File name:

a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21

Full analysis: https://app.any.run/tasks/17b907a2-62f6-4059-a70f-df267affd868
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: June 19, 2019, 10:19:52
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
adware
adload
pup
trojan
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (console) Intel 80386, for MS Windows
MD5:

A55974B07F860B901081B217BBC192DB

SHA1:

87D06FC52606C0CAE4A5727C7C902D47FF99B81B

SHA256:

A76937074BB920658FC9DD3150627715EB5B69CD8AD5A31FDEA251BC77BE9B21

SSDEEP:

49152:GPcyaEdAjv8zx+F/IVdAtqYwVY/iroap5VJvK/I64+H2PtfqRGo601068ubKv6W/:GPcyJ+AzxPfA8YKDVJvKA6nHuy8

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • ADLOAD was detected

      • a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe (PID: 3256)
    • Connects to CnC server

      • a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe (PID: 3256)
      • 3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe (PID: 1804)
      • MailRuUpdater.exe (PID: 1300)
    • Application was dropped or rewritten from another process

      • 522EB9F0-BD21-40F1-AD01-2297B3E8CBAA.exe (PID: 3972)
      • installer_campaign_14922.exe (PID: 3112)
      • 437932F7-94E7-4E4F-9583-6D65A7E19D2B.exe (PID: 1720)
      • 3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe (PID: 1804)
      • CoreTempApp.exe (PID: 3640)
      • CoreTempApp.exe (PID: 664)
      • B31B3665-9BF9-444A-85A2-7BD834A10223.exe (PID: 3692)
      • mweshieldup.exe (PID: 3800)
      • mweshield.exe (PID: 4012)
      • mweshield.exe (PID: 2612)
      • na_runner.exe (PID: 252)
      • MailRuUpdater.exe (PID: 1300)
      • mweshieldup.exe (PID: 3600)
      • MailRuUpdater.exe (PID: 2212)
      • 6894-ec17-d208-03db (PID: 920)
      • mrupdsrv.exe (PID: 1716)
      • smappscontroller.exe (PID: 2732)
    • Changes the autorun value in the registry

      • CoreTempApp.exe (PID: 3640)
      • 3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe (PID: 1804)
      • na_runner.exe (PID: 252)
      • MailRuUpdater.exe (PID: 2456)
    • Loads dropped or rewritten executable

      • installer_campaign_14922.exe (PID: 3112)
      • 437932F7-94E7-4E4F-9583-6D65A7E19D2B.exe (PID: 1720)
      • mweshield.exe (PID: 4012)
      • mweshield.exe (PID: 2612)
      • regsvr32.exe (PID: 3392)
    • Changes settings of System certificates

      • 3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe (PID: 1804)
      • mweshield.exe (PID: 2612)
      • MailRuUpdater.exe (PID: 1300)
    • Uses Task Scheduler to run other applications

      • B31B3665-9BF9-444A-85A2-7BD834A10223.tmp (PID: 2576)
    • Loads the Task Scheduler COM API

      • schtasks.exe (PID: 3956)
      • schtasks.exe (PID: 4068)
      • schtasks.exe (PID: 3696)
      • na_runner.exe (PID: 252)
      • MailRuUpdater.exe (PID: 2456)
    • Disables Windows Defender

      • 3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe (PID: 1804)
    • Changes Windows auto-update feature

      • 3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe (PID: 1804)
    • Registers / Runs the DLL via REGSVR32.EXE

      • 3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe (PID: 1804)
    • MAILRU was detected

      • MailRuUpdater.exe (PID: 1300)
      • 3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe (PID: 1804)
    • Downloads executable files from the Internet

      • a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe (PID: 3256)
  • SUSPICIOUS

    • Changes tracing settings of the file or console

      • a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe (PID: 3256)
    • Creates files in the user directory

      • a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe (PID: 3256)
      • installer_campaign_14922.exe (PID: 3112)
      • 437932F7-94E7-4E4F-9583-6D65A7E19D2B.exe (PID: 1720)
      • B31B3665-9BF9-444A-85A2-7BD834A10223.tmp (PID: 2576)
      • 3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe (PID: 1804)
      • MailRuUpdater.exe (PID: 1300)
    • Executable content was dropped or overwritten

      • a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe (PID: 3256)
      • installer_campaign_14922.exe (PID: 3112)
      • 437932F7-94E7-4E4F-9583-6D65A7E19D2B.exe (PID: 1720)
      • B31B3665-9BF9-444A-85A2-7BD834A10223.exe (PID: 3692)
      • B31B3665-9BF9-444A-85A2-7BD834A10223.tmp (PID: 2576)
      • 522EB9F0-BD21-40F1-AD01-2297B3E8CBAA.exe (PID: 3972)
      • 3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe (PID: 1804)
      • na_runner.exe (PID: 252)
      • regsvr32.exe (PID: 3392)
      • MailRuUpdater.exe (PID: 1300)
      • 6894-ec17-d208-03db (PID: 920)
    • Creates files in the program directory

      • 522EB9F0-BD21-40F1-AD01-2297B3E8CBAA.exe (PID: 3972)
      • 3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe (PID: 1804)
      • na_runner.exe (PID: 252)
      • MailRuUpdater.exe (PID: 1300)
      • mweshield.exe (PID: 2612)
      • 6894-ec17-d208-03db (PID: 920)
    • Creates a software uninstall entry

      • installer_campaign_14922.exe (PID: 3112)
      • 522EB9F0-BD21-40F1-AD01-2297B3E8CBAA.exe (PID: 3972)
      • na_runner.exe (PID: 252)
      • MailRuUpdater.exe (PID: 2456)
    • Searches for installed software

      • a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe (PID: 3256)
      • smappscontroller.exe (PID: 2732)
    • Reads the Windows organization settings

      • B31B3665-9BF9-444A-85A2-7BD834A10223.tmp (PID: 2576)
    • Reads Windows owner or organization settings

      • B31B3665-9BF9-444A-85A2-7BD834A10223.tmp (PID: 2576)
    • Adds / modifies Windows certificates

      • 3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe (PID: 1804)
    • Uses TASKKILL.EXE to kill process

      • B31B3665-9BF9-444A-85A2-7BD834A10223.tmp (PID: 2576)
    • Reads the cookies of Google Chrome

      • 3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe (PID: 1804)
    • Reads the cookies of Mozilla Firefox

      • 3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe (PID: 1804)
    • Creates files in the Windows directory

      • 522EB9F0-BD21-40F1-AD01-2297B3E8CBAA.exe (PID: 3972)
      • 3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe (PID: 1804)
      • MailRuUpdater.exe (PID: 2212)
      • mrupdsrv.exe (PID: 1716)
      • mweshieldup.exe (PID: 3600)
    • Creates or modifies windows services

      • 522EB9F0-BD21-40F1-AD01-2297B3E8CBAA.exe (PID: 3972)
    • Creates files in the driver directory

      • 522EB9F0-BD21-40F1-AD01-2297B3E8CBAA.exe (PID: 3972)
    • Executed as Windows Service

      • mweshield.exe (PID: 2612)
      • mweshieldup.exe (PID: 3600)
      • mrupdsrv.exe (PID: 1716)
      • MailRuUpdater.exe (PID: 2212)
    • Starts itself from another location

      • na_runner.exe (PID: 252)
      • MailRuUpdater.exe (PID: 2456)
    • Creates COM task schedule object

      • regsvr32.exe (PID: 3392)
    • Changes the started page of IE

      • 3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe (PID: 1804)
    • Starts application with an unusual extension

      • MailRuUpdater.exe (PID: 1300)
  • INFO

    • Loads dropped or rewritten executable

      • B31B3665-9BF9-444A-85A2-7BD834A10223.tmp (PID: 2576)
    • Creates files in the program directory

      • B31B3665-9BF9-444A-85A2-7BD834A10223.tmp (PID: 2576)
    • Application was dropped or rewritten from another process

      • B31B3665-9BF9-444A-85A2-7BD834A10223.tmp (PID: 2576)
    • Creates a software uninstall entry

      • B31B3665-9BF9-444A-85A2-7BD834A10223.tmp (PID: 2576)
    • Reads settings of System Certificates

      • MailRuUpdater.exe (PID: 1300)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2015:11:04 20:41:45+01:00
PEType: PE32
LinkerVersion: 12
CodeSize: 275968
InitializedDataSize: 6175232
UninitializedDataSize: -
EntryPoint: 0x210d5
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows command line
FileVersionNumber: 0.0.2.1
ProductVersionNumber: 0.0.2.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileDescription: x64_dbg
FileVersion: 0.0.2.1
LegalCopyright: x64dbg.com
ProductName: x64_dbg
ProductVersion: V2.1ALPHA

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_CUI
Compilation Date: 04-Nov-2015 19:41:45
Detected languages:
  • English - United States
FileDescription: x64_dbg
FileVersion: 0.0.2.1
LegalCopyright: x64dbg.com
ProductName: x64_dbg
ProductVersion: V2.1ALPHA

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000E8

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 04-Nov-2015 19:41:45
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x000435B1
0x00043600
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.56623
.data
0x00045000
0x0158E8CC
0x005BF000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.06664
.idata
0x015D4000
0x00000EEC
0x00001000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.4354
.xdata
0x015D5000
0x00005F4C
0x00005200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
1.47715
.rsrc
0x015DB000
0x0001E6E3
0x0001E800
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.68583

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.07794
1223
Latin 1 / Western European
English - United States
RT_MANIFEST
2
4.90736
1128
Latin 1 / Western European
UNKNOWN
RT_ICON
3
1.90263
16936
Latin 1 / Western European
UNKNOWN
RT_ICON
4
4.44079
4264
Latin 1 / Western European
UNKNOWN
RT_ICON
5
3.70444
67624
Latin 1 / Western European
UNKNOWN
RT_ICON
6
3.38484
1128
Latin 1 / Western European
UNKNOWN
RT_ICON
7
5.00468
16936
UNKNOWN
English - United States
RT_ICON
8
5.157
4264
UNKNOWN
English - United States
RT_ICON
9
5.07881
1128
UNKNOWN
English - United States
RT_ICON

Imports

CRYPT32.dll
KERNEL32.dll
USER32.dll
ole32.dll
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
70
Monitored processes
27
Malicious processes
15
Suspicious processes
3

Behavior graph

Click at the process to see the details
drop and start drop and start drop and start drop and start drop and start start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start #ADLOAD a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe 522eb9f0-bd21-40f1-ad01-2297b3e8cbaa.exe installer_campaign_14922.exe 437932f7-94e7-4e4f-9583-6d65a7e19d2b.exe coretempapp.exe coretempapp.exe no specs #MAILRU 3966ec29-6b49-40c2-8c0d-2be9731b2efe.exe b31b3665-9bf9-444a-85a2-7bd834a10223.exe b31b3665-9bf9-444a-85a2-7bd834a10223.tmp taskkill.exe no specs smappscontroller.exe schtasks.exe no specs schtasks.exe no specs mweshield.exe no specs schtasks.exe no specs mweshieldup.exe no specs na_runner.exe mweshield.exe #MAILRU mailruupdater.exe mweshieldup.exe mailruupdater.exe regsvr32.exe 6894-ec17-d208-03db mrupdsrv.exe mailruupdater.exe mailruupdater.exe a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
252"C:\Users\admin\AppData\Local\Temp\3221-b503-dfc9-5be7\na_runner.exe" --installC:\Users\admin\AppData\Local\Temp\3221-b503-dfc9-5be7\na_runner.exe
3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe
User:
admin
Company:
Mail.Ru
Integrity Level:
HIGH
Description:
Mail.Ru updater
Exit code:
0
Version:
5.0.0.176
Modules
Images
c:\users\admin\appdata\local\temp\3221-b503-dfc9-5be7\na_runner.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
664"C:\Users\admin\AppData\Roaming\CoreTempApp\CoreTempApp.exe" "write_patch_str_to_reg" "C:\Users\admin\AppData\Local\Temp\0CC68D6F-BA1F-4BE2-97AF-651366AEE842\installer_campaign_14922.exe" "HKCU" "Software\CoreTempApp" "qbobsi"C:\Users\admin\AppData\Roaming\CoreTempApp\CoreTempApp.exeinstaller_campaign_14922.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\roaming\coretempapp\coretempapp.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
920"C:\Users\admin\AppData\Local\Temp\6894-ec17-d208-03db" --installC:\Users\admin\AppData\Local\Temp\6894-ec17-d208-03db
MailRuUpdater.exe
User:
admin
Company:
Mail.Ru
Integrity Level:
HIGH
Description:
Mail.Ru Update Service
Exit code:
0
Version:
3.12.0.10
Modules
Images
c:\users\admin\appdata\local\temp\6894-ec17-d208-03db
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1300"C:\Users\admin\AppData\Local\Mail.Ru\MailRuUpdater.exe" C:\Users\admin\AppData\Local\Mail.Ru\MailRuUpdater.exe
na_runner.exe
User:
admin
Company:
Mail.Ru
Integrity Level:
HIGH
Description:
Mail.Ru updater
Exit code:
0
Version:
5.0.0.176
Modules
Images
c:\users\admin\appdata\local\mail.ru\mailruupdater.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1716"C:\Program Files\Mail.Ru\Update Service\mrupdsrv.exe" --sC:\Program Files\Mail.Ru\Update Service\mrupdsrv.exe
services.exe
User:
SYSTEM
Company:
Mail.Ru
Integrity Level:
SYSTEM
Description:
Mail.Ru Update Service
Exit code:
0
Version:
3.12.0.10
Modules
Images
c:\program files\mail.ru\update service\mrupdsrv.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1720"C:\Users\admin\AppData\Local\Temp\437932F7-94E7-4E4F-9583-6D65A7E19D2B\437932F7-94E7-4E4F-9583-6D65A7E19D2B.exe" /sid=9 /pid=550612257C:\Users\admin\AppData\Local\Temp\437932F7-94E7-4E4F-9583-6D65A7E19D2B\437932F7-94E7-4E4F-9583-6D65A7E19D2B.exe
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\437932f7-94e7-4e4f-9583-6d65a7e19d2b\437932f7-94e7-4e4f-9583-6d65a7e19d2b.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
1804"C:\Users\admin\AppData\Local\Temp\3966EC29-6B49-40C2-8C0D-2BE9731B2EFE\3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe" --silent --install_browser_class=0 --pay_browser_class=0 "--rfr=hp.1:834408,dse.1:811570,vbm.1:811580,pult.1:811580,hp.2:834423,dse.2:811610,vbm.2:811620,pult.2:811620,any:811550,any.2:811590" "--install_callback=http://zombleman.site/api_v2/callback/?guid={guid}&br={browser}&comp={component}&paid={paid}&pb={paidBrowser}&pa={paidAction}&ibc={installBrowserClass}&pbc={payBrowserClass}&ur={unpaidActionReason}&browserclass1={browserClass1}&browserclass2={browserClass2}&rfr={rfr}&clid=214319048&dlid=334169284"C:\Users\admin\AppData\Local\Temp\3966EC29-6B49-40C2-8C0D-2BE9731B2EFE\3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
User:
admin
Integrity Level:
HIGH
Description:
sputnik
Exit code:
0
Version:
5.1.0.194
Modules
Images
c:\users\admin\appdata\local\temp\3966ec29-6b49-40c2-8c0d-2be9731b2efe\3966ec29-6b49-40c2-8c0d-2be9731b2efe.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2212"C:\Program Files\Mail.Ru\MailRuUpdater\MailRuUpdater.exe" --sC:\Program Files\Mail.Ru\MailRuUpdater\MailRuUpdater.exe
services.exe
User:
SYSTEM
Company:
Mail.Ru
Integrity Level:
SYSTEM
Description:
Mail.Ru updater
Exit code:
0
Version:
5.0.0.176
Modules
Images
c:\program files\mail.ru\mailruupdater\mailruupdater.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2456"C:\Users\admin\AppData\Local\Mail.Ru\MailRuUpdater\us\2d0cd78004_d\MailRuUpdater.exe" --update-installationC:\Users\admin\AppData\Local\Mail.Ru\MailRuUpdater\us\2d0cd78004_d\MailRuUpdater.exe
MailRuUpdater.exe
User:
admin
Company:
Mail.Ru
Integrity Level:
HIGH
Description:
Mail.Ru updater
Exit code:
0
Version:
5.1.0.195
Modules
Images
c:\users\admin\appdata\local\mail.ru\mailruupdater\us\2d0cd78004_d\mailruupdater.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2576"C:\Users\admin\AppData\Local\Temp\is-FBMJ9.tmp\B31B3665-9BF9-444A-85A2-7BD834A10223.tmp" /SL5="$4014C,2554955,467456,C:\Users\admin\AppData\Local\Temp\B31B3665-9BF9-444A-85A2-7BD834A10223\B31B3665-9BF9-444A-85A2-7BD834A10223.exe" /VERYSILENT /SUPPRESSMESSAGESC:\Users\admin\AppData\Local\Temp\is-FBMJ9.tmp\B31B3665-9BF9-444A-85A2-7BD834A10223.tmp
B31B3665-9BF9-444A-85A2-7BD834A10223.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-fbmj9.tmp\b31b3665-9bf9-444a-85a2-7bd834a10223.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
Total events
4 503
Read events
3 459
Write events
922
Delete events
122

Modification events

(PID) Process:(3256) a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exeKey:HKEY_CURRENT_USER\Software\Downloader
Operation:writeName:quarantine
Value:
(PID) Process:(3256) a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3256) a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3256) a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(3256) a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
4294901760
(PID) Process:(3256) a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(3256) a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(3256) a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3256) a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3256) a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\RASMANCS
Operation:writeName:FileTracingMask
Value:
4294901760
Executable files
58
Suspicious files
24
Text files
85
Unknown types
13

Dropped files

PID
Process
Filename
Type
3256a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exeC:\Users\admin\AppData\Local\Temp\Downloader\tempicon.ico
MD5:
SHA256:
3112installer_campaign_14922.exeC:\Users\admin\AppData\Local\Temp\nsd6BCE.tmp
MD5:
SHA256:
3256a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exeC:\Users\admin\AppData\Local\Temp\437932F7-94E7-4E4F-9583-6D65A7E19D2B\437932F7-94E7-4E4F-9583-6D65A7E19D2B.exeexecutable
MD5:
SHA256:
3972522EB9F0-BD21-40F1-AD01-2297B3E8CBAA.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H6QNMHE9\300[1]text
MD5:
SHA256:
3256a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exeC:\Users\admin\AppData\Local\Temp\522EB9F0-BD21-40F1-AD01-2297B3E8CBAA\522EB9F0-BD21-40F1-AD01-2297B3E8CBAA.exeexecutable
MD5:
SHA256:
3256a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exeC:\Users\admin\Downloads\beamng\beamng.drive.torrenttorrent
MD5:
SHA256:
3256a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exeC:\Users\admin\AppData\Local\Temp\0CC68D6F-BA1F-4BE2-97AF-651366AEE842\installer_campaign_14922.exeexecutable
MD5:
SHA256:
3256a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\admin@file-5[1].txttext
MD5:
SHA256:
3112installer_campaign_14922.exeC:\Users\admin\AppData\Roaming\CoreTempApp\CoreTempApp.exeexecutable
MD5:
SHA256:
3112installer_campaign_14922.exeC:\Users\admin\AppData\Roaming\CoreTempApp\CoreTempApp\Сoretemp.exeexecutable
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
98
TCP/UDP connections
123
DNS requests
33
Threats
48

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
GET
104.18.53.15:80
http://file-5.ru/go/7e2eb71d508ff0c7a7561b67b253096c/8wqkyql6
US
suspicious
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
HEAD
200
104.18.52.15:80
http://file-5.ru/go/7e2eb71d508ff0c7a7561b67b253096c/8wqkyql6
US
suspicious
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
GET
104.18.53.15:80
http://file-5.ru/go/7e2eb71d508ff0c7a7561b67b253096c/8wqkyql6
US
suspicious
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
HEAD
200
104.18.52.15:80
http://file-5.ru/go/7e2eb71d508ff0c7a7561b67b253096c/8wqkyql6
US
suspicious
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
GET
200
88.208.60.229:80
http://zombleman.site/upload/9b33448929168974fa305a0ec4a35bc9.exe
NL
executable
623 Kb
malicious
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
POST
88.208.60.229:80
http://zombleman.site/api_v2/json/get/campaigns?blankId=412845
NL
malicious
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
POST
88.208.60.229:80
http://zombleman.site/api_v2/json/send/analyticsreport
NL
malicious
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
GET
200
88.208.60.229:80
http://zombleman.site/icons/6.ico
NL
image
31.2 Kb
malicious
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
POST
88.208.60.229:80
http://zombleman.site/api_v2/json/send/analyticsreport
NL
malicious
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
POST
88.208.60.229:80
http://zombleman.site/api_v2/json/get/initialization
NL
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
88.208.60.229:80
zombleman.site
DataWeb Global Group B.V.
NL
malicious
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
94.100.180.110:80
sputnikmailru.cdnmail.ru
Limited liability company Mail.Ru
RU
suspicious
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
104.18.52.15:80
file-5.ru
Cloudflare Inc
US
shared
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
104.18.53.15:80
file-5.ru
Cloudflare Inc
US
shared
1804
3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe
217.69.139.247:443
xmlbinupdate.mail.ru
Limited liability company Mail.Ru
RU
malicious
1804
3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe
217.69.139.122:443
conserv.go.mail.ru
Limited liability company Mail.Ru
RU
unknown
1804
3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe
217.69.139.245:443
mrds.mail.ru
Limited liability company Mail.Ru
RU
malicious
1804
3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe
217.69.139.245:80
mrds.mail.ru
Limited liability company Mail.Ru
RU
malicious
1804
3966EC29-6B49-40C2-8C0D-2BE9731B2EFE.exe
217.69.139.110:443
mailruupdater.cdnmail.ru
Limited liability company Mail.Ru
RU
malicious
2576
B31B3665-9BF9-444A-85A2-7BD834A10223.tmp
109.206.179.254:80
client.updsoft.net
Serverel Inc.
NL
malicious

DNS requests

Domain
IP
Reputation
zombleman.site
  • 88.208.60.229
malicious
sputnikmailru.cdnmail.ru
  • 94.100.180.110
unknown
file-5.ru
  • 104.18.52.15
  • 104.18.53.15
suspicious
mywebshield-ww1.com
  • 88.208.5.120
malicious
getmywebshield.org
  • 88.208.5.119
unknown
satysservs.com
  • 192.133.141.11
malicious
xmlbinupdate.mail.ru
  • 217.69.139.247
shared
conserv.go.mail.ru
  • 217.69.139.122
unknown
mrds.mail.ru
  • 217.69.139.245
suspicious
client.updsoft.net
  • 109.206.179.254
unknown

Threats

PID
Process
Class
Message
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
Misc activity
ADWARE [PTsecurity] AdLoad CnC Reverse Base64 POST
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
Misc activity
ADWARE [PTsecurity] AdLoad CnC Reverse Base64 POST
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
A Network Trojan was detected
ET CURRENT_EVENTS SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
A Network Trojan was detected
ET CURRENT_EVENTS SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
Misc activity
ADWARE [PTsecurity] AdLoad CnC Reverse Base64 POST
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
A Network Trojan was detected
ET CURRENT_EVENTS SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016
3256
a76937074bb920658fc9dd3150627715eb5b69cd8ad5a31fdea251bc77be9b21.exe
Misc activity
ADWARE [PTsecurity] AdLoad CnC Reverse Base64 POST
18 ETPRO signatures available at the full report
Process
Message
MailRuUpdater.exe
RunAsService: Entry
MailRuUpdater.exe
Updater.Mail.Ru: SERVICE_CONTROL_STOP