URL:

https://www.uvexplorer.com/uvexplorer-download?product=uvexplorer-2.0-pro&source=website

Full analysis: https://app.any.run/tasks/bfbf8941-5d41-4de2-bec3-b768ef71cd5c
Verdict: Malicious activity
Analysis date: June 29, 2020, 06:15:59
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

29C16B7FFFC3A596A8400A9C896A10CA

SHA1:

357777A3C42FDD996D46873F3CB14AEDB7F8F5C2

SHA256:

A32D03A3992ED546A456CD539AD43646361FE2EB642D605E7562FCD578DBDA23

SSDEEP:

3:N8DSLXXEYJK1F2omGYXdVJKjhoPHf:2OLkYE1FjXYXXEjs

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • PrtgUVexplorerService.exe (PID: 2596)
      • UVexplorerSplash.exe (PID: 3828)
      • UVexplorer.exe (PID: 3356)
    • Application was dropped or rewritten from another process

      • PrtgUVexplorerService.exe (PID: 2596)
      • UVexplorerSplash.exe (PID: 3828)
      • UVexplorer.exe (PID: 3356)
      • wyUpdate.exe (PID: 2488)
    • Changes settings of System certificates

      • PrtgUVexplorerService.exe (PID: 2596)
  • SUSPICIOUS

    • Creates files in the program directory

      • firefox.exe (PID: 2680)
      • PrtgUVexplorerService.exe (PID: 2596)
      • UVexplorer.exe (PID: 3356)
    • Starts Microsoft Installer

      • firefox.exe (PID: 2680)
    • Executed as Windows Service

      • vssvc.exe (PID: 3980)
    • Uses NETSH.EXE for network configuration

      • PrtgUVexplorerService.exe (PID: 2596)
    • Creates files in the Windows directory

      • PrtgUVexplorerService.exe (PID: 2596)
    • Creates files in the user directory

      • UVexplorer.exe (PID: 3356)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 2264)
    • Adds / modifies Windows certificates

      • PrtgUVexplorerService.exe (PID: 2596)
  • INFO

    • Application launched itself

      • firefox.exe (PID: 2056)
      • firefox.exe (PID: 2680)
      • msiexec.exe (PID: 2264)
    • Reads CPU info

      • firefox.exe (PID: 2680)
    • Reads Internet Cache Settings

      • firefox.exe (PID: 2680)
      • pingsender.exe (PID: 3132)
    • Reads settings of System Certificates

      • firefox.exe (PID: 2680)
      • PrtgUVexplorerService.exe (PID: 2596)
      • UVexplorer.exe (PID: 3356)
      • wyUpdate.exe (PID: 2488)
    • Searches for installed software

      • msiexec.exe (PID: 2264)
    • Low-level read access rights to disk partition

      • vssvc.exe (PID: 3980)
    • Dropped object may contain Bitcoin addresses

      • msiexec.exe (PID: 2264)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 2264)
    • Creates files in the program directory

      • msiexec.exe (PID: 2264)
    • Creates files in the user directory

      • firefox.exe (PID: 2680)
    • Changes settings of System certificates

      • pingsender.exe (PID: 3132)
    • Adds / modifies Windows certificates

      • pingsender.exe (PID: 3132)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
72
Monitored processes
25
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe firefox.exe firefox.exe msiexec.exe no specs msiexec.exe pingsender.exe msiexec.exe no specs vssvc.exe no specs msiexec.exe no specs prtguvexplorerservice.exe netsh.exe netsh.exe netsh.exe netsh.exe netsh.exe netsh.exe netsh.exe netsh.exe msiexec.exe no specs uvexplorer.exe uvexplorersplash.exe no specs wyupdate.exe

Process information

PID
CMD
Path
Indicators
Parent process
472"C:\Windows\System32\msiexec.exe" /i "C:\Users\admin\Downloads\UVexplorerSetup_2.0_Pro.msi" C:\Windows\System32\msiexec.exefirefox.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1108"netsh" advfirewall firewall delete rule name = "UVexplorer_PRTG_Service_Inbound"C:\Windows\system32\netsh.exe
PrtgUVexplorerService.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Network Command Shell
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
1376C:\Windows\system32\MsiExec.exe -Embedding D9A1A038731CFE150ED48971A2EF2756 M Global\MSI0000C:\Windows\system32\MsiExec.exemsiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1760C:\Windows\system32\MsiExec.exe -Embedding C9A324CFB181151717ACDEF4DF9FF5F8C:\Windows\system32\MsiExec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2056"C:\Program Files\Mozilla Firefox\firefox.exe" "https://www.uvexplorer.com/uvexplorer-download?product=uvexplorer-2.0-pro&source=website"C:\Program Files\Mozilla Firefox\firefox.exeexplorer.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
68.0.1
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
2160"netsh" advfirewall firewall add rule name = "UVexplorer_PRTG_Service_Outbound_2" dir = out action = allow program = "C:\Program Files\UVexplorer 2.0\PrtgUVexplorerService\PrtgUVexplorerService.exe"C:\Windows\system32\netsh.exe
PrtgUVexplorerService.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
2164"netsh" advfirewall firewall delete rule name = "UVexplorer_PRTG_Service_Outbound_2"C:\Windows\system32\netsh.exe
PrtgUVexplorerService.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Network Command Shell
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
2208"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2680.0.930636971\614215610" -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 2680 "\\.\pipe\gecko-crash-server-pipe.2680" 1180 gpuC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
1
Version:
68.0.1
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
2264C:\Windows\system32\msiexec.exe /VC:\Windows\system32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Exit code:
0
Version:
5.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msiexec.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2488"C:\Program Files\UVexplorer 2.0\wyUpdate.exe" /autoupdateC:\Program Files\UVexplorer 2.0\wyUpdate.exe
UVexplorer.exe
User:
admin
Company:
wyDay
Integrity Level:
MEDIUM
Description:
wyUpdate
Exit code:
3
Version:
2.6.18.4
Modules
Images
c:\program files\uvexplorer 2.0\wyupdate.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
7 191
Read events
1 740
Write events
4 252
Delete events
1 199

Modification events

(PID) Process:(2680) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Browser
Value:
D048190400000000
(PID) Process:(2056) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
Value:
CF48190400000000
(PID) Process:(2680) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Telemetry
Value:
1
(PID) Process:(2680) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2680) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(2680) firefox.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2680) firefox.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12F\52C64B7E
Operation:writeName:@%SystemRoot%\system32\p2pcollab.dll,-8042
Value:
Peer to Peer Trust
(PID) Process:(2680) firefox.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12F\52C64B7E
Operation:writeName:@%SystemRoot%\system32\qagentrt.dll,-10
Value:
System Health Authentication
(PID) Process:(2680) firefox.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12F\52C64B7E
Operation:writeName:@%SystemRoot%\system32\dnsapi.dll,-103
Value:
Domain Name System (DNS) Server Trust
(PID) Process:(2680) firefox.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\12F\52C64B7E
Operation:writeName:@%SystemRoot%\System32\fveui.dll,-843
Value:
BitLocker Drive Encryption
Executable files
125
Suspicious files
103
Text files
179
Unknown types
83

Dropped files

PID
Process
Filename
Type
2680firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-current.bin
MD5:
SHA256:
2680firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs-1.js
MD5:
SHA256:
2680firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\sessionCheckpoints.json.tmp
MD5:
SHA256:
2680firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\search.json.mozlz4.tmp
MD5:
SHA256:
2680firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3561288849sdhlie.sqlite-shm
MD5:
SHA256:
2680firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-child-current.binbinary
MD5:
SHA256:
2680firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\urlCache-current.binbinary
MD5:
SHA256:
2680firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs.jstext
MD5:
SHA256:
2680firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\search.json.mozlz4jsonlz4
MD5:
SHA256:
2680firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\safebrowsing-updating\base-track-digest256.sbstorebinary
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
17
TCP/UDP connections
47
DNS requests
103
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2596
PrtgUVexplorerService.exe
GET
200
151.139.128.14:80
http://ocsp.sectigo.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ5suEceKjAJbxseAmHFkQ9FrhTWQQUDuE6qFM6MdWKvsG7rWcaA4WtNA4CEA2iQYW7Jz7yFw4OC%2BNa6eY%3D
US
der
471 b
whitelisted
2680
firefox.exe
POST
200
172.217.22.67:80
http://ocsp.pki.goog/gts1o1core
US
der
471 b
whitelisted
2680
firefox.exe
POST
200
151.139.128.14:80
http://ocsp.usertrust.com/
US
der
471 b
whitelisted
2680
firefox.exe
POST
200
172.217.22.67:80
http://ocsp.pki.goog/gts1o1core
US
der
472 b
whitelisted
2680
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
2680
firefox.exe
POST
200
172.217.22.67:80
http://ocsp.pki.goog/gts1o1core
US
der
472 b
whitelisted
3132
pingsender.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQQX6Z6gAidtSefNc6DC0OInqPHDQQUD4BhHIIxYdUvKOeNRji0LOHG2eICEAd1LOvlIi%2FPXH0gOJhMUZg%3D
US
der
471 b
whitelisted
2680
firefox.exe
POST
200
172.217.22.67:80
http://ocsp.pki.goog/gts1o1core
US
der
471 b
whitelisted
3132
pingsender.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAH9o%2BtuynXIiEOLckvPvJE%3D
US
der
471 b
whitelisted
2680
firefox.exe
POST
200
172.217.22.67:80
http://ocsp.pki.goog/gts1o1
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2680
firefox.exe
2.16.107.58:80
detectportal.firefox.com
Akamai International B.V.
suspicious
2680
firefox.exe
13.89.243.228:443
www.uvexplorer.com
Microsoft Corporation
US
unknown
2680
firefox.exe
52.26.114.88:443
search.services.mozilla.com
Amazon.com, Inc.
US
unknown
2680
firefox.exe
151.139.128.14:80
ocsp.usertrust.com
Highwinds Network Group, Inc.
US
suspicious
2680
firefox.exe
52.43.170.200:443
push.services.mozilla.com
Amazon.com, Inc.
US
unknown
2680
firefox.exe
143.204.202.128:443
snippets.cdn.mozilla.net
US
malicious
2680
firefox.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2680
firefox.exe
216.58.208.42:443
safebrowsing.googleapis.com
Google Inc.
US
whitelisted
2680
firefox.exe
209.197.3.24:443
code.jquery.com
Highwinds Network Group, Inc.
US
malicious
2680
firefox.exe
143.204.202.18:443
firefox.settings.services.mozilla.com
US
unknown

DNS requests

Domain
IP
Reputation
www.uvexplorer.com
  • 13.89.243.228
unknown
detectportal.firefox.com
  • 2.16.107.58
  • 2.16.107.40
whitelisted
a1089.dscd.akamai.net
  • 2.16.107.40
  • 2.16.107.58
whitelisted
uvexplorer.com
  • 13.89.243.228
unknown
search.services.mozilla.com
  • 52.26.114.88
  • 34.211.106.52
  • 52.41.191.52
whitelisted
search.r53-2.services.mozilla.com
  • 52.41.191.52
  • 34.211.106.52
  • 52.26.114.88
whitelisted
push.services.mozilla.com
  • 52.43.170.200
whitelisted
ocsp.usertrust.com
  • 151.139.128.14
whitelisted
autopush.prod.mozaws.net
  • 52.43.170.200
whitelisted
snippets.cdn.mozilla.net
  • 143.204.202.128
  • 143.204.202.20
  • 143.204.202.48
  • 143.204.202.50
whitelisted

Threats

PID
Process
Class
Message
1072
svchost.exe
Potentially Bad Traffic
ET INFO Observed DNS Query to .cloud TLD
1072
svchost.exe
Potentially Bad Traffic
ET INFO Observed DNS Query to .cloud TLD
Process
Message
UVexplorer.exe
Trying to load native SQLite library "C:\Program Files\UVexplorer 2.0\x86\SQLite.Interop.dll"...