URL:

img1.wsimg.com/blobby/go/f7748e26-2d27-4aa6-89fb-b263de90f421/downloads/tilovapexof.pdf

Full analysis: https://app.any.run/tasks/67bc9720-d005-46a8-8519-938ef47d249c
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: March 20, 2025, 01:08:57
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
phishing
obfuscated-js
stealer
auto
generic
loader
Indicators:
MD5:

BCF2D25C9CE9D471B8B3F8E6A4713E44

SHA1:

4610988FDEB59E6D50CC567FDCDF1FEE4DE8A610

SHA256:

FC14720F9A4FC3A7B3F205EBCC3044009197A7D1F63DCC9A48174C271415BECB

SSDEEP:

3:JbSqKHu8KCISEXTDeZcTGsKqN3X:EqmI7DeZcTGqNn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • PHISHING has been detected (SURICATA)

      • chrome.exe (PID: 7236)
    • GENERIC has been found (auto)

      • msiexec.exe (PID: 7832)
    • Actions looks like stealing of personal data

      • launcher.exe (PID: 1020)
      • explorer.exe (PID: 7656)
      • powershell.exe (PID: 3024)
    • Run PowerShell with an invisible window

      • powershell.exe (PID: 3024)
    • Uses AES cipher (POWERSHELL)

      • powershell.exe (PID: 3024)
    • Downloads the requested resource (POWERSHELL)

      • powershell.exe (PID: 3024)
    • Steals credentials from Web Browsers

      • powershell.exe (PID: 3024)
  • SUSPICIOUS

    • Creates file in the systems drive root

      • explorer.exe (PID: 6652)
    • Reads security settings of Internet Explorer

      • msiexec.exe (PID: 3156)
    • The executable file from the user directory is run by the CMD process

      • 7z.exe (PID: 4272)
      • mksSandbox.exe (PID: 7320)
    • Process drops legitimate windows executable

      • msiexec.exe (PID: 7832)
      • 7z.exe (PID: 4272)
    • Drops 7-zip archiver for unpacking

      • msiexec.exe (PID: 7832)
    • Starts CMD.EXE for commands execution

      • msiexec.exe (PID: 7832)
    • Executing commands from a ".bat" file

      • msiexec.exe (PID: 7832)
    • Executable content was dropped or overwritten

      • 7z.exe (PID: 4272)
    • The process drops C-runtime libraries

      • 7z.exe (PID: 4272)
    • Executes application which crashes

      • mksSandbox.exe (PID: 7320)
    • BASE64 encoded PowerShell command has been detected

      • explorer.exe (PID: 7656)
    • Base64-obfuscated command line is found

      • explorer.exe (PID: 7656)
    • Uses base64 encoding (POWERSHELL)

      • powershell.exe (PID: 3024)
    • Uses sleep to delay execution (POWERSHELL)

      • powershell.exe (PID: 3024)
    • Gets content of a file (POWERSHELL)

      • powershell.exe (PID: 3024)
    • Converts a string into array of characters (POWERSHELL)

      • powershell.exe (PID: 3024)
    • Converts a specified value to an integer (POWERSHELL)

      • powershell.exe (PID: 3024)
    • Starts POWERSHELL.EXE for commands execution

      • explorer.exe (PID: 7656)
    • Writes data into a file (POWERSHELL)

      • powershell.exe (PID: 3024)
    • Converts a specified value to a byte (POWERSHELL)

      • powershell.exe (PID: 3024)
    • There is functionality for taking screenshot (YARA)

      • launcher.exe (PID: 1020)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 7832)
  • INFO

    • Application launched itself

      • chrome.exe (PID: 2340)
      • chrome.exe (PID: 4920)
    • Checks supported languages

      • curl.exe (PID: 7528)
      • msiexec.exe (PID: 7832)
      • msiexec.exe (PID: 3156)
      • 7z.exe (PID: 4272)
      • mksSandbox.exe (PID: 7320)
      • launcher.exe (PID: 1020)
    • Manual execution by a user

      • cmd.exe (PID: 2420)
      • Taskmgr.exe (PID: 6436)
      • Taskmgr.exe (PID: 7976)
    • Execution of CURL command

      • cmd.exe (PID: 2420)
    • Reads the computer name

      • curl.exe (PID: 7528)
      • msiexec.exe (PID: 7832)
      • msiexec.exe (PID: 3156)
      • launcher.exe (PID: 1020)
      • 7z.exe (PID: 4272)
    • Reads security settings of Internet Explorer

      • explorer.exe (PID: 6652)
      • explorer.exe (PID: 7656)
      • Taskmgr.exe (PID: 7976)
    • Reads Microsoft Office registry keys

      • explorer.exe (PID: 6652)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 7832)
      • chrome.exe (PID: 4380)
    • Reads Environment values

      • msiexec.exe (PID: 3156)
    • Reads the machine GUID from the registry

      • msiexec.exe (PID: 3156)
    • Checks proxy server information

      • msiexec.exe (PID: 3156)
      • explorer.exe (PID: 7656)
      • powershell.exe (PID: 3024)
      • slui.exe (PID: 2268)
    • Reads the software policy settings

      • msiexec.exe (PID: 3156)
      • slui.exe (PID: 7976)
      • explorer.exe (PID: 7656)
      • slui.exe (PID: 2268)
    • The sample compiled with english language support

      • msiexec.exe (PID: 7832)
      • 7z.exe (PID: 4272)
      • chrome.exe (PID: 4380)
    • Creates files or folders in the user directory

      • msiexec.exe (PID: 7832)
      • launcher.exe (PID: 1020)
      • 7z.exe (PID: 4272)
      • explorer.exe (PID: 7656)
      • msiexec.exe (PID: 3156)
    • The sample compiled with japanese language support

      • msiexec.exe (PID: 7832)
    • The sample compiled with german language support

      • msiexec.exe (PID: 7832)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 7832)
    • Reads CPU info

      • launcher.exe (PID: 1020)
    • Create files in a temporary directory

      • explorer.exe (PID: 7656)
    • Uses string replace method (POWERSHELL)

      • powershell.exe (PID: 3024)
    • Gets data length (POWERSHELL)

      • powershell.exe (PID: 3024)
    • Converts byte array into ASCII string (POWERSHELL)

      • powershell.exe (PID: 3024)
    • Disables trace logs

      • powershell.exe (PID: 3024)
    • Checks whether the specified file exists (POWERSHELL)

      • powershell.exe (PID: 3024)
    • Gets a random number, or selects objects randomly from a collection (POWERSHELL)

      • powershell.exe (PID: 3024)
    • Gets or sets the time when the file was last written to (POWERSHELL)

      • powershell.exe (PID: 3024)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 3024)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
239
Monitored processes
90
Malicious processes
6
Suspicious processes
1

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe no specs #PHISHING chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs sppextcomobj.exe no specs slui.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs cmd.exe no specs conhost.exe no specs curl.exe explorer.exe no specs explorer.exe no specs rundll32.exe no specs msiexec.exe no specs #GENERIC msiexec.exe msiexec.exe cmd.exe no specs launcher.exe conhost.exe no specs 7z.exe mkssandbox.exe explorer.exe werfault.exe no specs powershell.exe svchost.exe conhost.exe no specs slui.exe chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs taskmgr.exe no specs taskmgr.exe chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
660"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=6252 --field-trial-handle=1988,i,15464291171043555383,17322311623743838629,262144 --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
660"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=35 --mojo-platform-channel-handle=6932 --field-trial-handle=1988,i,15464291171043555383,17322311623743838629,262144 --variations-seed-version /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
668"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=6128 --field-trial-handle=1988,i,15464291171043555383,17322311623743838629,262144 --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
728"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=34 --mojo-platform-channel-handle=3740 --field-trial-handle=1988,i,15464291171043555383,17322311623743838629,262144 --variations-seed-version /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
900"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4760 --field-trial-handle=1988,i,15464291171043555383,17322311623743838629,262144 --variations-seed-version /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
960"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=5748 --field-trial-handle=1988,i,15464291171043555383,17322311623743838629,262144 --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1020"C:\Users\admin\AppData\Roaming\TasovCoop\Klio Verfair Tools\launcher.exe"C:\Users\admin\AppData\Roaming\TasovCoop\Klio Verfair Tools\launcher.exe
msiexec.exe
User:
admin
Company:
Krzysztof Kowalczyk
Integrity Level:
MEDIUM
Description:
SumatraPDF
Exit code:
0
Version:
3.5.2
Modules
Images
c:\users\admin\appdata\roaming\tasovcoop\klio verfair tools\launcher.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
1188"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=4528 --field-trial-handle=2008,i,11121648205890802444,14385401088269728962,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1324"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=6716 --field-trial-handle=1988,i,15464291171043555383,17322311623743838629,262144 --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1512"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=4556 --field-trial-handle=2008,i,11121648205890802444,14385401088269728962,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
Total events
47 701
Read events
47 476
Write events
207
Delete events
18

Modification events

(PID) Process:(2340) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(2340) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(2340) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(2340) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(2340) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(6652) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:NodeSlots
Value:
02020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202
(PID) Process:(6652) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:MRUListEx
Value:
04000000030000000E00000000000000100000000F0000000C0000000D0000000B000000050000000A000000090000000800000001000000070000000600000002000000FFFFFFFF
(PID) Process:(6652) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\4\0
Operation:writeName:MRUListEx
Value:
0400000005000000060000000100000008000000020000000C0000000B0000000A00000009000000070000000000000003000000FFFFFFFF
(PID) Process:(6652) explorer.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\4\0\4\0
Operation:writeName:MRUListEx
Value:
0100000000000000FFFFFFFF
(PID) Process:(6652) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Toolbar\ShellBrowser
Operation:writeName:ITBar7Layout
Value:
13000000000000000000000020000000100000000000000001000000010700005E01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
Executable files
50
Suspicious files
442
Text files
195
Unknown types
0

Dropped files

PID
Process
Filename
Type
2340chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old~RF10c5f2.TMP
MD5:
SHA256:
2340chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
2340chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF10c5f2.TMP
MD5:
SHA256:
2340chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
2340chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old~RF10c601.TMP
MD5:
SHA256:
2340chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db\LOG.old~RF10c601.TMP
MD5:
SHA256:
2340chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
2340chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db\LOG.old
MD5:
SHA256:
2340chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\discounts_db\LOG.old~RF10c601.TMP
MD5:
SHA256:
2340chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old~RF10c601.TMP
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
37
TCP/UDP connections
142
DNS requests
161
Threats
20

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.164.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
unknown
7320
backgroundTaskHost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
unknown
1228
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
unknown
1228
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
unknown
2924
SearchApp.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
unknown
2924
SearchApp.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
unknown
3156
msiexec.exe
GET
200
172.217.16.131:80
http://c.pki.goog/r/gsr1.crl
unknown
unknown
3156
msiexec.exe
GET
200
172.217.16.131:80
http://c.pki.goog/r/r4.crl
unknown
unknown
7656
explorer.exe
GET
200
169.150.247.37:80
http://vapotrust.com/front.php?a=ZtCrrNXEmdutLMI&id=0
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
unknown
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
2.16.164.120:80
crl.microsoft.com
Akamai International B.V.
NL
unknown
5496
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:138
unknown
7236
chrome.exe
95.101.182.74:80
img1.wsimg.com
Akamai International B.V.
FR
unknown
2340
chrome.exe
239.255.255.250:1900
unknown
7236
chrome.exe
95.101.182.74:443
img1.wsimg.com
Akamai International B.V.
FR
unknown
7236
chrome.exe
64.233.167.84:443
accounts.google.com
GOOGLE
US
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 4.231.128.59
  • 20.73.194.208
unknown
google.com
  • 216.58.206.78
unknown
crl.microsoft.com
  • 2.16.164.120
  • 2.16.164.49
unknown
img1.wsimg.com
  • 95.101.182.74
  • 95.101.182.82
unknown
accounts.google.com
  • 64.233.167.84
  • 74.125.71.84
unknown
client.wns.windows.com
  • 40.113.110.67
unknown
login.live.com
  • 40.126.31.73
  • 40.126.31.130
  • 40.126.31.131
  • 20.190.159.129
  • 20.190.159.73
  • 20.190.159.4
  • 20.190.159.71
  • 40.126.31.67
unknown
ocsp.digicert.com
  • 2.23.77.188
  • 184.30.131.245
unknown
paburozuduwe.mofien.co.za
  • 172.67.129.184
  • 104.21.2.216
unknown
a.nel.cloudflare.com
  • 35.190.80.1
unknown

Threats

PID
Process
Class
Message
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare Network Error Logging (NEL)
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare Network Error Logging (NEL)
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare turnstile CAPTCHA challenge
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare turnstile CAPTCHA challenge
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected Phishing domain by CrossDomain (godipal .com)
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected Phishing domain by CrossDomain (godipal .com)
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected Phishing domain by CrossDomain (godipal .com)
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected Phishing domain by CrossDomain (godipal .com)
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare turnstile CAPTCHA challenge
Potentially Bad Traffic
SUSPICIOUS [ANY.RUN] Suspected Malicious Domain (l-back .com)
No debug info