.exe (PID: 7464)
    • Reads Microsoft Outlook installation path

      • pmropn.exe (PID: 5864)
    • Reads Internet Explorer settings

      • pmropn.exe (PID: 5864)
    • Reads Mozilla Firefox installation path

      • opera.exe (PID: 1020)
    • Reads the Windows owner or organization settings

      • pmropn.exe (PID: 5864)
    • Potential Corporate Privacy Violation

      • pmropn.exe (PID: 5864)
    • Connects to unusual port

      • pmropn.exe (PID: 5864)
    • Starts POWERSHELL.EXE for commands execution

      • pmropn.exe (PID: 5864)
  • INFO

    • Checks supported languages

      • Swift Exploit_37393402(1).exe (PID: 6616)
      • OperaGX.exe (PID: 644)
      • setup.exe (PID: 4824)
      • setup.exe (PID: 5880)
      • setup.exe (PID: 5548)
      • setup.exe (PID: 4052)
      • ContentI3.exe (PID: 5916)
      • setup.exe (PID: 5544)
      • pmropn.exe (PID: 6732)
      • pmservice.exe (PID: 6328)
      • pmropn.exe (PID: 5864)
      • Opera_GX_assistant_73.0.3856.382_Setup.exe_sfx.exe (PID: 1804)
      • pmropn64.exe (PID: 6632)
      • pmropn32.exe (PID: 6256)
      • pmropn.exe (PID: 4360)
      • assistant_installer.exe (PID: 3640)
      • installer.exe (PID: 6476)
      • installer.exe (PID: 1760)
      • assistant_installer.exe (PID: 6792)
      • opera.exe (PID: 7008)
      • opera_crashreporter.exe (PID: 6624)
      • opera_crashreporter.exe (PID: 6260)
      • opera.exe (PID: 3552)
      • opera.exe (PID: 4976)
      • opera.exe (PID: 1020)
      • opera.exe (PID: 3540)
      • opera.exe (PID: 5404)
      • opera.exe (PID: 2076)
      • opera.exe (PID: 244)
      • opera.exe (PID: 6088)
      • opera.exe (PID: 3632)
      • opera_gx_splash.exe (PID: 2356)
      • opera.exe (PID: 6056)
      • opera.exe (PID: 6840)
      • opera.exe (PID: 3828)
      • opera.exe (PID: 6956)
      • opera.exe (PID: 6908)
      • opera.exe (PID: 7036)
      • opera.exe (PID: 7016)
      • opera.exe (PID: 7032)
      • opera.exe (PID: 624)
      • opera.exe (PID: 6484)
      • opera.exe (PID: 6232)
      • opera.exe (PID: 7176)
      • opera.exe (PID: 5920)
      • opera.exe (PID: 7204)
      • opera.exe (PID: 7420)
      • opera.exe (PID: 7216)
      • opera.exe (PID: 3656)
      • opera.exe (PID: 7980)
      • opera.exe (PID: 8048)
      • opera.exe (PID: 7996)
      • opera.exe (PID: 8016)
      • opera.exe (PID: 8040)
      • opera.exe (PID: 8024)
      • opera.exe (PID: 7988)
      • opera.exe (PID: 8056)
      • opera.exe (PID: 7948)
      • opera.exe (PID: 7972)
      • opera.exe (PID: 8072)
      • opera_autoupdate.exe (PID: 8592)
      • opera.exe (PID: 8156)
      • opera.exe (PID: 8008)
      • opera.exe (PID: 7596)
      • opera.exe (PID: 8228)
      • opera.exe (PID: 8020)
      • opera.exe (PID: 8580)
      • installer.exe (PID: 8380)
      • opera.exe (PID: 8096)
      • opera.exe (PID: 8076)
      • opera_autoupdate.exe (PID: 8556)
      • opera.exe (PID: 8688)
      • installer.exe (PID: 8648)
      • opera_autoupdate.exe (PID: 7464)
      • opera_autoupdate.exe (PID: 8876)
      • opera.exe (PID: 9076)
      • opera.exe (PID: 8904)
      • opera.exe (PID: 7600)
      • opera.exe (PID: 9160)
      • installer.exe (PID: 7644)
      • opera.exe (PID: 8852)
      • opera.exe (PID: 2928)
      • opera.exe (PID: 5616)
      • opera.exe (PID: 9116)
      • opera.exe (PID: 6876)
      • opera.exe (PID: 8168)
      • opera.exe (PID: 8388)
      • opera.exe (PID: 4244)
      • opera.exe (PID: 8588)
      • opera.exe (PID: 8628)
      • opera.exe (PID: 2800)
      • opera.exe (PID: 7224)
      • opera.exe (PID: 7840)
      • pmropn.exe (PID: 5256)
      • opera_autoupdate.exe (PID: 8908)
      • opera.exe (PID: 7632)
      • opera.exe (PID: 8008)
      • opera.exe (PID: 8956)
      • opera_autoupdate.exe (PID: 9116)
    • The sample compiled with english language support

      • Swift Exploit_37393402(1).exe (PID: 6616)
      • setup.exe (PID: 4824)
      • setup.exe (PID: 4052)
      • setup.exe (PID: 5880)
      • setup.exe (PID: 5548)
      • setup.exe (PID: 5544)
      • pmropn.exe (PID: 6732)
      • OperaGX.exe (PID: 644)
      • Opera_GX_assistant_73.0.3856.382_Setup.exe_sfx.exe (PID: 1804)
      • installer.exe (PID: 6476)
      • installer.exe (PID: 1760)
      • ContentI3.exe (PID: 5916)
    • Reads the computer name

      • setup.exe (PID: 4824)
      • Swift Exploit_37393402(1).exe (PID: 6616)
      • setup.exe (PID: 4052)
      • ContentI3.exe (PID: 5916)
      • pmropn.exe (PID: 6732)
      • pmservice.exe (PID: 6328)
      • pmropn.exe (PID: 5864)
      • assistant_installer.exe (PID: 6792)
      • installer.exe (PID: 6476)
      • opera.exe (PID: 7008)
      • opera.exe (PID: 1020)
      • opera.exe (PID: 3552)
      • opera.exe (PID: 4976)
      • opera_gx_splash.exe (PID: 2356)
      • opera.exe (PID: 6484)
      • opera.exe (PID: 5920)
      • opera_autoupdate.exe (PID: 8556)
      • installer.exe (PID: 8380)
      • opera_autoupdate.exe (PID: 7464)
      • opera.exe (PID: 8628)
      • pmropn.exe (PID: 5256)
      • opera_autoupdate.exe (PID: 8908)
    • Create files in a temporary directory

      • setup.exe (PID: 4824)
      • OperaGX.exe (PID: 644)
      • setup.exe (PID: 5880)
      • setup.exe (PID: 4052)
      • setup.exe (PID: 5548)
      • setup.exe (PID: 5544)
      • Swift Exploit_37393402(1).exe (PID: 6616)
      • ContentI3.exe (PID: 5916)
      • Opera_GX_assistant_73.0.3856.382_Setup.exe_sfx.exe (PID: 1804)
      • installer.exe (PID: 1760)
      • installer.exe (PID: 6476)
      • opera.exe (PID: 1020)
      • installer.exe (PID: 8380)
      • installer.exe (PID: 8648)
      • opera_autoupdate.exe (PID: 7464)
      • installer.exe (PID: 7644)
    • Reads the machine GUID from the registry

      • Swift Exploit_37393402(1).exe (PID: 6616)
      • setup.exe (PID: 4824)
      • pmropn.exe (PID: 6732)
      • pmservice.exe (PID: 6328)
      • pmropn.exe (PID: 5864)
      • opera.exe (PID: 1020)
      • opera_autoupdate.exe (PID: 8556)
      • opera_autoupdate.exe (PID: 8592)
      • opera_autoupdate.exe (PID: 7464)
      • opera_autoupdate.exe (PID: 8876)
      • opera_autoupdate.exe (PID: 8908)
      • opera_autoupdate.exe (PID: 9116)
    • Checks proxy server information

      • Swift Exploit_37393402(1).exe (PID: 6616)
      • setup.exe (PID: 4824)
      • pmropn.exe (PID: 6732)
      • pmropn.exe (PID: 5864)
      • opera_autoupdate.exe (PID: 8556)
      • opera_autoupdate.exe (PID: 7464)
      • opera.exe (PID: 8628)
      • opera_autoupdate.exe (PID: 8908)
    • Sends debugging messages

      • Swift Exploit_37393402(1).exe (PID: 6616)
      • assistant_installer.exe (PID: 6792)
    • Creates files or folders in the user directory

      • Swift Exploit_37393402(1).exe (PID: 6616)
      • setup.exe (PID: 5880)
      • setup.exe (PID: 4824)
      • pmropn.exe (PID: 6732)
      • ContentI3.exe (PID: 5916)
      • pmropn.exe (PID: 5864)
      • setup.exe (PID: 4052)
      • installer.exe (PID: 6476)
      • opera.exe (PID: 1020)
      • opera.exe (PID: 4976)
      • opera_autoupdate.exe (PID: 7464)
      • opera.exe (PID: 8628)
    • Reads the software policy settings

      • Swift Exploit_37393402(1).exe (PID: 6616)
      • setup.exe (PID: 4824)
      • pmropn.exe (PID: 6732)
      • pmservice.exe (PID: 6328)
      • pmropn.exe (PID: 5864)
    • The process uses the downloaded file

      • Swift Exploit_37393402(1).exe (PID: 6616)
      • cmd.exe (PID: 1216)
      • cmd.exe (PID: 2428)
      • opera.exe (PID: 8628)
      • opera.exe (PID: 1020)
      • powershell.exe (PID: 8020)
    • Process checks computer location settings

      • Swift Exploit_37393402(1).exe (PID: 6616)
      • opera.exe (PID: 1020)
      • opera.exe (PID: 6956)
      • opera.exe (PID: 6840)
      • opera.exe (PID: 6088)
      • opera.exe (PID: 6908)
      • opera.exe (PID: 7016)
      • opera.exe (PID: 3656)
      • opera.exe (PID: 7216)
      • opera.exe (PID: 7420)
      • opera.exe (PID: 6056)
      • opera.exe (PID: 7204)
      • opera.exe (PID: 7176)
      • opera.exe (PID: 7596)
      • opera.exe (PID: 7600)
      • opera.exe (PID: 9160)
      • opera.exe (PID: 8904)
      • opera.exe (PID: 8588)
      • opera.exe (PID: 3828)
      • opera.exe (PID: 7840)
      • opera.exe (PID: 7224)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 4548)
      • cmd.exe (PID: 1216)
      • cmd.exe (PID: 2428)
    • Creates files in the program directory

      • ContentI3.exe (PID: 5916)
      • reg.exe (PID: 2996)
      • pmropn.exe (PID: 6732)
      • pmservice.exe (PID: 6328)
      • pmropn.exe (PID: 5864)
      • pmropn.exe (PID: 5256)
    • Disables trace logs

      • pmropn.exe (PID: 5864)
    • Manual execution by a user

      • opera.exe (PID: 1020)
    • Drops encrypted VBS script (Microsoft Script Encoder)

      • pmropn.exe (PID: 5864)
    • Reads Microsoft Office registry keys

      • pmropn.exe (PID: 5864)
    • Reads Windows Product ID

      • pmropn.exe (PID: 5864)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:10:18 17:00:18+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.22
CodeSize: 4353024
InitializedDataSize: 1675776
UninitializedDataSize: -
EntryPoint: 0x398c98
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Unknown (0)
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileDescription: Download Manager
FileVersion: 1
InternalName: Download Manager
LegalCopyright: Download Manager
OriginalFileName: Download Manager
ProductName: Download Manager
ProductVersion: 1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
376
Monitored processes
242
Malicious processes
13
Suspicious processes
10

Behavior graph

Click at the process to see the details
start swift exploit_37393402(1).exe operagx.exe setup.exe setup.exe setup.exe setup.exe setup.exe contenti3.exe notepad.exe no specs pmropn.exe pmservice.exe rundll32.exe no specs reg.exe no specs conhost.exe no specs #OSSPROXY pmropn.exe unsecapp.exe no specs cmd.exe no specs cmd.exe no specs pmropn64.exe no specs pmropn32.exe no specs pmropn32.exe no specs pmropn64.exe no specs pmropn64.exe no specs pmropn32.exe no specs checknetisolation.exe no specs conhost.exe no specs pmropn.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs opera_gx_assistant_73.0.3856.382_setup.exe_sfx.exe checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs assistant_installer.exe assistant_installer.exe no specs installer.exe installer.exe UIAutomationCrossBitnessHook32 Class no specs opera.exe no specs opera_crashreporter.exe no specs opera.exe opera_crashreporter.exe no specs opera.exe no specs opera.exe opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera_gx_splash.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs comppkgsrv.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera_autoupdate.exe opera.exe no specs opera.exe no specs opera.exe no specs installer.exe no specs opera_autoupdate.exe opera.exe no specs opera_autoupdate.exe no specs installer.exe no specs opera.exe no specs opera_autoupdate.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs installer.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs opera.exe no specs pmropn.exe opera_autoupdate.exe opera_autoupdate.exe no specs powershell.exe no specs conhost.exe no specs notepad.exe no specs svchost.exe svchost.exe swift exploit_37393402(1).exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
68"C:\PROGRA~2\PREMIE~1\pmropn32.exe" 5864C:\Program Files (x86)\PremierOpinion\pmropn32.execmd.exe
User:
SYSTEM
Company:
VoiceFive, Inc.
Integrity Level:
HIGH
Description:
PremierOpinion
Exit code:
3221226540
Version:
1.0.14.10 (Build 14.10)
Modules
Images
c:\program files (x86)\premieropinion\pmropn32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
244CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.contentdeliverymanager_cw5n1h2txyewyC:\Windows\SysWOW64\CheckNetIsolation.exepmropn.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
AppContainer Network Isolation Diagnostic Tool
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\checknetisolation.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\sechost.dll
244"C:\Users\admin\AppData\Local\Programs\Opera GX\opera.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --enable-quic --with-feature:cashback-assistant=on --with-feature:address-bar-dropdown-autocompleted-domains=on --with-feature:address-bar-dropdown-unfiltered-full=off --with-feature:amazon-new-ids=on --with-feature:cashback-assistant=on --with-feature:continue-on-booking=on --with-feature:continue-on-shopping-via-amp=off --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-cms-configuration=on --with-feature:continue-shopping-explore=off --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-servers=off --with-feature:gx-post-mortem=on --with-feature:gx-reactinator=on --with-feature:gx-spotlight=on --with-feature:gx-video-to-phone=on --with-feature:hide-navigations-from-extensions=on --with-feature:lucid-mode-hide-text=on --with-feature:panic-button=on --with-feature:password-generator=off --with-feature:play-again=on --with-feature:realtime-impressions-reporting=on --with-feature:run-at-startup-default=on --with-feature:sd-suggestions-external=on --with-feature:session-restore-attribution=on --with-feature:side-profiles=on --with-feature:sitecheck-age=on --with-feature:tiktok-panel=on --with-feature:ui-compositor-multithreaded=on --with-feature:installer-experiment-test=off --ab_tests=GXCTest25-ref:DNA-99214_GXCTest25 --field-trial-handle=3232,i,10705159733703816815,960788927905882224,262144 --disable-features=CertificateTransparencyAskBeforeEnabling --variations-seed-version --mojo-platform-channel-handle=3500 /prefetch:8C:\Users\admin\AppData\Local\Programs\Opera GX\opera.exeopera.exe
User:
admin
Company:
Opera Software
Integrity Level:
LOW
Description:
Opera GX Internet Browser
Exit code:
0
Version:
115.0.5322.124
Modules
Images
c:\users\admin\appdata\local\programs\opera gx\opera.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\users\admin\appdata\local\programs\opera gx\115.0.5322.124\opera_elf.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\winmm.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shcore.dll
448CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.xboxgamingoverlay_8wekyb3d8bbweC:\Windows\SysWOW64\CheckNetIsolation.exepmropn.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
AppContainer Network Isolation Diagnostic Tool
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\checknetisolation.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\sechost.dll
488\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeCheckNetIsolation.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
520\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeCheckNetIsolation.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
524\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeCheckNetIsolation.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
624"C:\Users\admin\AppData\Local\Programs\Opera GX\opera.exe" --type=utility --utility-sub-type=opera.lights.mojom.Asus --lang=en-US --service-sandbox-type=none --enable-quic --with-feature:cashback-assistant=on --with-feature:address-bar-dropdown-autocompleted-domains=on --with-feature:address-bar-dropdown-unfiltered-full=off --with-feature:amazon-new-ids=on --with-feature:cashback-assistant=on --with-feature:continue-on-booking=on --with-feature:continue-on-shopping-via-amp=off --with-feature:continue-shopping=on --with-feature:continue-shopping-2=on --with-feature:continue-shopping-5=on --with-feature:continue-shopping-cms-configuration=on --with-feature:continue-shopping-explore=off --with-feature:continue-shopping-structured-partners=on --with-feature:feature-remote-disable-updates-testing-flag=off --with-feature:feature-remote-updates-testing-flag=on --with-feature:game-servers=off --with-feature:gx-post-mortem=on --with-feature:gx-reactinator=on --with-feature:gx-spotlight=on --with-feature:gx-video-to-phone=on --with-feature:hide-navigations-from-extensions=on --with-feature:lucid-mode-hide-text=on --with-feature:panic-button=on --with-feature:password-generator=off --with-feature:play-again=on --with-feature:realtime-impressions-reporting=on --with-feature:run-at-startup-default=on --with-feature:sd-suggestions-external=on --with-feature:session-restore-attribution=on --with-feature:side-profiles=on --with-feature:sitecheck-age=on --with-feature:tiktok-panel=on --with-feature:ui-compositor-multithreaded=on --with-feature:installer-experiment-test=off --ab_tests=GXCTest25-ref:DNA-99214_GXCTest25 --field-trial-handle=4996,i,10705159733703816815,960788927905882224,262144 --disable-features=CertificateTransparencyAskBeforeEnabling --variations-seed-version --mojo-platform-channel-handle=5412 /prefetch:8C:\Users\admin\AppData\Local\Programs\Opera GX\opera.exeopera.exe
User:
admin
Company:
Opera Software
Integrity Level:
MEDIUM
Description:
Opera GX Internet Browser
Exit code:
0
Version:
115.0.5322.124
Modules
Images
c:\users\admin\appdata\local\programs\opera gx\opera.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\users\admin\appdata\local\programs\opera gx\115.0.5322.124\opera_elf.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\winmm.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shcore.dll
644C:\Users\admin\AppData\Local\OperaGX.exe --silent --allusers=0C:\Users\admin\AppData\Local\OperaGX.exe
Swift Exploit_37393402(1).exe
User:
admin
Integrity Level:
HIGH
Description:
Opera installer SFX
Exit code:
0
Version:
115.0.5322.124
Modules
Images
c:\users\admin\appdata\local\operagx.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
716\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeCheckNetIsolation.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
74 297
Read events
72 878
Write events
1 240
Delete events
179

Modification events

(PID) Process:(1276) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator
Operation:writeName:SD
Value:
0100049C5C000000680000000000000014000000020048000300000000001400FF011F0001010000000000051200000000001400A900120001010000000000051300000000001800A900120001020000000000052000000020020000010100000000000512000000010100000000000512000000
(PID) Process:(1276) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\UpdateOrchestrator\Schedule Work
Operation:writeName:Index
Value:
3
(PID) Process:(1276) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{2ABBBFFC-6D6B-4B2E-8A8A-41ECCF29EE97}
Operation:writeName:Hash
Value:
3B6EE4045D97AA11A9FAE50DB375B526D55466B9856CF232E0B3DDF845CC6602
(PID) Process:(1276) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{2ABBBFFC-6D6B-4B2E-8A8A-41ECCF29EE97}
Operation:writeName:Schema
Value:
65538
(PID) Process:(1276) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{2ABBBFFC-6D6B-4B2E-8A8A-41ECCF29EE97}
Operation:delete valueName:Version
Value:
(PID) Process:(1276) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{2ABBBFFC-6D6B-4B2E-8A8A-41ECCF29EE97}
Operation:delete valueName:Date
Value:
(PID) Process:(1276) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{2ABBBFFC-6D6B-4B2E-8A8A-41ECCF29EE97}
Operation:writeName:SecurityDescriptor
Value:
D:P(A;;FA;;;SY)(A;;FRFX;;;LS)(A;;FRFX;;;BA)
(PID) Process:(1276) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{2ABBBFFC-6D6B-4B2E-8A8A-41ECCF29EE97}
Operation:delete valueName:Source
Value:
(PID) Process:(1276) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{2ABBBFFC-6D6B-4B2E-8A8A-41ECCF29EE97}
Operation:delete valueName:Author
Value:
(PID) Process:(1276) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{2ABBBFFC-6D6B-4B2E-8A8A-41ECCF29EE97}
Operation:delete valueName:Description
Value:
Executable files
39
Suspicious files
684
Text files
284
Unknown types
67

Dropped files

PID
Process
Filename
Type
1276svchost.exeC:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Workxml
MD5:5FADF13CCFBDCC5DD728380F7A615B28
SHA256:FF1F73395F6B5B22D5FDA367521FE0DCC31FF252849B7FA85FA346B953A40451
1276svchost.exeC:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Workxml
MD5:C6086D02F8CE044F5FA07A98303DC7EB
SHA256:8901D9C9AEA465DA4EA7AA874610A90B8CF0A71EBA0E321CF9675FCEEE0B54A0
6616Swift Exploit_37393402(1).exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199der
MD5:E935BC5762068CAF3E24A2683B1B8A88
SHA256:A8ACCFCFEB51BD73DF23B91F4D89FF1A9EB7438EF5B12E8AFDA1A6FF1769E89D
6616Swift Exploit_37393402(1).exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199binary
MD5:7B460CB2F731112C619BAFA1C7D8117F
SHA256:E8780A493161ED25FA1E345DD073246131742C5730F18A44ACA60706C458E36C
6616Swift Exploit_37393402(1).exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12der
MD5:67E486B2F148A3FCA863728242B6273E
SHA256:FACAF1C3A4BF232ABCE19A2D534E495B0D3ADC7DBE3797D336249AA6F70ADCFB
1276svchost.exeC:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Workxml
MD5:4838EE953DAB2C7A1BF57E0C6620A79D
SHA256:22C798E00C4793749EAC39CFB6EA3DD75112FD4453A3706E839038A64504D45D
6616Swift Exploit_37393402(1).exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\geo[1].htmtext
MD5:54F5A2884317F25C35491FCEBFEB06DB
SHA256:863A831AE5156E6FE1E3DBF1EB82BD14D10E681306C671A7A73FD118D36C586D
6616Swift Exploit_37393402(1).exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F44F0D8080C8C3429C5AB2379F33E907_9F640C49FF73611C0D8CAD8C0D537F4Bbinary
MD5:C2271044BE2C9E71397B8CECE5D610A5
SHA256:A2B1D56E0BA9CAC1CA431504707C17F151EC719BE3D5939D2C6EDE34579B9C71
6616Swift Exploit_37393402(1).exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F44F0D8080C8C3429C5AB2379F33E907_9F640C49FF73611C0D8CAD8C0D537F4Bder
MD5:4B1CC75668F2C8DF3E2A6F300E7BE5EE
SHA256:1C561FF37D9B038A4DB80EA616F75C08B4FC8A9DE07698AC21966E19BB22A928
6616Swift Exploit_37393402(1).exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B6BD014FE716C91658DE6501B31ECBCE_71EABA1FC0F37A6D83E57B2451A27470binary
MD5:A83628890B6DE7A170365C6B952C39C2
SHA256:07AD1ABFD36F29212941C7E23D8FED0E3960F7FA0E66007C1F5A3921CFAF23CD
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
49
TCP/UDP connections
290
DNS requests
116
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4536
svchost.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4536
svchost.exe
GET
200
23.38.73.129:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.38.73.129:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.38.73.129:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6616
Swift Exploit_37393402(1).exe
GET
200
142.250.185.67:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
whitelisted
6616
Swift Exploit_37393402(1).exe
GET
200
142.250.185.67:80
http://o.pki.goog/s/wr3/0Yg/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBQSq0i5t2Pafi2Gw9uzwnc7KTctWgQUx4H1%2FY6I2QA8TWOiUDEkoM4j%2FiMCEQDRiI70rSJu9AnH4wvTqQA5
unknown
whitelisted
6616
Swift Exploit_37393402(1).exe
GET
200
216.58.206.67:80
http://c.pki.goog/r/r1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4712
MoUsoCoreWorker.exe
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4536
svchost.exe
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
23.38.73.129:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4536
svchost.exe
23.38.73.129:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
23.38.73.129:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5064
SearchApp.exe
2.19.80.24:443
www.bing.com
Akamai International B.V.
DE
whitelisted
5064
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4
System
192.168.100.255:138
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 23.38.73.129
  • 95.101.149.131
whitelisted
www.bing.com
  • 2.19.80.24
  • 2.19.80.35
  • 2.19.80.88
  • 2.19.80.75
  • 2.19.80.89
  • 2.19.80.80
  • 2.19.80.17
  • 2.19.80.50
  • 2.19.80.56
  • 2.19.80.27
  • 2.19.80.99
whitelisted
google.com
  • 142.250.184.206
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 20.190.159.23
  • 20.190.159.2
  • 40.126.31.71
  • 20.190.159.64
  • 20.190.159.73
  • 20.190.159.68
  • 20.190.159.75
  • 40.126.31.73
whitelisted
go.microsoft.com
  • 23.218.210.69
whitelisted
www.dlsft.com
  • 35.190.60.70
unknown
ocsp.pki.goog
  • 142.250.185.67
whitelisted

Threats

PID
Process
Class
Message
5864
pmropn.exe
Potential Corporate Privacy Violation
ET ADWARE_PUP Suspected PUP/PUA User-Agent (OSSProxy)
5864
pmropn.exe
Potential Corporate Privacy Violation
ET ADWARE_PUP PUP/PUA OSSProxy HTTP Header
5864
pmropn.exe
Potential Corporate Privacy Violation
ET ADWARE_PUP Suspected PUP/PUA User-Agent (OSSProxy)
5864
pmropn.exe
Potential Corporate Privacy Violation
ET ADWARE_PUP PUP/PUA OSSProxy HTTP Header
5864
pmropn.exe
Potential Corporate Privacy Violation
ET ADWARE_PUP PUP/PUA OSSProxy HTTP Header
5864
pmropn.exe
Potential Corporate Privacy Violation
ET ADWARE_PUP PUP/PUA OSSProxy HTTP Header
5864
pmropn.exe
Potential Corporate Privacy Violation
ET ADWARE_PUP PUP/PUA OSSProxy HTTP Header
Process
Message
Swift Exploit_37393402(1).exe
Error: (undefined) has no property - value
Swift Exploit_37393402(1).exe
Swift Exploit_37393402(1).exe
Swift Exploit_37393402(1).exe
at initializeDynamicVariables (this://app/main.html(351))
Swift Exploit_37393402(1).exe
at getFileInfo.@307@46 (this://app/main.html(329))
Swift Exploit_37393402(1).exe
scanning node question /questions/question
Swift Exploit_37393402(1).exe
scanning node question /questions/question
Swift Exploit_37393402(1).exe
scanning node question /questions/question
Swift Exploit_37393402(1).exe
scanning node question /questions/question
Swift Exploit_37393402(1).exe
scanning node questions /questions