URL:

https://mega.nz/file/Xv4HSArR#aTIEjHWC8fsV1tRX14ms3p-v8OSKLd1q43OtWtUrZTQ

Full analysis: https://app.any.run/tasks/fb8b069f-f1f6-49cf-9052-745143ac8353
Verdict: Malicious activity
Analysis date: February 16, 2022, 13:56:57
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

3C28D3BE0518527AEE065B0AF14CF495

SHA1:

D1AF2EB9EED68B380C467ABDD96D43EF9817E230

SHA256:

87E21AA4BFAD0B2CAEA84EEBB2E54C81D9E8E0E89310AB859A481948D150A119

SSDEEP:

3:N8X/iCRtaYBtW4b3BDjyqx0:2ntDt5Biv

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops executable file immediately after starts

      • reWASD320-0674.exe (PID: 368)
      • reWASDInstaller.exe (PID: 3176)
      • reWASDService.exe (PID: 3928)
      • DrvInst.exe (PID: 2728)
    • Application was dropped or rewritten from another process

      • reWASD320-0674.exe (PID: 1768)
      • reWASD320-0674.exe (PID: 368)
      • RewasdWpfInstaller.exe (PID: 1200)
      • reWASDInstaller.exe (PID: 3176)
      • reWASDService.exe (PID: 3928)
    • Loads dropped or rewritten executable

      • reWASD320-0674.exe (PID: 368)
      • reWASDInstaller.exe (PID: 3176)
    • Changes the autorun value in the registry

      • reWASDInstaller.exe (PID: 3176)
    • Changes settings of System certificates

      • reWASDService.exe (PID: 3928)
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 3476)
      • chrome.exe (PID: 756)
    • Modifies files in Chrome extension folder

      • chrome.exe (PID: 3052)
    • Checks supported languages

      • WinRAR.exe (PID: 2532)
      • WinRAR.exe (PID: 3056)
      • reWASD320-0674.exe (PID: 368)
      • RewasdWpfInstaller.exe (PID: 1200)
      • reWASDInstaller.exe (PID: 3176)
      • ns26C6.tmp (PID: 1472)
      • ns27A2.tmp (PID: 2868)
      • reWASDService.exe (PID: 3928)
      • DrvInst.exe (PID: 2728)
    • Reads the computer name

      • WinRAR.exe (PID: 2532)
      • WinRAR.exe (PID: 3056)
      • reWASD320-0674.exe (PID: 368)
      • RewasdWpfInstaller.exe (PID: 1200)
      • reWASDInstaller.exe (PID: 3176)
      • reWASDService.exe (PID: 3928)
      • DrvInst.exe (PID: 2728)
    • Executable content was dropped or overwritten

      • reWASD320-0674.exe (PID: 368)
      • WinRAR.exe (PID: 3056)
      • RewasdWpfInstaller.exe (PID: 1200)
      • reWASDInstaller.exe (PID: 3176)
      • reWASDService.exe (PID: 3928)
      • DrvInst.exe (PID: 2728)
    • Drops a file that was compiled in debug mode

      • reWASD320-0674.exe (PID: 368)
      • reWASDInstaller.exe (PID: 3176)
      • reWASDService.exe (PID: 3928)
      • DrvInst.exe (PID: 2728)
    • Reads Environment values

      • RewasdWpfInstaller.exe (PID: 1200)
      • vssvc.exe (PID: 3532)
    • Creates a directory in Program Files

      • reWASDInstaller.exe (PID: 3176)
      • RewasdWpfInstaller.exe (PID: 1200)
    • Starts application with an unusual extension

      • reWASDInstaller.exe (PID: 3176)
    • Creates files in the program directory

      • reWASDInstaller.exe (PID: 3176)
      • logman.exe (PID: 3612)
      • logman.exe (PID: 2420)
      • reWASDService.exe (PID: 3928)
    • Changes default file association

      • reWASDInstaller.exe (PID: 3176)
    • Adds / modifies Windows certificates

      • reWASDService.exe (PID: 3928)
    • Executed via COM

      • DrvInst.exe (PID: 2728)
      • DrvInst.exe (PID: 3728)
      • DrvInst.exe (PID: 3340)
    • Creates files in the driver directory

      • DrvInst.exe (PID: 2728)
    • Uses RUNDLL32.EXE to load library

      • DrvInst.exe (PID: 2728)
      • DrvInst.exe (PID: 3728)
    • Executed as Windows Service

      • vssvc.exe (PID: 3532)
    • Creates files in the Windows directory

      • DrvInst.exe (PID: 2728)
    • Removes files from Windows directory

      • DrvInst.exe (PID: 2728)
  • INFO

    • Checks supported languages

      • iexplore.exe (PID: 3020)
      • iexplore.exe (PID: 3476)
      • control.exe (PID: 3888)
      • chrome.exe (PID: 3052)
      • chrome.exe (PID: 3228)
      • chrome.exe (PID: 484)
      • chrome.exe (PID: 3880)
      • chrome.exe (PID: 2972)
      • chrome.exe (PID: 2772)
      • chrome.exe (PID: 2252)
      • chrome.exe (PID: 3056)
      • chrome.exe (PID: 1984)
      • chrome.exe (PID: 3372)
      • chrome.exe (PID: 2568)
      • chrome.exe (PID: 3540)
      • chrome.exe (PID: 2420)
      • chrome.exe (PID: 3240)
      • chrome.exe (PID: 3296)
      • chrome.exe (PID: 344)
      • chrome.exe (PID: 3356)
      • chrome.exe (PID: 2604)
      • chrome.exe (PID: 3112)
      • chrome.exe (PID: 3028)
      • chrome.exe (PID: 2928)
      • chrome.exe (PID: 2976)
      • chrome.exe (PID: 452)
      • chrome.exe (PID: 504)
      • chrome.exe (PID: 3800)
      • chrome.exe (PID: 3204)
      • chrome.exe (PID: 1432)
      • chrome.exe (PID: 3560)
      • chrome.exe (PID: 1676)
      • chrome.exe (PID: 2940)
      • chrome.exe (PID: 764)
      • chrome.exe (PID: 396)
      • chrome.exe (PID: 4088)
      • chrome.exe (PID: 2516)
      • chrome.exe (PID: 3768)
      • chrome.exe (PID: 2160)
      • chrome.exe (PID: 2232)
      • chrome.exe (PID: 756)
      • chrome.exe (PID: 3552)
      • chrome.exe (PID: 2264)
      • chrome.exe (PID: 364)
      • chrome.exe (PID: 304)
      • chrome.exe (PID: 2980)
      • explorer.exe (PID: 2504)
      • NOTEPAD.EXE (PID: 2304)
      • chrome.exe (PID: 3316)
      • WISPTIS.EXE (PID: 2352)
      • logman.exe (PID: 2420)
      • logman.exe (PID: 3612)
      • rundll32.exe (PID: 2892)
      • vssvc.exe (PID: 3532)
    • Reads the computer name

      • iexplore.exe (PID: 3020)
      • iexplore.exe (PID: 3476)
      • control.exe (PID: 3888)
      • chrome.exe (PID: 3052)
      • chrome.exe (PID: 484)
      • chrome.exe (PID: 3880)
      • chrome.exe (PID: 2568)
      • chrome.exe (PID: 3372)
      • chrome.exe (PID: 344)
      • chrome.exe (PID: 3296)
      • chrome.exe (PID: 2604)
      • chrome.exe (PID: 3768)
      • chrome.exe (PID: 756)
      • chrome.exe (PID: 3552)
      • explorer.exe (PID: 2504)
      • WISPTIS.EXE (PID: 2352)
      • logman.exe (PID: 2420)
      • logman.exe (PID: 3612)
      • rundll32.exe (PID: 2892)
      • vssvc.exe (PID: 3532)
    • Application launched itself

      • iexplore.exe (PID: 3020)
      • chrome.exe (PID: 3052)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 3020)
      • iexplore.exe (PID: 3476)
      • chrome.exe (PID: 3880)
      • reWASDService.exe (PID: 3928)
      • DrvInst.exe (PID: 2728)
      • rundll32.exe (PID: 2892)
    • Manual execution by user

      • control.exe (PID: 3888)
      • chrome.exe (PID: 3052)
      • explorer.exe (PID: 2504)
      • WinRAR.exe (PID: 3056)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 3476)
      • iexplore.exe (PID: 3020)
      • chrome.exe (PID: 3052)
      • reWASDService.exe (PID: 3928)
      • DrvInst.exe (PID: 2728)
      • rundll32.exe (PID: 2892)
    • Changes internet zones settings

      • iexplore.exe (PID: 3020)
    • Reads the date of Windows installation

      • iexplore.exe (PID: 3020)
      • chrome.exe (PID: 344)
    • Reads the hosts file

      • chrome.exe (PID: 3052)
      • chrome.exe (PID: 3880)
    • Creates files in the user directory

      • chrome.exe (PID: 3052)
    • Changes settings of System certificates

      • DrvInst.exe (PID: 2728)
    • Searches for installed software

      • DrvInst.exe (PID: 2728)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
120
Monitored processes
68
Malicious processes
4
Suspicious processes
2

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start drop and start iexplore.exe iexplore.exe control.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs winrar.exe no specs chrome.exe no specs explorer.exe no specs winrar.exe chrome.exe no specs notepad.exe no specs rewasd320-0674.exe no specs rewasd320-0674.exe rewasdwpfinstaller.exe wisptis.exe no specs wisptis.exe no specs rewasdinstaller.exe ns26c6.tmp no specs logman.exe no specs ns27a2.tmp no specs logman.exe no specs rewasdservice.exe drvinst.exe rundll32.exe no specs vssvc.exe no specs drvinst.exe no specs drvinst.exe no specs rundll32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
304"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1036,7065692389319509867,8240932014652691765,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1952 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\86.0.4240.198\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\shell32.dll
c:\windows\system32\api-ms-win-downlevel-shell32-l1-1-0.dll
344"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1036,7065692389319509867,8240932014652691765,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2864 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\86.0.4240.198\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\api-ms-win-downlevel-shell32-l1-1-0.dll
c:\windows\system32\shell32.dll
364"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1036,7065692389319509867,8240932014652691765,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2896 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\86.0.4240.198\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\api-ms-win-downlevel-shell32-l1-1-0.dll
c:\windows\system32\shell32.dll
368"C:\Users\admin\AppData\Local\Temp\Rar$EXb3056.22668\reWASD_3.2.0.674_fu11\reWASD320-0674.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXb3056.22668\reWASD_3.2.0.674_fu11\reWASD320-0674.exe
WinRAR.exe
User:
admin
Company:
Disc Soft Ltd.
Integrity Level:
HIGH
Description:
reWASD
Exit code:
0
Version:
3.2.0674
Modules
Images
c:\users\admin\appdata\local\temp\rar$exb3056.22668\rewasd_3.2.0.674_fu11\rewasd320-0674.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
396"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1036,7065692389319509867,8240932014652691765,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3612 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\86.0.4240.198\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\api-ms-win-downlevel-shell32-l1-1-0.dll
c:\windows\system32\shell32.dll
452"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1036,7065692389319509867,8240932014652691765,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3592 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\86.0.4240.198\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\api-ms-win-downlevel-shell32-l1-1-0.dll
c:\windows\system32\shell32.dll
484"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1036,7065692389319509867,8240932014652691765,131072 --enable-features=PasswordImport --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=988 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\86.0.4240.198\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\api-ms-win-downlevel-shell32-l1-1-0.dll
c:\windows\system32\gdi32.dll
504"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1036,7065692389319509867,8240932014652691765,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2800 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\86.0.4240.198\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
756"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1036,7065692389319509867,8240932014652691765,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3640 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\program files\google\chrome\application\86.0.4240.198\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\api-ms-win-downlevel-shell32-l1-1-0.dll
c:\windows\system32\shlwapi.dll
764"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1036,7065692389319509867,8240932014652691765,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2196 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\86.0.4240.198\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\api-ms-win-downlevel-shell32-l1-1-0.dll
c:\windows\system32\shell32.dll
Total events
53 351
Read events
52 716
Write events
626
Delete events
9

Modification events

(PID) Process:(3020) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(3020) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
299233152
(PID) Process:(3020) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30942013
(PID) Process:(3020) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
599398933
(PID) Process:(3020) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30942013
(PID) Process:(3020) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3020) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3020) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3020) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(3020) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
38
Suspicious files
246
Text files
211
Unknown types
22

Dropped files

PID
Process
Filename
Type
3052chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-620D02C8-BEC.pma
MD5:
SHA256:
3476iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:
SHA256:
3020iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63der
MD5:
SHA256:
3020iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63binary
MD5:
SHA256:
3020iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF7903780ACE73276B.TMPgmc
MD5:
SHA256:
3020iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF32958593BACB2A17.TMPgmc
MD5:
SHA256:
3020iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Last Active\{5640C71D-8F30-11EC-976C-12A9866C77DE}.datbinary
MD5:
SHA256:
3020iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\Recovery\Active\{4F7B798A-8F30-11EC-976C-12A9866C77DE}.datbinary
MD5:
SHA256:
3020iexplore.exeC:\Users\admin\AppData\Local\Temp\~DF4A9BD2EDC7EFBC48.TMPgmc
MD5:
SHA256:
3476iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751binary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
49
TCP/UDP connections
111
DNS requests
70
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
884
svchost.exe
HEAD
302
142.250.186.142:80
http://redirector.gvt1.com/edgedl/release2/chrome_component/adktovjj3t3n7jwiiegl5h6y3v5q_1.3.36.121/ihnlcenocehgdaegdmhbidjhnhdchfmm_1.3.36.121_win_bxugoraqoudfswxg22hsatfdbi.crx3
US
whitelisted
3880
chrome.exe
GET
301
172.67.220.180:80
http://softoroom.org/ptopic87953.html
US
suspicious
3880
chrome.exe
GET
302
142.250.186.142:80
http://redirector.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvNzI0QUFXNV9zT2RvdUwyMERESEZGVmJnQQ/1.0.0.6_nmmhkkegccagdldgiimedpiccmgmieda.crx
US
html
556 b
whitelisted
884
svchost.exe
GET
302
142.250.186.142:80
http://redirector.gvt1.com/edgedl/release2/chrome_component/adktovjj3t3n7jwiiegl5h6y3v5q_1.3.36.121/ihnlcenocehgdaegdmhbidjhnhdchfmm_1.3.36.121_win_bxugoraqoudfswxg22hsatfdbi.crx3
US
html
575 b
whitelisted
884
svchost.exe
GET
206
74.125.104.234:80
http://r5---sn-ixh7yn7e.gvt1.com/edgedl/release2/chrome_component/adktovjj3t3n7jwiiegl5h6y3v5q_1.3.36.121/ihnlcenocehgdaegdmhbidjhnhdchfmm_1.3.36.121_win_bxugoraqoudfswxg22hsatfdbi.crx3?cms_redirect=yes&mh=bj&mip=196.244.192.6&mm=28&mn=sn-ixh7yn7e&ms=nvh&mt=1645019057&mv=m&mvi=5&pl=25&rmhost=r3---sn-ixh7yn7e.gvt1.com&shardbypass=yes
US
binary
12.0 Kb
whitelisted
884
svchost.exe
GET
206
74.125.104.234:80
http://r5---sn-ixh7yn7e.gvt1.com/edgedl/release2/chrome_component/adktovjj3t3n7jwiiegl5h6y3v5q_1.3.36.121/ihnlcenocehgdaegdmhbidjhnhdchfmm_1.3.36.121_win_bxugoraqoudfswxg22hsatfdbi.crx3?cms_redirect=yes&mh=bj&mip=196.244.192.6&mm=28&mn=sn-ixh7yn7e&ms=nvh&mt=1645019057&mv=m&mvi=5&pl=25&rmhost=r3---sn-ixh7yn7e.gvt1.com&shardbypass=yes
US
binary
9.50 Kb
whitelisted
3020
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
884
svchost.exe
GET
302
142.250.186.142:80
http://redirector.gvt1.com/edgedl/release2/chrome_component/adktovjj3t3n7jwiiegl5h6y3v5q_1.3.36.121/ihnlcenocehgdaegdmhbidjhnhdchfmm_1.3.36.121_win_bxugoraqoudfswxg22hsatfdbi.crx3
US
html
575 b
whitelisted
884
svchost.exe
GET
206
74.125.104.234:80
http://r5---sn-ixh7yn7e.gvt1.com/edgedl/release2/chrome_component/adktovjj3t3n7jwiiegl5h6y3v5q_1.3.36.121/ihnlcenocehgdaegdmhbidjhnhdchfmm_1.3.36.121_win_bxugoraqoudfswxg22hsatfdbi.crx3?cms_redirect=yes&mh=bj&mip=196.244.192.6&mm=28&mn=sn-ixh7yn7e&ms=nvh&mt=1645019057&mv=m&mvi=5&pl=25&rmhost=r3---sn-ixh7yn7e.gvt1.com&shardbypass=yes
US
pgc
30.8 Kb
whitelisted
884
svchost.exe
GET
302
142.250.186.142:80
http://redirector.gvt1.com/edgedl/release2/chrome_component/adktovjj3t3n7jwiiegl5h6y3v5q_1.3.36.121/ihnlcenocehgdaegdmhbidjhnhdchfmm_1.3.36.121_win_bxugoraqoudfswxg22hsatfdbi.crx3
US
html
575 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.2:53
whitelisted
3476
iexplore.exe
31.216.145.5:443
mega.nz
Datacenter Luxembourg S.A.
LU
malicious
3476
iexplore.exe
23.45.105.185:80
x1.c.lencr.org
Akamai International B.V.
NL
unknown
3476
iexplore.exe
209.197.3.8:80
ctldl.windowsupdate.com
Highwinds Network Group, Inc.
US
whitelisted
3476
iexplore.exe
2.16.186.19:80
r3.o.lencr.org
Akamai International B.V.
whitelisted
3020
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3880
chrome.exe
216.58.212.163:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
3880
chrome.exe
142.250.186.109:443
accounts.google.com
Google Inc.
US
whitelisted
142.250.186.174:443
clients2.google.com
Google Inc.
US
whitelisted
3880
chrome.exe
142.250.185.196:443
www.google.com
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
www.microsoft.com
whitelisted
mega.nz
  • 31.216.145.5
  • 31.216.144.5
whitelisted
ctldl.windowsupdate.com
  • 209.197.3.8
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 131.253.33.200
  • 13.107.22.200
whitelisted
x1.c.lencr.org
  • 23.45.105.185
whitelisted
r3.o.lencr.org
  • 2.16.186.19
  • 2.16.186.33
  • 2.16.186.8
  • 2.16.186.10
shared
ocsp.digicert.com
  • 93.184.220.29
whitelisted
www.google.com
  • 142.250.185.196
malicious
clientservices.googleapis.com
  • 216.58.212.163
whitelisted

Threats

No threats detected
No debug info