File name:

Mirko King FFlag Hack_41663868.exe

Full analysis: https://app.any.run/tasks/954da747-e0b6-4914-8e5d-a338d55ecb2c
Verdict: Malicious activity
Analysis date: January 16, 2024, 14:58:00
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

93D16508432C3FF3512EB9DE584F48E6

SHA1:

6ED9FD4D190AFC6C5154730D85CF883FD3AD4D2E

SHA256:

BE5357F63B036DA79D198978CBC5B652EA02B1CCFCB1538352442CDC7F4D5549

SSDEEP:

98304:F7GowcdPyJC8JRlobIlEQBYIXwUOZkj0o14vZGcwhnVx/mp9814L/fKBUe3VBOUu:R/JiB

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • Mirko King FFlag Hack_41663868.exe (PID: 2064)
      • setup41663868.exe (PID: 1112)
    • Actions looks like stealing of personal data

      • setup41663868.exe (PID: 1112)
      • OfferInstaller.exe (PID: 632)
  • SUSPICIOUS

    • Reads settings of System Certificates

      • Mirko King FFlag Hack_41663868.exe (PID: 2064)
      • setup41663868.exe (PID: 1112)
      • OfferInstaller.exe (PID: 632)
    • Reads security settings of Internet Explorer

      • Mirko King FFlag Hack_41663868.exe (PID: 2064)
      • setup41663868.exe (PID: 1112)
    • Reads the Internet Settings

      • Mirko King FFlag Hack_41663868.exe (PID: 2064)
      • setup41663868.exe (PID: 1112)
      • OfferInstaller.exe (PID: 632)
      • setup41663868.exe (PID: 2304)
    • Checks Windows Trust Settings

      • Mirko King FFlag Hack_41663868.exe (PID: 2064)
      • setup41663868.exe (PID: 1112)
    • Executable content was dropped or overwritten

      • Mirko King FFlag Hack_41663868.exe (PID: 2064)
      • setup41663868.exe (PID: 1112)
    • Process drops legitimate windows executable

      • setup41663868.exe (PID: 1112)
    • The process drops C-runtime libraries

      • setup41663868.exe (PID: 1112)
    • Adds/modifies Windows certificates

      • setup41663868.exe (PID: 1112)
      • Mirko King FFlag Hack_41663868.exe (PID: 2064)
    • Reads the Windows owner or organization settings

      • setup41663868.exe (PID: 1112)
      • OfferInstaller.exe (PID: 632)
    • Searches for installed software

      • setup41663868.exe (PID: 1112)
    • Executing commands from a ".bat" file

      • setup41663868.exe (PID: 1112)
    • Starts CMD.EXE for commands execution

      • setup41663868.exe (PID: 1112)
    • Get information on the list of running processes

      • cmd.exe (PID: 1880)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 1880)
    • The process creates files with name similar to system file names

      • setup41663868.exe (PID: 1112)
  • INFO

    • Checks supported languages

      • Mirko King FFlag Hack_41663868.exe (PID: 2064)
      • setup41663868.exe (PID: 1112)
      • setup41663868.exe (PID: 2304)
      • OfferInstaller.exe (PID: 632)
    • Reads the computer name

      • Mirko King FFlag Hack_41663868.exe (PID: 2064)
      • setup41663868.exe (PID: 1112)
      • setup41663868.exe (PID: 2304)
      • OfferInstaller.exe (PID: 632)
    • Checks proxy server information

      • Mirko King FFlag Hack_41663868.exe (PID: 2064)
    • Reads the machine GUID from the registry

      • Mirko King FFlag Hack_41663868.exe (PID: 2064)
      • setup41663868.exe (PID: 1112)
      • OfferInstaller.exe (PID: 632)
      • setup41663868.exe (PID: 2304)
    • Creates files or folders in the user directory

      • Mirko King FFlag Hack_41663868.exe (PID: 2064)
      • setup41663868.exe (PID: 1112)
      • OfferInstaller.exe (PID: 632)
    • Create files in a temporary directory

      • setup41663868.exe (PID: 1112)
      • Mirko King FFlag Hack_41663868.exe (PID: 2064)
      • setup41663868.exe (PID: 2304)
      • OfferInstaller.exe (PID: 632)
    • Reads Environment values

      • setup41663868.exe (PID: 1112)
      • OfferInstaller.exe (PID: 632)
    • Reads product name

      • setup41663868.exe (PID: 1112)
      • OfferInstaller.exe (PID: 632)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:11:21 20:16:16+01:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.22
CodeSize: 4345344
InitializedDataSize: 5646336
UninitializedDataSize: -
EntryPoint: 0x39649e
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Unknown (0)
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileDescription: Download Manager
FileVersion: 1
InternalName: Download Manager
LegalCopyright: Download Manager
OriginalFileName: Download Manager
ProductName: Download Manager
ProductVersion: 1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
47
Monitored processes
9
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start mirko king fflag hack_41663868.exe setup41663868.exe setup41663868.exe no specs offerinstaller.exe cmd.exe no specs tasklist.exe no specs find.exe no specs timeout.exe no specs mirko king fflag hack_41663868.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
120"C:\Users\admin\AppData\Local\Temp\Mirko King FFlag Hack_41663868.exe" C:\Users\admin\AppData\Local\Temp\Mirko King FFlag Hack_41663868.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Download Manager
Exit code:
3221226540
Version:
1
Modules
Images
c:\users\admin\appdata\local\temp\mirko king fflag hack_41663868.exe
c:\windows\system32\ntdll.dll
632"C:\Users\admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\OfferInstaller.exe" C:\Users\admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\OfferInstaller.exe
setup41663868.exe
User:
admin
Company:
Adaware
Integrity Level:
HIGH
Description:
OfferInstaller
Exit code:
0
Version:
7.14.2.0
Modules
Images
c:\users\admin\appdata\local\temp\ec05d89197b949eb6957b79472e8723d\offerinstaller.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
1112C:\Users\admin\AppData\Local\setup41663868.exe hhwnd=196904 hreturntoinstaller hextras=id:5080562a968597f-DE-mlcMdC:\Users\admin\AppData\Local\setup41663868.exe
Mirko King FFlag Hack_41663868.exe
User:
admin
Company:
DT001
Integrity Level:
HIGH
Description:
Software Installation
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\setup41663868.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
1880C:\Windows\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\H2OCleanup.bat""C:\Windows\System32\cmd.exesetup41663868.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2064"C:\Users\admin\AppData\Local\Temp\Mirko King FFlag Hack_41663868.exe" C:\Users\admin\AppData\Local\Temp\Mirko King FFlag Hack_41663868.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
Download Manager
Exit code:
0
Version:
1
Modules
Images
c:\users\admin\appdata\local\temp\mirko king fflag hack_41663868.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2304C:\Users\admin\AppData\Local\setup41663868.exe hreadyC:\Users\admin\AppData\Local\setup41663868.exeMirko King FFlag Hack_41663868.exe
User:
admin
Company:
DT001
Integrity Level:
HIGH
Description:
Software Installation
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\setup41663868.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
2564find /I "1112"C:\Windows\System32\find.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (grep) Utility
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\find.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2576tasklist /FI "PID eq 1112" /fo csv C:\Windows\System32\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Lists the current running tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2580timeout 5C:\Windows\System32\timeout.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
timeout - pauses command processing
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\timeout.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
Total events
21 634
Read events
21 509
Write events
125
Delete events
0

Modification events

(PID) Process:(2064) Mirko King FFlag Hack_41663868.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2064) Mirko King FFlag Hack_41663868.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
460000005B010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(2064) Mirko King FFlag Hack_41663868.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2064) Mirko King FFlag Hack_41663868.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2064) Mirko King FFlag Hack_41663868.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2064) Mirko King FFlag Hack_41663868.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2064) Mirko King FFlag Hack_41663868.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2064) Mirko King FFlag Hack_41663868.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2064) Mirko King FFlag Hack_41663868.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(1112) setup41663868.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
Operation:writeName:PendingFileRenameOperations
Value:
\??\C:\Users\admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\ServiceHide.dll
Executable files
23
Suspicious files
19
Text files
20
Unknown types
1

Dropped files

PID
Process
Filename
Type
2064Mirko King FFlag Hack_41663868.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_45E3C223BCF135987E4038FB6B0DBA13der
MD5:037AE8164352CA91E80AD33054D1906D
SHA256:07C018EB07002663D5248DAA8A65EAF587955E3DB45735E7E3AC9CB13D7D664E
2064Mirko King FFlag Hack_41663868.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157compressed
MD5:1BFE591A4FE3D91B03CDF26EAACD8F89
SHA256:9CF94355051BF0F4A45724CA20D1CC02F76371B963AB7D1E38BD8997737B13D8
1112setup41663868.exeC:\Users\admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\Ninject.dllexecutable
MD5:8DB691813A26E7D0F1DB5E2F4D0D05E3
SHA256:3043A65F11AC204E65BCA142FF4166D85F1B22078B126B806F1FECB2A315C701
2064Mirko King FFlag Hack_41663868.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_45E3C223BCF135987E4038FB6B0DBA13binary
MD5:8DBC46968DE82A5912DFB1758069DDE7
SHA256:A5BAC71D6DC312BA6E5FD2077EFA3D4946A7AA710B126B4D8C0304EFAA2A7269
2064Mirko King FFlag Hack_41663868.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAder
MD5:671692CC3016E82E68EE15E50A58F190
SHA256:C83793D00D64CA92A3B1E9DE125C45076BB97FB94A62D20F39E7C5D683518504
2064Mirko King FFlag Hack_41663868.exeC:\Users\admin\AppData\Local\setup41663868.exeexecutable
MD5:29D3A70CEC060614E1691E64162A6C1E
SHA256:CC70B093A19610E9752794D757AEC9EF07CA862EA9267EC6F9CC92B2AA882C72
1112setup41663868.exeC:\Users\admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\vcruntime140.dllexecutable
MD5:1A84957B6E681FCA057160CD04E26B27
SHA256:9FAEAA45E8CC986AF56F28350B38238B03C01C355E9564B849604B8D690919C5
2064Mirko King FFlag Hack_41663868.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\service[1].htmtext
MD5:B14DE629C5AEF9DD2D56347BA30890CA
SHA256:A06F0BF0B8AAD9FF2C3C1BF764862242743DE5C1E3A862564C4509891F5D9913
2064Mirko King FFlag Hack_41663868.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FD77866BD0703438EB17E0F5BF93F412binary
MD5:54823D775A519805AF02AB58303AC94B
SHA256:EC56321E57648FEF2543A88393D50B54B6A114486D07A5E3BAF0DFFB0C61C967
1112setup41663868.exeC:\Users\admin\AppData\Local\Temp\ec05d89197b949eb6957b79472e8723d\GenericSetup.LastScreen.dllexecutable
MD5:6E001F8D0EE4F09A6673A9E8168836B6
SHA256:6A30F9C604C4012D1D2E1BA075213C378AFB1BFCB94276DE7995ED7BBF492859
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
31
DNS requests
20
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2064
Mirko King FFlag Hack_41663868.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?722ea6196f9e5944
unknown
compressed
4.66 Kb
unknown
2064
Mirko King FFlag Hack_41663868.exe
GET
200
142.250.185.163:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
binary
1.41 Kb
unknown
2064
Mirko King FFlag Hack_41663868.exe
GET
200
142.250.185.163:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIAjrICMzZli2TN25s%3D
unknown
binary
724 b
unknown
2064
Mirko King FFlag Hack_41663868.exe
GET
200
142.250.185.163:80
http://crls.pki.goog/gts1d4/EZ1B53EQ5b0.crl
unknown
binary
184 Kb
unknown
2064
Mirko King FFlag Hack_41663868.exe
GET
200
142.250.185.163:80
http://ocsp.pki.goog/s/gts1d4/tPVfSrt3g1k/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBSMBFDqU0NJQdZdEGU3bkhj0FoRrQQUJeIYDrJXkZQq5dRdhpCD3lOzuJICEQDASJ2qLaCI5xAFjJiGxx93
unknown
binary
472 b
unknown
2064
Mirko King FFlag Hack_41663868.exe
GET
200
142.250.185.163:80
http://ocsp.pki.goog/s/gts1d4/BLyg_-h63RA/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSMBFDqU0NJQdZdEGU3bkhj0FoRrQQUJeIYDrJXkZQq5dRdhpCD3lOzuJICEACRI2vGqzWlEof0zfA2Du0%3D
unknown
binary
471 b
unknown
2064
Mirko King FFlag Hack_41663868.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?15609a8d39a25569
unknown
compressed
65.2 Kb
unknown
2064
Mirko King FFlag Hack_41663868.exe
GET
200
69.192.161.44:80
http://x1.c.lencr.org/
unknown
binary
717 b
unknown
2064
Mirko King FFlag Hack_41663868.exe
GET
200
69.192.161.44:80
http://x2.c.lencr.org/
unknown
binary
300 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
2064
Mirko King FFlag Hack_41663868.exe
35.190.60.70:443
www.dlsft.com
GOOGLE
US
whitelisted
2064
Mirko King FFlag Hack_41663868.exe
93.184.221.240:80
ctldl.windowsupdate.com
EDGECAST
GB
whitelisted
2064
Mirko King FFlag Hack_41663868.exe
142.250.185.163:80
ocsp.pki.goog
GOOGLE
US
whitelisted
1112
setup41663868.exe
104.17.8.52:443
flow.lavasoft.com
CLOUDFLARENET
shared
1112
setup41663868.exe
104.18.68.73:443
sos.adaware.com
CLOUDFLARENET
unknown
2064
Mirko King FFlag Hack_41663868.exe
188.114.97.3:443
filedm.com
CLOUDFLARENET
NL
unknown
1112
setup41663868.exe
104.18.67.73:443
sos.adaware.com
CLOUDFLARENET
unknown

DNS requests

Domain
IP
Reputation
www.dlsft.com
  • 35.190.60.70
unknown
ctldl.windowsupdate.com
  • 93.184.221.240
whitelisted
ocsp.pki.goog
  • 142.250.185.163
whitelisted
crls.pki.goog
  • 142.250.185.163
whitelisted
www.google.com
  • 142.250.186.36
whitelisted
flow.lavasoft.com
  • 104.17.8.52
  • 104.17.9.52
whitelisted
sos.adaware.com
  • 104.18.68.73
  • 104.18.67.73
whitelisted
dlsft.com
  • 35.190.60.70
unknown
filedm.com
  • 188.114.97.3
  • 188.114.96.3
malicious
sdl.adaware.com
  • 104.18.67.73
  • 104.18.68.73
whitelisted

Threats

Found threats are available for the paid subscriptions
7 ETPRO signatures available at the full report
Process
Message
setup41663868.exe
setup41663868.exe
file:resources/tis/TranslateOfferTemplate.tis(82) : warning :'async' does not contain any 'await'
setup41663868.exe
setup41663868.exe
at sciter:init-script.tis
setup41663868.exe
Error: File not found - sciterwrapper:console.tis
setup41663868.exe
Error: File not found - sciterwrapper:console.tis
setup41663868.exe
setup41663868.exe
at sciter:init-script.tis
setup41663868.exe
setup41663868.exe
file:resources/tis/TranslateOfferTemplate.tis(82) : warning :'async' does not contain any 'await'