URL:

https://cdn.gomlab.com/gretech/player/GOMPLAYERGLOBALSETUP_CHROME.EXE

Full analysis: https://app.any.run/tasks/a0714206-ddbd-4dd6-a6a8-26beb1eb522a
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: April 22, 2025, 13:56:21
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
loader
stealer
evasion
obfuscated-js
Indicators:
MD5:

99BAA579C0DD1C5EEF60CBC129E766E6

SHA1:

F38A0FF439AB6FBA912F170968A35CD3F6E6D0E4

SHA256:

7642B226A2E7B31A3DD1726F13D8E687B72F4385428DE8F9661A673FBFAA0118

SSDEEP:

3:N8cR/CX5jJ1AaqVcgHxfsgLgCn:2cR/CX7KTcgRkgp

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • KillGom.exe (PID: 6592)
      • KillGom.exe (PID: 5228)
    • Actions looks like stealing of personal data

      • tabservicepack.exe (PID: 7200)
      • setup.exe (PID: 7520)
      • setup.exe (PID: 1672)
      • setup.exe (PID: 7232)
      • setup.exe (PID: 4224)
      • nsi84BD.tmp (PID: 3304)
    • Steals credentials from Web Browsers

      • setup.exe (PID: 7520)
      • setup.exe (PID: 1672)
      • setup.exe (PID: 4224)
      • setup.exe (PID: 7232)
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • GOMPLAYERGLOBALSETUP_CHROME.EXE (PID: 4000)
    • The process creates files with name similar to system file names

      • GOMPLAYERGLOBALSETUP_CHROME.EXE (PID: 4000)
      • icarus.exe (PID: 6240)
    • Process drops legitimate windows executable

      • GOMPLAYERGLOBALSETUP_CHROME.EXE (PID: 4000)
      • icarus.exe (PID: 6240)
      • Assistant_118.0.5461.41_Setup.exe_sfx.exe (PID: 9956)
    • Executable content was dropped or overwritten

      • GOMPLAYERGLOBALSETUP_CHROME.EXE (PID: 4000)
      • nsf7E53.tmp (PID: 2568)
      • setup.exe (PID: 7520)
      • setup.exe (PID: 1672)
      • setup.exe (PID: 5020)
      • setup.exe (PID: 4224)
      • setup.exe (PID: 7232)
      • nsi84BD.tmp (PID: 3304)
      • nsr8F3D.tmp (PID: 3676)
      • avast_free_antivirus_online_setup.exe (PID: 236)
      • AvastBrowserUpdateSetup.exe (PID: 4976)
      • AvastBrowserUpdate.exe (PID: 864)
      • icarus.exe (PID: 8176)
      • icarus.exe (PID: 6240)
      • GOM.exe (PID: 8832)
      • Assistant_118.0.5461.41_Setup.exe_sfx.exe (PID: 9956)
    • Reads security settings of Internet Explorer

      • GOMPLAYERGLOBALSETUP_CHROME.EXE (PID: 4000)
      • tabservicepack.exe (PID: 7200)
      • GrLauncher.exe (PID: 924)
      • setup.exe (PID: 7520)
      • nsi84BD.tmp (PID: 3304)
      • AvastBrowserUpdate.exe (PID: 864)
      • GOM.exe (PID: 8832)
      • Toast.gom (PID: 8344)
    • There is functionality for taking screenshot (YARA)

      • GOMPLAYERGLOBALSETUP_CHROME.EXE (PID: 4000)
      • setup.exe (PID: 7520)
      • setup.exe (PID: 4224)
      • setup.exe (PID: 1672)
    • Reads Microsoft Outlook installation path

      • GOMPLAYERGLOBALSETUP_CHROME.EXE (PID: 4000)
      • GOM.exe (PID: 8832)
      • Toast.gom (PID: 8344)
    • Searches for installed software

      • GOMPLAYERGLOBALSETUP_CHROME.EXE (PID: 4000)
      • nsi84BD.tmp (PID: 3304)
    • Process requests binary or script from the Internet

      • GOMPLAYERGLOBALSETUP_CHROME.EXE (PID: 4000)
      • AvastBrowserUpdate.exe (PID: 472)
      • GOM.exe (PID: 8832)
    • Reads Internet Explorer settings

      • GOMPLAYERGLOBALSETUP_CHROME.EXE (PID: 4000)
      • GOM.exe (PID: 8832)
    • Creates a software uninstall entry

      • GOMPLAYERGLOBALSETUP_CHROME.EXE (PID: 4000)
    • Starts application with an unusual extension

      • GOMPLAYERGLOBALSETUP_CHROME.EXE (PID: 4000)
      • Toast.gom (PID: 8236)
      • GOM.exe (PID: 8832)
    • Starts itself from another location

      • setup.exe (PID: 7520)
      • AvastBrowserUpdate.exe (PID: 864)
      • icarus.exe (PID: 8176)
    • Application launched itself

      • setup.exe (PID: 7520)
      • setup.exe (PID: 4224)
      • Toast.gom (PID: 8236)
      • assistant_installer.exe (PID: 9992)
    • Reads the BIOS version

      • nsi84BD.tmp (PID: 3304)
    • Checks for external IP

      • svchost.exe (PID: 2196)
      • nsr8F3D.tmp (PID: 3676)
    • The process verifies whether the antivirus software is installed

      • nsi84BD.tmp (PID: 3304)
      • AvastBrowserUpdate.exe (PID: 864)
      • AvastBrowserUpdateComRegisterShell64.exe (PID: 1912)
      • AvastBrowserUpdate.exe (PID: 7420)
      • AvastBrowserUpdate.exe (PID: 7576)
      • AvastBrowserUpdateComRegisterShell64.exe (PID: 2432)
      • AvastBrowserUpdateComRegisterShell64.exe (PID: 7180)
      • AvastBrowserUpdate.exe (PID: 5056)
      • AvastBrowserUpdate.exe (PID: 7256)
      • AvastBrowserUpdate.exe (PID: 472)
      • icarus.exe (PID: 6240)
    • Creates/Modifies COM task schedule object

      • GOMPLAYERGLOBALSETUP_CHROME.EXE (PID: 4000)
      • AvastBrowserUpdateComRegisterShell64.exe (PID: 1912)
      • AvastBrowserUpdate.exe (PID: 7576)
      • AvastBrowserUpdateComRegisterShell64.exe (PID: 2432)
      • AvastBrowserUpdateComRegisterShell64.exe (PID: 7180)
      • AvastBrowserUpdate.exe (PID: 864)
    • Disables SEHOP

      • AvastBrowserUpdate.exe (PID: 864)
    • Executes as Windows Service

      • AvastBrowserUpdate.exe (PID: 472)
    • Potential Corporate Privacy Violation

      • AvastBrowserUpdate.exe (PID: 472)
    • The process drops C-runtime libraries

      • icarus.exe (PID: 6240)
    • The process checks if it is being run in the virtual environment

      • GOM.exe (PID: 8832)
  • INFO

    • Executable content was dropped or overwritten

      • chrome.exe (PID: 7592)
    • The sample compiled with english language support

      • chrome.exe (PID: 7592)
      • GOMPLAYERGLOBALSETUP_CHROME.EXE (PID: 4000)
      • nsf7E53.tmp (PID: 2568)
      • setup.exe (PID: 7520)
      • setup.exe (PID: 1672)
      • setup.exe (PID: 5020)
      • setup.exe (PID: 4224)
      • setup.exe (PID: 7232)
      • nsi84BD.tmp (PID: 3304)
      • nsr8F3D.tmp (PID: 3676)
      • avast_free_antivirus_online_setup.exe (PID: 236)
      • AvastBrowserUpdateSetup.exe (PID: 4976)
      • AvastBrowserUpdate.exe (PID: 864)
      • icarus.exe (PID: 8176)
      • icarus.exe (PID: 6240)
      • Assistant_118.0.5461.41_Setup.exe_sfx.exe (PID: 9956)
    • Checks supported languages

      • GOMPLAYERGLOBALSETUP_CHROME.EXE (PID: 4000)
      • KillGom.exe (PID: 6592)
      • tabservicepack.exe (PID: 7200)
      • KillGom.exe (PID: 5228)
      • GOM.exe (PID: 6972)
      • GOM.exe (PID: 7580)
      • GrLauncher.exe (PID: 924)
      • nsf7E53.tmp (PID: 2568)
      • setup.exe (PID: 7520)
      • setup.exe (PID: 1672)
      • setup.exe (PID: 5020)
      • setup.exe (PID: 4224)
      • setup.exe (PID: 7232)
      • nsi84BD.tmp (PID: 3304)
      • nsr8F3D.tmp (PID: 3676)
      • GOM.exe (PID: 1228)
      • avast_free_antivirus_online_setup.exe (PID: 236)
      • AvastBrowserUpdateSetup.exe (PID: 4976)
      • AvastBrowserUpdate.exe (PID: 864)
      • AvastBrowserUpdate.exe (PID: 7420)
      • AvastBrowserUpdate.exe (PID: 7576)
      • AvastBrowserUpdateComRegisterShell64.exe (PID: 1912)
      • AvastBrowserUpdateComRegisterShell64.exe (PID: 2432)
      • AvastBrowserUpdateComRegisterShell64.exe (PID: 7180)
      • AvastBrowserUpdate.exe (PID: 7256)
      • AvastBrowserUpdate.exe (PID: 5056)
      • AvastBrowserUpdate.exe (PID: 472)
      • icarus.exe (PID: 3768)
      • icarus.exe (PID: 6240)
      • icarus.exe (PID: 8176)
      • GOM.exe (PID: 8832)
      • Toast.gom (PID: 8236)
      • Toast.gom (PID: 8344)
      • Assistant_118.0.5461.41_Setup.exe_sfx.exe (PID: 9956)
    • Reads the computer name

      • GOMPLAYERGLOBALSETUP_CHROME.EXE (PID: 4000)
      • tabservicepack.exe (PID: 7200)
      • GOM.exe (PID: 6972)
      • GrLauncher.exe (PID: 924)
      • GOM.exe (PID: 7580)
      • setup.exe (PID: 7520)
      • setup.exe (PID: 4224)
      • nsi84BD.tmp (PID: 3304)
      • nsr8F3D.tmp (PID: 3676)
      • avast_free_antivirus_online_setup.exe (PID: 236)
      • GOM.exe (PID: 1228)
      • AvastBrowserUpdate.exe (PID: 864)
      • AvastBrowserUpdate.exe (PID: 7420)
      • AvastBrowserUpdate.exe (PID: 7576)
      • AvastBrowserUpdate.exe (PID: 7256)
      • AvastBrowserUpdate.exe (PID: 5056)
      • AvastBrowserUpdate.exe (PID: 472)
      • icarus.exe (PID: 8176)
      • icarus.exe (PID: 6240)
      • icarus.exe (PID: 3768)
      • GOM.exe (PID: 8832)
      • Toast.gom (PID: 8344)
      • identity_helper.exe (PID: 9252)
    • Application launched itself

      • chrome.exe (PID: 7592)
      • msedge.exe (PID: 7172)
      • msedge.exe (PID: 7180)
    • The sample compiled with korean language support

      • GOMPLAYERGLOBALSETUP_CHROME.EXE (PID: 4000)
      • AvastBrowserUpdateSetup.exe (PID: 4976)
      • AvastBrowserUpdate.exe (PID: 864)
    • Checks proxy server information

      • GOMPLAYERGLOBALSETUP_CHROME.EXE (PID: 4000)
      • tabservicepack.exe (PID: 7200)
      • slui.exe (PID: 5892)
      • GrLauncher.exe (PID: 924)
      • setup.exe (PID: 7520)
      • avast_free_antivirus_online_setup.exe (PID: 236)
      • nsi84BD.tmp (PID: 3304)
      • AvastBrowserUpdate.exe (PID: 7256)
      • GOM.exe (PID: 8832)
      • Toast.gom (PID: 8344)
    • Create files in a temporary directory

      • GOMPLAYERGLOBALSETUP_CHROME.EXE (PID: 4000)
      • GrLauncher.exe (PID: 924)
      • nsf7E53.tmp (PID: 2568)
      • setup.exe (PID: 7520)
      • setup.exe (PID: 1672)
      • setup.exe (PID: 5020)
      • setup.exe (PID: 4224)
      • setup.exe (PID: 7232)
      • nsi84BD.tmp (PID: 3304)
      • avast_free_antivirus_online_setup.exe (PID: 236)
      • AvastBrowserUpdate.exe (PID: 472)
      • GOM.exe (PID: 8832)
      • Assistant_118.0.5461.41_Setup.exe_sfx.exe (PID: 9956)
    • Creates files or folders in the user directory

      • GOMPLAYERGLOBALSETUP_CHROME.EXE (PID: 4000)
      • GrLauncher.exe (PID: 924)
      • GOM.exe (PID: 7580)
      • setup.exe (PID: 1672)
      • setup.exe (PID: 7520)
      • nsi84BD.tmp (PID: 3304)
      • GOM.exe (PID: 8832)
      • Toast.gom (PID: 8344)
      • setup.exe (PID: 4224)
    • Reads the machine GUID from the registry

      • GOMPLAYERGLOBALSETUP_CHROME.EXE (PID: 4000)
      • tabservicepack.exe (PID: 7200)
      • GOM.exe (PID: 6972)
      • GrLauncher.exe (PID: 924)
      • GOM.exe (PID: 7580)
      • setup.exe (PID: 7520)
      • nsr8F3D.tmp (PID: 3676)
      • avast_free_antivirus_online_setup.exe (PID: 236)
      • nsi84BD.tmp (PID: 3304)
      • GOM.exe (PID: 1228)
      • AvastBrowserUpdate.exe (PID: 864)
      • icarus.exe (PID: 8176)
      • AvastBrowserUpdate.exe (PID: 472)
      • icarus.exe (PID: 6240)
      • icarus.exe (PID: 3768)
      • GOM.exe (PID: 8832)
      • Toast.gom (PID: 8344)
    • Reads the software policy settings

      • GOMPLAYERGLOBALSETUP_CHROME.EXE (PID: 4000)
      • slui.exe (PID: 6708)
      • tabservicepack.exe (PID: 7200)
      • slui.exe (PID: 5892)
      • GrLauncher.exe (PID: 924)
      • setup.exe (PID: 7520)
      • nsr8F3D.tmp (PID: 3676)
      • avast_free_antivirus_online_setup.exe (PID: 236)
      • nsi84BD.tmp (PID: 3304)
      • AvastBrowserUpdate.exe (PID: 7256)
      • AvastBrowserUpdate.exe (PID: 472)
      • GOM.exe (PID: 8832)
      • Toast.gom (PID: 8344)
    • Creates files in the program directory

      • GOMPLAYERGLOBALSETUP_CHROME.EXE (PID: 4000)
      • tabservicepack.exe (PID: 7200)
      • GrLauncher.exe (PID: 924)
      • avast_free_antivirus_online_setup.exe (PID: 236)
      • AvastBrowserUpdateSetup.exe (PID: 4976)
      • AvastBrowserUpdate.exe (PID: 864)
      • AvastBrowserUpdate.exe (PID: 472)
      • icarus.exe (PID: 8176)
      • icarus.exe (PID: 6240)
    • Disables trace logs

      • tabservicepack.exe (PID: 7200)
    • The sample compiled with chinese language support

      • GOMPLAYERGLOBALSETUP_CHROME.EXE (PID: 4000)
      • AvastBrowserUpdateSetup.exe (PID: 4976)
      • AvastBrowserUpdate.exe (PID: 864)
    • Reads Environment values

      • nsi84BD.tmp (PID: 3304)
      • icarus.exe (PID: 6240)
      • identity_helper.exe (PID: 9252)
    • The sample compiled with arabic language support

      • GOMPLAYERGLOBALSETUP_CHROME.EXE (PID: 4000)
      • AvastBrowserUpdateSetup.exe (PID: 4976)
      • AvastBrowserUpdate.exe (PID: 864)
    • Process checks computer location settings

      • nsi84BD.tmp (PID: 3304)
      • AvastBrowserUpdate.exe (PID: 864)
    • The sample compiled with german language support

      • AvastBrowserUpdateSetup.exe (PID: 4976)
      • AvastBrowserUpdate.exe (PID: 864)
    • The sample compiled with bulgarian language support

      • AvastBrowserUpdateSetup.exe (PID: 4976)
      • AvastBrowserUpdate.exe (PID: 864)
    • The sample compiled with czech language support

      • AvastBrowserUpdateSetup.exe (PID: 4976)
      • AvastBrowserUpdate.exe (PID: 864)
      • icarus.exe (PID: 6240)
    • The sample compiled with french language support

      • AvastBrowserUpdateSetup.exe (PID: 4976)
      • AvastBrowserUpdate.exe (PID: 864)
    • The sample compiled with Indonesian language support

      • AvastBrowserUpdateSetup.exe (PID: 4976)
      • AvastBrowserUpdate.exe (PID: 864)
    • The sample compiled with japanese language support

      • AvastBrowserUpdateSetup.exe (PID: 4976)
      • AvastBrowserUpdate.exe (PID: 864)
    • The sample compiled with Italian language support

      • AvastBrowserUpdateSetup.exe (PID: 4976)
      • AvastBrowserUpdate.exe (PID: 864)
    • The sample compiled with swedish language support

      • AvastBrowserUpdateSetup.exe (PID: 4976)
      • AvastBrowserUpdate.exe (PID: 864)
    • The sample compiled with russian language support

      • AvastBrowserUpdateSetup.exe (PID: 4976)
      • AvastBrowserUpdate.exe (PID: 864)
    • The sample compiled with polish language support

      • AvastBrowserUpdateSetup.exe (PID: 4976)
      • AvastBrowserUpdate.exe (PID: 864)
    • The sample compiled with portuguese language support

      • AvastBrowserUpdateSetup.exe (PID: 4976)
      • AvastBrowserUpdate.exe (PID: 864)
    • The sample compiled with slovak language support

      • AvastBrowserUpdateSetup.exe (PID: 4976)
      • AvastBrowserUpdate.exe (PID: 864)
    • The sample compiled with turkish language support

      • AvastBrowserUpdateSetup.exe (PID: 4976)
      • AvastBrowserUpdate.exe (PID: 864)
    • AVAST browser mutex has been found

      • AvastBrowserUpdate.exe (PID: 864)
      • AvastBrowserUpdate.exe (PID: 7420)
      • AvastBrowserUpdate.exe (PID: 7256)
      • AvastBrowserUpdate.exe (PID: 472)
      • AvastBrowserUpdate.exe (PID: 7576)
    • Reads CPU info

      • icarus.exe (PID: 8176)
      • icarus.exe (PID: 3768)
      • icarus.exe (PID: 6240)
    • Manual execution by a user

      • msedge.exe (PID: 7180)
      • GOM.exe (PID: 8832)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
244
Monitored processes
102
Malicious processes
22
Suspicious processes
4

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs sppextcomobj.exe no specs slui.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs gomplayerglobalsetup_chrome.exe no specs gomplayerglobalsetup_chrome.exe killgom.exe no specs killgom.exe no specs slui.exe tabservicepack.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs gom.exe no specs gom.exe no specs VSUtil no specs grlauncher.exe nsf7e53.tmp setup.exe setup.exe setup.exe setup.exe setup.exe nsi84bd.tmp nsr8f3d.tmp avast_free_antivirus_online_setup.exe gom.exe no specs VSUtil no specs avastbrowserupdatesetup.exe avastbrowserupdate.exe avastbrowserupdate.exe no specs avastbrowserupdate.exe no specs avastbrowserupdatecomregistershell64.exe no specs avastbrowserupdatecomregistershell64.exe no specs avastbrowserupdatecomregistershell64.exe no specs avastbrowserupdate.exe avastbrowserupdate.exe no specs avastbrowserupdate.exe icarus.exe chrome.exe no specs icarus.exe icarus.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs gom.exe chrome.exe no specs msedge.exe no specs toast.gom no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs toast.gom identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs assistant_118.0.5461.41_setup.exe_sfx.exe assistant_installer.exe no specs assistant_installer.exe no specs chrome.exe no specs msedge.exe no specs msedge.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
236"C:\WINDOWS\Temp\asw.e05494740b9bd6a0\avast_free_antivirus_online_setup.exe" /silent /cookie:mmm_gom_ppi_003_434_m /ga_clientid:21ae3092-8ee5-409e-ba3d-bc3152b86678 /edat_dir:C:\WINDOWS\Temp\asw.e05494740b9bd6a0 /geo:USC:\Windows\Temp\asw.e05494740b9bd6a0\avast_free_antivirus_online_setup.exe
nsr8F3D.tmp
User:
admin
Company:
Gen Digital Inc.
Integrity Level:
HIGH
Description:
Avast Self-Extract Package
Version:
25.3.8935.0
Modules
Images
c:\windows\temp\asw.e05494740b9bd6a0\avast_free_antivirus_online_setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shell32.dll
472"C:\Program Files (x86)\AVAST Software\Browser\Update\AvastBrowserUpdate.exe" /svcC:\Program Files (x86)\AVAST Software\Browser\Update\AvastBrowserUpdate.exe
services.exe
User:
SYSTEM
Company:
Gen Digital Inc.
Integrity Level:
SYSTEM
Description:
Avast Browser
Version:
1.8.1697.6
Modules
Images
c:\program files (x86)\avast software\browser\update\avastbrowserupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
496C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
540"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.59 --initial-client-data=0x288,0x294,0x298,0x28c,0x2ac,0x7ffc84505fd8,0x7ffc84505fe4,0x7ffc84505ff0C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
732"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=3572 --field-trial-handle=1868,i,14227592818412071743,4435972000070405429,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
732C:\WINDOWS\SysWOW64\DllHost.exe /Processid:{2DB4F9B7-144E-4319-B14A-432AC74C0CEF}C:\Windows\SysWOW64\dllhost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\ucrtbase.dll
c:\windows\syswow64\combase.dll
800"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3248 --field-trial-handle=2256,i,17658274157630785200,13832884534666915838,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
864"C:\Program Files (x86)\GUMA3B5.tmp\AvastBrowserUpdate.exe" /silent /install "bundlename=Avast Secure Browser&appguid={A8504530-742B-42BC-895D-2BAD6406F698}&appname=Avast Secure Browser&needsadmin=true&lang=en-US&brand=6226&installargs=--no-create-user-shortcuts --make-chrome-default --force-default-win10 --auto-import-data%3Dmsedge --import-cookies"C:\Program Files (x86)\GUMA3B5.tmp\AvastBrowserUpdate.exe
AvastBrowserUpdateSetup.exe
User:
admin
Company:
Gen Digital Inc.
Integrity Level:
HIGH
Description:
Avast Browser
Version:
1.8.1697.6
Modules
Images
c:\program files (x86)\guma3b5.tmp\avastbrowserupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
896"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3680 --field-trial-handle=2256,i,17658274157630785200,13832884534666915838,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
924"C:\Program Files (x86)\GOM\GOMPlayer\GRLauncher.exe" <GRLAUNCHER_PARAM Command = 'checkversion' Lang = 'eng' AgentName = 'GOMPlayer' ProgramID = 'GOMPLAYER' ForceCheck = '0' CheckMinorVersion = '1' CheckBuildVersion = '1' CheckDisabled = '1' SilentInstall = '1' RetWindowHandle='1114778' />C:\Program Files (x86)\GOM\GOMPlayer\GrLauncher.exe
GOMPLAYERGLOBALSETUP_CHROME.EXE
User:
admin
Company:
GOM & Company
Integrity Level:
HIGH
Description:
GrLauncher
Exit code:
0
Version:
2.3.1.8
Modules
Images
c:\program files (x86)\gom\gomplayer\grlauncher.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
Total events
56 482
Read events
51 555
Write events
4 842
Delete events
85

Modification events

(PID) Process:(7592) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(7592) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(7592) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(7592) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(7592) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(1052) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
Operation:writeName:{2781761E-28E0-4109-99FE-B9D127C57AFE} {56FFCC30-D398-11D0-B2AE-00A0C908FA49} 0xFFFF
Value:
01000000000000007DDB26608EB3DB01
(PID) Process:(4000) GOMPLAYERGLOBALSETUP_CHROME.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\GOM
Operation:writeName:USMID
Value:
CDA3E591F45F408CB30B99E08D47C90E
(PID) Process:(4000) GOMPLAYERGLOBALSETUP_CHROME.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(4000) GOMPLAYERGLOBALSETUP_CHROME.EXEKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(4000) GOMPLAYERGLOBALSETUP_CHROME.EXEKey:HKEY_CURRENT_USER\SOFTWARE\GRETECH\GOMPlayer\OPTION
Operation:writeName:StatisticsUrl
Value:
http://log.gomlab.com/
Executable files
557
Suspicious files
1 079
Text files
1 767
Unknown types
0

Dropped files

PID
Process
Filename
Type
7592chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db\LOG.old~RF10c1ac.TMP
MD5:
SHA256:
7592chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\discounts_db\LOG.old~RF10c1ac.TMP
MD5:
SHA256:
7592chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF10c1ac.TMP
MD5:
SHA256:
7592chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db\LOG.old
MD5:
SHA256:
7592chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
7592chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
7592chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old~RF10c1bb.TMP
MD5:
SHA256:
7592chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
7592chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old~RF10c1bb.TMP
MD5:
SHA256:
7592chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
100
TCP/UDP connections
272
DNS requests
253
Threats
8

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7576
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
4000
GOMPLAYERGLOBALSETUP_CHROME.EXE
GET
200
18.173.154.11:80
http://playinfo.gomlab.com/setup_v2/index.gom?setup=player&name=GOMPLAYERGLOBALSETUP_CHROME&bit=32&lang=eng&version=2.3.108.5378&checkdate=202504220923
unknown
whitelisted
7576
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4000
GOMPLAYERGLOBALSETUP_CHROME.EXE
GET
200
151.101.130.133:80
http://ocsp2.globalsign.com/rootr3/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBT1nGh%2FJBjWKnkPdZIzB1bqhelHBwQUj%2FBLf6guRSSuTVD6Y5qL3uLdG7wCDQHuXyId%2FGI71DM6hVc%3D
unknown
whitelisted
4000
GOMPLAYERGLOBALSETUP_CHROME.EXE
GET
200
151.101.194.133:80
http://ocsp.globalsign.com/gsrsaovsslca2018/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBRrcGT%2BanRD3C1tW3nsrKeuXC7DPwQU%2BO9%2F8s14Z6jeb48kjYjxhwMCs%2BsCDDOdcVWyWqbeuaWiuA%3D%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
7592
chrome.exe
239.255.255.250:1900
whitelisted
7808
chrome.exe
163.171.128.100:443
cdn.gomlab.com
QUANTILNETWORKS
DE
suspicious

DNS requests

Domain
IP
Reputation
google.com
  • 172.217.16.206
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 23.52.120.96
whitelisted
cdn.gomlab.com
  • 163.171.128.100
unknown
accounts.google.com
  • 108.177.119.84
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 40.126.31.1
  • 20.190.159.4
  • 40.126.31.73
  • 20.190.159.128
  • 20.190.159.23
  • 40.126.31.0
  • 40.126.31.2
  • 20.190.159.75
  • 20.190.159.0
  • 20.190.159.2
  • 40.126.31.67
  • 20.190.159.71
whitelisted
ocsp.digicert.com
  • 2.17.190.73
  • 184.30.131.245
whitelisted
www.google.com
  • 172.217.18.100
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
Misc activity
ET INFO External IP Lookup Service in DNS Query (ip-info .ff .avast .com)
Misc activity
ET INFO Observed External IP Lookup Domain (ip-info .ff .avast .com) in TLS SNI
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
Misc activity
INFO [ANY.RUN] Possible short link service (t .co)
Misc activity
INFO [ANY.RUN] Possible short link service (t .co)
Misc activity
INFO [ANY.RUN] Possible short link service (t .co)
Misc activity
INFO [ANY.RUN] Possible short link service (t .co)
No debug info