File name:

debutpsetup.exe

Full analysis: https://app.any.run/tasks/81c83d6e-9a93-4ccb-b270-bad3449c144e
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: April 30, 2020, 00:32:54
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

8F45379211F9F7D3B68A88685FAD37D6

SHA1:

86D74F3A2892A888A9BA5E49DC544C73F6BF2698

SHA256:

862C1F3757EC3A3065F6176ACFE486735D54CFB127E0C9312A7FB51E10B1AD83

SSDEEP:

49152:sZdKbxYGt8affT9KAgUzNlqDNd8l1M6vFjpb1:sT5Q13TAvilMN+lJ3b1

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • nchsetup.exe (PID: 2060)
      • nchsetup.exe (PID: 4064)
    • Application was dropped or rewritten from another process

      • nchsetup.exe (PID: 2060)
      • Installer.exe (PID: 3740)
      • nchsetup.exe (PID: 4064)
      • mp3el2.exe (PID: 3440)
      • debut.exe (PID: 3916)
      • aacdec2.exe (PID: 856)
      • amrdec2.exe (PID: 3608)
      • x264enc10.exe (PID: 872)
      • gamecapturehook3.exe (PID: 2372)
      • debut.exe (PID: 2724)
      • ffmpeg24.exe (PID: 2588)
      • lame.exe (PID: 3064)
    • Downloads executable files from the Internet

      • nchsetup.exe (PID: 2060)
      • iexplore.exe (PID: 280)
    • Actions looks like stealing of personal data

      • explorer.exe (PID: 372)
    • Loads the Task Scheduler COM API

      • debut.exe (PID: 2724)
      • nchsetup.exe (PID: 4064)
      • debut.exe (PID: 3916)
    • Loads dropped or rewritten executable

      • debut.exe (PID: 3916)
      • explorer.exe (PID: 372)
      • iexplore.exe (PID: 1168)
      • iexplore.exe (PID: 280)
      • ffmpeg24.exe (PID: 2588)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • nchsetup.exe (PID: 2060)
      • Installer.exe (PID: 3740)
      • debutpsetup.exe (PID: 3328)
      • nchsetup.exe (PID: 4064)
      • mp3el2.exe (PID: 3440)
      • aacdec2.exe (PID: 856)
      • amrdec2.exe (PID: 3608)
      • x264enc10.exe (PID: 872)
      • gamecapturehook3.exe (PID: 2372)
      • iexplore.exe (PID: 280)
      • iexplore.exe (PID: 1168)
      • ffmpeg24.exe (PID: 2588)
    • Creates files in the program directory

      • amrdec2.exe (PID: 3608)
      • aacdec2.exe (PID: 856)
      • mp3el2.exe (PID: 3440)
      • x264enc10.exe (PID: 872)
      • nchsetup.exe (PID: 4064)
      • gamecapturehook3.exe (PID: 2372)
    • Modifies the open verb of a shell class

      • nchsetup.exe (PID: 4064)
    • Starts itself from another location

      • nchsetup.exe (PID: 4064)
    • Creates a software uninstall entry

      • nchsetup.exe (PID: 4064)
    • Creates files in the user directory

      • debut.exe (PID: 3916)
      • ffmpeg24.exe (PID: 2588)
    • Starts Internet Explorer

      • debut.exe (PID: 3916)
  • INFO

    • Reads Internet Cache Settings

      • iexplore.exe (PID: 1168)
      • iexplore.exe (PID: 280)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 1168)
    • Changes internet zones settings

      • iexplore.exe (PID: 1168)
    • Dropped object may contain Bitcoin addresses

      • ffmpeg24.exe (PID: 2588)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 1168)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 1168)
    • Changes settings of System certificates

      • iexplore.exe (PID: 1168)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2019:10:09 03:33:38+02:00
PEType: PE32
LinkerVersion: 8
CodeSize: 2048
InitializedDataSize: 2525184
UninitializedDataSize: -
EntryPoint: 0x11d4
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x0017
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (Australian)
CharacterSet: Unicode
CompanyName: NCH Software
FileDescription: Debut, capturador de vídeo
FileVersion: 6.21ES+
ProductVersion: 6.21ES+
ProductName: Debut
LegalCopyright: NCH Software
InternalName: Debut
OriginalFileName: Debut.exe

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 09-Oct-2019 01:33:38
Detected languages:
  • English - Australia
CompanyName: NCH Software
FileDescription: Debut, capturador de vídeo
FileVersion: 6.21ES+
ProductVersion: 6.21ES+
ProductName: Debut
LegalCopyright: NCH Software
InternalName: Debut
OriginalFilename: Debut.exe

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000D8

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 09-Oct-2019 01:33:38
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x00000743
0x00000800
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
5.54971
.rdata
0x00002000
0x00000A42
0x00000C00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
3.69999
.data
0x00003000
0x00000004
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0.0611629
.rsrc
0x00004000
0x002676D8
0x00267800
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
7.99966
.reloc
0x0026C000
0x0000013A
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
2.35421

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.09673
1149
Latin 1 / Western European
UNKNOWN
RT_MANIFEST
2
6.26009
2216
Latin 1 / Western European
UNKNOWN
RT_ICON
95
7.99979
1421865
Latin 1 / Western European
UNKNOWN
UNKNOWN
99
7.99968
1090606
Latin 1 / Western European
UNKNOWN
UNKNOWN

Imports

KERNEL32.dll
SETUPAPI.dll
SHELL32.dll
USER32.dll
ole32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
56
Monitored processes
17
Malicious processes
7
Suspicious processes
3

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start debutpsetup.exe nchsetup.exe installer.exe nchsetup.exe aacdec2.exe amrdec2.exe mp3el2.exe x264enc10.exe gamecapturehook3.exe debut.exe no specs debut.exe no specs explorer.exe iexplore.exe iexplore.exe ffmpeg24.exe lame.exe no specs debutpsetup.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
280"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1168 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
372C:\Windows\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\winanr.dll
c:\windows\system32\wshtcpip.dll
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
856"C:\Program Files\NCH Software\Debut\aacdec2.exe" -LQUIET -instby fiDebutC:\Program Files\NCH Software\Debut\aacdec2.exe
nchsetup.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\program files\nch software\debut\aacdec2.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
872"C:\Program Files\NCH Software\Debut\x264enc10.exe" -LQUIET -instby fiDebutC:\Program Files\NCH Software\Debut\x264enc10.exe
nchsetup.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\program files\nch software\debut\x264enc10.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
988"C:\Users\admin\AppData\Local\Temp\debutpsetup.exe" C:\Users\admin\AppData\Local\Temp\debutpsetup.exeexplorer.exe
User:
admin
Company:
NCH Software
Integrity Level:
MEDIUM
Description:
Debut, capturador de vídeo
Exit code:
3221226540
Version:
6.21ES+
Modules
Images
c:\users\admin\appdata\local\temp\debutpsetup.exe
c:\systemroot\system32\ntdll.dll
1168"C:\Program Files\Internet Explorer\iexplore.exe" http://www.nch.com.au/components/ffmpeg24.exeC:\Program Files\Internet Explorer\iexplore.exe
debut.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
1
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2060"C:\Users\admin\AppData\Local\Temp\n1s\nchsetup.exe" -installer "C:\Users\admin\AppData\Local\Temp\debutpsetup.exe" -instdata "C:\Users\admin\AppData\Local\Temp\n1s\nchdata.dat"C:\Users\admin\AppData\Local\Temp\n1s\nchsetup.exe
debutpsetup.exe
User:
admin
Company:
NCH Software
Integrity Level:
HIGH
Description:
Debut, capturador de vídeo
Exit code:
2
Version:
6.21ES+
Modules
Images
c:\users\admin\appdata\local\temp\n1s\nchsetup.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\gdi32.dll
2372"C:\Program Files\NCH Software\Debut\gamecapturehook3.exe" -LQUIET -instby fiDebutC:\Program Files\NCH Software\Debut\gamecapturehook3.exe
nchsetup.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\program files\nch software\debut\gamecapturehook3.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2588"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\ffmpeg24.exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\ffmpeg24.exe
iexplore.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\b6qgx7lp\ffmpeg24.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2724"C:\Program Files\NCH Software\Debut\debut.exe" -installschedC:\Program Files\NCH Software\Debut\debut.exenchsetup.exe
User:
admin
Company:
NCH Software
Integrity Level:
MEDIUM
Description:
Debut Video Capture Software
Exit code:
0
Version:
6.18+
Modules
Images
c:\program files\nch software\debut\debut.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\gdi32.dll
Total events
11 564
Read events
4 069
Write events
5 243
Delete events
2 252

Modification events

(PID) Process:(372) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3328) debutpsetup.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3328) debutpsetup.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2060) nchsetup.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
Operation:writeName:DebutInstall
Value:
C:\Users\admin\AppData\Local\Temp\debutpsetup.exe
(PID) Process:(3740) Installer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(3740) Installer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2060) nchsetup.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
Operation:delete valueName:DebutInstall
Value:
C:\Users\admin\AppData\Local\Temp\debutpsetup.exe
(PID) Process:(372) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Operation:writeName:P:\Hfref\nqzva\NccQngn\Ybpny\Grzc\a1f\apufrghc.rkr
Value:
00000000000000000000000000000000000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BF000080BFFFFFFFFF000000000000000000000000
(PID) Process:(372) explorer.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Operation:writeName:HRZR_PGYFRFFVBA
Value:
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
(PID) Process:(4064) nchsetup.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
Operation:writeName:DebutInstall
Value:
C:\Users\admin\AppData\Local\Temp\Debut-2568-1\Installer.exe
Executable files
33
Suspicious files
9
Text files
37
Unknown types
26

Dropped files

PID
Process
Filename
Type
3328debutpsetup.exeC:\Users\admin\AppData\Local\Temp\n1s\nchdata.cab
MD5:
SHA256:
3740Installer.exeC:\Users\admin\AppData\Local\Temp\n1s\nchdata.cab
MD5:
SHA256:
2060nchsetup.exeC:\Users\admin\AppData\Local\Temp\Debut-2568-1\Installer.exeexecutable
MD5:
SHA256:
3328debutpsetup.exeC:\Users\admin\AppData\Local\Temp\n1s\nchsetup.cabcompressed
MD5:
SHA256:
3740Installer.exeC:\Users\admin\AppData\Local\Temp\n1s\nchsetup.cabcompressed
MD5:
SHA256:
3740Installer.exeC:\Users\admin\AppData\Local\Temp\n1s\nchsetup.exeexecutable
MD5:
SHA256:
3740Installer.exeC:\Users\admin\AppData\Local\Temp\n1s\nchdata.datexecutable
MD5:
SHA256:
4064nchsetup.exeC:\Program Files\NCH Software\Debut\debut.exeexecutable
MD5:
SHA256:
4064nchsetup.exeC:\Program Files\NCH Software\Debut\debutfilterx86.sysexecutable
MD5:5B38F646D87890CDFFD1F1A13F9374C1
SHA256:2AF1236762139905693880569D6D4026A61220CC8F89A578BDF707E090C298E9
4064nchsetup.exeC:\Program Files\NCH Software\Debut\cursorleft.pngimage
MD5:D5D90415DF944402DFA23B70C7387932
SHA256:18A297B010FF2634417552CB5BE113890F7211A1A42A9C4220B4F759A31B279B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
9
DNS requests
7
Threats
3

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2060
nchsetup.exe
GET
200
66.39.105.214:80
http://www.nch.com.au/components/debutsetup.exe
US
executable
2.42 Mb
whitelisted
280
iexplore.exe
GET
200
23.235.214.26:80
http://www.nch.com.au/components/ffmpeg24.exe
US
executable
3.17 Mb
whitelisted
1168
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D
US
der
1.47 Kb
whitelisted
1168
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D
US
der
1.47 Kb
whitelisted
1168
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D
US
der
1.47 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2060
nchsetup.exe
66.39.105.214:80
www.nch.com.au
pair Networks
US
malicious
280
iexplore.exe
23.235.214.26:80
www.nch.com.au
InMotion Hosting, Inc.
US
suspicious
1168
iexplore.exe
152.199.19.161:443
iecvlist.microsoft.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
1168
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted

DNS requests

Domain
IP
Reputation
www.nch.com.au
  • 66.39.105.214
  • 23.235.214.26
whitelisted
iecvlist.microsoft.com
  • 152.199.19.161
whitelisted
r20swj13mr.microsoft.com
  • 152.199.19.161
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted

Threats

PID
Process
Class
Message
2060
nchsetup.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2060
nchsetup.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
280
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
No debug info