File name:

recoverit_setup_full4202.exe

Full analysis: https://app.any.run/tasks/0f3454ec-4040-4aad-8a59-4dd53b82a86d
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: May 27, 2024, 14:13:59
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

03A340DA7D377FDBBFFD2056FC413F93

SHA1:

F63796B71165946605053D4BD72A91AA46A4E31F

SHA256:

CF666257082DA6C03C204AFE5B95C401B469872666058D4E435E275A2E893F5E

SSDEEP:

98304:4Lfm2bvCbGlEqicJYJ0tuYKA68q8CEPubAConaLc:g

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • recoverit_setup_full4202.exe (PID: 4072)
      • recoverit_full4202.exe (PID: 2816)
      • WAFSetup.exe (PID: 3000)
      • WAFSetup.tmp (PID: 2800)
      • recoverit_full4202.tmp (PID: 952)
      • WsAppService.exe (PID: 3528)
    • Creates a writable file in the system directory

      • WAFSetup.tmp (PID: 2800)
    • Actions looks like stealing of personal data

      • WAFSetup.tmp (PID: 2800)
  • SUSPICIOUS

    • Reads the Internet Settings

      • recoverit_setup_full4202.exe (PID: 4072)
      • RegAsm.exe (PID: 3012)
      • RegAsm.exe (PID: 2736)
      • RegAsm.exe (PID: 3044)
      • RegAsm.exe (PID: 3100)
      • RegAsm.exe (PID: 3292)
      • RegAsm.exe (PID: 3592)
      • recoverit_full4202.tmp (PID: 952)
      • recoverit.exe (PID: 1680)
      • checkwaf.exe (PID: 1772)
      • diskfeedback.exe (PID: 1628)
      • WsAppClient.exe (PID: 2020)
    • Reads Microsoft Outlook installation path

      • recoverit_setup_full4202.exe (PID: 4072)
    • Reads security settings of Internet Explorer

      • recoverit_setup_full4202.exe (PID: 4072)
      • RegAsm.exe (PID: 3012)
      • RegAsm.exe (PID: 3044)
      • RegAsm.exe (PID: 2736)
      • RegAsm.exe (PID: 3100)
      • RegAsm.exe (PID: 3292)
      • RegAsm.exe (PID: 3592)
      • recoverit_full4202.tmp (PID: 952)
      • recoverit.exe (PID: 1680)
    • Executable content was dropped or overwritten

      • recoverit_setup_full4202.exe (PID: 4072)
      • recoverit_full4202.exe (PID: 2816)
      • recoverit_full4202.tmp (PID: 952)
      • WAFSetup.exe (PID: 3000)
      • WAFSetup.tmp (PID: 2800)
      • WsAppService.exe (PID: 3528)
    • Likely accesses (executes) a file from the Public directory

      • NFWCHK.exe (PID: 372)
      • recoverit_full4202.tmp (PID: 952)
      • recoverit_full4202.exe (PID: 2816)
    • Reads Internet Explorer settings

      • recoverit_setup_full4202.exe (PID: 4072)
    • Connects to unusual port

      • recoverit_setup_full4202.exe (PID: 4072)
    • Reads settings of System Certificates

      • recoverit_setup_full4202.exe (PID: 4072)
      • RegAsm.exe (PID: 3292)
      • recoverit_full4202.tmp (PID: 952)
    • Checks Windows Trust Settings

      • recoverit_setup_full4202.exe (PID: 4072)
      • RegAsm.exe (PID: 3292)
    • Process requests binary or script from the Internet

      • recoverit_setup_full4202.exe (PID: 4072)
    • Reads the Windows owner or organization settings

      • recoverit_full4202.tmp (PID: 952)
      • WAFSetup.tmp (PID: 2800)
    • Process drops legitimate windows executable

      • recoverit_full4202.tmp (PID: 952)
      • WAFSetup.tmp (PID: 2800)
    • The process drops C-runtime libraries

      • recoverit_full4202.tmp (PID: 952)
    • Adds/modifies Windows certificates

      • RegAsm.exe (PID: 3292)
    • Searches for installed software

      • RegAsm.exe (PID: 3292)
      • WsAppService.exe (PID: 3528)
    • Executes as Windows Service

      • WsAppService.exe (PID: 3528)
    • Creates/Modifies COM task schedule object

      • RegAsm.exe (PID: 3292)
      • RegAsm.exe (PID: 3592)
    • Creates or modifies Windows services

      • WAFSetup.tmp (PID: 2800)
  • INFO

    • Checks supported languages

      • recoverit_setup_full4202.exe (PID: 4072)
      • NFWCHK.exe (PID: 372)
      • wmpnscfg.exe (PID: 660)
      • recoverit_full4202.exe (PID: 2816)
      • recoverit_full4202.tmp (PID: 952)
      • WAFSetup.exe (PID: 3000)
      • WAFSetup.tmp (PID: 2800)
      • RegAsm.exe (PID: 3012)
      • RegAsm.exe (PID: 3044)
      • RegAsm.exe (PID: 2736)
      • RegAsm.exe (PID: 3100)
      • RegAsm.exe (PID: 3292)
      • WsAppService.exe (PID: 3528)
      • RegAsm.exe (PID: 3592)
      • recoverit.exe (PID: 1680)
      • checkwaf.exe (PID: 1772)
      • diskfeedback.exe (PID: 1628)
      • WsAppClient.exe (PID: 2020)
      • DiskAnalyzer.exe (PID: 2260)
      • wget.exe (PID: 2908)
    • Reads the computer name

      • recoverit_setup_full4202.exe (PID: 4072)
      • NFWCHK.exe (PID: 372)
      • wmpnscfg.exe (PID: 660)
      • recoverit_full4202.tmp (PID: 952)
      • WAFSetup.tmp (PID: 2800)
      • RegAsm.exe (PID: 3012)
      • RegAsm.exe (PID: 3044)
      • RegAsm.exe (PID: 2736)
      • RegAsm.exe (PID: 3100)
      • RegAsm.exe (PID: 3292)
      • RegAsm.exe (PID: 3592)
      • WsAppService.exe (PID: 3528)
      • recoverit.exe (PID: 1680)
      • DiskAnalyzer.exe (PID: 2260)
      • WsAppClient.exe (PID: 2020)
      • checkwaf.exe (PID: 1772)
      • diskfeedback.exe (PID: 1628)
      • wget.exe (PID: 2908)
    • Reads the machine GUID from the registry

      • recoverit_setup_full4202.exe (PID: 4072)
      • NFWCHK.exe (PID: 372)
      • RegAsm.exe (PID: 3012)
      • RegAsm.exe (PID: 3044)
      • RegAsm.exe (PID: 3100)
      • RegAsm.exe (PID: 2736)
      • RegAsm.exe (PID: 3292)
      • RegAsm.exe (PID: 3592)
      • WsAppService.exe (PID: 3528)
      • recoverit_full4202.tmp (PID: 952)
      • diskfeedback.exe (PID: 1628)
      • checkwaf.exe (PID: 1772)
      • DiskAnalyzer.exe (PID: 2260)
      • WsAppClient.exe (PID: 2020)
      • recoverit.exe (PID: 1680)
    • Checks proxy server information

      • recoverit_setup_full4202.exe (PID: 4072)
      • RegAsm.exe (PID: 3292)
      • WsAppService.exe (PID: 3528)
    • Create files in a temporary directory

      • recoverit_setup_full4202.exe (PID: 4072)
      • recoverit_full4202.exe (PID: 2816)
      • recoverit_full4202.tmp (PID: 952)
      • WAFSetup.exe (PID: 3000)
      • WAFSetup.tmp (PID: 2800)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 660)
      • explorer.exe (PID: 2240)
    • Creates files or folders in the user directory

      • recoverit_setup_full4202.exe (PID: 4072)
      • recoverit_full4202.tmp (PID: 952)
    • Reads the software policy settings

      • recoverit_setup_full4202.exe (PID: 4072)
      • RegAsm.exe (PID: 3292)
      • recoverit_full4202.tmp (PID: 952)
    • Creates files in the program directory

      • recoverit_full4202.tmp (PID: 952)
      • WAFSetup.tmp (PID: 2800)
      • recoverit_setup_full4202.exe (PID: 4072)
      • RegAsm.exe (PID: 3100)
      • RegAsm.exe (PID: 3292)
      • WsAppService.exe (PID: 3528)
      • RegAsm.exe (PID: 3592)
      • recoverit.exe (PID: 1680)
      • DiskAnalyzer.exe (PID: 2260)
      • WsAppClient.exe (PID: 2020)
      • wget.exe (PID: 2908)
      • checkwaf.exe (PID: 1772)
    • Creates a software uninstall entry

      • recoverit_full4202.tmp (PID: 952)
    • Reads Environment values

      • RegAsm.exe (PID: 3292)
      • WsAppService.exe (PID: 3528)
      • checkwaf.exe (PID: 1772)
      • WsAppClient.exe (PID: 2020)
      • diskfeedback.exe (PID: 1628)
      • recoverit.exe (PID: 1680)
    • Disables trace logs

      • RegAsm.exe (PID: 3292)
      • WsAppService.exe (PID: 3528)
      • checkwaf.exe (PID: 1772)
      • diskfeedback.exe (PID: 1628)
      • recoverit.exe (PID: 1680)
      • WsAppClient.exe (PID: 2020)
    • Application launched itself

      • chrome.exe (PID: 1112)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (16.3)
.exe | Win64 Executable (generic) (14.5)
.dll | Win32 Dynamic Link Library (generic) (3.4)
.exe | Win32 Executable (generic) (2.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:02:06 01:56:18+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 12
CodeSize: 1279488
InitializedDataSize: 749568
UninitializedDataSize: -
EntryPoint: 0x106a90
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 4.0.4.20
ProductVersionNumber: 4.0.4.20
FileFlagsMask: 0x0017
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileDescription: recoverit_setup_full4202.exe
FileVersion: 4.0.4.20
LegalCopyright: Copyright©2024 Wondershare. All rights reserved.
ProductName: Recoverit
ProductVersion: 12.0.22
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
99
Monitored processes
36
Malicious processes
8
Suspicious processes
1

Behavior graph

Click at the process to see the details
start recoverit_setup_full4202.exe nfwchk.exe no specs wmpnscfg.exe no specs explorer.exe no specs recoverit_full4202.exe recoverit_full4202.tmp wafsetup.exe wafsetup.tmp regasm.exe no specs regasm.exe regasm.exe regasm.exe no specs regasm.exe regasm.exe no specs wsappservice.exe recoverit.exe chrome.exe chrome.exe no specs checkwaf.exe diskfeedback.exe diskanalyzer.exe no specs wsappclient.exe chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs wget.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs recoverit_setup_full4202.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
372C:\Users\Public\Documents\Wondershare\NFWCHK.exeC:\Users\Public\Documents\Wondershare\NFWCHK.exerecoverit_setup_full4202.exe
User:
admin
Company:
Wondershare
Integrity Level:
HIGH
Description:
.NET Framework Checker
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\public\documents\wondershare\nfwchk.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
660"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
952"C:\Users\admin\AppData\Local\Temp\is-PJP4Q.tmp\recoverit_full4202.tmp" /SL5="$201E6,38057375,154112,C:\Users\Public\Documents\Wondershare\recoverit_full4202.exe" /VERYSILENT /NOPAGE /LANG=ENG /LOG="C:\Users\admin\AppData\Local\Temp\WAE-Recoverit.log" /installpath: "C:\Program Files\Wondershare\Recoverit\" /DIR="C:\Program Files\Wondershare\Recoverit\" /WAEWIN=2012A /PID=4202C:\Users\admin\AppData\Local\Temp\is-PJP4Q.tmp\recoverit_full4202.tmp
recoverit_full4202.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-pjp4q.tmp\recoverit_full4202.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
1112"C:\Program Files\Google\Chrome\Application\chrome.exe" http://cbs.wondershare.net/go.php?m=ic&back_url=https%3A%2F%2Frecoverit.wondershare.net%2Fes%2Fthankyou%2Finstall-recoverit.html%3Ff%3Dpro-drwin&client_sign={C4BA3647-FBFF-0005-06E3-12A9866C77DE}&m_nProductID=4202&installtime=1716819355&product_version=7.3.2.3C:\Program Files\Google\Chrome\Application\chrome.exe
recoverit_setup_full4202.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1288"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2140 --field-trial-handle=1128,i,12822685639989749851,1750040022139821104,131072 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1556"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=2136 --field-trial-handle=1128,i,12822685639989749851,1750040022139821104,131072 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1628"C:\Program Files\Wondershare\Recoverit\diskfeedback.exe" -G TestC:\Program Files\Wondershare\Recoverit\diskfeedback.exe
recoverit.exe
User:
admin
Company:
Microsoft
Integrity Level:
HIGH
Description:
diskfeedback
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\program files\wondershare\recoverit\diskfeedback.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1680"C:\Program Files\Wondershare\Recoverit\recoverit.exe" admin_runC:\Program Files\Wondershare\Recoverit\recoverit.exe
recoverit_setup_full4202.exe
User:
admin
Integrity Level:
HIGH
Description:
Wondershare Recoverit
Version:
7.3.2.3
Modules
Images
c:\program files\wondershare\recoverit\recoverit.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\wondershare\recoverit\qt5core.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
1772"C:\Program Files\Wondershare\Recoverit\checkwaf.exe" C:\Program Files\Wondershare\Recoverit\checkwaf.exe
recoverit.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\program files\wondershare\recoverit\checkwaf.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\wondershare\recoverit\qt5core.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
1928"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --disable-quic --mojo-platform-channel-handle=1292 --field-trial-handle=1128,i,12822685639989749851,1750040022139821104,131072 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
Total events
32 830
Read events
32 007
Write events
768
Delete events
55

Modification events

(PID) Process:(4072) recoverit_setup_full4202.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WafCX
Operation:writeName:4202
Value:
sku-ppc
(PID) Process:(4072) recoverit_setup_full4202.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Wondershare\Wondershare Helper Compact
Operation:writeName:ClientSign
Value:
{d869f165-b589-47cd-99ba-e9c93c70dd2dG}
(PID) Process:(4072) recoverit_setup_full4202.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Wondershare\WAF
Operation:writeName:ClientSign
Value:
{d869f165-b589-47cd-99ba-e9c93c70dd2dG}
(PID) Process:(4072) recoverit_setup_full4202.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(4072) recoverit_setup_full4202.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(4072) recoverit_setup_full4202.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(4072) recoverit_setup_full4202.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(4072) recoverit_setup_full4202.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(4072) recoverit_setup_full4202.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(4072) recoverit_setup_full4202.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
200
Suspicious files
169
Text files
282
Unknown types
8

Dropped files

PID
Process
Filename
Type
4072recoverit_setup_full4202.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:28EBF167055306246DEE1D84E51C43FF
SHA256:01B0CE07A6677E6CB7E02C2A299E2543D5B6AC0D40A3751B1BB81ECD3009F2E3
4072recoverit_setup_full4202.exeC:\Users\Public\Documents\Wondershare\NFWCHK.exeexecutable
MD5:27CFB3990872CAA5930FA69D57AEFE7B
SHA256:43881549228975C7506B050BCE4D9B671412D3CDC08C7516C9DBBB7F50C25146
4072recoverit_setup_full4202.exeC:\Users\Public\Documents\Wondershare\WAE_DOWNTASK_4202.xmlxml
MD5:C15E9FD55D1ABC9C58726BCF1510494E
SHA256:4805296C89D1249BE3478986F2E8829545D373C97ADE9CA7C1BDCB48540DE140
4072recoverit_setup_full4202.exeC:\Users\admin\AppData\Local\Temp\Wondershare\WAE\wsWAE.logtext
MD5:DDCCAF6DAD5EF6819765B84B5F2C31CE
SHA256:75FCDEC6951820D7809C8D86C87EA9A8A514EC6166B92C76CB8ECD4278118823
4072recoverit_setup_full4202.exeC:\Users\Public\Documents\Wondershare\NFWCHK.exe.configxml
MD5:5BABF2A106C883A8E216F768DB99AD51
SHA256:9E676A617EB0D0535AC05A67C0AE0C0E12D4E998AB55AC786A031BFC25E28300
4072recoverit_setup_full4202.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_23FFFDCAABB8E63694AD1202ED02BF57binary
MD5:DE2A7E3AD1A93D40878E8EB7391E7D4C
SHA256:1F67922ACA1F8CA1FB02DC06BC701C24EBBFDD9006A239588D9444E46B26518D
4072recoverit_setup_full4202.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\14561BF7422BB6F70A9CB14F5AA8A7DA_6D5FC9FD3617659722A64D73A114DFF7binary
MD5:7781C0EBC1EC236B02E67F15D4034F59
SHA256:77845E09AA68B46AF7C45EBC659BAD18A5FEF64914999AD388CAE49FC3579174
4072recoverit_setup_full4202.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\index-new[1].htmhtml
MD5:C746C6BE119CAEA032C03B5B7A45106F
SHA256:95AF9F51F2282B2414336D1AD7547CB32813310827597941FE66E6FE445CF8F0
4072recoverit_setup_full4202.exeC:\Users\Public\Documents\Wondershare\recoverit_full4202.exe.~P2S
MD5:
SHA256:
4072recoverit_setup_full4202.exeC:\Users\Public\Documents\Wondershare\recoverit_full4202.exe
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
65
TCP/UDP connections
146
DNS requests
134
Threats
16

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4072
recoverit_setup_full4202.exe
GET
8.209.73.211:80
http://platform.wondershare.cc/rest/v2/downloader/runtime/?client_sign={d869f165-b589-47cd-99ba-e9c93c70dd2dG}&product_id=4202&wae=4.0.4&platform=win_x86
unknown
unknown
4072
recoverit_setup_full4202.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQlOydjtpho0%2Bholo77zGjGxETUEQQU8JyF%2FaKffY%2FJaLvV1IlNHb7TkP8CEA3EQd5SLWy5mr7JXcu5TKw%3D
unknown
unknown
4072
recoverit_setup_full4202.exe
GET
23.56.238.90:80
http://download.wondershare.net/cbs_down/recoverit_full4202.exe
unknown
unknown
4072
recoverit_setup_full4202.exe
HEAD
200
23.56.238.91:80
http://download.wondershare.net/cbs_down/recoverit_full4202.exe
unknown
unknown
4072
recoverit_setup_full4202.exe
GET
200
142.250.181.227:80
http://c.pki.goog/r/r1.crl
unknown
unknown
4072
recoverit_setup_full4202.exe
GET
200
142.250.181.227:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
unknown
4072
recoverit_setup_full4202.exe
GET
206
23.56.238.91:80
http://download.wondershare.net/cbs_down/recoverit_full4202.exe
unknown
unknown
4072
recoverit_setup_full4202.exe
GET
200
142.250.181.227:80
http://o.pki.goog/wr2/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRTQtSEi8EX%2BbYUTXd8%2ByMxD3s1zQQU3hse7XkV1D43JMMhu%2Bw0OW1CsjACEQDcoc6fqZ4zlBD%2FfhdqltwL
unknown
unknown
4072
recoverit_setup_full4202.exe
GET
23.56.238.91:80
http://download.wondershare.net/cbs_down/recoverit_full4202.exe
unknown
unknown
4072
recoverit_setup_full4202.exe
GET
200
142.250.181.227:80
http://o.pki.goog/wr2/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRTQtSEi8EX%2BbYUTXd8%2ByMxD3s1zQQU3hse7XkV1D43JMMhu%2Bw0OW1CsjACEQCQcQ4QWW%2BJahKAwoVwd4m6
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
224.0.0.252:5355
unknown
1088
svchost.exe
224.0.0.252:5355
unknown
4072
recoverit_setup_full4202.exe
8.209.72.213:443
pc-api.wondershare.cc
Alibaba US Technology Co., Ltd.
DE
unknown
4072
recoverit_setup_full4202.exe
8.209.73.211:80
platform.wondershare.cc
Alibaba US Technology Co., Ltd.
DE
unknown
4072
recoverit_setup_full4202.exe
47.91.89.51:443
prod-web.wondershare.cc
Alibaba US Technology Co., Ltd.
DE
unknown
4072
recoverit_setup_full4202.exe
23.56.238.90:80
download.wondershare.net
Akamai International B.V.
GB
unknown
4072
recoverit_setup_full4202.exe
47.91.90.244:8106
analytics.wondershare.cc
Alibaba US Technology Co., Ltd.
DE
unknown
4072
recoverit_setup_full4202.exe
163.181.92.243:443
wae.wondershare.cc
Zhejiang Taobao Network Co.,Ltd
DE
unknown

DNS requests

Domain
IP
Reputation
pc-api.wondershare.cc
  • 8.209.72.213
malicious
platform.wondershare.cc
  • 8.209.73.211
unknown
prod-web.wondershare.cc
  • 47.91.89.51
unknown
download.wondershare.net
  • 23.56.238.90
  • 23.56.238.91
whitelisted
analytics.wondershare.cc
  • 47.91.90.244
unknown
wae.wondershare.cc
  • 163.181.92.243
  • 163.181.92.246
  • 163.181.92.226
  • 163.181.92.225
  • 163.181.92.250
  • 163.181.92.241
  • 163.181.92.245
  • 163.181.92.249
unknown
ctldl.windowsupdate.com
  • 199.232.214.172
  • 199.232.210.172
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
fonts.googleapis.com
  • 142.250.186.170
  • 142.250.184.202
whitelisted
ocsp.pki.goog
  • 142.250.181.227
whitelisted

Threats

PID
Process
Class
Message
1088
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
1088
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
1088
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
1088
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
1088
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Potentially Bad Traffic
ET DNS Query for .cc TLD
1088
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
1928
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] jQuery JavaScript Library Code Loaded (code.jquery .com)
4 ETPRO signatures available at the full report
Process
Message
RegAsm.exe
Cannot delete a subkey tree because the subkey does not exist.
RegAsm.exe
Cannot delete a subkey tree because the subkey does not exist.
RegAsm.exe
Cannot delete a subkey tree because the subkey does not exist.
RegAsm.exe
Cannot delete a subkey tree because the subkey does not exist.
RegAsm.exe
Cannot delete a subkey tree because the subkey does not exist.
RegAsm.exe
Cannot delete a subkey tree because the subkey does not exist.
RegAsm.exe
Cannot delete a subkey tree because the subkey does not exist.
RegAsm.exe
Cannot delete a subkey tree because the subkey does not exist.
RegAsm.exe
Cannot delete a subkey tree because the subkey does not exist.
RegAsm.exe
Cannot delete a subkey tree because the subkey does not exist.