File name:

324.exe

Full analysis: https://app.any.run/tasks/cb35122e-8d51-414a-ad3d-0b21bf2a2dc8
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: February 21, 2025, 14:21:50
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
auto
generic
premieropinion
adware
ossproxy
relevantknowledge
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

15D1C495FF66BF7CEA8A6D14BFDF0A20

SHA1:

942814521FA406A225522F208AC67F90DBDE0AE7

SHA256:

61C2C4A5D7C14F77EE88871DED4CC7F1E49DAE3E4EF209504C66FEDF4D22DE42

SSDEEP:

98304:DtjM+LgnHM8mNLNpOmMGl2p9tjIQh+1GHp8PGmDFzMVv3kdcpR41TBN14BC6SkPT:Kw8

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • GENERIC has been found (auto)

      • 324.exe (PID: 6484)
    • Executing a file with an untrusted certificate

      • 324.exe (PID: 6332)
      • 324.exe (PID: 6484)
      • 324.exe (PID: 7120)
      • 324.exe (PID: 5080)
    • OSSPROXY mutex has been found

      • ContentI3.exe (PID: 4576)
      • ContentI3.exe (PID: 5236)
      • ContentI3.exe (PID: 1704)
      • ContentI3.exe (PID: 4388)
      • pmropn.exe (PID: 6560)
      • pmropn.exe (PID: 4932)
      • pmropn64.exe (PID: 6280)
      • pmropn32.exe (PID: 3828)
      • pmropn.exe (PID: 6768)
    • PREMIEROPINION mutex has been found

      • ContentI3.exe (PID: 5236)
      • ContentI3.exe (PID: 4576)
      • ContentI3.exe (PID: 4388)
      • ContentI3.exe (PID: 1704)
      • pmropn.exe (PID: 6560)
      • pmropn.exe (PID: 4932)
      • pmropn.exe (PID: 6768)
    • RELEVANTKNOWLEDGE mutex has been found

      • rundll32.exe (PID: 6920)
      • pmropn.exe (PID: 6560)
      • pmropn.exe (PID: 4932)
      • pmropn32.exe (PID: 3828)
      • 324.exe (PID: 5080)
    • Runs injected code in another process

      • rundll32.exe (PID: 6920)
    • Application was injected by another process

      • svchost.exe (PID: 1276)
    • Actions looks like stealing of personal data

      • pmropn.exe (PID: 4932)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • 324.exe (PID: 6484)
      • ContentI3.exe (PID: 4576)
      • ContentI3.exe (PID: 4388)
      • ContentI3.exe (PID: 5236)
      • ContentI3.exe (PID: 1704)
      • pmropn.exe (PID: 6560)
      • pmropn.exe (PID: 4932)
      • 324.exe (PID: 5080)
    • There is functionality for taking screenshot (YARA)

      • 324.exe (PID: 6484)
    • Checks Windows Trust Settings

      • 324.exe (PID: 6484)
      • pmropn.exe (PID: 6560)
      • 324.exe (PID: 5080)
      • pmropn.exe (PID: 4932)
    • Executable content was dropped or overwritten

      • 324.exe (PID: 6484)
      • ContentI3.exe (PID: 5236)
      • ContentI3.exe (PID: 1704)
      • ContentI3.exe (PID: 4576)
      • Steam.exe (PID: 6640)
      • pmropn.exe (PID: 6560)
    • The process creates files with name similar to system file names

      • Steam.exe (PID: 6640)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • Steam.exe (PID: 6640)
    • Creates a software uninstall entry

      • pmropn.exe (PID: 6560)
      • ContentI3.exe (PID: 4576)
      • pmservice.exe (PID: 6916)
      • ContentI3.exe (PID: 1704)
      • pmropn.exe (PID: 4932)
    • Adds/modifies Windows certificates

      • pmropn.exe (PID: 6560)
      • pmservice.exe (PID: 6916)
    • Executes as Windows Service

      • pmservice.exe (PID: 6916)
    • Searches for installed software

      • rundll32.exe (PID: 6920)
      • pmservice.exe (PID: 6916)
      • reg.exe (PID: 7128)
      • pmropn.exe (PID: 6560)
      • svchost.exe (PID: 1276)
      • ContentI3.exe (PID: 4576)
      • ContentI3.exe (PID: 1704)
      • pmropn32.exe (PID: 3828)
      • 324.exe (PID: 5080)
      • unsecapp.exe (PID: 1620)
      • pmropn.exe (PID: 4932)
    • Uses RUNDLL32.EXE to load library

      • pmservice.exe (PID: 6916)
    • Starts CMD.EXE for commands execution

      • pmservice.exe (PID: 6916)
  • INFO

    • Checks supported languages

      • 324.exe (PID: 6484)
      • ContentI3.exe (PID: 4576)
      • ContentI3.exe (PID: 5236)
      • ContentI3.exe (PID: 1704)
      • Steam.exe (PID: 6640)
      • ContentI3.exe (PID: 4388)
      • pmropn.exe (PID: 6560)
      • pmservice.exe (PID: 6916)
      • 324.exe (PID: 5080)
      • pmropn.exe (PID: 4932)
      • pmropn32.exe (PID: 3828)
    • The sample compiled with english language support

      • 324.exe (PID: 6484)
      • ContentI3.exe (PID: 5236)
      • ContentI3.exe (PID: 1704)
      • ContentI3.exe (PID: 4576)
      • pmropn.exe (PID: 6560)
    • Reads the computer name

      • 324.exe (PID: 6484)
      • ContentI3.exe (PID: 1704)
      • ContentI3.exe (PID: 4388)
      • ContentI3.exe (PID: 4576)
      • ContentI3.exe (PID: 5236)
      • Steam.exe (PID: 6640)
      • pmropn.exe (PID: 6560)
      • pmservice.exe (PID: 6916)
      • 324.exe (PID: 5080)
      • pmropn.exe (PID: 4932)
    • Reads the machine GUID from the registry

      • 324.exe (PID: 6484)
      • pmropn.exe (PID: 6560)
      • pmservice.exe (PID: 6916)
      • pmropn.exe (PID: 4932)
      • 324.exe (PID: 5080)
    • Checks proxy server information

      • 324.exe (PID: 6484)
      • 324.exe (PID: 5080)
      • pmropn.exe (PID: 6560)
      • pmropn.exe (PID: 4932)
    • Creates files or folders in the user directory

      • 324.exe (PID: 6484)
      • ContentI3.exe (PID: 4388)
      • ContentI3.exe (PID: 4576)
      • ContentI3.exe (PID: 1704)
      • ContentI3.exe (PID: 5236)
      • pmropn.exe (PID: 6560)
      • 324.exe (PID: 5080)
      • pmropn.exe (PID: 4932)
    • Process checks computer location settings

      • 324.exe (PID: 6484)
    • Create files in a temporary directory

      • 324.exe (PID: 6484)
      • ContentI3.exe (PID: 5236)
      • ContentI3.exe (PID: 1704)
      • ContentI3.exe (PID: 4576)
      • Steam.exe (PID: 6640)
    • Reads the software policy settings

      • 324.exe (PID: 6484)
      • pmropn.exe (PID: 6560)
      • pmservice.exe (PID: 6916)
      • 324.exe (PID: 5080)
      • pmropn.exe (PID: 4932)
    • The sample compiled with bulgarian language support

      • 324.exe (PID: 6484)
    • OSSPROXY has been detected

      • ContentI3.exe (PID: 1704)
      • pmservice.exe (PID: 6916)
      • cmd.exe (PID: 7020)
      • cmd.exe (PID: 1220)
    • Creates files in the program directory

      • ContentI3.exe (PID: 4576)
      • ContentI3.exe (PID: 5236)
      • reg.exe (PID: 7128)
      • pmropn.exe (PID: 6560)
      • pmservice.exe (PID: 6916)
      • pmropn.exe (PID: 4932)
    • Manual execution by a user

      • 324.exe (PID: 7120)
      • 324.exe (PID: 5080)
    • Reads security settings of Internet Explorer

      • cmd.exe (PID: 7020)
      • cmd.exe (PID: 1220)
    • Disables trace logs

      • pmropn.exe (PID: 4932)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:10:18 17:00:18+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.22
CodeSize: 4353024
InitializedDataSize: 1675776
UninitializedDataSize: -
EntryPoint: 0x398c98
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Unknown (0)
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileDescription: Download Manager
FileVersion: 1
InternalName: Download Manager
LegalCopyright: Download Manager
OriginalFileName: Download Manager
ProductName: Download Manager
ProductVersion: 1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
286
Monitored processes
151
Malicious processes
15
Suspicious processes
5

Behavior graph

Click at the process to see the details
start 324.exe #PREMIEROPINION contenti3.exe #PREMIEROPINION contenti3.exe #PREMIEROPINION contenti3.exe #PREMIEROPINION contenti3.exe steam.exe #PREMIEROPINION pmropn.exe pmservice.exe no specs #RELEVANTKNOWLEDGE rundll32.exe no specs reg.exe no specs conhost.exe no specs 324.exe no specs #RELEVANTKNOWLEDGE 324.exe #PREMIEROPINION pmropn.exe unsecapp.exe no specs cmd.exe no specs cmd.exe no specs pmropn64.exe no specs pmropn32.exe no specs pmropn64.exe no specs pmropn32.exe no specs #RELEVANTKNOWLEDGE pmropn32.exe no specs pmropn64.exe no specs checknetisolation.exe no specs conhost.exe no specs #PREMIEROPINION pmropn.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs checknetisolation.exe no specs conhost.exe no specs svchost.exe svchost.exe 324.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
432CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.gethelp_8wekyb3d8bbweC:\Windows\SysWOW64\CheckNetIsolation.exepmropn.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
AppContainer Network Isolation Diagnostic Tool
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\checknetisolation.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\sechost.dll
432\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeCheckNetIsolation.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
436"C:\PROGRA~2\PREMIE~1\pmropn64.exe" 4932C:\Program Files (x86)\PremierOpinion\pmropn64.execmd.exe
User:
SYSTEM
Company:
VoiceFive, Inc.
Integrity Level:
HIGH
Description:
PremierOpinion
Exit code:
3221226540
Version:
1.0.14.10 (Build 14.10)
Modules
Images
c:\program files (x86)\premieropinion\pmropn64.exe
c:\windows\system32\ntdll.dll
640CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.apprep.chxapp_cw5n1h2txyewyC:\Windows\SysWOW64\CheckNetIsolation.exepmropn.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
AppContainer Network Isolation Diagnostic Tool
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\checknetisolation.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\sechost.dll
880CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.heifimageextension_8wekyb3d8bbweC:\Windows\SysWOW64\CheckNetIsolation.exepmropn.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
AppContainer Network Isolation Diagnostic Tool
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\checknetisolation.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\sechost.dll
900CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.peopleexperiencehost_cw5n1h2txyewyC:\Windows\SysWOW64\CheckNetIsolation.exepmropn.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
AppContainer Network Isolation Diagnostic Tool
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\checknetisolation.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\sechost.dll
1064CheckNetIsolation.exe LoopbackExempt -a -n=windows.cbspreview_cw5n1h2txyewyC:\Windows\SysWOW64\CheckNetIsolation.exepmropn.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
AppContainer Network Isolation Diagnostic Tool
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\checknetisolation.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\sechost.dll
1076C:\PROGRA~2\PREMIE~1\pmropn32.exe 4932C:\Program Files (x86)\PremierOpinion\pmropn32.execmd.exe
User:
SYSTEM
Company:
VoiceFive, Inc.
Integrity Level:
HIGH
Description:
PremierOpinion
Exit code:
3221226540
Version:
1.0.14.10 (Build 14.10)
Modules
Images
c:\program files (x86)\premieropinion\pmropn32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
1076CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.windows.contentdeliverymanager_cw5n1h2txyewyC:\Windows\SysWOW64\CheckNetIsolation.exepmropn.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
AppContainer Network Isolation Diagnostic Tool
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\checknetisolation.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\sechost.dll
1144CheckNetIsolation.exe LoopbackExempt -a -n=microsoft.vp9videoextensions_8wekyb3d8bbweC:\Windows\SysWOW64\CheckNetIsolation.exepmropn.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
AppContainer Network Isolation Diagnostic Tool
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\checknetisolation.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\sechost.dll
Total events
29 540
Read events
28 910
Write events
346
Delete events
284

Modification events

(PID) Process:(6484) 324.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6484) 324.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6484) 324.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(1276) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{C2AF3602-9179-4BAE-85B3-74A4EF5CF51F}
Operation:writeName:DynamicInfo
Value:
03000000BDCB09F80A59DA01F7324AF46B84DB0100000000000000003365ABFA6B84DB01
(PID) Process:(1276) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\WindowsUpdate\RUXIM
Operation:writeName:SD
Value:
0100049C5C000000680000000000000014000000020048000300000000001400FF011F0001010000000000051200000000001400A900120001010000000000051300000000001800A900120001020000000000052000000020020000010100000000000512000000010100000000000512000000
(PID) Process:(1276) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree\Microsoft\Windows\WindowsUpdate\RUXIM\PLUGScheduler
Operation:writeName:Index
Value:
2
(PID) Process:(1276) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{6C5B5846-5719-4E9F-A370-765D876DB0EF}
Operation:writeName:Hash
Value:
616EF862EC8F7E8ED858D89898FB22EF900ABC366B1E9928E10AF3530ADF5430
(PID) Process:(1276) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{6C5B5846-5719-4E9F-A370-765D876DB0EF}
Operation:writeName:Schema
Value:
65540
(PID) Process:(1276) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{6C5B5846-5719-4E9F-A370-765D876DB0EF}
Operation:writeName:Version
Value:
1.0
(PID) Process:(1276) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{6C5B5846-5719-4E9F-A370-765D876DB0EF}
Operation:delete valueName:Date
Value:
Executable files
37
Suspicious files
36
Text files
61
Unknown types
0

Dropped files

PID
Process
Filename
Type
6484324.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\geo[1].htmtext
MD5:2874D626FD954095B889237389AEB4A9
SHA256:45FBA94AE70DCD834456A3869527994FBAF8801BAFB73D83B85DC167E4D7AB45
6484324.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\service[1].htmtext
MD5:CB5E100E5A9A3E7F6D1FD97512215282
SHA256:CA00FCCFB408989EDDC401062C4D1219A6ACEB6B9B55412357F1790862E8F178
6484324.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\923CD0F3EDBB3759A875E7FE664C6C90_E177412028F15791C29E67CACD8927FCbinary
MD5:8E9CCE7D9200C6D15DDC8D224FF838FD
SHA256:7424E1CB118A5825DF5045C0C19329FDD6EC790D7B172ED60D70DB1A252B75FB
6484324.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAder
MD5:300BAD160CE7505B400B0706919A3EE1
SHA256:AECC299B9EA086D582D984442DDC39C5150756582C22C332807E380C8E1AD056
6484324.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199binary
MD5:824CE0F3E5205C44BFEAB89E8C809E4F
SHA256:252DC82035FC332D35E6429B4B1F25E33D6DA40F7C4B660838D7DF3DD64079AE
6484324.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAbinary
MD5:3EAB03A3B959BE4EEDC904C4BE8AFB61
SHA256:D17A393C42922263A3C001EF8AE14414D375784687BE0BD7D255F36DE07E8977
6484324.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C2C9D7FCC58B6FD9BF152E66809C1BBE_9962014287DF49023620C3F0C27B8ACEbinary
MD5:BBE63CBA274D24848BD5F76671A059AA
SHA256:98F72CC12225ECB69813A950B3DF909E709432FD4F6FA27F1EBB25E353F0EB8A
6484324.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C2C9D7FCC58B6FD9BF152E66809C1BBE_9962014287DF49023620C3F0C27B8ACEbinary
MD5:A5A9C4089CEBC59286C20D6135F47D13
SHA256:5621CCB0A0AFDFAA4891E15E3715DFCE4D6914D1301DEFA8A0515315842F01D5
6484324.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199binary
MD5:E935BC5762068CAF3E24A2683B1B8A88
SHA256:A8ACCFCFEB51BD73DF23B91F4D89FF1A9EB7438EF5B12E8AFDA1A6FF1769E89D
6484324.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12binary
MD5:C9BE626E9715952E9B70F92F912B9787
SHA256:C13E8D22800C200915F87F71C31185053E4E60CA25DE2E41E160E09CD2D815D4
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
24
TCP/UDP connections
105
DNS requests
35
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6484
324.exe
GET
200
172.64.149.23:80
http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m%2FWqorSs9UgOHYm8Cd8rIDZssCEBN9U5yqfDGppDNwGWiEeo0%3D
unknown
whitelisted
2456
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2456
svchost.exe
GET
200
23.32.238.107:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6484
324.exe
GET
200
142.250.184.227:80
http://c.pki.goog/r/r4.crl
unknown
whitelisted
6484
324.exe
GET
200
142.250.184.227:80
http://c.pki.goog/r/gsr1.crl
unknown
whitelisted
6484
324.exe
GET
200
216.58.206.35:80
http://o.pki.goog/s/wr3/URM/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQSq0i5t2Pafi2Gw9uzwnc7KTctWgQUx4H1%2FY6I2QA8TWOiUDEkoM4j%2FiMCEFET1OsgXJOMCsceBPevDRA%3D
unknown
whitelisted
6484
324.exe
GET
200
142.250.184.227:80
http://c.pki.goog/r/r1.crl
unknown
whitelisted
6484
324.exe
GET
200
216.58.206.35:80
http://o.pki.goog/s/wr3/fgA/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQSq0i5t2Pafi2Gw9uzwnc7KTctWgQUx4H1%2FY6I2QA8TWOiUDEkoM4j%2FiMCEH4AzC8CtsuHCuCmoKpV7Vk%3D
unknown
whitelisted
1176
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6484
324.exe
GET
200
172.217.18.99:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
104.126.37.185:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2456
svchost.exe
23.32.238.107:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
2456
svchost.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
6136
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6484
324.exe
35.190.60.70:443
www.dlsft.com
GOOGLE
US
whitelisted
6484
324.exe
172.217.18.99:80
ocsp.pki.goog
GOOGLE
US
whitelisted
6484
324.exe
142.250.184.227:80
c.pki.goog
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
www.bing.com
  • 104.126.37.185
  • 104.126.37.163
  • 104.126.37.178
  • 104.126.37.176
  • 104.126.37.170
  • 104.126.37.130
  • 104.126.37.171
  • 104.126.37.131
  • 104.126.37.123
  • 92.123.104.26
  • 92.123.104.13
  • 92.123.104.18
  • 92.123.104.21
  • 92.123.104.23
  • 92.123.104.15
  • 92.123.104.27
  • 92.123.104.22
  • 92.123.104.19
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 23.32.238.107
  • 23.32.238.112
whitelisted
google.com
  • 216.58.212.142
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
www.dlsft.com
  • 35.190.60.70
unknown
ocsp.pki.goog
  • 172.217.18.99
whitelisted
c.pki.goog
  • 142.250.184.227
whitelisted
o.pki.goog
  • 216.58.206.35
whitelisted
dlsft.com
  • 35.190.60.70
unknown

Threats

No threats detected
Process
Message
324.exe
324.exe
at initializeDynamicVariables (this://app/main.html(351))
324.exe
Error: (undefined) has no property - value
324.exe
324.exe
at getFileInfo.@307@46 (this://app/main.html(329))
324.exe
scanning node question /questions/question
324.exe
scanning node question /questions/question
324.exe
scanning node question /questions/question
324.exe
scanning node questions /questions
324.exe
scanning node question /questions/question