| File name: | Lonelyscreen.1.2.9.keygen.by.Paradox.zip |
| Full analysis: | https://app.any.run/tasks/efb7a57e-b6f3-4be0-9789-ad6a37dfdc9f |
| Verdict: | Malicious activity |
| Threats: | Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security. |
| Analysis date: | August 08, 2020, 18:32:34 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v1.0 to extract |
| MD5: | A08AD2D67A8B60EE574A5D68FFF35C6E |
| SHA1: | AF6FFE03B0B53FA3EFDE61D8B9F115788CFFF032 |
| SHA256: | B8F8FE870C841E6249FDABC7429F735CEFA7C57F10C41F30964F7E5EC190DE54 |
| SSDEEP: | 393216:k0A1zvK1Nl0HeD0Uxir8pOA6AqVFD9HIOb3E:5ARvK1NOHkor8pwF6iE |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 10 |
|---|---|
| ZipBitFlag: | - |
| ZipCompression: | None |
| ZipModifyDate: | 2020:08:08 21:32:02 |
| ZipCRC: | 0x1ed6911e |
| ZipCompressedSize: | 13900749 |
| ZipUncompressedSize: | 13900749 |
| ZipFileName: | Lonelyscreen.1.2.9.keygen.by.Paradox.zip |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 116 | "C:\Users\admin\AppData\Local\Temp\RarSFX2\id6.exe" | C:\Users\admin\AppData\Local\Temp\RarSFX2\id6.exe | keygen-step-4.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: 20200801 Microsoft 基础类应用程序 Exit code: 4294967295 Version: 1, 0, 0, 1 Modules
| |||||||||||||||
| 180 | C:\Users\admin\AppData\Local\Temp\Yandex.exe 200 install5 | C:\Users\admin\AppData\Local\Temp\Yandex.exe | Install.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: Vulkan Runtime Installer Exit code: 0 Version: 1.0.65.1 Modules
| |||||||||||||||
| 320 | taskkill /f /im chrome.exe | C:\Windows\system32\taskkill.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Terminates Processes Exit code: 128 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 408 | keygen-step-4.exe | C:\Users\admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe | cmd.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 536 | "C:\Users\admin\AppData\Local\Temp\is-5TEFR.tmp\Full Version.tmp" /SL5="$20278,138489,56832,C:\Users\admin\AppData\Local\Temp\RarSFX2\Full Version.exe" /SPAWNWND=$10276 /NOTIFYWND=$20268 | C:\Users\admin\AppData\Local\Temp\is-5TEFR.tmp\Full Version.tmp | Full Version.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: Setup/Uninstall Exit code: 1 Version: 51.52.0.0 Modules
| |||||||||||||||
| 556 | "C:\Users\admin\AppData\Local\Temp\is-E06NS.tmp\Setup.tmp" /SL5="$50164,1223153,733696,C:\Users\admin\AppData\Local\Temp\RarSFX2\Setup.exe" /SPAWNWND=$90138 /NOTIFYWND=$7018E | C:\Users\admin\AppData\Local\Temp\is-E06NS.tmp\Setup.tmp | Setup.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: Setup/Uninstall Exit code: 0 Version: 51.1052.0.0 Modules
| |||||||||||||||
| 564 | \??\C:\Windows\system32\conhost.exe "1694340849-1704942318-306482511054395661174964050-1168400174-392148055-541600410" | C:\Windows\system32\conhost.exe | — | csrss.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Console Window Host Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 820 | "C:\Users\admin\AppData\Local\Temp\a0-43fe4-4e5-38c8e-3142cac8e28bc\Nivakyxyci.exe" /noat | C:\Users\admin\AppData\Local\Temp\a0-43fe4-4e5-38c8e-3142cac8e28bc\Nivakyxyci.exe | prozipperRed.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Version: 7.6.2.3 Modules
| |||||||||||||||
| 848 | "C:\Users\admin\AppData\Local\Temp\RarSFX2\Full Version.exe" | C:\Users\admin\AppData\Local\Temp\RarSFX2\Full Version.exe | keygen-step-4.exe | ||||||||||||
User: admin Company: Integrity Level: MEDIUM Description: pro-zipper Setup Exit code: 1 Version: Modules
| |||||||||||||||
| 900 | netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes | C:\Windows\system32\netsh.exe | — | cmd.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Network Command Shell Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (3216) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (3216) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (3216) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\136\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3216) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\136\52C64B7E |
| Operation: | write | Name: | @C:\Windows\system32\NetworkExplorer.dll,-1 |
Value: Network | |||
| (PID) Process: | (3216) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\Lonelyscreen.1.2.9.keygen.by.Paradox.zip | |||
| (PID) Process: | (3216) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (3216) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (3216) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (3216) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (2960) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2960 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRb2960.42840\Lonelyscreen.1.2.9.keygen.by.Paradox.exe | — | |
MD5:— | SHA256:— | |||
| 408 | keygen-step-4.exe | C:\Users\admin\AppData\Local\Temp\RarSFX2\whhw.exe | executable | |
MD5:— | SHA256:— | |||
| 2184 | Lonelyscreen.1.2.9.keygen.by.Paradox.exe | C:\Users\admin\AppData\Local\Temp\RarSFX0\user32.dll | executable | |
MD5:— | SHA256:— | |||
| 3816 | keygen-step-3.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Login Data1 | sqlite | |
MD5:— | SHA256:— | |||
| 408 | keygen-step-4.exe | C:\Users\admin\AppData\Local\Temp\RarSFX2\hjjgaa.exe | executable | |
MD5:— | SHA256:— | |||
| 3608 | key.exe | C:\Users\admin\AppData\Local\Temp\tmp8B15.tmp | — | |
MD5:— | SHA256:— | |||
| 2184 | Lonelyscreen.1.2.9.keygen.by.Paradox.exe | C:\Users\admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe | executable | |
MD5:— | SHA256:— | |||
| 2780 | whhw.exe | C:\Users\admin\AppData\Local\Temp\RarSFX3\setup.upx.exe | executable | |
MD5:— | SHA256:— | |||
| 408 | keygen-step-4.exe | C:\Users\admin\AppData\Local\Temp\RarSFX2\Install.exe | executable | |
MD5:— | SHA256:— | |||
| 116 | id6.exe | C:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\cookies.sqlite-shm | — | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3816 | keygen-step-3.exe | POST | 200 | 45.32.114.117:80 | http://www.wdsfw34erf93.com/index.php/api/fb | SG | text | 24 b | whitelisted |
116 | id6.exe | POST | 200 | 194.54.83.254:80 | http://freekzvideo.cloud/business/receive | UA | — | — | malicious |
1800 | key.exe | POST | — | 104.27.166.134:80 | http://www.oldhorse.info/ | US | — | — | malicious |
3080 | setup.upx.exe | POST | 200 | 45.32.114.117:80 | http://www.wdsfw34erf93.com/index.php/api/fb | SG | text | 24 b | whitelisted |
1800 | key.exe | POST | 200 | 104.27.167.134:80 | http://oldhorse.info/a.php | US | — | — | malicious |
1676 | searzar.exe | GET | 200 | 2.16.186.35:80 | http://isrg.trustid.ocsp.identrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRv9GhNQxLSSGKBnMArPUcsHYovpgQUxKexpHsscfrb4UuQdf%2FEFWCFiRACEAoBQUIAAAFThXNqC4Xspwg%3D | unknown | der | 1.37 Kb | whitelisted |
2484 | Install.exe | POST | 200 | 172.67.152.86:80 | http://ef1db1064a5e5794.xyz/info/w | US | — | — | malicious |
1676 | searzar.exe | GET | 200 | 2.16.186.11:80 | http://ocsp.int-x3.letsencrypt.org/MFMwUTBPME0wSzAJBgUrDgMCGgUABBR%2B5mrncpqz%2FPiiIGRsFqEtYHEIXQQUqEpqYwR93brm0Tm3pkVl7%2FOo7KECEgObfHHgHlsa0R7fVL2Sj72S7g%3D%3D | unknown | der | 527 b | whitelisted |
2484 | Install.exe | POST | 200 | 172.67.152.86:80 | http://ef1db1064a5e5794.xyz/info/w | US | — | — | malicious |
2912 | hjjgaa.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/json/ | unknown | text | 292 b | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3816 | keygen-step-3.exe | 45.32.114.117:80 | www.wdsfw34erf93.com | Choopa, LLC | SG | malicious |
3080 | setup.upx.exe | 45.32.114.117:80 | www.wdsfw34erf93.com | Choopa, LLC | SG | malicious |
1800 | key.exe | 104.27.167.134:80 | oldhorse.info | Cloudflare Inc | US | malicious |
1800 | key.exe | 104.27.166.134:80 | oldhorse.info | Cloudflare Inc | US | shared |
116 | id6.exe | 194.54.83.254:80 | freekzvideo.cloud | Omnilance Ltd | UA | malicious |
1676 | searzar.exe | 149.28.244.249:80 | www.ipcode.pw | — | US | suspicious |
1676 | searzar.exe | 88.99.66.31:443 | iplogger.org | Hetzner Online GmbH | DE | malicious |
1676 | searzar.exe | 2.16.186.35:80 | isrg.trustid.ocsp.identrust.com | Akamai International B.V. | — | whitelisted |
1676 | searzar.exe | 2.16.186.11:80 | isrg.trustid.ocsp.identrust.com | Akamai International B.V. | — | whitelisted |
1676 | searzar.exe | 38.27.96.30:80 | www.nicekkk.pw | HOSTSPACE NETWORKS LLC | US | malicious |
Domain | IP | Reputation |
|---|---|---|
www.wdsfw34erf93.com |
| whitelisted |
oldhorse.info |
| malicious |
www.oldhorse.info |
| malicious |
freekzvideo.cloud |
| malicious |
www.ipcode.pw |
| malicious |
iplogger.org |
| shared |
isrg.trustid.ocsp.identrust.com |
| whitelisted |
ocsp.int-x3.letsencrypt.org |
| whitelisted |
www.nicekkk.pw |
| malicious |
ip-api.com |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
1800 | key.exe | A Network Trojan was detected | MALWARE [PTsecurity] Trojan.Win32.Nebuler Checkin |
1800 | key.exe | A Network Trojan was detected | ET TROJAN Fareit/Pony Downloader Checkin 2 |
1048 | svchost.exe | Potentially Bad Traffic | ET INFO Observed DNS Query to .cloud TLD |
116 | id6.exe | A Network Trojan was detected | ET TROJAN Suspicious User-Agent (WindowsNT) With No Separating Space |
116 | id6.exe | Potentially Bad Traffic | ET INFO HTTP Request to Suspicious *.cloud Domain |
1048 | svchost.exe | Potentially Bad Traffic | ET DNS Query to a *.pw domain - Likely Hostile |
1676 | searzar.exe | Potentially Bad Traffic | ET INFO HTTP Request to a *.pw domain |
1676 | searzar.exe | Potential Corporate Privacy Violation | POLICY [PTsecurity] IP Check Domain SSL certificate |
1676 | searzar.exe | Potential Corporate Privacy Violation | POLICY [PTsecurity] IP Check Domain SSL certificate |
1048 | svchost.exe | Potentially Bad Traffic | ET DNS Query to a *.pw domain - Likely Hostile |
Process | Message |
|---|---|
id6.exe | 006 |
id6.exe | http://freekzvideo.cloud/business/receive |
chrome.exe | RecursiveDirectoryCreate( C:\Users\admin\AppData\Local\Temp\1596911662941 directory exists )
|
id20.exe | http://freekzvideo.cloud/business/receive |
LightHotlux.exe | DeviceId=0743643e-9037-d808-6b96-07efe0d17ab7 Distributer=APSFADexpNR ChannelId=3 BarcodeId=54369003 ApName=Mbappert
|
Trantech.exe | DeviceId=0743643e-9037-d808-6b96-07efe0d17ab7 Distributer=APSFADexpNR ChannelId=3 BarcodeId=54369003 DefaultSearchDomain=https://feed.sonic-search.com HomePageDomain=https://feed.helperbar.com NewTabDomain=https://feed.helperbar.com EncryptUrl=true AddRemove=false AgentName=Mbappert YBSearch=false ApName=Mbappert SetAll=true campaignId=461
|
Mbappert.exe | Agent Main
|
Mbappert.exe | Agent service started with arg: DeviceId=0743643e-9037-d808-6b96-07efe0d17ab7 Distributer=APSFADexpNR ChannelId=3 BarcodeId=54369003 DefaultSearchDomain=https://feed.sonic-search.com HomePageDomain=https://feed.helperbar.com NewTabDomain=https://feed.helperbar.com EncryptUrl=true AddRemove=false AgentName=Mbappert YBSearch=false ApName=Mbappert SetAll=true campaignId=461
|
Mbappert.exe | Current directory: C:\ProgramData\Mbappert
|
Mbappert.exe | Agent Started
|