URL:

http://yepdownload.com

Full analysis: https://app.any.run/tasks/73af2f9c-2643-4607-a27d-495695f18efb
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: February 06, 2020, 10:20:50
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MD5:

34F7D82F6F87769E5322ABBFDA615F45

SHA1:

0C57443E3807CD6E49FC0214F00BDFE344D87EC9

SHA256:

A0C68961007C509CE6E90AFA224184958CC233C143E7D977B8EAFF32F43053EA

SSDEEP:

3:N1KH0KKKn:CTKKn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Downloads executable files from the Internet

      • iexplore.exe (PID: 1916)
      • avastfreeantivirussetuponline.m.exe (PID: 3972)
      • AvEmUpdate.exe (PID: 1632)
      • CCUpdate.exe (PID: 3236)
    • Application was dropped or rewritten from another process

      • knipolnnllmklapflnccelgolnpehhpl_3435009117.exe (PID: 4012)
      • knipolnnllmklapflnccelgolnpehhpl_3435009117.exe (PID: 3964)
      • avastfreeantivirussetuponline.m.exe (PID: 3972)
      • avast_free_antivirus_setup_online.exe (PID: 2396)
      • instup.exe (PID: 1400)
      • instup.exe (PID: 4088)
      • sbr.exe (PID: 3460)
      • AvEmUpdate.exe (PID: 2456)
      • AvEmUpdate.exe (PID: 1632)
      • AvEmUpdate.exe (PID: 1724)
      • AvEmUpdate.exe (PID: 2572)
      • CCUpdate.exe (PID: 2652)
      • CCUpdate.exe (PID: 316)
      • CCUpdate.exe (PID: 3236)
      • CCUpdate.exe (PID: 1908)
      • SetupInf.exe (PID: 3436)
      • SetupInf.exe (PID: 3880)
      • SetupInf.exe (PID: 3888)
      • SetupInf.exe (PID: 3572)
      • CCUpdate.exe (PID: 3720)
      • avBugReport.exe (PID: 2784)
      • RegSvr.exe (PID: 3380)
      • RegSvr.exe (PID: 2596)
      • AvastNM.exe (PID: 2568)
      • overseer.exe (PID: 2580)
      • wsc_proxy.exe (PID: 2056)
    • Loads dropped or rewritten executable

      • knipolnnllmklapflnccelgolnpehhpl_3435009117.exe (PID: 3964)
      • instup.exe (PID: 1400)
      • instup.exe (PID: 4088)
      • AvEmUpdate.exe (PID: 1632)
      • AvEmUpdate.exe (PID: 1724)
      • AvEmUpdate.exe (PID: 2572)
      • CCUpdate.exe (PID: 1908)
      • RegSvr.exe (PID: 3380)
      • RegSvr.exe (PID: 2596)
      • engsup.exe (PID: 2184)
    • Changes settings of System certificates

      • instup.exe (PID: 1400)
      • knipolnnllmklapflnccelgolnpehhpl_3435009117.exe (PID: 3964)
    • Changes the autorun value in the registry

      • instup.exe (PID: 4088)
    • Loads the Task Scheduler COM API

      • AvEmUpdate.exe (PID: 2456)
      • AvEmUpdate.exe (PID: 1632)
      • CCUpdate.exe (PID: 3236)
      • CCUpdate.exe (PID: 3720)
      • overseer.exe (PID: 2580)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 1916)
      • iexplore.exe (PID: 2896)
      • knipolnnllmklapflnccelgolnpehhpl_3435009117.exe (PID: 3964)
      • avastfreeantivirussetuponline.m.exe (PID: 3972)
      • avast_free_antivirus_setup_online.exe (PID: 2396)
      • instup.exe (PID: 1400)
      • instup.exe (PID: 4088)
      • AvEmUpdate.exe (PID: 1632)
      • AvEmUpdate.exe (PID: 2572)
      • CCUpdate.exe (PID: 3236)
      • CCUpdate.exe (PID: 316)
      • CCUpdate.exe (PID: 2652)
    • Cleans NTFS data-stream (Zone Identifier)

      • knipolnnllmklapflnccelgolnpehhpl_3435009117.exe (PID: 4012)
    • Reads Environment values

      • knipolnnllmklapflnccelgolnpehhpl_3435009117.exe (PID: 3964)
    • Application launched itself

      • knipolnnllmklapflnccelgolnpehhpl_3435009117.exe (PID: 4012)
      • AvEmUpdate.exe (PID: 1632)
      • CCUpdate.exe (PID: 3236)
    • Reads internet explorer settings

      • knipolnnllmklapflnccelgolnpehhpl_3435009117.exe (PID: 3964)
    • Low-level read access rights to disk partition

      • avastfreeantivirussetuponline.m.exe (PID: 3972)
      • avast_free_antivirus_setup_online.exe (PID: 2396)
      • instup.exe (PID: 1400)
      • instup.exe (PID: 4088)
      • AvEmUpdate.exe (PID: 1632)
      • AvEmUpdate.exe (PID: 1724)
      • AvEmUpdate.exe (PID: 2572)
      • CCUpdate.exe (PID: 316)
      • CCUpdate.exe (PID: 2652)
      • CCUpdate.exe (PID: 1908)
      • CCUpdate.exe (PID: 3236)
      • CCUpdate.exe (PID: 3720)
      • avBugReport.exe (PID: 2784)
      • overseer.exe (PID: 2580)
    • Creates files in the Windows directory

      • avastfreeantivirussetuponline.m.exe (PID: 3972)
      • avast_free_antivirus_setup_online.exe (PID: 2396)
      • instup.exe (PID: 1400)
      • instup.exe (PID: 4088)
      • AvEmUpdate.exe (PID: 1632)
    • Creates or modifies windows services

      • instup.exe (PID: 1400)
      • instup.exe (PID: 4088)
      • SetupInf.exe (PID: 3572)
      • SetupInf.exe (PID: 3888)
      • SetupInf.exe (PID: 3880)
      • SetupInf.exe (PID: 3436)
      • AvEmUpdate.exe (PID: 2456)
      • AvEmUpdate.exe (PID: 1632)
      • AvEmUpdate.exe (PID: 1724)
      • AvEmUpdate.exe (PID: 2572)
      • avBugReport.exe (PID: 2784)
      • RegSvr.exe (PID: 3380)
      • RegSvr.exe (PID: 2596)
    • Creates files in the program directory

      • avast_free_antivirus_setup_online.exe (PID: 2396)
      • instup.exe (PID: 1400)
      • AvEmUpdate.exe (PID: 2456)
      • instup.exe (PID: 4088)
      • AvEmUpdate.exe (PID: 1632)
      • CCUpdate.exe (PID: 2652)
      • CCUpdate.exe (PID: 316)
      • CCUpdate.exe (PID: 3236)
      • CCUpdate.exe (PID: 3720)
      • avBugReport.exe (PID: 2784)
      • AvastNM.exe (PID: 2568)
      • engsup.exe (PID: 2184)
    • Adds / modifies Windows certificates

      • instup.exe (PID: 1400)
      • knipolnnllmklapflnccelgolnpehhpl_3435009117.exe (PID: 3964)
    • Removes files from Windows directory

      • instup.exe (PID: 1400)
      • instup.exe (PID: 4088)
      • AvEmUpdate.exe (PID: 1632)
    • Executed via COM

      • explorer.exe (PID: 1140)
    • Starts itself from another location

      • instup.exe (PID: 1400)
      • CCUpdate.exe (PID: 316)
    • Creates a software uninstall entry

      • instup.exe (PID: 4088)
      • AvEmUpdate.exe (PID: 2572)
    • Creates COM task schedule object

      • instup.exe (PID: 4088)
      • RegSvr.exe (PID: 3380)
      • RegSvr.exe (PID: 2596)
    • Creates files in the driver directory

      • instup.exe (PID: 4088)
      • AvEmUpdate.exe (PID: 1632)
    • Modifies the open verb of a shell class

      • instup.exe (PID: 4088)
  • INFO

    • Changes internet zones settings

      • iexplore.exe (PID: 2896)
    • Reads Internet Cache Settings

      • iexplore.exe (PID: 2896)
      • iexplore.exe (PID: 1916)
      • iexplore.exe (PID: 2664)
    • Reads internet explorer settings

      • iexplore.exe (PID: 1916)
      • iexplore.exe (PID: 2664)
    • Dropped object may contain Bitcoin addresses

      • iexplore.exe (PID: 1916)
      • instup.exe (PID: 4088)
      • AvEmUpdate.exe (PID: 1632)
    • Application launched itself

      • iexplore.exe (PID: 2896)
      • chrome.exe (PID: 3824)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 2896)
    • Creates files in the user directory

      • iexplore.exe (PID: 2896)
      • iexplore.exe (PID: 2664)
      • iexplore.exe (PID: 1916)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2896)
      • knipolnnllmklapflnccelgolnpehhpl_3435009117.exe (PID: 3964)
      • iexplore.exe (PID: 1916)
      • chrome.exe (PID: 852)
    • Reads the hosts file

      • instup.exe (PID: 1400)
      • instup.exe (PID: 4088)
      • chrome.exe (PID: 3824)
      • chrome.exe (PID: 852)
      • overseer.exe (PID: 2580)
    • Manual execution by user

      • chrome.exe (PID: 3824)
    • Modifies the open verb of a shell class

      • chrome.exe (PID: 3824)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2896)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2896)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
95
Monitored processes
51
Malicious processes
16
Suspicious processes
5

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start iexplore.exe iexplore.exe iexplore.exe knipolnnllmklapflnccelgolnpehhpl_3435009117.exe no specs knipolnnllmklapflnccelgolnpehhpl_3435009117.exe avastfreeantivirussetuponline.m.exe avast_free_antivirus_setup_online.exe instup.exe explorer.exe no specs explorer.exe no specs instup.exe sbr.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs setupinf.exe no specs setupinf.exe no specs setupinf.exe no specs setupinf.exe no specs avemupdate.exe no specs avemupdate.exe avemupdate.exe avemupdate.exe ccupdate.exe ccupdate.exe ccupdate.exe ccupdate.exe ccupdate.exe avbugreport.exe regsvr.exe no specs regsvr.exe no specs avastnm.exe no specs overseer.exe engsup.exe no specs wsc_proxy.exe no specs avastsvc.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
316CCUpdate.exe /emupdater /applyupdate "C:\Program Files\CCleaner\Setup\26d41742-e45f-4e06-94ba-fff613b971df\update.xml"C:\Program Files\CCleaner\Setup\26d41742-e45f-4e06-94ba-fff613b971df\CCUpdate.exe
CCUpdate.exe
User:
admin
Company:
Piriform Ltd
Integrity Level:
HIGH
Description:
CCleaner emergency updater
Exit code:
0
Version:
18.6.553.0
Modules
Images
c:\program files\ccleaner\setup\26d41742-e45f-4e06-94ba-fff613b971df\ccupdate.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
480"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=1084 --on-initialized-event-handle=324 --parent-handle=328 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
852"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1040,7708287140016938922,16000637631210422257,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --service-request-channel-token=4937585519465918136 --mojo-platform-channel-handle=1568 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\shlwapi.dll
1008"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1040,7708287140016938922,16000637631210422257,131072 --enable-features=PasswordImport --gpu-preferences=KAAAAAAAAADgAAAgAQAAAAAAAAAAAGAAAAAAAAAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --service-request-channel-token=4828786486075655777 --mojo-platform-channel-handle=1048 --ignored=" --type=renderer " /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1140C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -EmbeddingC:\Windows\explorer.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1380"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1040,7708287140016938922,16000637631210422257,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=4413414965587960098 --mojo-platform-channel-handle=3732 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1400"C:\Windows\Temp\asw.45260d53d92b806b\instup.exe" /cookie:mmm_irs_ppi_002_451_m /edition:1 /ga_clientid:667fca65-c6a5-4e55-99cc-768bccbcc15e /guid:1f5ed6b7-b9d2-4139-8aa2-d289cf865732 /prod:ais /sfx:lite /sfxstorage:C:\Windows\Temp\asw.45260d53d92b806b /silent /psh:fKjrWTzzulA58bslOfXOIjr3u1MvsusQNPO/VjnxvVQ/8L9WO/S9VTH1qQtvp+oWNIDZJVqVqQd7orxWNPK/UTj2v1Y69rb+RwAAAAnBj2Q= /ws /ga_clientid:667fca65-c6a5-4e55-99cc-768bccbcc15e /edat_dir:C:\Windows\Temp\asw.a65a77974e7299d0C:\Windows\Temp\asw.45260d53d92b806b\instup.exe
avast_free_antivirus_setup_online.exe
User:
admin
Company:
AVAST Software
Integrity Level:
HIGH
Description:
Avast Antivirus Installer
Exit code:
0
Version:
19.8.4793.0
Modules
Images
c:\windows\temp\asw.45260d53d92b806b\instup.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
1448"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1040,7708287140016938922,16000637631210422257,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=14622738089784412511 --mojo-platform-channel-handle=3188 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1456"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1040,7708287140016938922,16000637631210422257,131072 --enable-features=PasswordImport --lang=en-US --extension-process --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=12553075917333656669 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2480 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1632"C:\Program Files\AVAST Software\Avast\AvEmUpdate.exe" /installer1C:\Program Files\AVAST Software\Avast\AvEmUpdate.exe
instup.exe
User:
admin
Company:
AVAST Software
Integrity Level:
HIGH
Description:
Avast Antivirus Emergency Update
Exit code:
0
Version:
19.8.4793.0
Modules
Images
c:\program files\avast software\avast\avemupdate.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\webio.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
Total events
15 833
Read events
3 929
Write events
10 173
Delete events
1 731

Modification events

(PID) Process:(2896) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
966324226
(PID) Process:(2896) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30792919
(PID) Process:(2896) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2896) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2896) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2896) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2896) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2896) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(2896) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2896) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
Executable files
471
Suspicious files
250
Text files
1 049
Unknown types
94

Dropped files

PID
Process
Filename
Type
2664iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Cab98DD.tmp
MD5:
SHA256:
2664iexplore.exeC:\Users\admin\AppData\Local\Temp\Low\Tar98DE.tmp
MD5:
SHA256:
2896iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
MD5:
SHA256:
2664iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\KKW686VR.txt
MD5:
SHA256:
2664iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\KQ1NN4Y4.txt
MD5:
SHA256:
2664iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\qsml[1].htm
MD5:
SHA256:
2664iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\34DA60AA966CD9270C5362E6AEF824CFbinary
MD5:
SHA256:
2664iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\R4OPLMKZ.txttext
MD5:
SHA256:
2664iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1BB09BEEC155258835C193A7AA85AA5B_4BBCB6BF4436E7D6640897AF9D93442Abinary
MD5:
SHA256:
2664iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1BB09BEEC155258835C193A7AA85AA5B_4BBCB6BF4436E7D6640897AF9D93442Ader
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
262
TCP/UDP connections
284
DNS requests
192
Threats
24

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2664
iexplore.exe
GET
13.107.5.80:80
http://api.bing.com/qsml.aspx?query=yepdow&maxwidth=32765&rowheight=20&sectionHeight=160&FORM=IE11SS&market=en-US
US
whitelisted
2664
iexplore.exe
GET
200
172.217.23.99:80
http://ocsp.pki.goog/gsr2/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTgXIsxbvr2lBkPpoIEVRE6gHlCnAQUm%2BIHV2ccHsBqBt5ZtJot39wZhi4CDQHjtJqhjYqpgSVpULg%3D
US
der
468 b
whitelisted
1916
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/search?q=yepdownload&src=IE-TopResult&FORM=IE11TR&conversationid=
US
html
35.3 Kb
whitelisted
2664
iexplore.exe
GET
200
5.45.205.242:80
http://yandex.ocsp-responder.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBStniMGfahyWUWDEeSLUFbNR9JLAgQUN1zjGeCyjqGoTtLPq9Dc4wtcNU0CEGo64gHWQVFU7F1yeyNqDBI%3D
RU
der
1.52 Kb
whitelisted
2664
iexplore.exe
GET
200
172.217.23.99:80
http://ocsp.pki.goog/gts1o1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEFa0PH9RdFNVCAAAAAAqsjw%3D
US
der
471 b
whitelisted
2664
iexplore.exe
GET
200
13.107.5.80:80
http://api.bing.com/qsml.aspx?query=yepdo&maxwidth=32765&rowheight=20&sectionHeight=160&FORM=IE11SS&market=en-US
US
xml
209 b
whitelisted
2664
iexplore.exe
GET
200
151.139.236.246:80
http://subca.ocsp-certum.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBR5iK7tYk9tqQEoeQhZNkKcAol9bgQUjEPEy22YwaechGnr30oNYJY6w%2FsCEQCTkoVAAWVxX5R%2FKI%2FvyZso
US
der
1.62 Kb
whitelisted
2664
iexplore.exe
GET
200
151.139.236.246:80
http://subca.ocsp-certum.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTYOkzrrCGQj08njZXbUQQpkoUmuQQUCHbNywf%2FJPbFze27kLzihDdGdfcCEQDkBUeDDgxkUpdvejVJwN1I
US
der
1.66 Kb
whitelisted
1916
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/sa/simg/SharedSpriteDesktop_2x_090619.png
US
image
11.2 Kb
whitelisted
1916
iexplore.exe
GET
200
204.79.197.200:80
http://www.bing.com/rb/5f/cj,nj/23b13182/1ac56e62.js?bu=Es8g7iD4H5IgnAWhIKMg-SClILEguCDnIOUg2iDMH8we0h65Hw
US
text
5.42 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2664
iexplore.exe
67.207.92.67:80
yepdownload.com
Digital Ocean, Inc.
US
unknown
2664
iexplore.exe
67.207.92.67:443
yepdownload.com
Digital Ocean, Inc.
US
unknown
2664
iexplore.exe
91.199.212.52:80
crt.comodoca.com
Comodo CA Ltd
GB
suspicious
2664
iexplore.exe
151.139.128.14:80
ocsp.comodoca.com
Highwinds Network Group, Inc.
US
suspicious
2896
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
2664
iexplore.exe
13.107.5.80:80
api.bing.com
Microsoft Corporation
US
whitelisted
2664
iexplore.exe
195.181.175.46:443
cdn.sendpulse.com
Datacamp Limited
DE
suspicious
2664
iexplore.exe
172.217.16.136:443
www.googletagmanager.com
Google Inc.
US
suspicious
2664
iexplore.exe
172.217.23.99:80
ocsp.pki.goog
Google Inc.
US
whitelisted
2664
iexplore.exe
216.58.207.35:80
ocsp.pki.goog
Google Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
yepdownload.com
  • 67.207.92.67
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
crt.comodoca.com
  • 91.199.212.52
whitelisted
ocsp.comodoca.com
  • 151.139.128.14
whitelisted
cdn.sendpulse.com
  • 195.181.175.46
whitelisted
www.googletagmanager.com
  • 172.217.16.136
whitelisted
ocsp.pki.goog
  • 172.217.23.99
  • 216.58.207.35
whitelisted
ocsp.usertrust.com
  • 151.139.128.14
whitelisted
mc.yandex.ru
  • 93.158.134.119
  • 87.250.251.119
  • 77.88.21.119
  • 87.250.250.119
whitelisted

Threats

PID
Process
Class
Message
1916
iexplore.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
1916
iexplore.exe
Misc activity
ET INFO EXE - Served Attached HTTP
3972
avastfreeantivirussetuponline.m.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
1916
iexplore.exe
Generic Protocol Command Decode
SURICATA HTTP unable to match response to request
1632
AvEmUpdate.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3236
CCUpdate.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
18 ETPRO signatures available at the full report
No debug info