File name:

Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.exe

Full analysis: https://app.any.run/tasks/6b4de766-9c23-4078-b539-1aa83e3bbe18
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: June 27, 2024, 07:23:36
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
adware
loader
pua
pup
not-a-virus
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

AF90D321179FF395EEA8F440CC7232FA

SHA1:

4186B6D82CCEEDFA06A753B1E37D8E070C3FC2B9

SHA256:

80729F5237AC4B69D0ED4B947F44BA97C582367B834EE453E1C9478C38649E07

SSDEEP:

98304:6gWmxDbUQ+ysxZmA4Kgsv2auUStZDHLyhV2syJlW9HBrk7HX4OAwXmb6nsbVX5ao:c8KIQ9OXg1ta7w4snPM

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.exe (PID: 3520)
      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.exe (PID: 2076)
      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp (PID: 2348)
      • downloader.exe (PID: 3696)
      • msiexec.exe (PID: 2544)
      • msiexec.exe (PID: 1596)
      • Yandex.exe (PID: 2832)
      • avast_free_antivirus_setup_online.exe (PID: 2296)
      • avast_free_antivirus_setup_online.exe (PID: 3068)
      • Instup.exe (PID: 2676)
      • lite_installer.exe (PID: 3840)
      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.exe (PID: 3600)
      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.exe (PID: 3348)
      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp (PID: 680)
      • driverscanner.exe (PID: 1832)
      • msiexec.exe (PID: 2920)
      • driverscanner.tmp (PID: 2588)
      • lite_installer.exe (PID: 2512)
    • Actions looks like stealing of personal data

      • lite_installer.exe (PID: 3840)
      • seederexe.exe (PID: 3316)
      • lite_installer.exe (PID: 2512)
      • seederexe.exe (PID: 3884)
    • Steals credentials from Web Browsers

      • seederexe.exe (PID: 3316)
      • seederexe.exe (PID: 3884)
    • Changes the autorun value in the registry

      • instup.exe (PID: 3592)
    • Connects to the CnC server

      • driverscanner.tmp (PID: 2588)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.exe (PID: 3520)
      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.exe (PID: 2076)
      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp (PID: 2348)
      • downloader.exe (PID: 3696)
      • Yandex.exe (PID: 2832)
      • avast_free_antivirus_setup_online.exe (PID: 2296)
      • avast_free_antivirus_setup_online.exe (PID: 3068)
      • Instup.exe (PID: 2676)
      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.exe (PID: 3600)
      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.exe (PID: 3348)
      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp (PID: 680)
      • driverscanner.tmp (PID: 2588)
      • driverscanner.exe (PID: 1832)
    • Reads the Windows owner or organization settings

      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp (PID: 2348)
      • msiexec.exe (PID: 1596)
      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp (PID: 680)
      • driverscanner.tmp (PID: 2588)
    • Reads the Internet Settings

      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp (PID: 2348)
      • downloader.exe (PID: 3696)
      • lite_installer.exe (PID: 3840)
      • Instup.exe (PID: 2676)
      • instup.exe (PID: 3592)
      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp (PID: 680)
      • downloader.exe (PID: 3972)
      • lite_installer.exe (PID: 2512)
      • dsmonitor.exe (PID: 2792)
      • driverscanner.tmp (PID: 2588)
      • driverscanner.exe (PID: 3904)
      • {11A7D5AC-B623-401A-A104-1762FB8830FD}.exe (PID: 3724)
    • Reads security settings of Internet Explorer

      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp (PID: 2348)
      • downloader.exe (PID: 3696)
      • lite_installer.exe (PID: 3840)
      • {11A7D5AC-B623-401A-A104-1762FB8830FD}.exe (PID: 3724)
      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp (PID: 680)
      • downloader.exe (PID: 3972)
      • lite_installer.exe (PID: 2512)
      • driverscanner.exe (PID: 3904)
    • Access to an unwanted program domain was detected

      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp (PID: 2348)
      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp (PID: 680)
      • driverscanner.tmp (PID: 2588)
    • Potential Corporate Privacy Violation

      • downloader.exe (PID: 3696)
      • lite_installer.exe (PID: 3840)
      • lite_installer.exe (PID: 2512)
      • driverscanner.exe (PID: 3904)
    • Process drops legitimate windows executable

      • downloader.exe (PID: 3696)
      • driverscanner.tmp (PID: 2588)
    • Checks Windows Trust Settings

      • downloader.exe (PID: 3696)
      • msiexec.exe (PID: 1596)
      • lite_installer.exe (PID: 3840)
      • {11A7D5AC-B623-401A-A104-1762FB8830FD}.exe (PID: 3724)
      • downloader.exe (PID: 3972)
      • lite_installer.exe (PID: 2512)
    • Process requests binary or script from the Internet

      • downloader.exe (PID: 3696)
      • downloader.exe (PID: 3972)
      • lite_installer.exe (PID: 3840)
      • lite_installer.exe (PID: 2512)
    • Reads settings of System Certificates

      • avast_free_antivirus_setup_online.exe (PID: 3068)
      • downloader.exe (PID: 3696)
      • avast_free_antivirus_setup_online.exe (PID: 2296)
      • Instup.exe (PID: 2676)
      • instup.exe (PID: 3592)
      • lite_installer.exe (PID: 3840)
      • {11A7D5AC-B623-401A-A104-1762FB8830FD}.exe (PID: 3724)
      • downloader.exe (PID: 3972)
      • lite_installer.exe (PID: 2512)
    • Adds/modifies Windows certificates

      • downloader.exe (PID: 3696)
      • msiexec.exe (PID: 1596)
    • Application launched itself

      • downloader.exe (PID: 3696)
      • downloader.exe (PID: 3972)
    • Starts a Microsoft application from unusual location

      • YandexPackSetup.exe (PID: 3056)
      • YandexPackSetup.exe (PID: 3844)
    • Reads Mozilla Firefox installation path

      • seederexe.exe (PID: 3316)
      • seederexe.exe (PID: 3884)
    • Changes the Home page of Internet Explorer

      • seederexe.exe (PID: 3316)
    • Changes the title of the Internet Explorer window

      • seederexe.exe (PID: 3316)
    • Creates a software uninstall entry

      • Yandex.exe (PID: 2832)
      • Yandex.exe (PID: 3652)
    • Reads the date of Windows installation

      • Yandex.exe (PID: 2832)
      • Yandex.exe (PID: 3652)
    • Starts itself from another location

      • Instup.exe (PID: 2676)
    • The process verifies whether the antivirus software is installed

      • instup.exe (PID: 3592)
    • Executes as Windows Service

      • VSSVC.exe (PID: 4092)
    • The process drops C-runtime libraries

      • driverscanner.tmp (PID: 2588)
    • Searches for installed software

      • driverscanner.tmp (PID: 2588)
      • dllhost.exe (PID: 3716)
    • The process executes via Task Scheduler

      • dsmonitor.exe (PID: 1488)
    • Reads Microsoft Outlook installation path

      • driverscanner.exe (PID: 3904)
    • Reads Internet Explorer settings

      • driverscanner.exe (PID: 3904)
  • INFO

    • Checks supported languages

      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp (PID: 3252)
      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.exe (PID: 3520)
      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.exe (PID: 2076)
      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp (PID: 2348)
      • downloader.exe (PID: 3696)
      • downloader.exe (PID: 964)
      • avast_free_antivirus_setup_online.exe (PID: 3068)
      • msiexec.exe (PID: 1596)
      • YandexPackSetup.exe (PID: 3056)
      • lite_installer.exe (PID: 3840)
      • seederexe.exe (PID: 3316)
      • msiexec.exe (PID: 2544)
      • Yandex.exe (PID: 2832)
      • sender.exe (PID: 2128)
      • Instup.exe (PID: 2676)
      • avast_free_antivirus_setup_online.exe (PID: 2296)
      • instup.exe (PID: 3592)
      • sbr.exe (PID: 2664)
      • {11A7D5AC-B623-401A-A104-1762FB8830FD}.exe (PID: 3724)
      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.exe (PID: 3600)
      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp (PID: 3096)
      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.exe (PID: 3348)
      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp (PID: 680)
      • downloader.exe (PID: 3972)
      • YandexPackSetup.exe (PID: 3844)
      • downloader.exe (PID: 2420)
      • driverscanner.exe (PID: 1832)
      • driverscanner.tmp (PID: 2588)
      • msiexec.exe (PID: 2920)
      • lite_installer.exe (PID: 2512)
      • seederexe.exe (PID: 3884)
      • Yandex.exe (PID: 3652)
      • sender.exe (PID: 2028)
      • ds_move_serial.exe (PID: 2604)
      • dsmonitor.exe (PID: 2792)
      • driverscanner.exe (PID: 3904)
      • dsmonitor.exe (PID: 1488)
      • {EC94EFA1-3666-4FA1-941F-939CE0287796}.exe (PID: 2464)
    • Reads the computer name

      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp (PID: 3252)
      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp (PID: 2348)
      • downloader.exe (PID: 3696)
      • YandexPackSetup.exe (PID: 3056)
      • avast_free_antivirus_setup_online.exe (PID: 3068)
      • msiexec.exe (PID: 1596)
      • lite_installer.exe (PID: 3840)
      • seederexe.exe (PID: 3316)
      • msiexec.exe (PID: 2544)
      • downloader.exe (PID: 964)
      • Yandex.exe (PID: 2832)
      • sender.exe (PID: 2128)
      • avast_free_antivirus_setup_online.exe (PID: 2296)
      • Instup.exe (PID: 2676)
      • instup.exe (PID: 3592)
      • {11A7D5AC-B623-401A-A104-1762FB8830FD}.exe (PID: 3724)
      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp (PID: 3096)
      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp (PID: 680)
      • downloader.exe (PID: 3972)
      • YandexPackSetup.exe (PID: 3844)
      • driverscanner.tmp (PID: 2588)
      • msiexec.exe (PID: 2920)
      • lite_installer.exe (PID: 2512)
      • seederexe.exe (PID: 3884)
      • downloader.exe (PID: 2420)
      • Yandex.exe (PID: 3652)
      • sender.exe (PID: 2028)
      • ds_move_serial.exe (PID: 2604)
      • dsmonitor.exe (PID: 2792)
      • driverscanner.exe (PID: 3904)
      • dsmonitor.exe (PID: 1488)
    • Create files in a temporary directory

      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.exe (PID: 3520)
      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.exe (PID: 2076)
      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp (PID: 2348)
      • downloader.exe (PID: 3696)
      • downloader.exe (PID: 964)
      • YandexPackSetup.exe (PID: 3056)
      • lite_installer.exe (PID: 3840)
      • msiexec.exe (PID: 1596)
      • seederexe.exe (PID: 3316)
      • msiexec.exe (PID: 2544)
      • sender.exe (PID: 2128)
      • {11A7D5AC-B623-401A-A104-1762FB8830FD}.exe (PID: 3724)
      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.exe (PID: 3600)
      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.exe (PID: 3348)
      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp (PID: 680)
      • downloader.exe (PID: 3972)
      • downloader.exe (PID: 2420)
      • YandexPackSetup.exe (PID: 3844)
      • driverscanner.exe (PID: 1832)
      • msiexec.exe (PID: 2920)
      • lite_installer.exe (PID: 2512)
      • driverscanner.tmp (PID: 2588)
      • seederexe.exe (PID: 3884)
      • sender.exe (PID: 2028)
    • Checks proxy server information

      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp (PID: 2348)
      • downloader.exe (PID: 3696)
      • lite_installer.exe (PID: 3840)
      • Instup.exe (PID: 2676)
      • instup.exe (PID: 3592)
      • {11A7D5AC-B623-401A-A104-1762FB8830FD}.exe (PID: 3724)
      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp (PID: 680)
      • downloader.exe (PID: 3972)
      • lite_installer.exe (PID: 2512)
      • dsmonitor.exe (PID: 2792)
      • driverscanner.exe (PID: 3904)
    • Reads the machine GUID from the registry

      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp (PID: 2348)
      • downloader.exe (PID: 3696)
      • YandexPackSetup.exe (PID: 3056)
      • msiexec.exe (PID: 1596)
      • avast_free_antivirus_setup_online.exe (PID: 3068)
      • lite_installer.exe (PID: 3840)
      • seederexe.exe (PID: 3316)
      • msiexec.exe (PID: 2544)
      • Yandex.exe (PID: 2832)
      • Instup.exe (PID: 2676)
      • sender.exe (PID: 2128)
      • avast_free_antivirus_setup_online.exe (PID: 2296)
      • instup.exe (PID: 3592)
      • {11A7D5AC-B623-401A-A104-1762FB8830FD}.exe (PID: 3724)
      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp (PID: 680)
      • downloader.exe (PID: 3972)
      • YandexPackSetup.exe (PID: 3844)
      • msiexec.exe (PID: 2920)
      • seederexe.exe (PID: 3884)
      • driverscanner.tmp (PID: 2588)
      • lite_installer.exe (PID: 2512)
      • sender.exe (PID: 2028)
      • Yandex.exe (PID: 3652)
      • ds_move_serial.exe (PID: 2604)
      • dsmonitor.exe (PID: 2792)
      • driverscanner.exe (PID: 3904)
      • dsmonitor.exe (PID: 1488)
    • Creates files or folders in the user directory

      • downloader.exe (PID: 3696)
      • lite_installer.exe (PID: 3840)
      • msiexec.exe (PID: 2544)
      • msiexec.exe (PID: 1596)
      • seederexe.exe (PID: 3316)
      • Yandex.exe (PID: 2832)
      • {11A7D5AC-B623-401A-A104-1762FB8830FD}.exe (PID: 3724)
      • downloader.exe (PID: 3972)
      • lite_installer.exe (PID: 2512)
      • seederexe.exe (PID: 3884)
      • Yandex.exe (PID: 3652)
      • dsmonitor.exe (PID: 2792)
      • driverscanner.tmp (PID: 2588)
      • driverscanner.exe (PID: 3904)
    • Reads the software policy settings

      • avast_free_antivirus_setup_online.exe (PID: 3068)
      • downloader.exe (PID: 3696)
      • msiexec.exe (PID: 1596)
      • avast_free_antivirus_setup_online.exe (PID: 2296)
      • Instup.exe (PID: 2676)
      • instup.exe (PID: 3592)
      • lite_installer.exe (PID: 3840)
      • {11A7D5AC-B623-401A-A104-1762FB8830FD}.exe (PID: 3724)
      • downloader.exe (PID: 3972)
      • lite_installer.exe (PID: 2512)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 1596)
      • msiexec.exe (PID: 2544)
      • msiexec.exe (PID: 2920)
    • Reads Environment values

      • msiexec.exe (PID: 2544)
      • Instup.exe (PID: 2676)
      • instup.exe (PID: 3592)
      • msiexec.exe (PID: 2920)
      • dsmonitor.exe (PID: 2792)
      • ds_move_serial.exe (PID: 2604)
      • dsmonitor.exe (PID: 1488)
      • driverscanner.exe (PID: 3904)
    • Application launched itself

      • msiexec.exe (PID: 1596)
      • iexplore.exe (PID: 1044)
      • iexplore.exe (PID: 2396)
    • Process checks computer location settings

      • msiexec.exe (PID: 2544)
      • msiexec.exe (PID: 2920)
    • Creates files in the program directory

      • Instup.exe (PID: 2676)
      • avast_free_antivirus_setup_online.exe (PID: 2296)
      • instup.exe (PID: 3592)
      • driverscanner.tmp (PID: 2588)
      • driverscanner.exe (PID: 3904)
    • Reads CPU info

      • avast_free_antivirus_setup_online.exe (PID: 2296)
      • Instup.exe (PID: 2676)
      • instup.exe (PID: 3592)
      • driverscanner.exe (PID: 3904)
    • Dropped object may contain TOR URL's

      • Instup.exe (PID: 2676)
    • Manual execution by a user

      • {11A7D5AC-B623-401A-A104-1762FB8830FD}.exe (PID: 3724)
      • iexplore.exe (PID: 2396)
      • iexplore.exe (PID: 1044)
      • Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.exe (PID: 3600)
      • {EC94EFA1-3666-4FA1-941F-939CE0287796}.exe (PID: 2464)
    • Creates a software uninstall entry

      • driverscanner.tmp (PID: 2588)
    • Reads product name

      • driverscanner.exe (PID: 3904)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable Delphi generic (57.2)
.exe | Win32 Executable (generic) (18.2)
.exe | Win16/32 Executable Delphi generic (8.3)
.exe | Generic Win/DOS Executable (8)
.exe | DOS Executable Generic (8)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2016:04:06 14:39:04+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 66560
InitializedDataSize: 179712
UninitializedDataSize: -
EntryPoint: 0x117dc
OSVersion: 5
ImageVersion: 6
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName: appset.me
FileDescription: Uniblue DriverScanner Setup
FileVersion:
LegalCopyright:
ProductName: Uniblue DriverScanner
ProductVersion: 0.0.0.1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
108
Monitored processes
45
Malicious processes
27
Suspicious processes
1

Behavior graph

Click at the process to see the details
start hoax.win32.speedupmypc.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.exe hoax.win32.speedupmypc.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp no specs hoax.win32.speedupmypc.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.exe hoax.win32.speedupmypc.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp downloader.exe yandexpacksetup.exe downloader.exe avast_free_antivirus_setup_online.exe msiexec.exe msiexec.exe lite_installer.exe seederexe.exe yandex.exe sender.exe avast_free_antivirus_setup_online.exe instup.exe instup.exe sbr.exe no specs {11a7d5ac-b623-401a-a104-1762fb8830fd}.exe iexplore.exe iexplore.exe iexplore.exe iexplore.exe no specs iexplore.exe hoax.win32.speedupmypc.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.exe hoax.win32.speedupmypc.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp no specs hoax.win32.speedupmypc.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.exe hoax.win32.speedupmypc.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp downloader.exe yandexpacksetup.exe downloader.exe driverscanner.exe driverscanner.tmp msiexec.exe lite_installer.exe seederexe.exe yandex.exe no specs vssvc.exe no specs sender.exe SPPSurrogate no specs ds_move_serial.exe dsmonitor.exe driverscanner.exe dsmonitor.exe {ec94efa1-3666-4fa1-941f-939ce0287796}.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
680"C:\Users\admin\AppData\Local\Temp\is-KKRGJ.tmp\Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp" /SL5="$50362,8726424,247296,C:\Users\admin\Desktop\Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.exe" /SPAWNWND=$302E2 /NOTIFYWND=$402C4 C:\Users\admin\AppData\Local\Temp\is-KKRGJ.tmp\Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp
Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-kkrgj.tmp\hoax.win32.speedupmypc.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
880"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1044 CREDAT:3347725 APPID:Microsoft.Website.2AE68B04.23AF42CA /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
964C:\Users\admin\AppData\Local\Temp\downloader.exe --stat dwnldr/p=7053/cnt=0/dt=6/ct=1/rt=0 --dh 1436 --st 1719473049C:\Users\admin\AppData\Local\Temp\downloader.exe
downloader.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup Downloader
Exit code:
0
Version:
0.1.0.32
Modules
Images
c:\users\admin\appdata\local\temp\downloader.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\secur32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
1044"C:\Program Files\Internet Explorer\iexplore.exe" -w "C:\Users\admin\Desktop\Яндекс.website" C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
1488"C:\Program Files\Uniblue\DriverScanner\dsmonitor.exe" C:\Program Files\Uniblue\DriverScanner\dsmonitor.exe
taskeng.exe
User:
admin
Company:
Uniblue Systems Ltd
Integrity Level:
HIGH
Description:
Uniblue DriverScanner Monitor
Version:
4.1.1.1
Modules
Images
c:\program files\uniblue\driverscanner\dsmonitor.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
1596C:\Windows\system32\msiexec.exe /VC:\Windows\System32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1832"C:\Users\admin\AppData\Local\Temp\is-CJEDT.tmp\driverscanner.exe" C:\Users\admin\AppData\Local\Temp\is-CJEDT.tmp\driverscanner.exe
Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp
User:
admin
Company:
Uniblue Systems Ltd
Integrity Level:
HIGH
Description:
DriverScanner Setup
Exit code:
0
Version:
4.1.1.1
Modules
Images
c:\users\admin\appdata\local\temp\is-cjedt.tmp\driverscanner.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2028C:\Users\admin\AppData\Local\Temp\D8CD6BC8-AA5E-431A-BC4C-CBE9ACB72FAB\sender.exe --send "/status.xml?clid=2313438-3&uuid=99555ae8-FF28-4974-8D86-1EA4E4F0df91&vnt=Windows 7x32&file-no=8%0A13%0A15%0A18%0A25%0A42%0A45%0A49%0A50%0A57%0A61%0A103%0A111%0A123%0A124%0A125%0A"C:\Users\admin\AppData\Local\Temp\D8CD6BC8-AA5E-431A-BC4C-CBE9ACB72FAB\sender.exe
seederexe.exe
User:
admin
Company:
Yandex
Integrity Level:
MEDIUM
Description:
Yandex Statistics
Exit code:
0
Version:
0.0.2.14
Modules
Images
c:\users\admin\appdata\local\temp\d8cd6bc8-aa5e-431a-bc4c-cbe9acb72fab\sender.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\webio.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2076"C:\Users\admin\Desktop\Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.exe" /SPAWNWND=$4010A /NOTIFYWND=$B016A C:\Users\admin\Desktop\Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.exe
Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp
User:
admin
Company:
appset.me
Integrity Level:
HIGH
Description:
Uniblue DriverScanner Setup
Version:
Modules
Images
c:\users\admin\desktop\hoax.win32.speedupmypc.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2128C:\Users\admin\AppData\Local\Temp\1071AB23-7805-4D4A-8404-8614C8B41A4A\sender.exe --send "/status.xml?clid=2313438-3&uuid=99555ae8-FF28-4974-8D86-1EA4E4F0df91&vnt=Windows 7x32&file-no=8%0A10%0A11%0A13%0A15%0A17%0A18%0A20%0A21%0A22%0A24%0A25%0A40%0A42%0A45%0A50%0A57%0A61%0A89%0A103%0A111%0A123%0A124%0A125%0A129%0A"C:\Users\admin\AppData\Local\Temp\1071AB23-7805-4D4A-8404-8614C8B41A4A\sender.exe
seederexe.exe
User:
admin
Company:
Yandex
Integrity Level:
MEDIUM
Description:
Yandex Statistics
Exit code:
0
Version:
0.0.2.14
Modules
Images
c:\users\admin\appdata\local\temp\1071ab23-7805-4d4a-8404-8614c8b41a4a\sender.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\webio.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
130 261
Read events
125 923
Write events
4 166
Delete events
172

Modification events

(PID) Process:(2348) Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:writeName:Owner
Value:
2C0900007ADDCCF162C8DA01
(PID) Process:(2348) Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:writeName:SessionHash
Value:
12563859FB8FCE2BE90A30BE080ADA01C6E83781BABF353C5C2AFB6190569E29
(PID) Process:(2348) Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:writeName:Sequence
Value:
1
(PID) Process:(2348) Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2348) Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyServer
Value:
(PID) Process:(2348) Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyOverride
Value:
(PID) Process:(2348) Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoConfigURL
Value:
(PID) Process:(2348) Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:AutoDetect
Value:
(PID) Process:(2348) Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
460000005D010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(2348) Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
138
Suspicious files
252
Text files
474
Unknown types
7

Dropped files

PID
Process
Filename
Type
2076Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.exeC:\Users\admin\AppData\Local\Temp\is-PMNGI.tmp\Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmpexecutable
MD5:030FF307247E27693F139602B2B844CE
SHA256:EAAD488AD85FEB448EA788243406CB598B91A2E3512A808F43B3EBBCB6308D92
2348Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmpC:\Users\admin\AppData\Local\Temp\is-2BITV.tmp\AppsetOfferText.rtftext
MD5:CE92DCDEF31F98A88C26B385E45C0F76
SHA256:E6D020217B9DEEE770B52D2862C8DD1E5AA9F063B1AE140CA45FD80171155291
2348Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmpC:\Users\admin\AppData\Local\Temp\is-2BITV.tmp\botva2.dllexecutable
MD5:EF899FA243C07B7B82B3A45F6EC36771
SHA256:DA7D0368712EE419952EB2640A65A7F24E39FB7872442ED4D2EE847EC4CFDE77
2348Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmpC:\Users\admin\AppData\Local\Temp\is-2BITV.tmp\Ya_distr_342x422.pngimage
MD5:B273649B75D640CCD6921E22F7016566
SHA256:632BCE31329FB202B24A76CA7CC15264BD88562DE9B41783D9CB61154C6D78BB
2348Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmpC:\Users\admin\AppData\Local\Temp\is-2BITV.tmp\downloader.exeexecutable
MD5:7DF933C48F70841613A9F0092B5E4A31
SHA256:8E553E9AA721DB167BDEAF7748BB09D4F497E3A469FD09B6A995EA25D378F1FB
3056YandexPackSetup.exeC:\Users\admin\AppData\Local\Temp\{5B964E0E-B9A3-4276-9ED9-4D5A5720747A}\YandexSearch.msi
MD5:
SHA256:
1596msiexec.exeC:\Windows\Installer\54d9a.msi
MD5:
SHA256:
2348Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmpC:\Users\admin\AppData\Local\Temp\is-2BITV.tmp\driverscanner.exeexecutable
MD5:6DD862ACF1ABE210DEA0E6E345E59E19
SHA256:F834401AF4FE7F2052E35EBD6F616B97ECBDAA0181BD486442E6DFCFE3FA149D
2348Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmpC:\Users\admin\AppData\Local\Temp\is-2BITV.tmp\is-U3J75.tmpexecutable
MD5:8078AEB5AFEFAE19356709EC118599C3
SHA256:3DEAAF71EF6F9BE574913006500DC34F156D6334D619FDAE9DB02B0C77F2C1E3
3520Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.exeC:\Users\admin\AppData\Local\Temp\is-LL88E.tmp\Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmpexecutable
MD5:030FF307247E27693F139602B2B844CE
SHA256:EAAD488AD85FEB448EA788243406CB598B91A2E3512A808F43B3EBBCB6308D92
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
102
TCP/UDP connections
158
DNS requests
114
Threats
21

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
964
downloader.exe
GET
87.250.251.14:80
http://clck.yandex.ru/click/dtype=stred/pid=12/cid=72435/path=dwnldr/p=7053/cnt=0/dt=6/ct=1/rt=4/imp=0/*
unknown
3068
avast_free_antivirus_setup_online.exe
POST
200
142.250.185.110:80
http://www.google-analytics.com/collect
unknown
3316
seederexe.exe
GET
200
77.88.21.14:80
http://clck.yandex.ru/click/dtype=stred/pid=198/cid=73068/path=3_7_12_234/GoogleChromeBeta=0/anti=0/antiNames=/browser=msedge/clid=2313438-3/ff=315/gc=181/goodToken=1/googlin=0/ie=44/init=1428/mlru=0/op=12/op64=14/ui=99555ae8-FF28-4974-8D86-1EA4E4F0df91/yabro=0/%2A
unknown
2128
sender.exe
GET
200
87.250.254.20:80
http://soft.export.yandex.ru/status.xml?clid=2313438-3&uuid=99555ae8-FF28-4974-8D86-1EA4E4F0df91&vnt=Windows%207x32&file-no=8%0A10%0A11%0A13%0A15%0A17%0A18%0A20%0A21%0A22%0A24%0A25%0A40%0A42%0A45%0A50%0A57%0A61%0A89%0A103%0A111%0A123%0A124%0A125%0A129
unknown
2348
Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp
GET
202
188.42.30.244:80
http://stat.offerbox.io/download/3/{B8936F92-BB4B-4CFE-A2CA-2152CDD6A40D}/4E3014F88A1776A95D57E2AE3211A742FF35E455C4BA364784/1/0
unknown
3696
downloader.exe
GET
302
5.45.205.241:80
http://downloader.yandex.net/yandex-pack/downloader/info.rss
unknown
3696
downloader.exe
GET
200
5.45.247.52:80
http://cachev2-ams02.cdn.yandex.net/downloader.yandex.net/yandex-pack/downloader/info.rss?lid=300
unknown
1372
svchost.exe
GET
304
23.50.131.196:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?33775f6043c93e33
unknown
1372
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
1372
svchost.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
unknown
224.0.0.252:5355
unknown
1372
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
239.255.255.250:3702
unknown
4
System
192.168.100.255:138
unknown
2348
Hoax.Win32.SpeedUpMyPC.gen-80729f5237ac4b69d0ed4b947f44ba97c582367b834ee453e1c9478c38649e07.tmp
188.42.30.244:80
stat.offerbox.io
United Network LLC
LU
unknown
1060
svchost.exe
224.0.0.252:5355
unknown
3696
downloader.exe
5.45.205.241:80
downloader.yandex.net
YANDEX LLC
RU
unknown
3696
downloader.exe
5.45.247.52:80
cachev2-ams02.cdn.yandex.net
YANDEX LLC
RU
unknown
1372
svchost.exe
23.50.131.196:80
ctldl.windowsupdate.com
Akamai International B.V.
DE
unknown

DNS requests

Domain
IP
Reputation
stat.offerbox.io
  • 188.42.30.244
unknown
downloader.yandex.net
  • 5.45.205.241
  • 5.45.205.245
  • 5.45.205.244
  • 5.45.205.242
  • 5.45.205.243
unknown
cachev2-ams02.cdn.yandex.net
  • 5.45.247.52
unknown
settings-win.data.microsoft.com
  • 4.231.128.59
unknown
ctldl.windowsupdate.com
  • 23.50.131.196
  • 23.50.131.200
  • 23.50.131.213
unknown
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
unknown
www.microsoft.com
  • 184.30.21.171
unknown
www.google-analytics.com
  • 142.250.185.110
  • 142.250.74.206
unknown
v7event.stats.avast.com
  • 34.117.223.223
unknown
files.avast.com
  • 23.48.23.42
  • 23.48.23.43
unknown

Threats

PID
Process
Class
Message
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Misc activity
ET INFO EXE - Served Attached HTTP
Attempted Information Leak
ET POLICY curl User-Agent Outbound
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Misc activity
ET INFO EXE - Served Attached HTTP
Attempted Information Leak
ET POLICY curl User-Agent Outbound
Attempted Information Leak
ET POLICY Python-urllib/ Suspicious User Agent
Attempted Information Leak
ET POLICY Python-urllib/ Suspicious User Agent
12 ETPRO signatures available at the full report
Process
Message
YandexPackSetup.exe
GetLoggedCreds_WTSSessionInfo(): szUserName = admin, szDomain = USER-PC, dwSessionId = 1
YandexPackSetup.exe
IsAlreadyRun() In
YandexPackSetup.exe
IsAlreadyRun() Out : ret (BOOL) = 0
YandexPackSetup.exe
IsMSISrvFree() In
YandexPackSetup.exe
IsMSISrvFree() : OpenMutex() err ret = 2
YandexPackSetup.exe
IsMSISrvFree() Out ret = 1
YandexPackSetup.exe
GetSidFromEnumSess(): i = 0 : szUserName = Administrator, szDomain = USER-PC, dwSessionId = 0
YandexPackSetup.exe
GetSidFromEnumSess(): i = 1 : szUserName = admin, szDomain = USER-PC, dwSessionId = 0
YandexPackSetup.exe
GetSidFromEnumSess(): ProfileImagePath(2) = C:\Users\admin
YandexPackSetup.exe
GetSidFromEnumSess(): LsaEnumerateLogonSessions() lpszSid = S-1-5-21-1302019708-1500728564-335382590-1000