| File name: | McAfee+Total+Protection+2022+Crack+Full+Free+Here!.zip |
| Full analysis: | https://app.any.run/tasks/b2854e12-e4cb-419e-be39-96554a57c762 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | January 08, 2022, 02:33:51 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v1.0 to extract |
| MD5: | 68A2064FB56DBAC10768D9BDEB4D6AD6 |
| SHA1: | ADDA84425955F5E89F34DC66F068B9244DBDA2A0 |
| SHA256: | F75676A3C35E7918A80BBFE01E0BFA7B7561C57CD23EC26EA32A1DB37B5F65A3 |
| SSDEEP: | 3072:gydZCbGomfVVyrF+wqjXKdrELDZBE1Ez66lMB4sZscal/iBx:g8CKoaVVVwqjUrELD/WyjMewscaA |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipFileName: | Setup/ |
|---|---|
| ZipUncompressedSize: | - |
| ZipCompressedSize: | - |
| ZipCRC: | 0x00000000 |
| ZipModifyDate: | 2021:09:11 22:15:01 |
| ZipCompression: | None |
| ZipBitFlag: | - |
| ZipRequiredVersion: | 10 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 268 | "C:\Users\admin\AppData\Local\Temp\zjh.exe" | C:\Users\admin\AppData\Local\Temp\zjh.exe | — | LzmwAqmV.exe | |||||||||||
User: admin Company: DCloud Integrity Level: HIGH Description: HBuilder X Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 276 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=86.0.4240.198 --initial-client-data=0xc8,0xcc,0xd0,0x9c,0xd4,0x69b3d988,0x69b3d998,0x69b3d9a4 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Exit code: 9 Version: 86.0.4240.198 Modules
| |||||||||||||||
| 296 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=988,15060846022507745445,9000948567788643099,131072 --enable-features=PasswordImport --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1916 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 9 Version: 86.0.4240.198 Modules
| |||||||||||||||
| 304 | "C:\Users\admin\AppData\Local\Temp\2108352564.exe" | C:\Users\admin\AppData\Local\Temp\2108352564.exe | — | cmd.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 392 | C:\Users\admin\AppData\Local\Temp\kezmetus.4gp\toolspab3.exe | C:\Users\admin\AppData\Local\Temp\kezmetus.4gp\toolspab3.exe | — | cmd.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 396 | "C:\Windows\System32\cmd.exe" /c taskkill /im "mMkNQwcrxJo9Fac4EU9aFY3M.exe" /f & erase "C:\Users\admin\Pictures\Adobe Films\mMkNQwcrxJo9Fac4EU9aFY3M.exe" & exit | C:\Windows\System32\cmd.exe | — | mMkNQwcrxJo9Fac4EU9aFY3M.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 424 | "C:\Windows\System32\cmd.exe" /k C:\Users\admin\AppData\Local\Temp\r3rswk4c.xkd\random.exe & exit | C:\Windows\System32\cmd.exe | — | Manocabitae.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 444 | "C:\Program Files\Company\NewProduct\inst2.exe" | C:\Program Files\Company\NewProduct\inst2.exe | — | setupWW1.exe | |||||||||||
User: admin Company: Sysinternals - www.sysinternals.com Integrity Level: HIGH Description: NTFS Information Dump Exit code: 0 Version: 1.2 Modules
| |||||||||||||||
| 448 | "C:\Users\admin\Pictures\Adobe Films\BqAMy4mFWg3REKgWUHPWJQ_3.exe" -u | C:\Users\admin\Pictures\Adobe Films\BqAMy4mFWg3REKgWUHPWJQ_3.exe | BqAMy4mFWg3REKgWUHPWJQ_3.exe | ||||||||||||
User: admin Company: initool Integrity Level: HIGH Description: initool Exit code: 0 Version: 1, 0, 0, 1 Modules
| |||||||||||||||
| 508 | "C:\Windows\system32\gpupdate.exe" /force | C:\Windows\system32\gpupdate.exe | — | powershell.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft� Group Policy Update Utility Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (2196) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (2196) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (2196) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2196) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip | |||
| (PID) Process: | (2196) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
| (PID) Process: | (2196) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\McAfee+Total+Protection+2022+Crack+Full+Free+Here!.zip | |||
| (PID) Process: | (2196) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (2196) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (2196) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (2196) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2024 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXb2024.41042\open.dat | binary | |
MD5:— | SHA256:— | |||
| 2728 | YolaProduct.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 | der | |
MD5:— | SHA256:— | |||
| 2196 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DIb2196.40665\Setup.zip | compressed | |
MD5:— | SHA256:— | |||
| 2728 | YolaProduct.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 | binary | |
MD5:— | SHA256:— | |||
| 2728 | YolaProduct.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 | binary | |
MD5:— | SHA256:— | |||
| 2728 | YolaProduct.exe | C:\Users\admin\Pictures\Adobe Films\tmn7Sjo6IZn07qqz6H1i1Sh2.exe | executable | |
MD5:— | SHA256:— | |||
| 2728 | YolaProduct.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\PO2HN1X2\PL_Client[1].bmp | binary | |
MD5:— | SHA256:— | |||
| 2728 | YolaProduct.exe | C:\Users\admin\Pictures\Adobe Films\5ZA5lXslnPQYDVT1QFcL69K6.exe | html | |
MD5:— | SHA256:— | |||
| 2056 | Setup.exe | C:\Users\admin\AppData\Local\Temp\YolaProduct.exe | executable | |
MD5:— | SHA256:— | |||
| 2728 | YolaProduct.exe | C:\Users\admin\Pictures\Adobe Films\SJq3sY_Jf2gAFAxmy9y75zil.exe | html | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2728 | YolaProduct.exe | GET | — | 172.67.133.215:80 | http://wfsdragon.ru/api/setStats.php | US | — | — | malicious |
2728 | YolaProduct.exe | HEAD | 200 | 45.144.225.57:80 | http://45.144.225.57/download/NiceProcessX32.bmp | unknown | — | — | malicious |
2728 | YolaProduct.exe | HEAD | 200 | 185.215.113.208:80 | http://185.215.113.208/ferrari.exe | PT | — | — | malicious |
2728 | YolaProduct.exe | HEAD | 404 | 212.193.30.29:80 | http://212.193.30.29/WW/file4.exe | RU | — | — | malicious |
2728 | YolaProduct.exe | HEAD | 404 | 212.193.30.29:80 | http://212.193.30.29/WW/file3.exe | RU | — | — | malicious |
2728 | YolaProduct.exe | HEAD | 200 | 185.112.83.8:80 | http://185.112.83.8/install6.exe | RU | — | — | suspicious |
2728 | YolaProduct.exe | GET | 404 | 212.193.30.45:80 | http://212.193.30.45/WW/file7.exe | RU | — | — | malicious |
2728 | YolaProduct.exe | HEAD | 200 | 212.193.30.29:80 | http://212.193.30.29/download/Service.bmp | RU | — | — | malicious |
2728 | YolaProduct.exe | HEAD | 404 | 85.209.157.230:80 | http://tg8.cllgxx.com/sr21/siww1047.exe | unknown | — | — | malicious |
2728 | YolaProduct.exe | HEAD | 404 | 212.193.30.45:80 | http://212.193.30.45/WW/file8.exe | RU | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 212.193.30.45:80 | — | — | RU | malicious |
2728 | YolaProduct.exe | 104.23.99.190:443 | pastebin.com | Cloudflare Inc | US | malicious |
— | — | 45.144.225.57:80 | — | — | — | malicious |
2728 | YolaProduct.exe | 172.67.133.215:80 | wfsdragon.ru | — | US | malicious |
2728 | YolaProduct.exe | 162.159.130.233:80 | cdn.discordapp.com | Cloudflare Inc | — | shared |
2728 | YolaProduct.exe | 2.56.59.42:80 | — | — | — | malicious |
— | — | 162.159.130.233:80 | cdn.discordapp.com | Cloudflare Inc | — | shared |
2728 | YolaProduct.exe | 162.159.130.233:443 | cdn.discordapp.com | Cloudflare Inc | — | shared |
2728 | YolaProduct.exe | 212.193.30.29:80 | — | — | RU | malicious |
2728 | YolaProduct.exe | 185.112.83.8:80 | — | Total Server Solutions L.L.C. | RU | suspicious |
Domain | IP | Reputation |
|---|---|---|
pastebin.com |
| malicious |
wfsdragon.ru |
| malicious |
cdn.discordapp.com |
| shared |
ctldl.windowsupdate.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
ipinfo.io |
| shared |
db-ip.com |
| whitelisted |
api.db-ip.com |
| shared |
stylesheet.faseaegasdfase.com |
| malicious |
baanrabiengfah.com |
| suspicious |
PID | Process | Class | Message |
|---|---|---|---|
2728 | YolaProduct.exe | A Network Trojan was detected | ET MALWARE User-Agent (???) |
2728 | YolaProduct.exe | Potentially Bad Traffic | ET INFO Terse Request for .txt - Likely Hostile |
2728 | YolaProduct.exe | Potentially Bad Traffic | ET INFO Terse Request for .txt - Likely Hostile |
2728 | YolaProduct.exe | A Network Trojan was detected | ET MALWARE User-Agent (???) |
2728 | YolaProduct.exe | Generic Protocol Command Decode | SURICATA Applayer Mismatch protocol both directions |
2728 | YolaProduct.exe | Generic Protocol Command Decode | SURICATA Applayer Mismatch protocol both directions |
2728 | YolaProduct.exe | A Network Trojan was detected | ET POLICY Possible External IP Lookup Domain Observed in SNI (ipinfo. io) |
2728 | YolaProduct.exe | Potential Corporate Privacy Violation | ET POLICY Possible External IP Lookup SSL Cert Observed (ipinfo.io) |
2728 | YolaProduct.exe | A Network Trojan was detected | ET TROJAN Win32/Unk.HRESQ! MultiDownloader Checkin |
2728 | YolaProduct.exe | A Network Trojan was detected | ET TROJAN Win32/Unk.HRESQ! MultiDownloader Checkin |
Process | Message |
|---|---|
lighteningplayer-cache-gen.exe | main libvlc debug: VLC media player - 3.0.7 Vetinari
|
lighteningplayer-cache-gen.exe | main libvlc debug: Copyright � 1996-2018 the VideoLAN team
|
lighteningplayer-cache-gen.exe | main libvlc debug: revision 3.0.2-225-gc9e3360dd4
|
lighteningplayer-cache-gen.exe | main libvlc debug: configured with ../extras/package/win32/../../../configure '--enable-update-check' '--enable-lua' '--enable-faad' '--enable-flac' '--enable-theora' '--enable-twolame' '--enable-avcodec' '--enable-merge-ffmpeg' '--enable-dca' '--enable-mpc' '--enable-libass' '--enable-x264' '--enable-schroedinger' '--enable-realrtsp' '--enable-live555' '--enable-dvdread' '--enable-shout' '--enable-goom' '--enable-caca' '--enable-qt' '--enable-skins2' '--enable-sse' '--enable-mmx' '--enable-libcddb' '--enable-zvbi' '--disable-telx' '--enable-nls' '--host=i686-w64-mingw32' '--build=x86_64-pc-linux-gnu' 'build_alias=x86_64-pc-linux-gnu' 'host_alias=i686-w64-mingw32'
|
lighteningplayer-cache-gen.exe | main libvlc debug: using multimedia timers as clock source
|
lighteningplayer-cache-gen.exe | main libvlc debug: min period: 1 ms, max period: 1000000 ms
|
lighteningplayer-cache-gen.exe | main libvlc debug: searching plug-in modules
|
lighteningplayer-cache-gen.exe | main libvlc debug: ignoring plugins cache file
|
lighteningplayer-cache-gen.exe | main libvlc debug: recursively browsing `C:\Program Files\lighteningplayer\plugins'
|
lighteningplayer-cache-gen.exe | main libvlc debug: saving plugins cache C:\Program Files\lighteningplayer\plugins\plugins.dat
|