File name:

icq5_setup.exe

Full analysis: https://app.any.run/tasks/0293c2f3-fa30-451f-8951-fbc5fec426d3
Verdict: Malicious activity
Analysis date: December 10, 2023, 01:48:14
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
icq
messenger
icq5
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

D84469DED4FB838A5839E05829A3304A

SHA1:

0BC5DCCB71ACFDF24938D3603C711E91390DCD66

SHA256:

B95AC09730D2F1959E9E758D992AE869DB453040AC3ED4952724E0117F915359

SSDEEP:

98304:aRipgNCh0rxPkhYiOrUGQTAau6AP1N7bMC3TQnsPCU83qPILd7FZD7XaahOunPG1:r2sJGjj

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • icq5_setup.exe (PID: 1352)
      • GLBFF44.tmp (PID: 1840)
    • Actions looks like stealing of personal data

      • GLBFF44.tmp (PID: 1840)
  • SUSPICIOUS

    • Starts application with an unusual extension

      • icq5_setup.exe (PID: 1352)
      • GLBFF44.tmp (PID: 1840)
    • Reads the Internet Settings

      • GLBFF44.tmp (PID: 1840)
      • ICQInstall.exe (PID: 1988)
      • ICQInstall.exe (PID: 2520)
      • ICQInstall.exe (PID: 3228)
      • ICQLite.exe (PID: 3576)
    • The process creates files with name similar to system file names

      • GLBFF44.tmp (PID: 1840)
    • Process drops legitimate windows executable

      • GLBFF44.tmp (PID: 1840)
    • The process drops C-runtime libraries

      • GLBFF44.tmp (PID: 1840)
    • Searches for installed software

      • GLBFF44.tmp (PID: 1840)
    • Creates a software uninstall entry

      • GLBFF44.tmp (PID: 1840)
    • Creates/Modifies COM task schedule object

      • GLJFF83.tmp (PID: 2972)
    • Reads Microsoft Outlook installation path

      • ICQLite.exe (PID: 3576)
    • Reads Internet Explorer settings

      • ICQLite.exe (PID: 3576)
    • Checks Windows Trust Settings

      • ICQLite.exe (PID: 3576)
    • Reads security settings of Internet Explorer

      • ICQLite.exe (PID: 3576)
    • Reads settings of System Certificates

      • ICQLite.exe (PID: 3576)
    • Connects to unusual port

      • ICQLite.exe (PID: 3576)
  • INFO

    • Checks supported languages

      • icq5_setup.exe (PID: 1352)
      • ICQInstall.exe (PID: 1988)
      • ICQInstall.exe (PID: 2520)
      • wmpnscfg.exe (PID: 240)
      • ICQLiteDBConverter.exe (PID: 3092)
      • ICQLite.exe (PID: 2224)
      • GLJFF83.tmp (PID: 3492)
      • GLJFF83.tmp (PID: 3340)
      • GLJFF83.tmp (PID: 3556)
      • GLJFF83.tmp (PID: 1872)
      • ICQInstall.exe (PID: 3228)
      • GLJFF83.tmp (PID: 2972)
      • ICQLite.exe (PID: 3576)
      • GLJFF83.tmp (PID: 4000)
      • GLJFF83.tmp (PID: 3944)
      • ICQLite.exe (PID: 280)
      • ICQLite.exe (PID: 2860)
      • ICQLite.exe (PID: 1860)
      • ICQLiteDBConverter.exe (PID: 1328)
      • GLBFF44.tmp (PID: 1840)
    • Create files in a temporary directory

      • GLBFF44.tmp (PID: 1840)
      • ICQLite.exe (PID: 3576)
      • ICQLiteDBConverter.exe (PID: 1328)
      • icq5_setup.exe (PID: 1352)
    • Reads the computer name

      • ICQInstall.exe (PID: 1988)
      • wmpnscfg.exe (PID: 240)
      • GLJFF83.tmp (PID: 3340)
      • ICQInstall.exe (PID: 2520)
      • GLJFF83.tmp (PID: 4000)
      • GLJFF83.tmp (PID: 1872)
      • GLJFF83.tmp (PID: 3944)
      • ICQInstall.exe (PID: 3228)
      • ICQLite.exe (PID: 3576)
      • GLJFF83.tmp (PID: 2972)
      • ICQLite.exe (PID: 2860)
      • ICQLite.exe (PID: 1860)
      • ICQLiteDBConverter.exe (PID: 1328)
      • ICQLite.exe (PID: 280)
      • GLBFF44.tmp (PID: 1840)
    • Checks proxy server information

      • ICQInstall.exe (PID: 1988)
      • ICQInstall.exe (PID: 2520)
      • ICQInstall.exe (PID: 3228)
      • ICQLite.exe (PID: 3576)
    • Reads the machine GUID from the registry

      • ICQInstall.exe (PID: 1988)
      • ICQInstall.exe (PID: 2520)
      • ICQInstall.exe (PID: 3228)
      • ICQLite.exe (PID: 3576)
      • GLJFF83.tmp (PID: 2972)
      • ICQLite.exe (PID: 280)
      • ICQLite.exe (PID: 2860)
      • ICQLiteDBConverter.exe (PID: 1328)
      • ICQLite.exe (PID: 1860)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 240)
      • ICQLite.exe (PID: 1860)
    • Application launched itself

      • iexplore.exe (PID: 3440)
    • Creates files or folders in the user directory

      • ICQLite.exe (PID: 3576)
    • Reads CPU info

      • ICQLite.exe (PID: 3576)
    • Creates files in the program directory

      • GLBFF44.tmp (PID: 1840)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Wise Installer executable (91.7)
.exe | Win64 Executable (generic) (5.3)
.dll | Win32 Dynamic Link Library (generic) (1.2)
.exe | Win32 Executable (generic) (0.8)
.exe | Generic Win/DOS Executable (0.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1999:04:08 22:24:47+02:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 512
InitializedDataSize: 6057984
UninitializedDataSize: -
EntryPoint: 0x1000
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows 16-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: ICQ Ltd.
FileDescription: ICQ(R)
FileVersion: -
LegalCopyright: ICQ Ltd.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
77
Monitored processes
23
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start icq5_setup.exe glbff44.tmp icqinstall.exe wmpnscfg.exe no specs icqinstall.exe icqlitedbconverter.exe no specs icqlite.exe no specs gljff83.tmp no specs gljff83.tmp no specs gljff83.tmp no specs gljff83.tmp no specs gljff83.tmp no specs gljff83.tmp no specs icqinstall.exe gljff83.tmp no specs icqlite.exe iexplore.exe no specs iexplore.exe no specs icqlite.exe no specs icqlite.exe no specs icqlite.exe icqlitedbconverter.exe icq5_setup.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
240"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
280C:\PROGRA~1\ICQLite\ICQLite.exe -EmbeddingC:\Program Files\ICQLite\ICQLite.exesvchost.exe
User:
admin
Company:
ICQ Ltd.
Integrity Level:
MEDIUM
Description:
ICQLite
Exit code:
0
Version:
20, 52, 2573, 0
Modules
Images
c:\program files\icqlite\icqlite.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\winmm.dll
1328C:\PROGRA~1\ICQLite\ICQLIT~2.EXE -EmbeddingC:\Program Files\ICQLite\ICQLiteDBConverter.exe
svchost.exe
User:
admin
Integrity Level:
HIGH
Description:
ICQLiteDBConverter MFC Application
Exit code:
0
Version:
20, 52, 2573, 0
Modules
Images
c:\program files\icqlite\icqlitedbconverter.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\mfc42.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1352"C:\Users\admin\Desktop\icq5_setup.exe" C:\Users\admin\Desktop\icq5_setup.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\icq5_setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\apphelp.dll
1840C:\Users\admin\AppData\Local\Temp\GLBFF44.tmp 4736 C:\Users\admin\Desktop\ICQ5_S~1.EXEC:\Users\admin\AppData\Local\Temp\GLBFF44.tmp
icq5_setup.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\glbff44.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1860"C:\Program Files\ICQLite\ICQLite.exe" C:\Program Files\ICQLite\ICQLite.exe
explorer.exe
User:
admin
Company:
ICQ Ltd.
Integrity Level:
HIGH
Description:
ICQLite
Exit code:
0
Version:
20, 52, 2573, 0
Modules
Images
c:\program files\icqlite\icqlite.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\winmm.dll
1872"C:\Users\admin\AppData\Local\Temp\GLJFF83.tmp" C:\Program Files\ICQLite\ICQLiteShell.dllC:\Users\admin\AppData\Local\Temp\GLJFF83.tmpGLBFF44.tmp
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\gljff83.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\aclayers.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
1988"C:\Users\admin\AppData\Local\Temp\ICQINS~1.EXE" STPARAM=0 2052-1085-3000C:\Users\admin\AppData\Local\Temp\ICQInstall.exe
GLBFF44.tmp
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\icqinstall.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\acgenral.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspicli.dll
1996"C:\Users\admin\Desktop\icq5_setup.exe" C:\Users\admin\Desktop\icq5_setup.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\desktop\icq5_setup.exe
c:\windows\system32\ntdll.dll
2224"C:\PROGRA~1\ICQLite\ICQLite.exe" -RegServerC:\Program Files\ICQLite\ICQLite.exeGLBFF44.tmp
User:
admin
Company:
ICQ Ltd.
Integrity Level:
HIGH
Description:
ICQLite
Exit code:
0
Version:
20, 52, 2573, 0
Modules
Images
c:\program files\icqlite\icqlite.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\winmm.dll
Total events
17 623
Read events
17 359
Write events
257
Delete events
7

Modification events

(PID) Process:(1840) GLBFF44.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1840) GLBFF44.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1840) GLBFF44.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(1840) GLBFF44.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(1988) ICQInstall.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(1988) ICQInstall.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
460000005A010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1988) ICQInstall.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1988) ICQInstall.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1988) ICQInstall.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(1988) ICQInstall.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
97
Suspicious files
331
Text files
1 498
Unknown types
19

Dropped files

PID
Process
Filename
Type
1840GLBFF44.tmpC:\Users\admin\AppData\Local\Temp\GLM5A0.tmpexecutable
MD5:484CB68472473A1A84FF07996BB8C1F6
SHA256:15BB390AF019D92E1D02771B02335FA360DB1BB34BCF4F0C72705027428F4FF1
1840GLBFF44.tmpC:\Users\admin\AppData\Local\Temp\GLCFF72.tmpexecutable
MD5:8C97D8BB1470C6498E47B12C5A03CE39
SHA256:A87F19F9FEE475D2B2E82ACFB4589BE6D816B613064CD06826E1D4C147BEB50A
1840GLBFF44.tmpC:\Users\admin\AppData\Local\Temp\GLJFF83.tmpexecutable
MD5:6F608D264503796BEBD7CD66B687BE92
SHA256:49833D2820AFB1D7409DFBD916480F2CDF5787D2E2D94166725BEB9064922D5D
1840GLBFF44.tmpC:\Program Files\ICQLite\temp\~GLH0008.TMP
MD5:
SHA256:
1840GLBFF44.tmpC:\Program Files\ICQLite\temp\ICQLite.emo
MD5:
SHA256:
1840GLBFF44.tmpC:\Users\admin\AppData\Local\Temp\~GLH0002.TMPexecutable
MD5:91721B51C747F85E4E02ACE980D0419D
SHA256:09BC931FDA2DF639C752B4C5BD52381C7F738A2B6B9D0657CC839C21355391A4
1840GLBFF44.tmpC:\Users\admin\AppData\Local\Temp\GLK188.tmpexecutable
MD5:4F355C177DDABAD5D7079F10503006AB
SHA256:BC91D160C7B0FC9E40D8DB9B248A9FD6DD9489F4246415B98BCD6FB9B806DC74
1840GLBFF44.tmpC:\Users\admin\AppData\Local\Temp\~GLH0001.TMPexecutable
MD5:79DA24BD9B47632835AFC2B47BF18774
SHA256:7F4DDF45CBE502F9AA7A94F0E5B2F520C2ECCC087A42864B5BBA11626F20B360
1840GLBFF44.tmpC:\Users\admin\AppData\Local\Temp\~GLH0000.TMPexecutable
MD5:3B2E23D259394C701050486E642D14FA
SHA256:166D7156142F3EE09FA69EB617DD22E4FD248AA80A1AC08767DB6AD99A2705C1
1840GLBFF44.tmpC:\Users\Public\Desktop\Click here to restart ICQ 5.1 Setup.lnkbinary
MD5:D1A3E7C21D07E1B7C181E40683B86186
SHA256:740AD5F788370CC20479C3499687502AF242D58872AD1EB61FA525866E7D7709
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
16
TCP/UDP connections
25
DNS requests
9
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1988
ICQInstall.exe
GET
404
178.237.20.30:80
http://cb.icq.com/cb/icqsrp/2052/srp.cb?GUID=B5E42400-9761-4ABA-B86D-6DD486DAFFF7&TIME_T=657518eb&GUIDCRC=F74580F9F6C30338&STAGE=00&DIST=1085&BUILDID=3000&SKINID=&COOKIE=0&OS=2,1,6&PARAM=
unknown
html
162 b
2520
ICQInstall.exe
GET
404
178.237.20.30:80
http://cb.icq.com/cb/icqsrp/2052/srp.cb?GUID=B5E42400-9761-4ABA-B86D-6DD486DAFFF7&TIME_T=65751903&GUIDCRC=A24580F9F9C30338&STAGE=01&DIST=1085&BUILDID=3000&SKINID=&COOKIE=0&OS=2,1,6&PARAM=
unknown
html
162 b
3228
ICQInstall.exe
GET
404
178.237.20.30:80
http://cb.icq.com/cb/icqsrp/2052/srp.cb?GUID=B5E42400-9761-4ABA-B86D-6DD486DAFFF7&TIME_T=6575195c&GUIDCRC=F24580F9F6C30338&STAGE=02&DIST=1085&BUILDID=3000&SKINID=&COOKIE=0&OS=2,1,6&PARAM=
unknown
html
162 b
3576
ICQLite.exe
GET
301
5.61.236.229:80
http://www.icq.com/xtraz/products/coreg/Cactus/testConnection.xml
unknown
html
178 b
3576
ICQLite.exe
GET
404
178.237.20.30:80
http://cb.icq.com/cb/icqsrp/2052/srp.cb?GUID=B5E42400-9761-4ABA-B86D-6DD486DAFFF7&TIME_T=65751961&GUIDCRC=034580F9D9C30338&STAGE=03&DIST=1085&BUILDID=3000&SKINID=Default_Skin&COOKIE=0&OS=2,1,6&PARAM=
unknown
html
162 b
3576
ICQLite.exe
GET
200
23.32.238.201:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?665a89dcb709bda3
unknown
compressed
4.66 Kb
3576
ICQLite.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA0HeCoTP8b5pXKW4TH%2F0Xk%3D
unknown
binary
471 b
3576
ICQLite.exe
POST
200
192.229.221.95:80
http://ocsp.digicert.com/
unknown
binary
471 b
3576
ICQLite.exe
GET
200
192.229.221.95:80
http://status.geotrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS6FKmrgWTGr7Q8nSk4Oub50ler6QQUlE%2FUXYvkpOKmgP792PkA76O%2BAlcCEALa82sinG45HWKv3oILixk%3D
unknown
binary
471 b
3576
ICQLite.exe
GET
403
5.61.236.229:80
http://xtraz.icq.com/xtraz/global/cactus/Eng/PluginsList.xml?R=1702173025
unknown
html
181 b
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
unknown
1080
svchost.exe
224.0.0.252:5355
unknown
2588
svchost.exe
239.255.255.250:1900
unknown
4
System
192.168.100.255:138
unknown
1988
ICQInstall.exe
178.237.20.30:80
cb.icq.com
LLC VK
RU
unknown
2520
ICQInstall.exe
178.237.20.30:80
cb.icq.com
LLC VK
RU
unknown
3228
ICQInstall.exe
178.237.20.30:80
cb.icq.com
LLC VK
RU
unknown
3576
ICQLite.exe
5.61.236.229:80
xtraz.icq.com
LLC VK
RU
unknown
3576
ICQLite.exe
178.237.20.30:80
cb.icq.com
LLC VK
RU
unknown
3576
ICQLite.exe
5.61.236.229:443
xtraz.icq.com
LLC VK
RU
unknown

DNS requests

Domain
IP
Reputation
cb.icq.com
  • 178.237.20.30
unknown
xtraz.icq.com
  • 5.61.236.229
unknown
www.icq.com
  • 5.61.236.229
unknown
ctldl.windowsupdate.com
  • 23.32.238.201
  • 23.32.238.178
unknown
geo2.adobe.com
  • 184.30.16.138
unknown
ocsp.digicert.com
  • 192.229.221.95
unknown
status.geotrust.com
  • 192.229.221.95
unknown
fpdownload.macromedia.com
  • 23.212.219.216
unknown
login.icq.com
  • 178.237.20.58
unknown

Threats

PID
Process
Class
Message
A Network Trojan was detected
ET USER_AGENTS Suspicious User Agent (Microsoft Internet Explorer)
A Network Trojan was detected
ET USER_AGENTS Suspicious User Agent (Microsoft Internet Explorer)
No debug info