analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.exe

Full analysis: https://app.any.run/tasks/b823f7f6-db65-4207-9e70-8c4f20d38bcc
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: June 27, 2024, 06:41:15
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
loader
banload
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

C6A1F489BDA66700F0481DA92BAA920C

SHA1:

97DB8AF5004CA98F9D2195B3ABC107F2609A1C2B

SHA256:

94884E8A17CAE503A062516EBEABEA0DF3A9326622ACC0C70747D7A685DD1CE5

SSDEEP:

98304:BqS77Ke8NKNS7/RTLLq6lrNDthWJTK55Ds33lIKNlee4J/8Q9tOdWt1lSP+p4Y7K:Nix5mdPYeI++xjSQI

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.exe (PID: 2944)
      • Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.exe (PID: 3400)
      • Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmp (PID: 2100)
    • Starts NET.EXE for service management

      • Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmp (PID: 2100)
      • net.exe (PID: 2348)
      • net.exe (PID: 2256)
      • net.exe (PID: 3736)
    • Banload is detected

      • USTSPCOCheckUpdate.exe (PID: 2420)
      • USTSPCOPrivacyProtector.exe (PID: 3612)
      • ustpcopt.exe (PID: 3392)
      • USTSPCOSystemCleaner.exe (PID: 3580)
    • Actions looks like stealing of personal data

      • USTSPCOPrivacyProtector.exe (PID: 3612)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.exe (PID: 2944)
      • Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.exe (PID: 3400)
      • Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmp (PID: 2100)
    • Reads the Windows owner or organization settings

      • Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmp (PID: 2100)
    • Reads the Internet Settings

      • Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmp (PID: 2100)
      • requireadministrator.exe (PID: 3760)
      • USTSPCOCheckUpdate.exe (PID: 2420)
      • USTSPCOPrivacyProtector.exe (PID: 3612)
    • Reads security settings of Internet Explorer

      • Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmp (PID: 2100)
      • requireadministrator.exe (PID: 3760)
      • USTSPCOCheckUpdate.exe (PID: 2420)
    • Process drops legitimate windows executable

      • Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmp (PID: 2100)
    • Uses TASKKILL.EXE to kill process

      • Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmp (PID: 2100)
    • The process drops C-runtime libraries

      • Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmp (PID: 2100)
    • Deletes scheduled task without confirmation

      • schtasks.exe (PID: 2652)
      • schtasks.exe (PID: 268)
      • schtasks.exe (PID: 2544)
      • schtasks.exe (PID: 1904)
      • schtasks.exe (PID: 2836)
      • schtasks.exe (PID: 4016)
      • schtasks.exe (PID: 3988)
      • schtasks.exe (PID: 2760)
      • schtasks.exe (PID: 3840)
      • schtasks.exe (PID: 936)
      • schtasks.exe (PID: 2488)
      • schtasks.exe (PID: 1172)
      • schtasks.exe (PID: 3056)
      • schtasks.exe (PID: 1144)
      • schtasks.exe (PID: 3224)
      • schtasks.exe (PID: 2700)
      • schtasks.exe (PID: 2936)
      • schtasks.exe (PID: 3540)
    • Reads the BIOS version

      • ustpcopt.exe (PID: 3392)
      • USTSPCOCheckUpdate.exe (PID: 2420)
      • USTSPCOPrivacyProtector.exe (PID: 3612)
      • USTSPCOSystemCleaner.exe (PID: 3580)
    • Detected use of alternative data streams (AltDS)

      • USTSPCOPrivacyProtector.exe (PID: 3612)
    • Creates/Modifies COM task schedule object

      • ustpcopt.exe (PID: 3392)
  • INFO

    • Checks supported languages

      • Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.exe (PID: 3400)
      • Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmp (PID: 2100)
      • Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.exe (PID: 2944)
      • Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmp (PID: 3332)
      • ustpcopt.exe (PID: 3392)
      • requireadministrator.exe (PID: 3760)
      • USTSPCODefragSrv.exe (PID: 3288)
      • USTSPCOCheckUpdate.exe (PID: 2420)
      • USTSPCOPrivacyProtector.exe (PID: 3612)
      • USTSPCOSystemCleaner.exe (PID: 3580)
    • Create files in a temporary directory

      • Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.exe (PID: 3400)
      • Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.exe (PID: 2944)
      • Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmp (PID: 2100)
      • USTSPCOSystemCleaner.exe (PID: 3580)
      • USTSPCOPrivacyProtector.exe (PID: 3612)
      • USTSPCOCheckUpdate.exe (PID: 2420)
    • Reads the computer name

      • Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmp (PID: 3332)
      • Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmp (PID: 2100)
      • requireadministrator.exe (PID: 3760)
      • USTSPCODefragSrv.exe (PID: 3288)
      • ustpcopt.exe (PID: 3392)
      • USTSPCOCheckUpdate.exe (PID: 2420)
      • USTSPCOPrivacyProtector.exe (PID: 3612)
      • USTSPCOSystemCleaner.exe (PID: 3580)
    • Creates files in the program directory

      • Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmp (PID: 2100)
      • USTSPCOCheckUpdate.exe (PID: 2420)
    • Creates a software uninstall entry

      • Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmp (PID: 2100)
    • Reads the machine GUID from the registry

      • USTSPCOCheckUpdate.exe (PID: 2420)
      • ustpcopt.exe (PID: 3392)
    • Creates files or folders in the user directory

      • USTSPCOCheckUpdate.exe (PID: 2420)
      • USTSPCOPrivacyProtector.exe (PID: 3612)
    • Checks proxy server information

      • USTSPCOCheckUpdate.exe (PID: 2420)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable Delphi generic (57.2)
.exe | Win32 Executable (generic) (18.2)
.exe | Win16/32 Executable Delphi generic (8.3)
.exe | Generic Win/DOS Executable (8)
.exe | DOS Executable Generic (8)

EXIF

EXE

ProductVersion: 3.0.0.4073
ProductName: USTechSupport PC Optimizer
LegalCopyright: USTechSupport
FileVersion: USTechSupport PC Opt
FileDescription: USTechSupport PC Optimizer
CompanyName: USTechSupport LLC
Comments: This installation was built with Inno Setup.
CharacterSet: Unicode
LanguageCode: Neutral
FileSubtype: -
ObjectFileType: Executable application
FileOS: Win32
FileFlags: (none)
FileFlagsMask: 0x003f
ProductVersionNumber: 3.0.0.4073
FileVersionNumber: 3.0.0.0
Subsystem: Windows GUI
SubsystemVersion: 5
ImageVersion: 6
OSVersion: 5
EntryPoint: 0x113bc
UninitializedDataSize: -
InitializedDataSize: 150016
CodeSize: 65024
LinkerVersion: 2.25
PEType: PE32
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
TimeStamp: 2015:07:16 13:24:20+00:00
MachineType: Intel 386 or later, and compatibles
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
186
Monitored processes
79
Malicious processes
9
Suspicious processes
0

Behavior graph

Click at the process to see the details
start hoax.win32.inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.exe hoax.win32.inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmp no specs hoax.win32.inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.exe hoax.win32.inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmp net.exe no specs net1.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs net.exe no specs net1.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs taskkill.exe no specs net.exe no specs net1.exe no specs ustspcodefragsrv.exe no specs requireadministrator.exe no specs #BANLOAD ustpcopt.exe #BANLOAD ustspcocheckupdate.exe #BANLOAD ustspcoprivacyprotector.exe #BANLOAD ustspcosystemcleaner.exe

Process information

PID
CMD
Path
Indicators
Parent process
3400"C:\Users\admin\AppData\Local\Temp\Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.exe" C:\Users\admin\AppData\Local\Temp\Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.exe
explorer.exe
User:
admin
Company:
USTechSupport LLC
Integrity Level:
MEDIUM
Description:
USTechSupport PC Optimizer
Exit code:
0
Version:
USTechSupport PC Opt
Modules
Images
c:\users\admin\appdata\local\temp\hoax.win32.inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
3332"C:\Users\admin\AppData\Local\Temp\is-75A1H.tmp\Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmp" /SL5="$6015A,10137739,216064,C:\Users\admin\AppData\Local\Temp\Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.exe" C:\Users\admin\AppData\Local\Temp\is-75A1H.tmp\Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmpHoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-75a1h.tmp\hoax.win32.inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2944"C:\Users\admin\AppData\Local\Temp\Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.exe" /SPAWNWND=$F0168 /NOTIFYWND=$6015A C:\Users\admin\AppData\Local\Temp\Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.exe
Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmp
User:
admin
Company:
USTechSupport LLC
Integrity Level:
HIGH
Description:
USTechSupport PC Optimizer
Exit code:
0
Version:
USTechSupport PC Opt
Modules
Images
c:\users\admin\appdata\local\temp\hoax.win32.inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2100"C:\Users\admin\AppData\Local\Temp\is-JOJLV.tmp\Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmp" /SL5="$6010A,10137739,216064,C:\Users\admin\AppData\Local\Temp\Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.exe" /SPAWNWND=$F0168 /NOTIFYWND=$6015A C:\Users\admin\AppData\Local\Temp\is-JOJLV.tmp\Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmp
Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-jojlv.tmp\hoax.win32.inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
2348"C:\Windows\system32\net.exe" stop USTSPCODiskOptimizer /yC:\Windows\System32\net.exeHoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Net Command
Exit code:
2
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\net.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\netutils.dll
c:\windows\system32\browcli.dll
2948C:\Windows\system32\net1 stop USTSPCODiskOptimizer /yC:\Windows\System32\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Net Command
Exit code:
2
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\net1.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dsrole.dll
c:\windows\system32\netutils.dll
3176"C:\Windows\System32\taskkill.exe" /f /im "ustpcopt.exe"C:\Windows\System32\taskkill.exeHoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
3292"C:\Windows\System32\taskkill.exe" /f /im "USTSPCOcheckupdate.exe"C:\Windows\System32\taskkill.exeHoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
1460"C:\Windows\System32\taskkill.exe" /f /im "USTSPCODefragSrv.exe"C:\Windows\System32\taskkill.exeHoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
3572"C:\Windows\System32\taskkill.exe" /f /im "USTSPCODefragSrv64.exe"C:\Windows\System32\taskkill.exeHoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
Total events
19 909
Read events
18 052
Write events
486
Delete events
1 371

Modification events

(PID) Process:(2100) Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:writeName:Owner
Value:
340800003A4FF4075DC8DA01
(PID) Process:(2100) Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:writeName:SessionHash
Value:
9D817C27714125D8154FDE01B3FA0E8968792FE10F9A600F02EEC9AC424F36A1
(PID) Process:(2100) Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:writeName:Sequence
Value:
1
(PID) Process:(2100) Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\USTechSupport\PC Optimizer
Operation:writeName:InstalledSuccessfully
Value:
0
(PID) Process:(2100) Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2100) Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2100) Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2100) Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2100) Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\USTechSupport\PC Optimizer
Operation:delete valueName:ProceedUninstall
Value:
(PID) Process:(2100) Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmpKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager\Memory Management
Operation:writeName:ClearPageFileAtShutdown
Value:
0
Executable files
82
Suspicious files
12
Text files
59
Unknown types
0

Dropped files

PID
Process
Filename
Type
2944Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.exeC:\Users\admin\AppData\Local\Temp\is-JOJLV.tmp\Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmpexecutable
MD5:C7DF23C785B368B9D2DC8B1094FC71A1
SHA256:788CDC1D09FB37FD28DB040D6F03B9F578A529846178045BBCA3C0F566AB6CA1
2100Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmpC:\Users\admin\AppData\Local\Temp\is-IVKMV.tmp\USTSPCOsys.dllexecutable
MD5:92ED56A5C1C7BCC3B7278CF16D45A385
SHA256:D3C29B16CA1A6A80A89A5BFDE8117293308E64C94F4CE76792B9E4AD283C0A24
2100Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmpC:\Program Files\USTechSupport\MCPPCO\is-RRUJ9.tmpexecutable
MD5:C7DF23C785B368B9D2DC8B1094FC71A1
SHA256:788CDC1D09FB37FD28DB040D6F03B9F578A529846178045BBCA3C0F566AB6CA1
2100Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmpC:\Program Files\USTechSupport\MCPPCO\is-Q38F8.tmptext
MD5:C69223100211EBEB172ACB81B3560116
SHA256:CA231B3BBF32D1634F08C91CE483D7E1D3BFE86B002C5E34B720E5C18BF569D8
2100Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmpC:\Program Files\USTechSupport\MCPPCO\is-OMRUI.tmptext
MD5:F87057BB4A50AC6C89B9BC37BF0D1AB6
SHA256:389F1CF3AC2803B5558343CA91094413A29A5F2A7E1DA21EED986ACF7FBDB330
2100Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmpC:\Program Files\USTechSupport\MCPPCO\privprotector.iniini
MD5:C69223100211EBEB172ACB81B3560116
SHA256:CA231B3BBF32D1634F08C91CE483D7E1D3BFE86B002C5E34B720E5C18BF569D8
2100Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmpC:\Users\admin\AppData\Local\Temp\is-IVKMV.tmp\zlibwapi.dllexecutable
MD5:CC3B19389FC774B7DFB3D54977062798
SHA256:F836BFB06D7EBECD189B4568E2A04664B4C75C4EF8A3A4010B2032287A0B06F4
2100Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmpC:\Program Files\USTechSupport\MCPPCO\is-SH0B3.tmptext
MD5:2269F50102850322EDD1B020138C243C
SHA256:13F098D627D68273DBB4D2545BECE81029EE9C7AE79CC20F68523907F55F0B71
2100Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmpC:\Program Files\USTechSupport\MCPPCO\is-3I2LF.tmptext
MD5:3209FCFB3AB94E712CA9833F0E3F4FB4
SHA256:DAF94D1010651CE08EF88F88064F13BA6975B72AAD5777D3AC03CE37E9E00267
2100Hoax.Win32.Inrogatio.gen-94884e8a17cae503a062516ebeabea0df3a9326622acc0c70747d7a685dd1ce5.tmpC:\Program Files\USTechSupport\MCPPCO\is-4TRHU.tmpini
MD5:6014743C8693F5AA0083BCE1B079D1ED
SHA256:DAAB1873BDD9618EAEB48F707B5CE51AA27AC0BDFE40F465F3C5F5087DBCB469
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
12
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1372
svchost.exe
GET
304
199.232.214.172:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?33775f6043c93e33
unknown
unknown
2420
USTSPCOCheckUpdate.exe
GET
200
165.227.176.158:80
http://www.activate123.com/ustechsupportupdates/pcoptimizer/update.zip
unknown
unknown
2420
USTSPCOCheckUpdate.exe
GET
302
165.227.176.158:80
http://www.activate123.com/ustechsupportupdates/pcoptimizer/update.asp?brandname=MyCleanPC%20PC%20Optimizer&phonenumber=(888)%20590-8910
unknown
unknown
1372
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
unknown
1372
svchost.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1372
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
whitelisted
239.255.255.250:3702
unknown
4
System
192.168.100.255:138
whitelisted
1060
svchost.exe
224.0.0.252:5355
unknown
1372
svchost.exe
199.232.214.172:80
ctldl.windowsupdate.com
FASTLY
US
unknown
1372
svchost.exe
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
unknown
1372
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
unknown
2420
USTSPCOCheckUpdate.exe
165.227.176.158:80
www.activate123.com
DIGITALOCEAN-ASN
US
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
ctldl.windowsupdate.com
  • 199.232.214.172
  • 199.232.210.172
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
www.activate123.com
  • 165.227.176.158
unknown

Threats

No threats detected
Process
Message
ustpcopt.exe
%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s
ustpcopt.exe
%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s
USTSPCOCheckUpdate.exe
%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s
USTSPCOCheckUpdate.exe
%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s
USTSPCOPrivacyProtector.exe
%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s
USTSPCOPrivacyProtector.exe
%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s
USTSPCOSystemCleaner.exe
%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s
USTSPCOSystemCleaner.exe
%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s