| File name: | True Facials.exe |
| Full analysis: | https://app.any.run/tasks/493f4c23-db7a-4b2e-a632-29c0dabbe05d |
| Verdict: | Malicious activity |
| Threats: | Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security. |
| Analysis date: | May 30, 2020, 14:15:54 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 5035F7F86C0B1B7BF0227BD6201DA71C |
| SHA1: | CCD52A2A6DF60B6383AD81386D32724D6EF4E9EF |
| SHA256: | 930F406AC828B2E1C896CD05DA9A8FD06EE295A6152DCB352B2D2B0FCA4C1A6F |
| SSDEEP: | 49152:8cW4f4PNTCnrIgiBhJKsh+RwetDAUu7dvVb0W7SCUWihDzJuP6:8X4gdCnrIguKs0Rfa7bH7SZ46 |
| .exe | | | Inno Setup installer (67.7) |
|---|---|---|
| .exe | | | Win32 EXE PECompact compressed (generic) (25.6) |
| .exe | | | Win32 Executable (generic) (2.7) |
| .exe | | | Win16/32 Executable Delphi generic (1.2) |
| .exe | | | Generic Win/DOS Executable (1.2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2019:04:27 10:22:11+02:00 |
| PEType: | PE32 |
| LinkerVersion: | 2.25 |
| CodeSize: | 682496 |
| InitializedDataSize: | 595968 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xa7ed0 |
| OSVersion: | 6 |
| ImageVersion: | 6 |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 0.0.0.0 |
| ProductVersionNumber: | 0.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| Comments: | This installation was built with Inno Setup. |
| CompanyName: | |
| FileDescription: | True Facials |
| FileVersion: | |
| LegalCopyright: | |
| OriginalFileName: | |
| ProductName: | True Facials |
| ProductVersion: | 0.0 |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 27-Apr-2019 08:22:11 |
| Detected languages: |
|
| Comments: | This installation was built with Inno Setup. |
| CompanyName: | - |
| FileDescription: | True Facials |
| FileVersion: | - |
| LegalCopyright: | - |
| OriginalFilename: | - |
| ProductName: | True Facials |
| ProductVersion: | 0.0 |
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0050 |
| Pages in file: | 0x0002 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x000F |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x001A |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x00000100 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 10 |
| Time date stamp: | 27-Apr-2019 08:22:11 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00001000 | 0x000A50E0 | 0x000A5200 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.36825 |
.itext | 0x000A7000 | 0x00001668 | 0x00001800 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 5.95049 |
.data | 0x000A9000 | 0x000037A4 | 0x00003800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.02787 |
.bss | 0x000AD000 | 0x0000676C | 0x00000000 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
.idata | 0x000B4000 | 0x00000F1C | 0x00001000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 4.79161 |
.didata | 0x000B5000 | 0x000001A4 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 2.74582 |
.edata | 0x000B6000 | 0x0000009A | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 1.88107 |
.tls | 0x000B7000 | 0x00000018 | 0x00000000 | IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0 |
.rdata | 0x000B8000 | 0x0000005D | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 1.36974 |
.rsrc | 0x000B9000 | 0x0008D000 | 0x0008CA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 3.62044 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
1 | 5.13965 | 1580 | Latin 1 / Western European | English - United States | RT_MANIFEST |
2 | 4.61125 | 2440 | Latin 1 / Western European | English - United States | RT_ICON |
3 | 4.11959 | 4264 | Latin 1 / Western European | English - United States | RT_ICON |
4 | 4.05353 | 9640 | Latin 1 / Western European | English - United States | RT_ICON |
5 | 3.76721 | 16936 | Latin 1 / Western European | English - United States | RT_ICON |
6 | 3.73979 | 38056 | Latin 1 / Western European | English - United States | RT_ICON |
7 | 3.57675 | 67624 | Latin 1 / Western European | English - United States | RT_ICON |
8 | 3.58825 | 152104 | Latin 1 / Western European | English - United States | RT_ICON |
9 | 3.41666 | 270376 | Latin 1 / Western European | English - United States | RT_ICON |
4086 | 3.16547 | 864 | Latin 1 / Western European | UNKNOWN | RT_STRING |
advapi32.dll |
comctl32.dll |
kernel32.dll |
kernel32.dll (delay-loaded) |
netapi32.dll |
oleaut32.dll |
user32.dll |
version.dll |
Title | Ordinal | Address |
|---|---|---|
dbkFCallWrapperAddr | 1 | 0x000B063C |
__dbk_fcall_wrapper | 2 | 0x0000D3DC |
TMethodImplementationIntercept | 3 | 0x00053ABC |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2308 | "C:\Users\admin\Desktop\True Facials.exe" /SPAWNWND=$1013C /NOTIFYWND=$2012C | C:\Users\admin\Desktop\True Facials.exe | True Facials.tmp | ||||||||||||
User: admin Company: Integrity Level: HIGH Description: True Facials Exit code: 0 Version: Modules
| |||||||||||||||
| 2348 | "C:\Program Files\Internet Explorer\iexplore.exe" https://falcoware.com | C:\Program Files\Internet Explorer\iexplore.exe | Patch.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Internet Explorer Exit code: 1 Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
| 2500 | "C:\Users\admin\AppData\Local\Temp\is-3574L.tmp\Patch.exe" /SL5="$150536,207793,119808,C:\Users\admin\AppData\Local\Temp\is-3574L.tmp\Patch-0.bin" | C:\Users\admin\AppData\Local\Temp\is-3574L.tmp\Patch.exe | True Facials.tmp | ||||||||||||
User: admin Integrity Level: HIGH Description: Setup/Uninstall Exit code: 0 Version: 51.1052.0.0 Modules
| |||||||||||||||
| 2700 | "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2348 CREDAT:275457 /prefetch:2 | C:\Program Files\Internet Explorer\iexplore.exe | iexplore.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Internet Explorer Exit code: 0 Version: 11.00.9600.16428 (winblue_gdr.131013-1700) Modules
| |||||||||||||||
| 2820 | "C:\Users\admin\AppData\Local\Temp\is-UJE31.tmp\True Facials.tmp" /SL5="$2012C,2435204,1279488,C:\Users\admin\Desktop\True Facials.exe" | C:\Users\admin\AppData\Local\Temp\is-UJE31.tmp\True Facials.tmp | — | True Facials.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: Setup/Uninstall Exit code: 0 Version: 51.1052.0.0 Modules
| |||||||||||||||
| 2888 | "C:\Users\admin\AppData\Local\Temp\is-3Q9CC.tmp\rkverify.exe" | C:\Users\admin\AppData\Local\Temp\is-3Q9CC.tmp\rkverify.exe | Patch.exe | ||||||||||||
User: admin Company: T M R G , INC. Integrity Level: HIGH Description: rkverify Exit code: 0 Version: 0.2.6.7 (Build 6.7) Modules
| |||||||||||||||
| 2896 | "C:\Users\admin\AppData\Local\Temp\is-TJ9QP.tmp\True Facials.tmp" /SL5="$30138,2435204,1279488,C:\Users\admin\Desktop\True Facials.exe" /SPAWNWND=$1013C /NOTIFYWND=$2012C | C:\Users\admin\AppData\Local\Temp\is-TJ9QP.tmp\True Facials.tmp | True Facials.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: Setup/Uninstall Exit code: 0 Version: 51.1052.0.0 Modules
| |||||||||||||||
| 3644 | C:\Windows\system32\wbem\unsecapp.exe -Embedding | C:\Windows\system32\wbem\unsecapp.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Sink to receive asynchronous callbacks for WMI client application Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3660 | "C:\Users\admin\Desktop\True Facials.exe" | C:\Users\admin\Desktop\True Facials.exe | explorer.exe | ||||||||||||
User: admin Company: Integrity Level: MEDIUM Description: True Facials Exit code: 0 Version: Modules
| |||||||||||||||
| (PID) Process: | (2896) True Facials.tmp | Key: | HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000 |
| Operation: | write | Name: | Owner |
Value: 500B00004797DBE18C36D601 | |||
| (PID) Process: | (2896) True Facials.tmp | Key: | HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000 |
| Operation: | write | Name: | SessionHash |
Value: 6F412D450A17BF33DD44498F5D928EAEC6287A326181CEB8D86AF94032957E66 | |||
| (PID) Process: | (2896) True Facials.tmp | Key: | HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000 |
| Operation: | write | Name: | Sequence |
Value: 1 | |||
| (PID) Process: | (2896) True Facials.tmp | Key: | HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000 |
| Operation: | write | Name: | RegFiles0000 |
Value: C:\Users\admin\AppData\Local\Temp\is-3574L.tmp\Patch.exe | |||
| (PID) Process: | (2896) True Facials.tmp | Key: | HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000 |
| Operation: | write | Name: | RegFilesHash |
Value: 49A34A2A5AA650CB41C0AC5764841F8D83288D12A06E8CC17D8EC8450924E113 | |||
| (PID) Process: | (2500) Patch.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0001 |
| Operation: | write | Name: | Owner |
Value: C409000087E227E28C36D601 | |||
| (PID) Process: | (2500) Patch.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0001 |
| Operation: | write | Name: | SessionHash |
Value: 4FB1ABD3D64A4C68A9A646CBEADBD44E01C0A054DB172162F89762FC9AB2450E | |||
| (PID) Process: | (2500) Patch.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0001 |
| Operation: | write | Name: | Sequence |
Value: 1 | |||
| (PID) Process: | (2500) Patch.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
| (PID) Process: | (2500) Patch.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
| Operation: | write | Name: | SavedLegacySettings |
Value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| |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2896 | True Facials.tmp | C:\Windows\is-JORIM.tmp | — | |
MD5:— | SHA256:— | |||
| 2896 | True Facials.tmp | C:\Users\admin\AppData\Local\Temp\is-3574L.tmp\is-31LF6.tmp | — | |
MD5:— | SHA256:— | |||
| 2896 | True Facials.tmp | C:\Users\admin\AppData\Local\Temp\is-3574L.tmp\is-AD1CQ.tmp | — | |
MD5:— | SHA256:— | |||
| 2500 | Patch.exe | C:\Users\admin\AppData\Local\Temp\Cab10A2.tmp | — | |
MD5:— | SHA256:— | |||
| 2500 | Patch.exe | C:\Users\admin\AppData\Local\Temp\Tar10A3.tmp | — | |
MD5:— | SHA256:— | |||
| 2500 | Patch.exe | C:\Users\admin\AppData\Local\Temp\Cab10D3.tmp | — | |
MD5:— | SHA256:— | |||
| 2500 | Patch.exe | C:\Users\admin\AppData\Local\Temp\Tar10D4.tmp | — | |
MD5:— | SHA256:— | |||
| 2500 | Patch.exe | C:\Users\admin\AppData\Local\Temp\Cab10E5.tmp | — | |
MD5:— | SHA256:— | |||
| 2500 | Patch.exe | C:\Users\admin\AppData\Local\Temp\Tar10E6.tmp | — | |
MD5:— | SHA256:— | |||
| 2500 | Patch.exe | C:\Users\admin\AppData\Local\Temp\Tar131A.tmp | — | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2700 | iexplore.exe | GET | — | 2.23.158.32:80 | http://ocsp.int-x3.letsencrypt.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBR%2B5mrncpqz%2FPiiIGRsFqEtYHEIXQQUqEpqYwR93brm0Tm3pkVl7%2FOo7KECEgTvjXxRI2fDjQPRn%2FruWU10Ug%3D%3D | unknown | — | — | whitelisted |
2500 | Patch.exe | GET | 200 | 165.193.78.234:80 | http://post.securestudies.com/packages/RV0267/ContentV3.exe | US | executable | 577 Kb | malicious |
2500 | Patch.exe | GET | 200 | 205.185.216.10:80 | http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab | US | compressed | 57.0 Kb | whitelisted |
2500 | Patch.exe | GET | 200 | 165.193.78.234:80 | http://post.securestudies.com/packages/RI1034/ContentI3.exe | US | executable | 412 Kb | malicious |
2700 | iexplore.exe | GET | — | 2.23.158.32:80 | http://ocsp.int-x3.letsencrypt.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBR%2B5mrncpqz%2FPiiIGRsFqEtYHEIXQQUqEpqYwR93brm0Tm3pkVl7%2FOo7KECEgTvjXxRI2fDjQPRn%2FruWU10Ug%3D%3D | unknown | — | — | whitelisted |
2700 | iexplore.exe | GET | 200 | 2.23.158.81:80 | http://isrg.trustid.ocsp.identrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRv9GhNQxLSSGKBnMArPUcsHYovpgQUxKexpHsscfrb4UuQdf%2FEFWCFiRACEAoBQUIAAAFThXNqC4Xspwg%3D | unknown | der | 1.37 Kb | whitelisted |
2700 | iexplore.exe | GET | 200 | 2.23.158.81:80 | http://isrg.trustid.ocsp.identrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRv9GhNQxLSSGKBnMArPUcsHYovpgQUxKexpHsscfrb4UuQdf%2FEFWCFiRACEAoBQUIAAAFThXNqC4Xspwg%3D | unknown | der | 1.37 Kb | whitelisted |
2500 | Patch.exe | GET | 304 | 205.185.216.10:80 | http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab | US | compressed | 57.0 Kb | whitelisted |
2500 | Patch.exe | POST | 200 | 165.193.78.234:80 | http://post.securestudies.com/TapAction.aspx?campaign_id=868&tpi=FalcoDownloader&action_id=17&uid=ctIQQLiM4QvWKT7D655555 | US | text | 2 b | malicious |
2348 | iexplore.exe | GET | 200 | 204.79.197.200:80 | http://www.bing.com/favicon.ico | US | image | 237 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
2348 | iexplore.exe | 204.79.197.200:80 | www.bing.com | Microsoft Corporation | US | whitelisted |
2700 | iexplore.exe | 45.10.111.18:443 | falcoware.com | — | — | malicious |
2700 | iexplore.exe | 2.23.158.32:80 | ocsp.int-x3.letsencrypt.org | Telia Company AB | — | unknown |
2700 | iexplore.exe | 2.23.158.81:80 | isrg.trustid.ocsp.identrust.com | Telia Company AB | — | unknown |
2500 | Patch.exe | 165.193.78.234:80 | post.securestudies.com | Savvis | US | malicious |
2500 | Patch.exe | 23.14.138.106:443 | dpd.securestudies.com | Akamai Technologies, Inc. | NL | unknown |
2500 | Patch.exe | 205.185.216.10:80 | www.download.windowsupdate.com | Highwinds Network Group, Inc. | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
post.securestudies.com |
| malicious |
dpd.securestudies.com |
| whitelisted |
www.download.windowsupdate.com |
| whitelisted |
falcoware.com |
| malicious |
api.bing.com |
| whitelisted |
www.bing.com |
| whitelisted |
isrg.trustid.ocsp.identrust.com |
| whitelisted |
ocsp.int-x3.letsencrypt.org |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2500 | Patch.exe | Misc activity | ADWARE [PTsecurity] InnoTools Download PE file |
2500 | Patch.exe | Misc activity | ADWARE [PTsecurity] InnoTools Downloader |
2500 | Patch.exe | Misc activity | ADWARE [PTsecurity] InnoTools Download PE file |
2500 | Patch.exe | Misc activity | ADWARE [PTsecurity] InnoTools Downloader |
2500 | Patch.exe | Misc activity | ADWARE [PTsecurity] InnoTools Downloader |
2500 | Patch.exe | Misc activity | ADWARE [PTsecurity] InnoTools Downloader Check-in |
2500 | Patch.exe | Misc activity | ADWARE [PTsecurity] InnoTools Downloader |
2500 | Patch.exe | Misc activity | ADWARE [PTsecurity] InnoTools Downloader Check-in |
2500 | Patch.exe | Misc activity | ADWARE [PTsecurity] InnoTools Downloader |