File name:

drfone_setup_full3360.exe

Full analysis: https://app.any.run/tasks/a91b08a3-56e0-4cd5-ba7e-bda5b70132fb
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: January 14, 2025, 13:06:49
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
loader
qrcode
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

BB196AA2D4A9DFE1FC561D4EED5D76B5

SHA1:

993AD8BC260A2B8F4F198AA8CC2E7E6EEE175A90

SHA256:

E761058440233AAF9BD93D9AF50BFFD6DC2B57235B622CF0634357C881C2F00A

SSDEEP:

98304:sJFfX3z+2Pwwgpzp5suNP4Uv5+/wDMXCcbNoX6Ple73U6D6VGUEGmutvDFm6c:UM

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Likely accesses (executes) a file from the Public directory

      • NFWCHK.exe (PID: 3952)
      • drfone_full3360.exe (PID: 4320)
      • drfone_full3360.tmp (PID: 1792)
    • Executable content was dropped or overwritten

      • drfone_setup_full3360.exe (PID: 5740)
      • drfone_full3360.exe (PID: 4320)
      • drfone_full3360.tmp (PID: 1792)
    • Reads security settings of Internet Explorer

      • drfone_setup_full3360.exe (PID: 5740)
      • drfone_full3360.tmp (PID: 1792)
    • Connects to unusual port

      • drfone_setup_full3360.exe (PID: 5740)
    • Process requests binary or script from the Internet

      • drfone_setup_full3360.exe (PID: 5740)
    • Potential Corporate Privacy Violation

      • drfone_setup_full3360.exe (PID: 5740)
    • The process drops C-runtime libraries

      • drfone_full3360.tmp (PID: 1792)
    • Process drops legitimate windows executable

      • drfone_full3360.tmp (PID: 1792)
  • INFO

    • Checks supported languages

      • drfone_setup_full3360.exe (PID: 5740)
      • NFWCHK.exe (PID: 3952)
      • ProcessKiller.exe (PID: 1292)
    • Reads the machine GUID from the registry

      • drfone_setup_full3360.exe (PID: 5740)
      • NFWCHK.exe (PID: 3952)
    • Reads the software policy settings

      • drfone_setup_full3360.exe (PID: 5740)
    • Checks proxy server information

      • drfone_setup_full3360.exe (PID: 5740)
    • Reads the computer name

      • NFWCHK.exe (PID: 3952)
      • ProcessKiller.exe (PID: 1292)
    • Create files in a temporary directory

      • drfone_setup_full3360.exe (PID: 5740)
      • drfone_full3360.exe (PID: 4320)
      • drfone_full3360.tmp (PID: 1792)
    • Creates files or folders in the user directory

      • drfone_setup_full3360.exe (PID: 5740)
    • The process uses the downloaded file

      • drfone_full3360.tmp (PID: 1792)
    • Sends debugging messages

      • ProcessKiller.exe (PID: 1292)
    • Creates files in the program directory

      • drfone_full3360.tmp (PID: 1792)
    • The sample compiled with chinese language support

      • drfone_full3360.tmp (PID: 1792)
    • The sample compiled with arabic language support

      • drfone_full3360.tmp (PID: 1792)
    • The sample compiled with english language support

      • drfone_full3360.tmp (PID: 1792)
    • SQLite executable

      • drfone_full3360.tmp (PID: 1792)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (16.3)
.exe | Win64 Executable (generic) (14.5)
.dll | Win32 Dynamic Link Library (generic) (3.4)
.exe | Win32 Executable (generic) (2.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:01:13 08:19:46+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 12
CodeSize: 1278976
InitializedDataSize: 1204736
UninitializedDataSize: -
EntryPoint: 0x1069f0
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 4.0.4.18
ProductVersionNumber: 4.0.4.18
FileFlagsMask: 0x0017
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileDescription: drfone_setup_full3360.exe
FileVersion: 4.0.4.18
LegalCopyright: Copyright©2023 Wondershare. All rights reserved.
ProductName: drfone
ProductVersion: 13.5.5
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
128
Monitored processes
9
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drfone_setup_full3360.exe svchost.exe nfwchk.exe no specs conhost.exe no specs drfone_full3360.exe drfone_full3360.tmp processkiller.exe conhost.exe no specs drfone_setup_full3360.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1292"C:\Users\admin\AppData\Local\Temp\is-PLSU8.tmp\ProcessKiller.exe"C:\Users\admin\AppData\Local\Temp\is-PLSU8.tmp\ProcessKiller.exe
drfone_full3360.tmp
User:
admin
Company:
Microsoft
Integrity Level:
HIGH
Description:
ProcessKiller
Exit code:
0
Version:
1.0.0.2
Modules
Images
c:\users\admin\appdata\local\temp\is-plsu8.tmp\processkiller.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
1792"C:\Users\admin\AppData\Local\Temp\is-3IN90.tmp\drfone_full3360.tmp" /SL5="$B02E4,499915082,673280,C:\Users\Public\Documents\Wondershare\drfone_full3360.exe" /VERYSILENT /NOPAGE /LANG=ENG /LOG="C:\Users\admin\AppData\Local\Temp\WAE-drfone.log" /installpath: "C:\Program Files (x86)\Wondershare\drfone\" /DIR="C:\Program Files (x86)\Wondershare\drfone\" /WAEWIN=A02B0 /PID=3360C:\Users\admin\AppData\Local\Temp\is-3IN90.tmp\drfone_full3360.tmp
drfone_full3360.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-3in90.tmp\drfone_full3360.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
3436\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeNFWCHK.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3952C:\Users\Public\Documents\Wondershare\NFWCHK.exeC:\Users\Public\Documents\Wondershare\NFWCHK.exedrfone_setup_full3360.exe
User:
admin
Company:
Wondershare
Integrity Level:
HIGH
Description:
.NET Framework Checker
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\public\documents\wondershare\nfwchk.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
4128"C:\Users\admin\AppData\Local\Temp\drfone_setup_full3360.exe" C:\Users\admin\AppData\Local\Temp\drfone_setup_full3360.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
drfone_setup_full3360.exe
Exit code:
3221226540
Version:
4.0.4.18
Modules
Images
c:\users\admin\appdata\local\temp\drfone_setup_full3360.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
4320"C:\Users\Public\Documents\Wondershare\drfone_full3360.exe" /VERYSILENT /NOPAGE /LANG=ENG /LOG="C:\Users\admin\AppData\Local\Temp\WAE-drfone.log" /installpath: "C:\Program Files (x86)\Wondershare\drfone\" /DIR="C:\Program Files (x86)\Wondershare\drfone\" /WAEWIN=A02B0 /PID=3360C:\Users\Public\Documents\Wondershare\drfone_full3360.exe
drfone_setup_full3360.exe
User:
admin
Company:
Wondershare
Integrity Level:
HIGH
Description:
dr.fone
Version:
13.6.7.462
Modules
Images
c:\users\public\documents\wondershare\drfone_full3360.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
5212\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeProcessKiller.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5740"C:\Users\admin\AppData\Local\Temp\drfone_setup_full3360.exe" C:\Users\admin\AppData\Local\Temp\drfone_setup_full3360.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
drfone_setup_full3360.exe
Version:
4.0.4.18
Modules
Images
c:\users\admin\appdata\local\temp\drfone_setup_full3360.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\wldap32.dll
Total events
1 562
Read events
1 553
Write events
9
Delete events
0

Modification events

(PID) Process:(5740) drfone_setup_full3360.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\WafCX
Operation:writeName:3360
Value:
sku-ween
(PID) Process:(5740) drfone_setup_full3360.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Wondershare\Wondershare Helper Compact
Operation:writeName:ClientSign
Value:
{a2f7e117-2822-4d02-9890-8f15e3007bacG}
(PID) Process:(5740) drfone_setup_full3360.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Wondershare\WAF
Operation:writeName:ClientSign
Value:
{a2f7e117-2822-4d02-9890-8f15e3007bacG}
(PID) Process:(5740) drfone_setup_full3360.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(5740) drfone_setup_full3360.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(5740) drfone_setup_full3360.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(5740) drfone_setup_full3360.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch
Operation:writeName:Version
Value:
WS not running
(PID) Process:(5740) drfone_setup_full3360.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main
Operation:writeName:DisableFirstRunCustomize
Value:
1
(PID) Process:(1792) drfone_full3360.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Wondershare\com.wondershare.drfonewin
Operation:writeName:RemindSwitch
Value:
1
Executable files
476
Suspicious files
7
Text files
2 184
Unknown types
8

Dropped files

PID
Process
Filename
Type
5740drfone_setup_full3360.exeC:\Users\Public\Documents\Wondershare\drfone_full3360.exe.~P2S
MD5:
SHA256:
5740drfone_setup_full3360.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\NotoSansSC-Regular[1].otf
MD5:
SHA256:
5740drfone_setup_full3360.exeC:\Users\Public\Documents\Wondershare\drfone_full3360.exe
MD5:
SHA256:
5740drfone_setup_full3360.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3FE2BD01AB6BC312BF0DADE7F797388F_D700B3BF42AE699B26DDBDD3E4CB7EDDder
MD5:68BC1905FADDDC240941CBAEED50322B
SHA256:6303FB310D999CB5FDD9B966A0AFDEE75FE3713A75B082E9A0635639D99C43B8
5740drfone_setup_full3360.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\E4DJRUXW\en_banner_4[1].pngimage
MD5:BD971DFDDCE86F425E731FB2CE368F76
SHA256:EE074106CF678B0C3974C6E44F15E3381D9D8C0C0C57170E46C4AAAAD91F223C
5740drfone_setup_full3360.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3FE2BD01AB6BC312BF0DADE7F797388F_D700B3BF42AE699B26DDBDD3E4CB7EDDbinary
MD5:E7562502445EF58B1EBCF37C2F3D5ACD
SHA256:BAFAB0617D4E9C5BDE22E54C6B9201A2CC133CA21A3F215ED184CE582EC0F3AC
5740drfone_setup_full3360.exeC:\Users\Public\Documents\Wondershare\WAE_DOWNTASK_3360.xmlxml
MD5:2108B5D39D37C65DF3110C5AAD83F81E
SHA256:B19E920F356A49DB0D062396F81F74BA8CFC7EF67A6FC937273778D0B7F63F8A
5740drfone_setup_full3360.exeC:\Users\admin\AppData\Local\Temp\wsduilib.logtext
MD5:5759C85CF17D6EC396F0A38A68F03A92
SHA256:DCF8B5FE6FF4A5EE20696273A533161D93A25A3485EB0D2C0E50568D94536F81
5740drfone_setup_full3360.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_C39E9DBC666D19C07EEE7CD1E11AF8BEder
MD5:1D11D4DA94F2D9754BB17EC5BF4E9381
SHA256:1ED43068BDD475A455E4382E23E14B6BFE6467A6460041B2D4B6E10E8FACB3D8
5740drfone_setup_full3360.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\773CFF2C7835D48C4E76FE153DBA9F81_C795BA5F05A7A13075CD7C0C0E838731binary
MD5:303EFAD59E0C2794A2C60D87DE4B552E
SHA256:713317C2E45A2104A87BBB9CFE46CDB619D06B55DFB0C4DC9D33F3428D07395B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
29
TCP/UDP connections
84
DNS requests
31
Threats
11

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4972
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
4972
svchost.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5740
drfone_setup_full3360.exe
GET
8.209.73.211:80
http://platform.wondershare.cc/rest/v2/downloader/runtime/?client_sign={a2f7e117-2822-4d02-9890-8f15e3007bacG}&product_id=3360&wae=4.0.4&platform=win_x64
unknown
malicious
1176
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5740
drfone_setup_full3360.exe
HEAD
200
2.16.168.100:80
http://download.wondershare.com/cbs_down/drfone_full3360.exe
unknown
whitelisted
5740
drfone_setup_full3360.exe
HEAD
200
2.19.126.135:80
http://download.wondershare.com/cbs_down/drfone_full3360.exe
unknown
whitelisted
5740
drfone_setup_full3360.exe
HEAD
200
2.19.126.160:80
http://download.wondershare.com/cbs_down/drfone_full3360.exe
unknown
whitelisted
4128
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
4128
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4972
svchost.exe
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4972
svchost.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
92.123.104.21:443
Akamai International B.V.
DE
unknown
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5064
SearchApp.exe
2.23.227.202:443
www.bing.com
Ooredoo Q.S.C.
QA
whitelisted
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1076
svchost.exe
2.23.242.9:443
go.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
4712
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.142
whitelisted
crl.microsoft.com
  • 2.16.241.19
  • 2.16.241.14
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 95.101.149.131
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
  • 51.124.78.146
whitelisted
www.bing.com
  • 2.23.227.202
  • 2.23.227.208
  • 2.23.227.221
  • 2.23.227.215
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
go.microsoft.com
  • 2.23.242.9
whitelisted
pc-api.wondershare.cc
  • 8.209.72.213
malicious
login.live.com
  • 40.126.32.133
  • 40.126.32.136
  • 40.126.32.72
  • 40.126.32.76
  • 20.190.160.14
  • 20.190.160.17
  • 20.190.160.22
  • 40.126.32.138
whitelisted
platform.wondershare.cc
  • 8.209.73.211
malicious

Threats

PID
Process
Class
Message
2192
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
2192
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
2192
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
2192
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
2192
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
5740
drfone_setup_full3360.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
5740
drfone_setup_full3360.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2192
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
3 ETPRO signatures available at the full report
Process
Message
ProcessKiller.exe
Plan B