URL:

https://startcrack.com/adobe-photoshop-cc-2021-crack-updated/

Full analysis: https://app.any.run/tasks/a40e48e5-2718-4c1f-b880-51cb06d339cb
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: January 05, 2021, 16:14:58
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
adware
evasion
Indicators:
MD5:

4C0D6130F6E2A245FF31A4A2CA1E2427

SHA1:

E31D82F962BC447A5CD2F3BEE42D1AF537694E12

SHA256:

7D8E81E79EE379BC15FA6444ECB146A54F13D37BD6CADBD0AA4F6B9AB28B1FBC

SSDEEP:

3:N8c8LGTAenR5IAX:2caKAegc

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • FileSetup-v31.55.01.exe (PID: 2664)
      • FileSetup-v31.55.01.exe (PID: 3468)
      • 7882645F6AF8B82B.exe (PID: 2964)
      • 7882645F6AF8B82B.exe (PID: 1628)
      • ThunderFW.exe (PID: 980)
      • MiniThunderPlatform.exe (PID: 2956)
      • 23E04C4F32EF2158.exe (PID: 4052)
      • seed.sfx.exe (PID: 1520)
      • seed.exe (PID: 2792)
    • Changes settings of System certificates

      • FileSetup-v31.55.01.exe (PID: 2664)
    • Connects to CnC server

      • FileSetup-v31.55.01.exe (PID: 2664)
      • 7882645F6AF8B82B.exe (PID: 2964)
      • 7882645F6AF8B82B.exe (PID: 1628)
      • MiniThunderPlatform.exe (PID: 2956)
    • Steals credentials from Web Browsers

      • 7882645F6AF8B82B.exe (PID: 2964)
      • 7882645F6AF8B82B.exe (PID: 1628)
    • Actions looks like stealing of personal data

      • 7882645F6AF8B82B.exe (PID: 2964)
      • 7882645F6AF8B82B.exe (PID: 1628)
    • Modifies files in Chrome extension folder

      • 7882645F6AF8B82B.exe (PID: 2964)
    • Runs PING.EXE for delay simulation

      • cmd.exe (PID: 1956)
      • cmd.exe (PID: 2000)
      • cmd.exe (PID: 1680)
    • Loads dropped or rewritten executable

      • 7882645F6AF8B82B.exe (PID: 1628)
      • MiniThunderPlatform.exe (PID: 2956)
      • FileSetup-v31.55.01.exe (PID: 3468)
      • chrome.exe (PID: 1768)
      • chrome.exe (PID: 2276)
      • chrome.exe (PID: 1784)
      • SearchFilterHost.exe (PID: 4004)
      • SearchProtocolHost.exe (PID: 3116)
      • SearchProtocolHost.exe (PID: 3692)
      • seed.sfx.exe (PID: 1520)
      • chrome.exe (PID: 3036)
      • chrome.exe (PID: 3100)
      • chrome.exe (PID: 3164)
      • conhost.exe (PID: 2992)
      • NOTEPAD.EXE (PID: 536)
      • ThunderFW.exe (PID: 980)
      • WinRAR.exe (PID: 1840)
      • chrome.exe (PID: 2588)
      • consent.exe (PID: 2320)
      • firefox.exe (PID: 868)
      • chrome.exe (PID: 3288)
      • 23E04C4F32EF2158.exe (PID: 4052)
      • seed.exe (PID: 2792)
      • chrome.exe (PID: 1760)
      • WinRAR.exe (PID: 1816)
      • chrome.exe (PID: 964)
      • chrome.exe (PID: 2828)
      • chrome.exe (PID: 1940)
      • svchost.exe (PID: 2212)
      • SearchFilterHost.exe (PID: 3424)
      • vssvc.exe (PID: 2984)
      • cmd.exe (PID: 2496)
      • taskkill.exe (PID: 2332)
      • cmd.exe (PID: 1956)
      • chrome.exe (PID: 2980)
      • PING.EXE (PID: 3296)
      • chrome.exe (PID: 2208)
      • chrome.exe (PID: 2492)
      • wmiprvse.exe (PID: 2392)
      • conhost.exe (PID: 3516)
      • cmd.exe (PID: 3888)
      • WinRAR.exe (PID: 3312)
      • conhost.exe (PID: 3932)
      • chrome.exe (PID: 716)
      • wmiprvse.exe (PID: 3024)
      • chrome.exe (PID: 1416)
      • DllHost.exe (PID: 128)
      • chrome.exe (PID: 3460)
      • firefox.exe (PID: 2952)
      • conhost.exe (PID: 3172)
      • DllHost.exe (PID: 3776)
      • iexplore.exe (PID: 1496)
      • iexplore.exe (PID: 2976)
      • msiexec.exe (PID: 2172)
      • DllHost.exe (PID: 3192)
      • WinRAR.exe (PID: 3048)
      • DllHost.exe (PID: 2128)
      • filezilla.exe (PID: 2580)
      • cmd.exe (PID: 2000)
      • 7882645F6AF8B82B.exe (PID: 2964)
      • PING.EXE (PID: 2444)
      • SearchProtocolHost.exe (PID: 3620)
      • wmiprvse.exe (PID: 2860)
      • AUDIODG.EXE (PID: 2512)
      • FileSetup-v31.55.01.exe (PID: 2664)
      • conhost.exe (PID: 2576)
      • PING.EXE (PID: 3108)
      • svchost.exe (PID: 2200)
      • WerFault.exe (PID: 1688)
      • cmd.exe (PID: 1680)
    • Drops executable file immediately after starts

      • 23E04C4F32EF2158.exe (PID: 4052)
      • 23E04C4F32EF2158.tmp (PID: 2788)
  • SUSPICIOUS

    • Application launched itself

      • WinRAR.exe (PID: 1840)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3312)
      • msiexec.exe (PID: 3148)
      • 7882645F6AF8B82B.exe (PID: 1628)
      • MiniThunderPlatform.exe (PID: 2956)
      • 23E04C4F32EF2158.exe (PID: 4052)
      • FileSetup-v31.55.01.exe (PID: 2664)
      • 23E04C4F32EF2158.tmp (PID: 2788)
      • seed.sfx.exe (PID: 1520)
      • seed.exe (PID: 2792)
    • Drops a file that was compiled in debug mode

      • WinRAR.exe (PID: 3312)
      • FileSetup-v31.55.01.exe (PID: 2664)
      • msiexec.exe (PID: 3148)
      • 7882645F6AF8B82B.exe (PID: 1628)
      • MiniThunderPlatform.exe (PID: 2956)
      • 23E04C4F32EF2158.tmp (PID: 2788)
      • seed.exe (PID: 2792)
    • Low-level read access rights to disk partition

      • FileSetup-v31.55.01.exe (PID: 2664)
      • 7882645F6AF8B82B.exe (PID: 2964)
      • 7882645F6AF8B82B.exe (PID: 1628)
      • MiniThunderPlatform.exe (PID: 2956)
    • Starts Microsoft Installer

      • FileSetup-v31.55.01.exe (PID: 2664)
    • Executed as Windows Service

      • vssvc.exe (PID: 2984)
    • Creates a directory in Program Files

      • msiexec.exe (PID: 3148)
      • 23E04C4F32EF2158.tmp (PID: 2788)
      • seed.sfx.exe (PID: 1520)
    • Creates files in the user directory

      • msiexec.exe (PID: 3148)
      • filezilla.exe (PID: 2580)
      • 7882645F6AF8B82B.exe (PID: 2964)
      • 7882645F6AF8B82B.exe (PID: 1628)
    • Starts itself from another location

      • FileSetup-v31.55.01.exe (PID: 2664)
    • Uses TASKKILL.EXE to kill Browsers

      • cmd.exe (PID: 2496)
    • Starts CMD.EXE for commands execution

      • 7882645F6AF8B82B.exe (PID: 2964)
      • FileSetup-v31.55.01.exe (PID: 2664)
      • 23E04C4F32EF2158.tmp (PID: 2788)
      • 7882645F6AF8B82B.exe (PID: 1628)
    • Reads the cookies of Google Chrome

      • 7882645F6AF8B82B.exe (PID: 1628)
    • Reads the cookies of Mozilla Firefox

      • 7882645F6AF8B82B.exe (PID: 1628)
    • Starts CMD.EXE for self-deleting

      • 7882645F6AF8B82B.exe (PID: 2964)
      • FileSetup-v31.55.01.exe (PID: 2664)
      • 7882645F6AF8B82B.exe (PID: 1628)
    • Executed via COM

      • DllHost.exe (PID: 2128)
    • Creates files in the program directory

      • MiniThunderPlatform.exe (PID: 2956)
      • seed.sfx.exe (PID: 1520)
    • Drops a file with too old compile date

      • 7882645F6AF8B82B.exe (PID: 1628)
      • MiniThunderPlatform.exe (PID: 2956)
      • 23E04C4F32EF2158.tmp (PID: 2788)
      • 23E04C4F32EF2158.exe (PID: 4052)
    • Starts Internet Explorer

      • cmd.exe (PID: 3888)
  • INFO

    • Reads the hosts file

      • chrome.exe (PID: 964)
      • chrome.exe (PID: 716)
      • MiniThunderPlatform.exe (PID: 2956)
    • Application launched itself

      • chrome.exe (PID: 964)
      • msiexec.exe (PID: 3148)
      • iexplore.exe (PID: 1496)
    • Low-level read access rights to disk partition

      • vssvc.exe (PID: 2984)
    • Searches for installed software

      • msiexec.exe (PID: 3148)
    • Creates files in the program directory

      • msiexec.exe (PID: 3148)
      • 23E04C4F32EF2158.tmp (PID: 2788)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 3148)
      • 23E04C4F32EF2158.tmp (PID: 2788)
    • Manual execution by user

      • filezilla.exe (PID: 2580)
    • Changes internet zones settings

      • iexplore.exe (PID: 1496)
    • Application was dropped or rewritten from another process

      • 23E04C4F32EF2158.tmp (PID: 2788)
    • Loads dropped or rewritten executable

      • 23E04C4F32EF2158.tmp (PID: 2788)
      • MsiExec.exe (PID: 1568)
      • msiexec.exe (PID: 3148)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2976)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2976)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2976)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2976)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
105
Monitored processes
73
Malicious processes
10
Suspicious processes
5

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs winrar.exe no specs chrome.exe no specs winrar.exe no specs notepad.exe no specs winrar.exe no specs winrar.exe filesetup-v31.55.01.exe no specs filesetup-v31.55.01.exe msiexec.exe no specs msiexec.exe msiexec.exe no specs vssvc.exe no specs 7882645f6af8b82b.exe 7882645f6af8b82b.exe filezilla.exe no specs cmd.exe no specs taskkill.exe no specs firefox.exe no specs cmd.exe no specs PhotoViewer.dll no specs ping.exe no specs firefox.exe no specs cmd.exe no specs ping.exe no specs thunderfw.exe no specs minithunderplatform.exe 23e04c4f32ef2158.exe 23e04c4f32ef2158.tmp seed.sfx.exe cmd.exe no specs iexplore.exe seed.exe iexplore.exe Thumbnail Cache Out of Proc Server no specs svchost.exe no specs consent.exe no specs wmiprvse.exe no specs audiodg.exe no specs wmiprvse.exe no specs conhost.exe no specs wmiprvse.exe no specs searchprotocolhost.exe no specs conhost.exe no specs Profile Notification Host no specs searchfilterhost.exe no specs conhost.exe no specs searchprotocolhost.exe no specs Profile Notification Host no specs conhost.exe no specs searchfilterhost.exe no specs searchprotocolhost.exe no specs svchost.exe no specs werfault.exe cmd.exe no specs conhost.exe no specs ping.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
128C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}C:\Windows\system32\DllHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
COM Surrogate
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\dllhost.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
536"C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Local\Temp\Rar$DIa1840.24527\-+- PassssWord FilE 4 ExTraCtioN 77543210.txtC:\Windows\system32\NOTEPAD.EXEWinRAR.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\notepad.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
716"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=988,8481196148569965631,3093905723361489994,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=6588546908347050605 --mojo-platform-channel-handle=1480 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
1
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
868"C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe7882645F6AF8B82B.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
HIGH
Description:
Firefox
Exit code:
0
Version:
68.0.1
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
964"C:\Program Files\Google\Chrome\Application\chrome.exe" --disk-cache-dir=null --disk-cache-size=1 --media-cache-size=1 --disable-gpu-shader-disk-cache --disable-background-networking "https://startcrack.com/adobe-photoshop-cc-2021-crack-updated/"C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
1
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
980C:\Users\admin\AppData\Local\Temp\download\ThunderFW.exe ThunderFW "C:\Users\admin\AppData\Local\Temp\download\MiniThunderPlatform.exe"C:\Users\admin\AppData\Local\Temp\download\ThunderFW.exe7882645F6AF8B82B.exe
User:
admin
Company:
ShenZhen Xunlei Networking Technologies,LTD
Integrity Level:
HIGH
Description:
ThunderFW
Exit code:
0
Version:
2, 0, 0, 4
Modules
Images
c:\users\admin\appdata\local\temp\download\thunderfw.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1416"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=988,8481196148569965631,3093905723361489994,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=16769801046855152379 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2188 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
1
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1496"C:\Program Files\Internet Explorer\iexplore.exe" https://iplogger.org/14Zhe7C:\Program Files\Internet Explorer\iexplore.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
1520"C:\Program Files\HappyNewYear\seed.sfx.exe" -pX7mdks39WE0 -s1C:\Program Files\HappyNewYear\seed.sfx.exe
23E04C4F32EF2158.tmp
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\program files\happynewyear\seed.sfx.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\gdiplus.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1568C:\Windows\system32\MsiExec.exe -Embedding A786DBF571158196DFCEC02772A3515C CC:\Windows\system32\MsiExec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
5 819
Read events
5 242
Write events
556
Delete events
21

Modification events

(PID) Process:(964) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(964) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(964) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(964) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(964) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(2588) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:writeName:964-13254336919145000
Value:
259
(PID) Process:(964) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(964) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(964) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:delete valueName:3252-13245750958665039
Value:
0
(PID) Process:(964) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
Executable files
24
Suspicious files
64
Text files
170
Unknown types
20

Dropped files

PID
Process
Filename
Type
964chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-5FF49098-3C4.pma
MD5:
SHA256:
964chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB\LOG.old
MD5:
SHA256:
964chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\900c9e0b-e3ab-42cd-b129-d73c674b5480.tmp
MD5:
SHA256:
964chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000048.dbtmp
MD5:
SHA256:
964chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Platform Notifications\LOG.old
MD5:
SHA256:
964chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\LOG.old
MD5:
SHA256:
964chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.oldtext
MD5:
SHA256:
964chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.oldtext
MD5:
SHA256:
964chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old
MD5:
SHA256:
964chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old~RF127c7b.TMP
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
61
TCP/UDP connections
110
DNS requests
66
Threats
45

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2956
MiniThunderPlatform.exe
GET
8.208.92.20:80
http://dream.pics/setup_10.2_mix1.exe
US
suspicious
2956
MiniThunderPlatform.exe
GET
8.208.92.20:80
http://dream.pics/setup_10.2_mix1.exe
US
suspicious
2956
MiniThunderPlatform.exe
GET
8.208.92.20:80
http://dream.pics/setup_10.2_mix1.exe
US
suspicious
716
chrome.exe
GET
200
13.58.159.65:80
http://13.58.159.65/?hash=1E14B37D379189AA320058181F16A49736EEDFEB&fn=adobe-photoshop-cc-2021-crack-v22-1-0-94&file=1_adobephotoshopcc2021crackv221094.html
US
html
8.37 Kb
unknown
2664
FileSetup-v31.55.01.exe
POST
104.18.34.201:80
http://3ef9ca0e29792e68.xyz/info_old/w
US
malicious
716
chrome.exe
GET
200
13.58.159.65:80
http://13.58.159.65/adobe_5ff490aee80cd_5ff490aee80d0.zip?dash=FWbMB8vFgVyi6jZATzSrG15GcvpQEjRo50KPsMeg-L8RTiLemVr-cFQe_aFxHD3vftg3bvrWtBAIQ42jOOeyzA&v=1&xdf5ff490aee812f=b11f97523c68d306fddfc0477d7e9968
US
compressed
3.87 Mb
unknown
2664
FileSetup-v31.55.01.exe
POST
200
104.18.34.201:80
http://3ef9ca0e29792e68.xyz/info_old/w
US
malicious
716
chrome.exe
GET
200
13.58.159.65:80
http://13.58.159.65/bootstrap-darkly.min.css
US
text
24.3 Kb
unknown
716
chrome.exe
POST
302
13.58.159.65:80
http://13.58.159.65/?hash=1E14B37D379189AA320058181F16A49736EEDFEB&fn=adobe-photoshop-cc-2021-crack-v22-1-0-94&file=1_adobephotoshopcc2021crackv221094.html
US
html
11.6 Kb
unknown
716
chrome.exe
GET
404
13.58.159.65:80
http://13.58.159.65/favicon.ico
US
html
274 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.0.78.26:443
href.li
Automattic, Inc
US
suspicious
716
chrome.exe
104.27.142.235:443
startcrack.com
Cloudflare Inc
US
shared
716
chrome.exe
216.58.205.237:443
accounts.google.com
Google Inc.
US
whitelisted
716
chrome.exe
172.217.22.74:443
fonts.googleapis.com
Google Inc.
US
whitelisted
716
chrome.exe
151.101.2.109:443
cdn.jsdelivr.net
Fastly
US
suspicious
716
chrome.exe
192.0.73.2:443
secure.gravatar.com
Automattic, Inc
US
whitelisted
716
chrome.exe
172.217.22.3:443
fonts.gstatic.com
Google Inc.
US
whitelisted
716
chrome.exe
216.58.208.46:443
www.google-analytics.com
Google Inc.
US
whitelisted
716
chrome.exe
104.18.226.52:443
cdn.onesignal.com
Cloudflare Inc
US
malicious
716
chrome.exe
66.102.1.156:443
stats.g.doubleclick.net
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
startcrack.com
  • 104.27.142.235
  • 104.27.143.235
  • 172.67.155.69
malicious
accounts.google.com
  • 216.58.205.237
shared
fonts.googleapis.com
  • 172.217.22.74
whitelisted
cdn.jsdelivr.net
  • 151.101.2.109
  • 151.101.66.109
  • 151.101.130.109
  • 151.101.194.109
whitelisted
s.w.org
  • 192.0.77.48
whitelisted
fonts.gstatic.com
  • 172.217.22.3
whitelisted
secure.gravatar.com
  • 192.0.73.2
whitelisted
www.google-analytics.com
  • 216.58.208.46
whitelisted
cdn.onesignal.com
  • 104.18.226.52
  • 104.18.225.52
whitelisted
stats.g.doubleclick.net
  • 66.102.1.156
  • 66.102.1.157
  • 66.102.1.155
  • 66.102.1.154
whitelisted

Threats

PID
Process
Class
Message
A Network Trojan was detected
ETPRO TROJAN Win32/Wacapew.C_ml Stealer CnC Checkin
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
A Network Trojan was detected
ETPRO TROJAN Win32/Wacapew.C_ml Stealer CnC Checkin
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
A Network Trojan was detected
ETPRO TROJAN Win32/Wacapew.C_ml Stealer CnC Checkin
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
A Network Trojan was detected
ETPRO TROJAN Win32/Wacapew.C_ml Stealer CnC Checkin
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
A Network Trojan was detected
ETPRO TROJAN Win32/Wacapew.C_ml Stealer CnC Checkin
Potentially Bad Traffic
AV INFO HTTP Request to a *.xyz domain
9 ETPRO signatures available at the full report
No debug info