File name:

dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf

Full analysis: https://app.any.run/tasks/cf8efa3e-7f26-4c75-94cf-655de7cc54b2
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: October 04, 2020, 10:00:41
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
loader
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
MD5:

50E570AA28FA78F1C3029D4DB50E1099

SHA1:

FDEE7D28208179E1F859DB4F4BC97F96DF2B7B6A

SHA256:

DFD89EB4E5F4D2BE79EF7A1A4C828300E17F8FEB2C1E852AC0871C062E3177BF

SSDEEP:

49152:1kUQIF2Aa7TAaVnGHP0q7x5o0WnfnL9t:1kUj5aVnSsU/0nL9t

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Downloads executable files from the Internet

      • dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe (PID: 3336)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe (PID: 3336)
      • dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.new.exe (PID: 2800)
      • dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe (PID: 1180)
    • Starts itself from another location

      • dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe (PID: 3336)
      • dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.new.exe (PID: 2800)
    • Reads Internet Cache Settings

      • dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe (PID: 3336)
      • dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe (PID: 1180)
    • Reads internet explorer settings

      • dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe (PID: 1180)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe (PID: 1180)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable Delphi generic (37.4)
.scr | Windows screen saver (34.5)
.exe | Win32 Executable (generic) (11.9)
.exe | Win16/32 Executable Delphi generic (5.4)
.exe | Generic Win/DOS Executable (5.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2010:09:20 03:18:12+02:00
PEType: PE32
LinkerVersion: 2.25
CodeSize: 836608
InitializedDataSize: 1473024
UninitializedDataSize: -
EntryPoint: 0xcdd08
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 20-Sep-2010 01:18:12
Detected languages:
  • Russian - Russia

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0050
Pages in file: 0x0002
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x000F
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x001A
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000100

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 8
Time date stamp: 20-Sep-2010 01:18:12
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_BYTES_REVERSED_HI
  • IMAGE_FILE_BYTES_REVERSED_LO
  • IMAGE_FILE_DEBUG_STRIPPED
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x000CB2C4
0x000CB400
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.55475
.itext
0x000CD000
0x00000E24
0x00001000
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
5.97364
.data
0x000CE000
0x00007294
0x00007400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
5.88832
.bss
0x000D6000
0x00007BD0
0x00000000
IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.idata
0x000DE000
0x00003368
0x00003400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.55467
.tls
0x000E2000
0x0000003C
0x00000000
IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.rdata
0x000E3000
0x00000018
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
0.210826
.rsrc
0x000E4000
0x0015CE40
0x0015D000
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
7.79413

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.14523
826
Latin 1 / Western European
Russian - Russia
RT_MANIFEST
2
4.37919
67624
Latin 1 / Western European
Russian - Russia
RT_ICON
3
4.75496
38056
Latin 1 / Western European
Russian - Russia
RT_ICON
4
5.20097
26600
Latin 1 / Western European
Russian - Russia
RT_ICON
5
4.82632
21640
Latin 1 / Western European
Russian - Russia
RT_ICON
6
4.6223
16936
Latin 1 / Western European
Russian - Russia
RT_ICON
7
5.04829
9640
Latin 1 / Western European
Russian - Russia
RT_ICON
8
5.05011
4264
Latin 1 / Western European
Russian - Russia
RT_ICON
9
5.50719
2440
Latin 1 / Western European
Russian - Russia
RT_ICON
4078
3.13933
484
Latin 1 / Western European
UNKNOWN
RT_STRING

Imports

KERNEL32.DLL
URLMON.DLL
advapi32.dll
comctl32.dll
gdi32.dll
ole32.dll
oleaut32.dll
shell32.dll
user32.dll
version.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
4
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start start drop and start dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.new.exe dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1180"C:\Users\admin\AppData\Local\Temp\dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe" /delete "C:\Users\admin\AppData\Local\Temp\dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.new.exe" C:\Users\admin\AppData\Local\Temp\dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe
dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.new.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\gdi32.dll
2360"C:\Users\admin\AppData\Local\Temp\dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe" C:\Users\admin\AppData\Local\Temp\dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe
c:\systemroot\system32\ntdll.dll
2800"C:\Users\admin\AppData\Local\Temp\dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.new.exe" /update "C:\Users\admin\AppData\Local\Temp\dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe"C:\Users\admin\AppData\Local\Temp\dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.new.exe
dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.new.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\gdi32.dll
3336"C:\Users\admin\AppData\Local\Temp\dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe" C:\Users\admin\AppData\Local\Temp\dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\gdi32.dll
Total events
96
Read events
85
Write events
11
Delete events
0

Modification events

(PID) Process:(3336) dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exeKey:HKEY_CURRENT_USER\Software\L2j Community Network\LameUpdater\{07880B56-278B12D2-F2254387-65D813F4-519020D7}
Operation:writeName:HomeDir
Value:
C:\Users\admin\AppData\Local\Temp\
(PID) Process:(1180) dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exeKey:HKEY_CURRENT_USER\Software\L2j Community Network\LameUpdater\{07880B56-278B12D2-F2254387-65D813F4-519020D7}
Operation:writeName:HomeDir
Value:
C:\Users\admin\AppData\Local\Temp\
(PID) Process:(1180) dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(1180) dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(1180) dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(1180) dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
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
(PID) Process:(1180) dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(1180) dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1180) dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
13
Suspicious files
4
Text files
135
Unknown types
97

Dropped files

PID
Process
Filename
Type
1180dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exeC:\Users\admin\AppData\Local\Temp\steam_appid.txt.lzma.part
MD5:
SHA256:
1180dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exeC:\Users\admin\AppData\Local\Temp\steam_appid.txt.lzma
MD5:
SHA256:
1180dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exeC:\Users\admin\AppData\Local\Temp\steam_appid.lamenew
MD5:
SHA256:
1180dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exeC:\Users\admin\AppData\Local\Temp\bin\inspector.pak.lzma.part
MD5:
SHA256:
1180dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exeC:\Users\admin\AppData\Local\Temp\bin\inspector.pak.lzma
MD5:
SHA256:
1180dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exeC:\Users\admin\AppData\Local\Temp\bin\inspector.lamenew
MD5:
SHA256:
1180dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exeC:\Users\admin\AppData\Local\Temp\garrysmod\html\img\upload.png.lzma.part
MD5:
SHA256:
1180dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exeC:\Users\admin\AppData\Local\Temp\garrysmod\html\img\upload.png.lzma
MD5:
SHA256:
1180dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exeC:\Users\admin\AppData\Local\Temp\garrysmod\html\img\upload.lamenew
MD5:
SHA256:
1180dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exeC:\Users\admin\AppData\Local\Temp\garrysmod\resource\localization\hr.png.lzma.part
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
217
TCP/UDP connections
215
DNS requests
5
Threats
219

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1180
dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe
GET
200
46.4.39.247:80
http://update.bruss.org.ru/gmod/update.html
DE
html
704 b
malicious
1180
dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe
GET
200
46.4.39.247:80
http://update.bruss.org.ru/gmod/patchlist.xml
DE
text
40.1 Kb
malicious
1180
dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe
GET
200
46.4.39.247:80
http://update.bruss.org.ru/gmod/garrysmod/html/img/upload.png.lzma
DE
lzma
824 b
malicious
1180
dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe
GET
200
46.4.39.247:80
http://update.bruss.org.ru/gmod/garrysmod/resource/localization/hr.png.lzma
DE
lzma
537 b
malicious
1180
dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe
GET
200
46.4.39.247:80
http://update.bruss.org.ru/gmod/garrysmod/gamemodes/terrortown/content/materials/vgui/ttt/c4%5Fwire%5Fcut.vtf.lzma
DE
lzma
1.16 Kb
malicious
3336
dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe
GET
200
46.4.39.247:80
http://update.bruss.org.ru/gmod/Gmod%5FUpdater.exe
DE
executable
2.20 Mb
malicious
3336
dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe
GET
200
46.4.39.247:80
http://update.bruss.org.ru/gmod/options.xml
DE
html
382 b
malicious
1180
dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe
GET
200
46.4.39.247:80
http://update.bruss.org.ru/gmod/bin/Awesomium.framework/Versions/A/inspector.pak.lzma
DE
lzma
716 Kb
malicious
1180
dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe
GET
200
46.4.39.247:80
http://update.bruss.org.ru/gmod/garrysmod/resource/localization/sk.png.lzma
DE
lzma
567 b
malicious
1180
dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe
GET
200
46.4.39.247:80
http://update.bruss.org.ru/gmod/garrysmod/resource/localization/zh-CN.png.lzma
DE
lzma
485 b
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3336
dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe
46.4.39.247:80
update.bruss.org.ru
Hetzner Online GmbH
DE
malicious
46.4.39.247:80
update.bruss.org.ru
Hetzner Online GmbH
DE
malicious
1180
dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe
46.4.39.247:80
update.bruss.org.ru
Hetzner Online GmbH
DE
malicious

DNS requests

Domain
IP
Reputation
update.bruss.org.ru
  • 46.4.39.247
malicious
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

PID
Process
Class
Message
3336
dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe
A Network Trojan was detected
ET TROJAN Trojan Related Lame Updater User-Agent
3336
dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe
A Network Trojan was detected
ET TROJAN Trojan Related Lame Updater User-Agent
3336
dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
1180
dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe
A Network Trojan was detected
ET TROJAN Trojan Related Lame Updater User-Agent
1180
dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe
A Network Trojan was detected
ET TROJAN Trojan Related Lame Updater User-Agent
1180
dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
1180
dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe
A Network Trojan was detected
ET TROJAN Trojan Related Lame Updater User-Agent
1180
dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe
A Network Trojan was detected
ET TROJAN Trojan Related Lame Updater User-Agent
1180
dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe
A Network Trojan was detected
ET TROJAN Trojan Related Lame Updater User-Agent
1180
dfd89eb4e5f4d2be79ef7a1a4c828300e17f8feb2c1e852ac0871c062e3177bf.exe
A Network Trojan was detected
ET TROJAN Trojan Related Lame Updater User-Agent
No debug info