File name:

df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb

Full analysis: https://app.any.run/tasks/e000c764-9391-4060-9c58-c247d0be2732
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: December 13, 2024, 20:53:42
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
floxif
upx
loader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

BFBF6C7D85EBA973BA534E5ABFED2CDC

SHA1:

DC829AE5633C951A06B9BC803CCC407864C1104A

SHA256:

DF2F5EB2CAAC30A6E7824DE01EF12B96332AF567BDCEFC399B8899395260CEEB

SSDEEP:

49152:voloCnjPSBJYEJQxw4MjRekzULlPGiy22wCl66EMHp+crRf121AaOhWqvdfzb+2d:g+6zGnrXyGd46EMHQCf12KW8fzC2SLSZ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exe (PID: 3260)
      • GoogleUpdateSetup.exe (PID: 2084)
    • FLOXIF has been detected (SURICATA)

      • df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exe (PID: 3260)
      • GoogleUpdateSetup.exe (PID: 2084)
    • Connects to the CnC server

      • df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exe (PID: 3260)
      • GoogleUpdateSetup.exe (PID: 2084)
    • Changes the autorun value in the registry

      • setup.exe (PID: 5304)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exe (PID: 3260)
      • GoogleUpdateSetup.exe (PID: 2084)
      • 131.0.6778.140_chrome_installer.exe (PID: 5112)
      • setup.exe (PID: 5304)
    • Process drops legitimate windows executable

      • df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exe (PID: 3260)
      • GoogleUpdateSetup.exe (PID: 2084)
    • Reads security settings of Internet Explorer

      • GoogleUpdate.exe (PID: 4328)
      • df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exe (PID: 3260)
      • GoogleUpdate.exe (PID: 5540)
      • GoogleUpdate.exe (PID: 4320)
    • Contacting a server suspected of hosting an CnC

      • df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exe (PID: 3260)
      • GoogleUpdateSetup.exe (PID: 2084)
    • Process requests binary or script from the Internet

      • svchost.exe (PID: 5316)
    • Potential Corporate Privacy Violation

      • svchost.exe (PID: 5316)
    • Application launched itself

      • setup.exe (PID: 5304)
      • setup.exe (PID: 5536)
      • GoogleUpdate.exe (PID: 4320)
  • INFO

    • Checks supported languages

      • df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exe (PID: 3260)
      • GoogleUpdate.exe (PID: 4328)
      • GoogleUpdateSetup.exe (PID: 2084)
      • GoogleUpdate.exe (PID: 5032)
      • GoogleUpdate.exe (PID: 5540)
      • GoogleUpdate.exe (PID: 4468)
      • GoogleUpdate.exe (PID: 4320)
      • setup.exe (PID: 5200)
      • GoogleUpdate.exe (PID: 1612)
      • setup.exe (PID: 5536)
      • GoogleUpdate.exe (PID: 2440)
    • Reads the computer name

      • df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exe (PID: 3260)
      • GoogleUpdate.exe (PID: 4328)
      • GoogleUpdateSetup.exe (PID: 2084)
      • GoogleUpdate.exe (PID: 5540)
      • GoogleUpdate.exe (PID: 5032)
      • GoogleUpdate.exe (PID: 4468)
      • GoogleUpdate.exe (PID: 4320)
      • setup.exe (PID: 5304)
    • The sample compiled with bulgarian language support

      • df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exe (PID: 3260)
      • GoogleUpdateSetup.exe (PID: 2084)
    • The sample compiled with Indonesian language support

      • df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exe (PID: 3260)
    • The sample compiled with slovak language support

      • df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exe (PID: 3260)
      • GoogleUpdateSetup.exe (PID: 2084)
    • The sample compiled with french language support

      • df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exe (PID: 3260)
      • GoogleUpdateSetup.exe (PID: 2084)
    • The sample compiled with Italian language support

      • df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exe (PID: 3260)
      • GoogleUpdateSetup.exe (PID: 2084)
    • The sample compiled with arabic language support

      • df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exe (PID: 3260)
      • GoogleUpdateSetup.exe (PID: 2084)
    • The sample compiled with czech language support

      • df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exe (PID: 3260)
      • GoogleUpdateSetup.exe (PID: 2084)
    • The sample compiled with english language support

      • df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exe (PID: 3260)
      • GoogleUpdateSetup.exe (PID: 2084)
      • 131.0.6778.140_chrome_installer.exe (PID: 5112)
      • svchost.exe (PID: 5316)
      • setup.exe (PID: 5304)
    • Create files in a temporary directory

      • df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exe (PID: 3260)
      • svchost.exe (PID: 5316)
      • GoogleUpdate.exe (PID: 4320)
    • The sample compiled with turkish language support

      • df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exe (PID: 3260)
      • GoogleUpdateSetup.exe (PID: 2084)
    • Checks proxy server information

      • df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exe (PID: 3260)
      • GoogleUpdateSetup.exe (PID: 2084)
      • GoogleUpdate.exe (PID: 4468)
      • GoogleUpdate.exe (PID: 4320)
    • The sample compiled with german language support

      • GoogleUpdateSetup.exe (PID: 2084)
    • The sample compiled with japanese language support

      • GoogleUpdateSetup.exe (PID: 2084)
    • The sample compiled with chinese language support

      • GoogleUpdateSetup.exe (PID: 2084)
    • Process checks computer location settings

      • GoogleUpdate.exe (PID: 5540)
    • Reads the software policy settings

      • GoogleUpdate.exe (PID: 4320)
      • GoogleUpdate.exe (PID: 4468)
    • Creates files or folders in the user directory

      • GoogleUpdate.exe (PID: 4320)
    • UPX packer has been detected

      • df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exe (PID: 3260)
      • GoogleUpdateSetup.exe (PID: 2084)
    • Creates files in the program directory

      • GoogleUpdateSetup.exe (PID: 2084)
      • 131.0.6778.140_chrome_installer.exe (PID: 5112)
      • setup.exe (PID: 5304)
      • GoogleUpdate.exe (PID: 4320)
      • setup.exe (PID: 5536)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (76.4)
.exe | Win32 Executable (generic) (12.4)
.exe | Generic Win/DOS Executable (5.5)
.exe | DOS Executable Generic (5.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:04:05 01:58:14+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.2
CodeSize: 95232
InitializedDataSize: 1292288
UninitializedDataSize: -
EntryPoint: 0x4f0e
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 1.3.36.132
ProductVersionNumber: 1.3.36.132
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Google LLC
FileDescription: Google Update Setup
FileVersion: 1.3.36.132
InternalName: Google Update Setup
LegalCopyright: Copyright 2018 Google LLC
OriginalFileName: GoogleUpdateSetup.exe
ProductName: Google Update
ProductVersion: 1.3.36.132
LanguageId: en
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
133
Monitored processes
16
Malicious processes
7
Suspicious processes
1

Behavior graph

Click at the process to see the details
start #FLOXIF df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exe googleupdate.exe no specs #FLOXIF googleupdatesetup.exe googleupdate.exe no specs googleupdate.exe no specs googleupdate.exe googleupdate.exe svchost.exe 131.0.6778.140_chrome_installer.exe setup.exe setup.exe no specs setup.exe no specs setup.exe no specs googleupdate.exe no specs googleupdateondemand.exe no specs googleupdate.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3260"C:\Users\admin\Desktop\df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exe" C:\Users\admin\Desktop\df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Update Setup
Version:
1.3.36.132
Modules
Images
c:\users\admin\desktop\df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
4328C:\Users\admin\AppData\Local\Temp\GUM690E.tmp\GoogleUpdate.exe /installsource taggedmi /install "appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={447CFD79-60DA-9EF5-B3E5-137254EEC2F9}&lang=ko&browser=5&usagestats=1&appname=Google%20Chrome&needsadmin=prefers&ap=x64-stable-statsdef_1&installdataindex=empty"C:\Users\admin\AppData\Local\Temp\GUM690E.tmp\GoogleUpdate.exedf2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Installer
Version:
1.3.36.131
Modules
Images
c:\users\admin\appdata\local\temp\gum690e.tmp\googleupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
2084"C:\Users\admin\AppData\Local\Temp\GUM690E.tmp\GoogleUpdateSetup.exe" /installsource taggedmi /install "appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={447CFD79-60DA-9EF5-B3E5-137254EEC2F9}&lang=ko&browser=5&usagestats=1&appname=Google%20Chrome&needsadmin=prefers&ap=x64-stable-statsdef_1&installdataindex=empty" /installelevated /nomitagC:\Users\admin\AppData\Local\Temp\GUM690E.tmp\GoogleUpdateSetup.exe
GoogleUpdate.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Update Setup
Version:
1.3.36.132
Modules
Images
c:\users\admin\appdata\local\temp\gum690e.tmp\googleupdatesetup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
5540"C:\Program Files (x86)\Google\Temp\GUM71E7.tmp\GoogleUpdate.exe" /installsource taggedmi /install "appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={447CFD79-60DA-9EF5-B3E5-137254EEC2F9}&lang=ko&browser=5&usagestats=1&appname=Google%20Chrome&needsadmin=prefers&ap=x64-stable-statsdef_1&installdataindex=empty" /installelevatedC:\Program Files (x86)\Google\Temp\GUM71E7.tmp\GoogleUpdate.exeGoogleUpdateSetup.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Installer
Version:
1.3.36.131
Modules
Images
c:\program files (x86)\google\temp\gum71e7.tmp\googleupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
5032"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /healthcheckC:\Program Files (x86)\Google\Update\GoogleUpdate.exeGoogleUpdate.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Installer
Exit code:
0
Version:
1.3.36.51
Modules
Images
c:\program files (x86)\google\update\googleupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
4468"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ping 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:\Program Files (x86)\Google\Update\GoogleUpdate.exe
GoogleUpdate.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Installer
Exit code:
0
Version:
1.3.36.51
Modules
Images
c:\program files (x86)\google\update\googleupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
4320"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /handoff "appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={447CFD79-60DA-9EF5-B3E5-137254EEC2F9}&lang=ko&browser=5&usagestats=1&appname=Google%20Chrome&needsadmin=prefers&ap=x64-stable-statsdef_1&installdataindex=empty" /installsource taggedmi /sessionid "{AA709F63-6DE3-499A-9BA0-9F800F38B593}"C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
GoogleUpdate.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Installer
Version:
1.3.36.51
Modules
Images
c:\program files (x86)\google\update\googleupdate.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
5316C:\WINDOWS\System32\svchost.exe -k netsvcs -p -s BITSC:\Windows\System32\svchost.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
5112"C:\Program Files (x86)\Google\Update\Install\{AADD6058-945F-4071-8574-A4B13F8D3EE6}\131.0.6778.140_chrome_installer.exe" --verbose-logging --do-not-launch-chrome --channel=stable --system-level /installerdata="C:\Program Files (x86)\Google\Update\Install\{AADD6058-945F-4071-8574-A4B13F8D3EE6}\gui8A7D.tmp"C:\Program Files (x86)\Google\Update\Install\{AADD6058-945F-4071-8574-A4B13F8D3EE6}\131.0.6778.140_chrome_installer.exe
GoogleUpdate.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome Installer
Exit code:
0
Version:
131.0.6778.140
Modules
Images
c:\program files (x86)\google\update\install\{aadd6058-945f-4071-8574-a4b13f8d3ee6}\131.0.6778.140_chrome_installer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
5304"C:\Program Files (x86)\Google\Update\Install\{AADD6058-945F-4071-8574-A4B13F8D3EE6}\CR_D0F81.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Google\Update\Install\{AADD6058-945F-4071-8574-A4B13F8D3EE6}\CR_D0F81.tmp\CHROME.PACKED.7Z" --verbose-logging --do-not-launch-chrome --channel=stable --system-level /installerdata="C:\Program Files (x86)\Google\Update\Install\{AADD6058-945F-4071-8574-A4B13F8D3EE6}\gui8A7D.tmp"C:\Program Files (x86)\Google\Update\Install\{AADD6058-945F-4071-8574-A4B13F8D3EE6}\CR_D0F81.tmp\setup.exe
131.0.6778.140_chrome_installer.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome Installer
Exit code:
0
Version:
131.0.6778.140
Modules
Images
c:\program files (x86)\google\update\install\{aadd6058-945f-4071-8574-a4b13f8d3ee6}\cr_d0f81.tmp\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\acgenral.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
15 758
Read events
13 285
Write events
2 458
Delete events
15

Modification events

(PID) Process:(4328) GoogleUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Update
Operation:delete valueName:uid
Value:
(PID) Process:(4328) GoogleUpdate.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Update
Operation:delete valueName:old-uid
Value:
(PID) Process:(3260) df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(3260) df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3260) df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2084) GoogleUpdateSetup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2084) GoogleUpdateSetup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2084) GoogleUpdateSetup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(5540) GoogleUpdate.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:delete valueName:usagestats
Value:
(PID) Process:(5032) GoogleUpdate.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\uid
Operation:writeName:GPd4b5bu
Value:
Executable files
154
Suspicious files
11
Text files
8
Unknown types
0

Dropped files

PID
Process
Filename
Type
3260df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exeC:\Users\admin\AppData\Local\Temp\GUM690E.tmp\GoogleUpdateOnDemand.exeexecutable
MD5:9A4BC642B8FEC86C9F75619B7B58DE7B
SHA256:E567AC44B9FE3E1F7E90B39E2DC8FF2F31640509E208D8C1A7690D55ECB81EC1
3260df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exeC:\Users\admin\AppData\Local\Temp\GUM690E.tmp\goopdateres_bg.dllexecutable
MD5:DB8908B6627859104BFCA1E777743B25
SHA256:BB6569AD79623EED5F042982C2FE2808D8A9CD2B85B98D9BD0A0CF8999C31EBA
3260df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exeC:\Users\admin\AppData\Local\Temp\GUM690E.tmp\GoogleUpdate.exeexecutable
MD5:E885BF92C289C674CD32F3E85AB2B922
SHA256:63854E78780866D2AE56A58958A1FDA017A71F54B71FE70CF5403958E961862A
3260df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exeC:\Users\admin\AppData\Local\Temp\GUM690E.tmp\GoogleUpdateCore.exeexecutable
MD5:2C6849CCA1783F20415A54FF80BD6A82
SHA256:EAE6D2053A0F4EA3AF887C9244770D31CBACAB69F165D4AC5FA49B619F0D6BC3
3260df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exeC:\Users\admin\AppData\Local\Temp\GUM690E.tmp\GoogleCrashHandler.exeexecutable
MD5:B6B844CBA41F7C190A001941A9A34E9A
SHA256:03E91A5144AB49E6A39DF0D920987E718FD36F8D5CA34E243506025E8DA1DB78
3260df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exeC:\Users\admin\AppData\Local\Temp\GUM690E.tmp\GoogleUpdateBroker.exeexecutable
MD5:4B2EED3642582E2CCF7D9B928C1CC9E1
SHA256:D17CA7125ADAEC0F1DD2553A4F4409D942BFE0C22BAFF08AAAD7FC8A76BEB5A2
3260df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exeC:\Users\admin\AppData\Local\Temp\GUM690E.tmp\psuser_64.dllexecutable
MD5:D84541C48B2E69EE9B6B6553F4D34507
SHA256:4A0CF52297CB8BE3BB84AE0969483CD4A9EAC58AEC89394094579EE95DFEA79D
3260df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exeC:\Users\admin\AppData\Local\Temp\GUM690E.tmp\goopdateres_bn.dllexecutable
MD5:949AAE7ECDE2E0D1EC1E78E925DD86AD
SHA256:ADC617B5E3E647355E47006D5B9A130341323C1345FADD25EE880BBA89EB95D3
3260df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exeC:\Users\admin\AppData\Local\Temp\GUM690E.tmp\psmachine.dllexecutable
MD5:4AE48B9B9E2ED8F7079D07DBB13813E1
SHA256:35665180CA7ACD542C1C5ED09F07C59005E77B3E5181C916B17079075B32B1AF
3260df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exeC:\Users\admin\AppData\Local\Temp\GUM690E.tmp\GoogleCrashHandler64.exeexecutable
MD5:71E73162F75EF1C1094F8E8AC5E9BED3
SHA256:2AE4D76B2037BF4EA615E92C7064272C93FC6A5CD649A95502234F6F32B9B151
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
21
TCP/UDP connections
37
DNS requests
19
Threats
14

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3700
svchost.exe
GET
200
2.19.11.105:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5316
svchost.exe
HEAD
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome/cpihdgaknu62wnuokp6tdnocla_131.0.6778.140/131.0.6778.140_chrome_installer.exe
unknown
whitelisted
3260
df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exe
GET
403
45.56.79.23:80
http://www.aieov.com/logo.gif
unknown
malicious
2084
GoogleUpdateSetup.exe
GET
403
45.56.79.23:80
http://www.aieov.com/logo.gif
unknown
malicious
2084
GoogleUpdateSetup.exe
GET
403
45.56.79.23:80
http://www.aieov.com/logo.gif
unknown
malicious
3260
df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exe
GET
403
45.56.79.23:80
http://www.aieov.com/logo.gif
unknown
malicious
2084
GoogleUpdateSetup.exe
GET
403
45.56.79.23:80
http://www.aieov.com/logo.gif
unknown
malicious
3260
df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exe
GET
403
45.56.79.23:80
http://www.aieov.com/logo.gif
unknown
malicious
3260
df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exe
GET
403
45.56.79.23:80
http://www.aieov.com/logo.gif
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2.23.209.182:443
www.bing.com
Akamai International B.V.
GB
whitelisted
192.168.100.255:138
whitelisted
4712
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3700
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3260
df2f5eb2caac30a6e7824de01ef12b96332af567bdcefc399b8899395260ceeb.exe
45.56.79.23:80
www.aieov.com
Linode, LLC
US
malicious
3700
svchost.exe
2.19.11.105:80
crl.microsoft.com
Elisa Oyj
NL
whitelisted
3700
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4712
MoUsoCoreWorker.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2084
GoogleUpdateSetup.exe
45.56.79.23:80
www.aieov.com
Linode, LLC
US
malicious

DNS requests

Domain
IP
Reputation
www.bing.com
  • 2.23.209.182
  • 2.23.209.179
  • 2.23.209.140
  • 2.23.209.133
  • 2.23.209.130
  • 2.23.209.189
  • 2.23.209.149
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.124.78.146
whitelisted
google.com
  • 142.250.185.206
whitelisted
5isohu.com
whitelisted
www.aieov.com
  • 45.56.79.23
  • 198.58.118.167
  • 45.33.23.183
  • 96.126.123.244
  • 45.33.30.197
  • 45.33.2.79
  • 45.33.18.44
  • 72.14.185.43
  • 45.33.20.235
  • 72.14.178.174
  • 173.255.194.134
  • 45.79.19.196
malicious
crl.microsoft.com
  • 2.19.11.105
  • 2.19.11.120
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted
update.googleapis.com
  • 142.250.184.227
whitelisted
dl.google.com
  • 142.250.186.78
whitelisted
edgedl.me.gvt1.com
  • 34.104.35.123
whitelisted

Threats

PID
Process
Class
Message
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
Misc activity
ET INFO EXE - Served Attached HTTP
12 ETPRO signatures available at the full report
No debug info