URL:

https://www.googleadservices.com/pagead/aclk?sa=L&ai=DChcSEwjfzvvNiPKGAxU4XkgAHTo2D8kYABAAGgJjZQ&ae=2&gclid=EAIaIQobChMI3877zYjyhgMVOF5IAB06Ng_JEAAYASAAEgLk1vD_BwE&ohost=www.google.com&cid=CAASJuRog-goo8sW1tnZoqXUHxbHMCIO2dsEO9e_-k_KZ2rXP9FeByxl&sig=AOD64_2V_jF8LWzNuElnh-DjL77D15ENbw&q&adurl&ved=2ahUKEwi42ffNiPKGAxWvHLkGHdaGCXoQ0Qx6BAgQEAE

Full analysis: https://app.any.run/tasks/24507ba3-4b0b-46a2-98f1-e2d33c99d00c
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: June 23, 2024, 15:44:53
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MD5:

366EECB702D0E3B2584C166A2504044B

SHA1:

5694B04FE3EFCB3E19B3D34F42D8BE9E8FFA769F

SHA256:

6D60CB9D1D398D20BA9165C4A54BA94E6C4A9B9E09AE4BBBE9588C215357DBF1

SSDEEP:

6:2OLAAmrDX2x2E0t/9dTyeC6/nmDx5UAGWxr5gqcJDcduar6HQgT/XmvNsTMeWmO/:2DGx2E0tLycnM5TRcJDcdSQgINwMeWB

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • recoverit_setup_full4214.exe (PID: 4060)
      • recoverit_full4214.exe (PID: 3888)
      • recoverit_full4214.tmp (PID: 2812)
      • WAFSetup.exe (PID: 1796)
      • WAFSetup.tmp (PID: 2772)
    • Actions looks like stealing of personal data

      • WAFSetup.tmp (PID: 2772)
    • Creates a writable file in the system directory

      • WAFSetup.tmp (PID: 2772)
  • SUSPICIOUS

    • Reads the Internet Settings

      • recoverit_setup_full4214.exe (PID: 4060)
      • RegAsm.exe (PID: 1916)
      • RegAsm.exe (PID: 3768)
      • RegAsm.exe (PID: 3008)
      • RegAsm.exe (PID: 3724)
      • RegAsm.exe (PID: 2664)
      • RegAsm.exe (PID: 2488)
      • recoverit_full4214.tmp (PID: 2812)
      • recoverit.exe (PID: 2908)
      • diskfeedback.exe (PID: 1568)
      • checkwaf.exe (PID: 348)
      • WsAppClient.exe (PID: 3004)
    • Reads Microsoft Outlook installation path

      • recoverit_setup_full4214.exe (PID: 4060)
    • Reads security settings of Internet Explorer

      • recoverit_setup_full4214.exe (PID: 4060)
      • RegAsm.exe (PID: 1916)
      • RegAsm.exe (PID: 3768)
      • RegAsm.exe (PID: 3008)
      • RegAsm.exe (PID: 3724)
      • RegAsm.exe (PID: 2664)
      • RegAsm.exe (PID: 2488)
      • recoverit_full4214.tmp (PID: 2812)
      • recoverit.exe (PID: 2908)
    • Executable content was dropped or overwritten

      • recoverit_setup_full4214.exe (PID: 4060)
      • recoverit_full4214.exe (PID: 3888)
      • recoverit_full4214.tmp (PID: 2812)
      • WAFSetup.exe (PID: 1796)
      • WAFSetup.tmp (PID: 2772)
    • Likely accesses (executes) a file from the Public directory

      • NFWCHK.exe (PID: 3320)
      • recoverit_full4214.exe (PID: 3888)
      • recoverit_full4214.tmp (PID: 2812)
    • Reads Internet Explorer settings

      • recoverit_setup_full4214.exe (PID: 4060)
    • Connects to unusual port

      • recoverit_setup_full4214.exe (PID: 4060)
    • Checks Windows Trust Settings

      • recoverit_setup_full4214.exe (PID: 4060)
      • RegAsm.exe (PID: 2664)
    • Process requests binary or script from the Internet

      • recoverit_setup_full4214.exe (PID: 4060)
    • Potential Corporate Privacy Violation

      • recoverit_setup_full4214.exe (PID: 4060)
    • Reads the Windows owner or organization settings

      • recoverit_full4214.tmp (PID: 2812)
      • WAFSetup.tmp (PID: 2772)
    • Process drops legitimate windows executable

      • WAFSetup.tmp (PID: 2772)
      • recoverit_full4214.tmp (PID: 2812)
    • The process drops C-runtime libraries

      • recoverit_full4214.tmp (PID: 2812)
    • Reads settings of System Certificates

      • RegAsm.exe (PID: 2664)
      • recoverit_setup_full4214.exe (PID: 4060)
      • recoverit_full4214.tmp (PID: 2812)
    • Adds/modifies Windows certificates

      • RegAsm.exe (PID: 2664)
    • Creates/Modifies COM task schedule object

      • RegAsm.exe (PID: 2664)
      • RegAsm.exe (PID: 2488)
    • Searches for installed software

      • RegAsm.exe (PID: 2664)
      • WsAppService.exe (PID: 3920)
    • Executes as Windows Service

      • WsAppService.exe (PID: 3920)
    • Creates or modifies Windows services

      • WAFSetup.tmp (PID: 2772)
  • INFO

    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 3264)
      • iexplore.exe (PID: 3392)
    • Checks supported languages

      • recoverit_setup_full4214.exe (PID: 4060)
      • NFWCHK.exe (PID: 3320)
      • recoverit_full4214.exe (PID: 3888)
      • recoverit_full4214.tmp (PID: 2812)
      • WAFSetup.exe (PID: 1796)
      • WAFSetup.tmp (PID: 2772)
      • RegAsm.exe (PID: 1916)
      • RegAsm.exe (PID: 3768)
      • RegAsm.exe (PID: 3008)
      • RegAsm.exe (PID: 3724)
      • RegAsm.exe (PID: 2664)
      • WsAppService.exe (PID: 3920)
      • recoverit.exe (PID: 2908)
      • checkwaf.exe (PID: 348)
      • diskfeedback.exe (PID: 1568)
      • WsAppClient.exe (PID: 3004)
      • DiskAnalyzer.exe (PID: 1412)
      • wget.exe (PID: 2292)
      • RegAsm.exe (PID: 2488)
    • Drops the executable file immediately after the start

      • iexplore.exe (PID: 3264)
      • iexplore.exe (PID: 3392)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 3392)
    • The process uses the downloaded file

      • iexplore.exe (PID: 3392)
      • chrome.exe (PID: 2024)
      • chrome.exe (PID: 976)
    • Reads the computer name

      • recoverit_setup_full4214.exe (PID: 4060)
      • NFWCHK.exe (PID: 3320)
      • recoverit_full4214.tmp (PID: 2812)
      • RegAsm.exe (PID: 1916)
      • RegAsm.exe (PID: 3768)
      • RegAsm.exe (PID: 3008)
      • WAFSetup.tmp (PID: 2772)
      • RegAsm.exe (PID: 3724)
      • RegAsm.exe (PID: 2664)
      • RegAsm.exe (PID: 2488)
      • WsAppService.exe (PID: 3920)
      • checkwaf.exe (PID: 348)
      • diskfeedback.exe (PID: 1568)
      • WsAppClient.exe (PID: 3004)
      • recoverit.exe (PID: 2908)
      • DiskAnalyzer.exe (PID: 1412)
      • wget.exe (PID: 2292)
    • Application launched itself

      • iexplore.exe (PID: 3392)
      • chrome.exe (PID: 2204)
      • msedge.exe (PID: 4064)
    • Create files in a temporary directory

      • recoverit_setup_full4214.exe (PID: 4060)
      • recoverit_full4214.tmp (PID: 2812)
      • WAFSetup.exe (PID: 1796)
      • WAFSetup.tmp (PID: 2772)
      • recoverit_full4214.exe (PID: 3888)
    • Reads the machine GUID from the registry

      • recoverit_setup_full4214.exe (PID: 4060)
      • NFWCHK.exe (PID: 3320)
      • RegAsm.exe (PID: 1916)
      • RegAsm.exe (PID: 3768)
      • RegAsm.exe (PID: 3008)
      • RegAsm.exe (PID: 2664)
      • RegAsm.exe (PID: 3724)
      • RegAsm.exe (PID: 2488)
      • WsAppService.exe (PID: 3920)
      • recoverit_full4214.tmp (PID: 2812)
      • diskfeedback.exe (PID: 1568)
      • checkwaf.exe (PID: 348)
      • WsAppClient.exe (PID: 3004)
      • recoverit.exe (PID: 2908)
      • DiskAnalyzer.exe (PID: 1412)
    • Checks proxy server information

      • recoverit_setup_full4214.exe (PID: 4060)
      • RegAsm.exe (PID: 2664)
      • WsAppService.exe (PID: 3920)
    • Creates files in the program directory

      • recoverit_setup_full4214.exe (PID: 4060)
      • recoverit_full4214.tmp (PID: 2812)
      • WAFSetup.tmp (PID: 2772)
      • RegAsm.exe (PID: 3724)
      • RegAsm.exe (PID: 2664)
      • RegAsm.exe (PID: 2488)
      • WsAppService.exe (PID: 3920)
      • recoverit.exe (PID: 2908)
      • WsAppClient.exe (PID: 3004)
      • checkwaf.exe (PID: 348)
      • DiskAnalyzer.exe (PID: 1412)
      • wget.exe (PID: 2292)
      • chrome.exe (PID: 2204)
    • Reads the software policy settings

      • recoverit_setup_full4214.exe (PID: 4060)
      • RegAsm.exe (PID: 2664)
      • recoverit_full4214.tmp (PID: 2812)
    • Creates files or folders in the user directory

      • recoverit_setup_full4214.exe (PID: 4060)
      • recoverit_full4214.tmp (PID: 2812)
    • Creates a software uninstall entry

      • recoverit_full4214.tmp (PID: 2812)
    • Reads Environment values

      • RegAsm.exe (PID: 2664)
      • WsAppService.exe (PID: 3920)
      • diskfeedback.exe (PID: 1568)
      • checkwaf.exe (PID: 348)
      • WsAppClient.exe (PID: 3004)
      • recoverit.exe (PID: 2908)
    • Disables trace logs

      • RegAsm.exe (PID: 2664)
      • diskfeedback.exe (PID: 1568)
      • checkwaf.exe (PID: 348)
      • WsAppClient.exe (PID: 3004)
      • recoverit.exe (PID: 2908)
    • Manual execution by a user

      • msedge.exe (PID: 4064)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
122
Monitored processes
64
Malicious processes
9
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe recoverit_setup_full4214.exe no specs recoverit_setup_full4214.exe nfwchk.exe no specs recoverit_full4214.exe recoverit_full4214.tmp wafsetup.exe wafsetup.tmp regasm.exe no specs regasm.exe regasm.exe regasm.exe no specs regasm.exe iexplore.exe regasm.exe no specs wsappservice.exe recoverit.exe chrome.exe checkwaf.exe diskfeedback.exe chrome.exe no specs wsappclient.exe chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs diskanalyzer.exe no specs chrome.exe no specs wget.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
292"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --disable-quic --mojo-platform-channel-handle=4496 --field-trial-handle=1192,i,4216794995201492058,12004676773283694151,131072 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
348"C:\Program Files\Wondershare\Recoverit\checkwaf.exe" C:\Program Files\Wondershare\Recoverit\checkwaf.exe
recoverit.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\program files\wondershare\recoverit\checkwaf.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\wondershare\recoverit\qt5core.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
724"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --disable-quic --mojo-platform-channel-handle=1956 --field-trial-handle=1192,i,4216794995201492058,12004676773283694151,131072 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
764"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1080 --field-trial-handle=1192,i,4216794995201492058,12004676773283694151,131072 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
976"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --disable-quic --mojo-platform-channel-handle=4628 --field-trial-handle=1192,i,4216794995201492058,12004676773283694151,131072 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1268"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1080 --field-trial-handle=1192,i,4216794995201492058,12004676773283694151,131072 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1412"C:\Program Files\Wondershare\Recoverit\DiskAnalyzer.exe" C:\Program Files\Wondershare\Recoverit\DiskAnalyzer.exerecoverit.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\program files\wondershare\recoverit\diskanalyzer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
1428"C:\Users\admin\Downloads\recoverit_setup_full4214.exe" C:\Users\admin\Downloads\recoverit_setup_full4214.exeiexplore.exe
User:
admin
Integrity Level:
MEDIUM
Description:
recoverit_setup_full4214.exe
Exit code:
3221226540
Version:
4.0.4.20
Modules
Images
c:\users\admin\downloads\recoverit_setup_full4214.exe
c:\windows\system32\ntdll.dll
1460"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=4280 --field-trial-handle=1192,i,4216794995201492058,12004676773283694151,131072 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1568"C:\Program Files\Wondershare\Recoverit\diskfeedback.exe" -G TestC:\Program Files\Wondershare\Recoverit\diskfeedback.exe
recoverit.exe
User:
admin
Company:
Microsoft
Integrity Level:
HIGH
Description:
diskfeedback
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\program files\wondershare\recoverit\diskfeedback.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
98 630
Read events
97 397
Write events
1 140
Delete events
93

Modification events

(PID) Process:(3392) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(3392) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
(PID) Process:(3392) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
31114628
(PID) Process:(3392) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
(PID) Process:(3392) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
31114628
(PID) Process:(3392) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3392) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3392) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3392) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3392) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
209
Suspicious files
742
Text files
589
Unknown types
14

Dropped files

PID
Process
Filename
Type
3264iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAder
MD5:3C5E86B316AF2BD62139E4EB0F41436B
SHA256:064ECD34C59D645B25760F64139327206D70E775A000D875626C989D375AD755
3264iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\4FA45AE1010E09657982D8D28B3BD38E_955ED7CA397C85EAE95373E8AC18EA7Dbinary
MD5:2C1B84617952D2FD5E6D021CB2B39C35
SHA256:1BD23037BAB1433F0550042AE49218956063FCAF8FB5BE7B3E7AB1592229F149
3264iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\RSLSGCQ1.txttext
MD5:B84E75CDE9B7A96DEBD606D8F9A02143
SHA256:5F53C31B83A574B0EB108B2D4574640EEE1A35A4FA63B6467DEEBED74B30ED45
3264iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAbinary
MD5:61D15CF97421226A2E5461B2EA911FC0
SHA256:7E7E6C52BDC86FDC60081EB0D03C998E449886728DC28070B1245B123F1043F9
3264iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\05DDC6AA91765AACACDB0A5F96DF8199der
MD5:8D1040B12A663CA4EC7277CFC1CE44F0
SHA256:3086094D4198A5BBD12938B0D2D5F696C4DFC77E1EAE820ADDED346A59AA8727
3264iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\05DDC6AA91765AACACDB0A5F96DF8199binary
MD5:19C256A4ADE3CE61047DF0544E332F27
SHA256:4F1881D05B5ECA4BCD5D21F8E23AD145FE1FAF7ED507C6D0A33E4728F86D5258
3264iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04binary
MD5:B6E04362FB9E3A86C77222C265DAABAF
SHA256:AC34D98F89828D3940631045A14B844ACC26DCC1E6BCAAAB3C11EC2896C5C635
3264iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\4FA45AE1010E09657982D8D28B3BD38E_955ED7CA397C85EAE95373E8AC18EA7Dder
MD5:E8046F2B9887AD9B5DB09DBE39012CDE
SHA256:2BEFF248C5EDFC407E29C26436C39F41055FB5819B338E512EFDCDCCA528CF07
3264iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:05045459401B1D64C699FFA20B068CF0
SHA256:CDB86DA1C4C3EA40472C1FE1872CE168D6F6A43448175EDD38773F01CF95F5BB
3264iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\data-recovery[1].htmhtml
MD5:A2E839F43BD9B41C9422EF61A0206F85
SHA256:13A2EB7D9916AD5C5D404ECF180183867AD21FF1148BE822797EEE37D6CB1492
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
91
TCP/UDP connections
365
DNS requests
338
Threats
15

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3264
iexplore.exe
GET
304
23.50.131.209:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?e7395a10ad170b70
unknown
unknown
3264
iexplore.exe
GET
304
23.50.131.207:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?e11ed310cb05c77e
unknown
unknown
3264
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbY2QTVWENG9oovp1QifsQ%3D
unknown
unknown
3264
iexplore.exe
GET
200
142.250.185.99:80
http://o.pki.goog/wr2/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTQtSEi8EX%2BbYUTXd8%2ByMxD3s1zQQU3hse7XkV1D43JMMhu%2Bw0OW1CsjACEHB6EjF0WzdkEGFI6omRico%3D
unknown
unknown
3264
iexplore.exe
GET
200
142.250.185.99:80
http://o.pki.goog/wr2/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRTQtSEi8EX%2BbYUTXd8%2ByMxD3s1zQQU3hse7XkV1D43JMMhu%2Bw0OW1CsjACEQDGCgF2SaJtvwmu6gM4lJDO
unknown
unknown
3264
iexplore.exe
GET
200
192.124.249.41:80
http://ocsp.starfieldtech.com//MEIwQDA%2BMDwwOjAJBgUrDgMCGgUABBQUwPiEZQ6%2FsVZNPaFToNfxx8ZwqAQUfAwyH6fZMH%2FEfWijYqihzqsHWycCAQc%3D
unknown
unknown
3264
iexplore.exe
GET
200
142.250.185.99:80
http://o.pki.goog/wr2/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTQtSEi8EX%2BbYUTXd8%2ByMxD3s1zQQU3hse7XkV1D43JMMhu%2Bw0OW1CsjACEEl8TcEFiE%2BWEmblhZ5UF0Y%3D
unknown
unknown
3264
iexplore.exe
GET
200
192.124.249.41:80
http://ocsp.starfieldtech.com//MEQwQjBAMD4wPDAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCAzkUhA%3D%3D
unknown
unknown
3264
iexplore.exe
GET
200
192.124.249.41:80
http://ocsp.starfieldtech.com//MEowSDBGMEQwQjAJBgUrDgMCGgUABBT1ZqtwV0O1KcYi0gdzcFkHM%2BuArAQUJUWBaFAmOD07LSy%2BzWrZtj2zZmMCCQCdltbyYAx6jw%3D%3D
unknown
unknown
3264
iexplore.exe
GET
200
142.250.185.99:80
http://o.pki.goog/wr2/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTQtSEi8EX%2BbYUTXd8%2ByMxD3s1zQQU3hse7XkV1D43JMMhu%2Bw0OW1CsjACEEl8TcEFiE%2BWEmblhZ5UF0Y%3D
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1060
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
whitelisted
1372
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2564
svchost.exe
239.255.255.250:3702
whitelisted
3264
iexplore.exe
142.250.186.162:443
pagead2.googlesyndication.com
GOOGLE
US
whitelisted
3264
iexplore.exe
23.50.131.209:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
unknown
3264
iexplore.exe
23.50.131.207:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
unknown
3264
iexplore.exe
142.250.185.99:80
ocsp.pki.goog
GOOGLE
US
whitelisted
4
System
192.168.100.255:138
whitelisted
3264
iexplore.exe
23.48.23.191:443
recoverit.wondershare.net
Akamai International B.V.
DE
unknown

DNS requests

Domain
IP
Reputation
ctldl.windowsupdate.com
  • 23.50.131.207
  • 23.50.131.221
  • 23.50.131.218
  • 23.50.131.217
  • 23.50.131.220
  • 23.50.131.209
  • 23.50.131.211
  • 23.50.131.219
  • 23.50.131.222
  • 23.50.131.206
  • 23.50.131.203
whitelisted
ocsp.pki.goog
  • 142.250.185.99
whitelisted
c.pki.goog
  • 142.250.185.99
unknown
o.pki.goog
  • 142.250.185.99
unknown
recoverit.wondershare.net
  • 23.48.23.191
  • 23.48.23.151
unknown
ocsp.digicert.com
  • 192.229.221.95
whitelisted
images.wondershare.com
  • 23.48.23.191
  • 23.48.23.151
whitelisted
www.wondershare.com
  • 23.48.23.191
  • 23.48.23.151
whitelisted
neveragain.allstatics.com
  • 23.50.131.89
  • 23.50.131.75
whitelisted
recoverit.wondershare.com
  • 23.48.23.191
  • 23.48.23.151
malicious

Threats

PID
Process
Class
Message
1060
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
1060
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
1060
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
1060
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
1060
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
4060
recoverit_setup_full4214.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
4060
recoverit_setup_full4214.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
1060
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
1060
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
3872
chrome.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
4 ETPRO signatures available at the full report
Process
Message
RegAsm.exe
Cannot delete a subkey tree because the subkey does not exist.
RegAsm.exe
Cannot delete a subkey tree because the subkey does not exist.
RegAsm.exe
Cannot delete a subkey tree because the subkey does not exist.
RegAsm.exe
Cannot delete a subkey tree because the subkey does not exist.
RegAsm.exe
Cannot delete a subkey tree because the subkey does not exist.
RegAsm.exe
Cannot delete a subkey tree because the subkey does not exist.
RegAsm.exe
Cannot delete a subkey tree because the subkey does not exist.
RegAsm.exe
Cannot delete a subkey tree because the subkey does not exist.
RegAsm.exe
Cannot delete a subkey tree because the subkey does not exist.
RegAsm.exe
Cannot delete a subkey tree because the subkey does not exist.