URL:

https://www.googleadservices.com/pagead/aclk?sa=L&ai=DChcSEwjfzvvNiPKGAxU4XkgAHTo2D8kYABAAGgJjZQ&ae=2&gclid=EAIaIQobChMI3877zYjyhgMVOF5IAB06Ng_JEAAYASAAEgLk1vD_BwE&ohost=www.google.com&cid=CAASJuRog-goo8sW1tnZoqXUHxbHMCIO2dsEO9e_-k_KZ2rXP9FeByxl&sig=AOD64_2V_jF8LWzNuElnh-DjL77D15ENbw&q&adurl&ved=2ahUKEwi42ffNiPKGAxWvHLkGHdaGCXoQ0Qx6BAgQEAE

Full analysis: https://app.any.run/tasks/24507ba3-4b0b-46a2-98f1-e2d33c99d00c
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: June 23, 2024, 15:44:53
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MD5:

366EECB702D0E3B2584C166A2504044B

SHA1:

5694B04FE3EFCB3E19B3D34F42D8BE9E8FFA769F

SHA256:

6D60CB9D1D398D20BA9165C4A54BA94E6C4A9B9E09AE4BBBE9588C215357DBF1

SSDEEP:

6:2OLAAmrDX2x2E0t/9dTyeC6/nmDx5UAGWxr5gqcJDcduar6HQgT/XmvNsTMeWmO/:2DGx2E0tLycnM5TRcJDcdSQgINwMeWB

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • recoverit_setup_full4214.exe (PID: 4060)
      • recoverit_full4214.exe (PID: 3888)
      • WAFSetup.exe (PID: 1796)
      • WAFSetup.tmp (PID: 2772)
      • recoverit_full4214.tmp (PID: 2812)
    • Actions looks like stealing of personal data

      • WAFSetup.tmp (PID: 2772)
    • Creates a writable file in the system directory

      • WAFSetup.tmp (PID: 2772)
  • SUSPICIOUS

    • Reads the Internet Settings

      • recoverit_setup_full4214.exe (PID: 4060)
      • RegAsm.exe (PID: 1916)
      • RegAsm.exe (PID: 3768)
      • RegAsm.exe (PID: 3008)
      • RegAsm.exe (PID: 3724)
      • RegAsm.exe (PID: 2664)
      • RegAsm.exe (PID: 2488)
      • recoverit.exe (PID: 2908)
      • recoverit_full4214.tmp (PID: 2812)
      • diskfeedback.exe (PID: 1568)
      • WsAppClient.exe (PID: 3004)
      • checkwaf.exe (PID: 348)
    • Reads Microsoft Outlook installation path

      • recoverit_setup_full4214.exe (PID: 4060)
    • Reads security settings of Internet Explorer

      • recoverit_setup_full4214.exe (PID: 4060)
      • RegAsm.exe (PID: 1916)
      • RegAsm.exe (PID: 3768)
      • RegAsm.exe (PID: 3008)
      • RegAsm.exe (PID: 3724)
      • RegAsm.exe (PID: 2664)
      • RegAsm.exe (PID: 2488)
      • recoverit_full4214.tmp (PID: 2812)
      • recoverit.exe (PID: 2908)
    • Executable content was dropped or overwritten

      • recoverit_setup_full4214.exe (PID: 4060)
      • recoverit_full4214.exe (PID: 3888)
      • recoverit_full4214.tmp (PID: 2812)
      • WAFSetup.exe (PID: 1796)
      • WAFSetup.tmp (PID: 2772)
    • Reads Internet Explorer settings

      • recoverit_setup_full4214.exe (PID: 4060)
    • Likely accesses (executes) a file from the Public directory

      • NFWCHK.exe (PID: 3320)
      • recoverit_full4214.exe (PID: 3888)
      • recoverit_full4214.tmp (PID: 2812)
    • Reads the Windows owner or organization settings

      • recoverit_full4214.tmp (PID: 2812)
      • WAFSetup.tmp (PID: 2772)
    • Connects to unusual port

      • recoverit_setup_full4214.exe (PID: 4060)
    • Process requests binary or script from the Internet

      • recoverit_setup_full4214.exe (PID: 4060)
    • Reads settings of System Certificates

      • recoverit_setup_full4214.exe (PID: 4060)
      • RegAsm.exe (PID: 2664)
      • recoverit_full4214.tmp (PID: 2812)
    • Checks Windows Trust Settings

      • recoverit_setup_full4214.exe (PID: 4060)
      • RegAsm.exe (PID: 2664)
    • Potential Corporate Privacy Violation

      • recoverit_setup_full4214.exe (PID: 4060)
    • The process drops C-runtime libraries

      • recoverit_full4214.tmp (PID: 2812)
    • Process drops legitimate windows executable

      • WAFSetup.tmp (PID: 2772)
      • recoverit_full4214.tmp (PID: 2812)
    • Adds/modifies Windows certificates

      • RegAsm.exe (PID: 2664)
    • Searches for installed software

      • RegAsm.exe (PID: 2664)
      • WsAppService.exe (PID: 3920)
    • Creates/Modifies COM task schedule object

      • RegAsm.exe (PID: 2488)
      • RegAsm.exe (PID: 2664)
    • Creates or modifies Windows services

      • WAFSetup.tmp (PID: 2772)
    • Executes as Windows Service

      • WsAppService.exe (PID: 3920)
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 3392)
      • chrome.exe (PID: 2204)
      • msedge.exe (PID: 4064)
    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 3264)
      • iexplore.exe (PID: 3392)
    • Drops the executable file immediately after the start

      • iexplore.exe (PID: 3264)
      • iexplore.exe (PID: 3392)
    • Reads the computer name

      • recoverit_setup_full4214.exe (PID: 4060)
      • NFWCHK.exe (PID: 3320)
      • recoverit_full4214.tmp (PID: 2812)
      • WAFSetup.tmp (PID: 2772)
      • RegAsm.exe (PID: 1916)
      • RegAsm.exe (PID: 3768)
      • RegAsm.exe (PID: 3724)
      • RegAsm.exe (PID: 3008)
      • RegAsm.exe (PID: 2664)
      • RegAsm.exe (PID: 2488)
      • WsAppService.exe (PID: 3920)
      • recoverit.exe (PID: 2908)
      • diskfeedback.exe (PID: 1568)
      • checkwaf.exe (PID: 348)
      • WsAppClient.exe (PID: 3004)
      • DiskAnalyzer.exe (PID: 1412)
      • wget.exe (PID: 2292)
    • The process uses the downloaded file

      • iexplore.exe (PID: 3392)
      • chrome.exe (PID: 976)
      • chrome.exe (PID: 2024)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 3392)
    • Checks proxy server information

      • recoverit_setup_full4214.exe (PID: 4060)
      • RegAsm.exe (PID: 2664)
      • WsAppService.exe (PID: 3920)
    • Reads the machine GUID from the registry

      • recoverit_setup_full4214.exe (PID: 4060)
      • NFWCHK.exe (PID: 3320)
      • RegAsm.exe (PID: 1916)
      • RegAsm.exe (PID: 3768)
      • RegAsm.exe (PID: 3008)
      • RegAsm.exe (PID: 3724)
      • RegAsm.exe (PID: 2664)
      • RegAsm.exe (PID: 2488)
      • WsAppService.exe (PID: 3920)
      • recoverit_full4214.tmp (PID: 2812)
      • diskfeedback.exe (PID: 1568)
      • checkwaf.exe (PID: 348)
      • WsAppClient.exe (PID: 3004)
      • recoverit.exe (PID: 2908)
      • DiskAnalyzer.exe (PID: 1412)
    • Create files in a temporary directory

      • recoverit_setup_full4214.exe (PID: 4060)
      • recoverit_full4214.exe (PID: 3888)
      • recoverit_full4214.tmp (PID: 2812)
      • WAFSetup.exe (PID: 1796)
      • WAFSetup.tmp (PID: 2772)
    • Checks supported languages

      • recoverit_setup_full4214.exe (PID: 4060)
      • NFWCHK.exe (PID: 3320)
      • recoverit_full4214.exe (PID: 3888)
      • recoverit_full4214.tmp (PID: 2812)
      • WAFSetup.exe (PID: 1796)
      • WAFSetup.tmp (PID: 2772)
      • RegAsm.exe (PID: 1916)
      • RegAsm.exe (PID: 3768)
      • RegAsm.exe (PID: 3008)
      • RegAsm.exe (PID: 3724)
      • RegAsm.exe (PID: 2664)
      • RegAsm.exe (PID: 2488)
      • WsAppService.exe (PID: 3920)
      • recoverit.exe (PID: 2908)
      • checkwaf.exe (PID: 348)
      • diskfeedback.exe (PID: 1568)
      • WsAppClient.exe (PID: 3004)
      • DiskAnalyzer.exe (PID: 1412)
      • wget.exe (PID: 2292)
    • Creates files in the program directory

      • recoverit_setup_full4214.exe (PID: 4060)
      • recoverit_full4214.tmp (PID: 2812)
      • WAFSetup.tmp (PID: 2772)
      • RegAsm.exe (PID: 3724)
      • RegAsm.exe (PID: 2664)
      • RegAsm.exe (PID: 2488)
      • WsAppService.exe (PID: 3920)
      • recoverit.exe (PID: 2908)
      • WsAppClient.exe (PID: 3004)
      • checkwaf.exe (PID: 348)
      • DiskAnalyzer.exe (PID: 1412)
      • wget.exe (PID: 2292)
      • chrome.exe (PID: 2204)
    • Creates files or folders in the user directory

      • recoverit_setup_full4214.exe (PID: 4060)
      • recoverit_full4214.tmp (PID: 2812)
    • Reads the software policy settings

      • recoverit_setup_full4214.exe (PID: 4060)
      • RegAsm.exe (PID: 2664)
      • recoverit_full4214.tmp (PID: 2812)
    • Creates a software uninstall entry

      • recoverit_full4214.tmp (PID: 2812)
    • Reads Environment values

      • RegAsm.exe (PID: 2664)
      • WsAppService.exe (PID: 3920)
      • diskfeedback.exe (PID: 1568)
      • checkwaf.exe (PID: 348)
      • WsAppClient.exe (PID: 3004)
      • recoverit.exe (PID: 2908)
    • Disables trace logs

      • RegAsm.exe (PID: 2664)
      • diskfeedback.exe (PID: 1568)
      • checkwaf.exe (PID: 348)
      • recoverit.exe (PID: 2908)
      • WsAppClient.exe (PID: 3004)
    • Manual execution by a user

      • msedge.exe (PID: 4064)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
122
Monitored processes
64
Malicious processes
9
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe recoverit_setup_full4214.exe no specs recoverit_setup_full4214.exe nfwchk.exe no specs recoverit_full4214.exe recoverit_full4214.tmp wafsetup.exe wafsetup.tmp regasm.exe no specs regasm.exe regasm.exe regasm.exe no specs regasm.exe iexplore.exe regasm.exe no specs wsappservice.exe recoverit.exe chrome.exe checkwaf.exe diskfeedback.exe chrome.exe no specs wsappclient.exe chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs diskanalyzer.exe no specs chrome.exe no specs wget.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
292"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --disable-quic --mojo-platform-channel-handle=4496 --field-trial-handle=1192,i,4216794995201492058,12004676773283694151,131072 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
348"C:\Program Files\Wondershare\Recoverit\checkwaf.exe" C:\Program Files\Wondershare\Recoverit\checkwaf.exe
recoverit.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\program files\wondershare\recoverit\checkwaf.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\wondershare\recoverit\qt5core.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
724"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --disable-quic --mojo-platform-channel-handle=1956 --field-trial-handle=1192,i,4216794995201492058,12004676773283694151,131072 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
764"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1080 --field-trial-handle=1192,i,4216794995201492058,12004676773283694151,131072 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
976"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --disable-quic --mojo-platform-channel-handle=4628 --field-trial-handle=1192,i,4216794995201492058,12004676773283694151,131072 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1268"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1080 --field-trial-handle=1192,i,4216794995201492058,12004676773283694151,131072 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1412"C:\Program Files\Wondershare\Recoverit\DiskAnalyzer.exe" C:\Program Files\Wondershare\Recoverit\DiskAnalyzer.exerecoverit.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\program files\wondershare\recoverit\diskanalyzer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
1428"C:\Users\admin\Downloads\recoverit_setup_full4214.exe" C:\Users\admin\Downloads\recoverit_setup_full4214.exeiexplore.exe
User:
admin
Integrity Level:
MEDIUM
Description:
recoverit_setup_full4214.exe
Exit code:
3221226540
Version:
4.0.4.20
Modules
Images
c:\users\admin\downloads\recoverit_setup_full4214.exe
c:\windows\system32\ntdll.dll
1460"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=4280 --field-trial-handle=1192,i,4216794995201492058,12004676773283694151,131072 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1568"C:\Program Files\Wondershare\Recoverit\diskfeedback.exe" -G TestC:\Program Files\Wondershare\Recoverit\diskfeedback.exe
recoverit.exe
User:
admin
Company:
Microsoft
Integrity Level:
HIGH
Description:
diskfeedback
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\program files\wondershare\recoverit\diskfeedback.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
98 630
Read events
97 397
Write events
1 140
Delete events
93

Modification events

(PID) Process:(3392) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(3392) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(3392) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
31114628
(PID) Process:(3392) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(3392) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
31114628
(PID) Process:(3392) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3392) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3392) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3392) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3392) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
209
Suspicious files
742
Text files
589
Unknown types
14

Dropped files

PID
Process
Filename
Type
3264iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199binary
MD5:19C256A4ADE3CE61047DF0544E332F27
SHA256:4F1881D05B5ECA4BCD5D21F8E23AD145FE1FAF7ED507C6D0A33E4728F86D5258
3264iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAder
MD5:3C5E86B316AF2BD62139E4EB0F41436B
SHA256:064ECD34C59D645B25760F64139327206D70E775A000D875626C989D375AD755
3264iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4FA45AE1010E09657982D8D28B3BD38E_955ED7CA397C85EAE95373E8AC18EA7Dder
MD5:E8046F2B9887AD9B5DB09DBE39012CDE
SHA256:2BEFF248C5EDFC407E29C26436C39F41055FB5819B338E512EFDCDCCA528CF07
3264iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAbinary
MD5:61D15CF97421226A2E5461B2EA911FC0
SHA256:7E7E6C52BDC86FDC60081EB0D03C998E449886728DC28070B1245B123F1043F9
3264iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04der
MD5:7B438C3411FD2C0A98E3B583DA76C261
SHA256:C48807A5A8B532A0AB2FC19212F81E91D6A00DF7E0048ABFE36F12AE900C3C8E
3264iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\RSLSGCQ1.txttext
MD5:B84E75CDE9B7A96DEBD606D8F9A02143
SHA256:5F53C31B83A574B0EB108B2D4574640EEE1A35A4FA63B6467DEEBED74B30ED45
3264iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\data-recovery[1].htmhtml
MD5:A2E839F43BD9B41C9422EF61A0206F85
SHA256:13A2EB7D9916AD5C5D404ECF180183867AD21FF1148BE822797EEE37D6CB1492
3264iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\jiaobiao[1].svgimage
MD5:2DE3B24E3D7F890611ABA9A6DD0AF0A9
SHA256:D580A817B72A691ED5BC894BEF8DCADE77D6DAF29852CAA432C8EA8C92D37044
3264iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4FA45AE1010E09657982D8D28B3BD38E_955ED7CA397C85EAE95373E8AC18EA7Dbinary
MD5:2C1B84617952D2FD5E6D021CB2B39C35
SHA256:1BD23037BAB1433F0550042AE49218956063FCAF8FB5BE7B3E7AB1592229F149
3264iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\banner[1].pngimage
MD5:1B2D4EB62EBD91520AA65A24E7A8B7C7
SHA256:5D7DCF890A51C8BE097EFD760215BA1220D76939CA47FD76ABD1229170558480
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
91
TCP/UDP connections
365
DNS requests
338
Threats
15

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3264
iexplore.exe
GET
304
23.50.131.209:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?e7395a10ad170b70
unknown
unknown
3264
iexplore.exe
GET
200
142.250.185.99:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
unknown
3264
iexplore.exe
GET
200
142.250.185.99:80
http://c.pki.goog/r/r1.crl
unknown
unknown
3264
iexplore.exe
GET
304
23.50.131.207:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?e11ed310cb05c77e
unknown
unknown
3264
iexplore.exe
GET
200
142.250.185.99:80
http://o.pki.goog/wr2/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTQtSEi8EX%2BbYUTXd8%2ByMxD3s1zQQU3hse7XkV1D43JMMhu%2Bw0OW1CsjACEHB6EjF0WzdkEGFI6omRico%3D
unknown
unknown
3264
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbY2QTVWENG9oovp1QifsQ%3D
unknown
unknown
3264
iexplore.exe
GET
200
142.250.185.99:80
http://o.pki.goog/wr2/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRTQtSEi8EX%2BbYUTXd8%2ByMxD3s1zQQU3hse7XkV1D43JMMhu%2Bw0OW1CsjACEQDGCgF2SaJtvwmu6gM4lJDO
unknown
unknown
3264
iexplore.exe
GET
200
192.124.249.41:80
http://ocsp.starfieldtech.com//MEQwQjBAMD4wPDAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCAzkUhA%3D%3D
unknown
unknown
3264
iexplore.exe
GET
200
192.124.249.41:80
http://ocsp.starfieldtech.com//MEIwQDA%2BMDwwOjAJBgUrDgMCGgUABBQUwPiEZQ6%2FsVZNPaFToNfxx8ZwqAQUfAwyH6fZMH%2FEfWijYqihzqsHWycCAQc%3D
unknown
unknown
3264
iexplore.exe
GET
200
192.124.249.41:80
http://ocsp.starfieldtech.com//MEowSDBGMEQwQjAJBgUrDgMCGgUABBT1ZqtwV0O1KcYi0gdzcFkHM%2BuArAQUJUWBaFAmOD07LSy%2BzWrZtj2zZmMCCQCdltbyYAx6jw%3D%3D
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1060
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
whitelisted
1372
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2564
svchost.exe
239.255.255.250:3702
whitelisted
3264
iexplore.exe
142.250.186.162:443
pagead2.googlesyndication.com
GOOGLE
US
whitelisted
3264
iexplore.exe
23.50.131.209:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
unknown
3264
iexplore.exe
23.50.131.207:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
unknown
3264
iexplore.exe
142.250.185.99:80
ocsp.pki.goog
GOOGLE
US
whitelisted
4
System
192.168.100.255:138
whitelisted
3264
iexplore.exe
23.48.23.191:443
recoverit.wondershare.net
Akamai International B.V.
DE
unknown

DNS requests

Domain
IP
Reputation
ctldl.windowsupdate.com
  • 23.50.131.207
  • 23.50.131.221
  • 23.50.131.218
  • 23.50.131.217
  • 23.50.131.220
  • 23.50.131.209
  • 23.50.131.211
  • 23.50.131.219
  • 23.50.131.222
  • 23.50.131.206
  • 23.50.131.203
whitelisted
ocsp.pki.goog
  • 142.250.185.99
whitelisted
c.pki.goog
  • 142.250.185.99
unknown
o.pki.goog
  • 142.250.185.99
unknown
recoverit.wondershare.net
  • 23.48.23.191
  • 23.48.23.151
unknown
ocsp.digicert.com
  • 192.229.221.95
whitelisted
images.wondershare.com
  • 23.48.23.191
  • 23.48.23.151
whitelisted
www.wondershare.com
  • 23.48.23.191
  • 23.48.23.151
whitelisted
neveragain.allstatics.com
  • 23.50.131.89
  • 23.50.131.75
whitelisted
recoverit.wondershare.com
  • 23.48.23.191
  • 23.48.23.151
malicious

Threats

PID
Process
Class
Message
1060
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
1060
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
1060
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
1060
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
1060
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
4060
recoverit_setup_full4214.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
4060
recoverit_setup_full4214.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
1060
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
1060
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
3872
chrome.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
4 ETPRO signatures available at the full report
Process
Message
RegAsm.exe
Cannot delete a subkey tree because the subkey does not exist.
RegAsm.exe
Cannot delete a subkey tree because the subkey does not exist.
RegAsm.exe
Cannot delete a subkey tree because the subkey does not exist.
RegAsm.exe
Cannot delete a subkey tree because the subkey does not exist.
RegAsm.exe
Cannot delete a subkey tree because the subkey does not exist.
RegAsm.exe
Cannot delete a subkey tree because the subkey does not exist.
RegAsm.exe
Cannot delete a subkey tree because the subkey does not exist.
RegAsm.exe
Cannot delete a subkey tree because the subkey does not exist.
RegAsm.exe
Cannot delete a subkey tree because the subkey does not exist.
RegAsm.exe
Cannot delete a subkey tree because the subkey does not exist.