Submission Summary:

What's been foundSeverity Level
Downloads/requests other files from Internet.

 

Technical Details:

NOTICE: The content shown in the above window is captured automatically and is not controlled or endorsed by ThreatExpert.
Please contact us on this link should any material be offensive or inappropriate and we will ensure any such content is blocked from future viewers of the report.

 

Memory Modifications

Process NameProcess FilenameMain Module Size
[filename of the sample #1][file and pathname of the sample #1]233,472 bytes

 

Other details

Server NameServer PortConnect as UserConnection Password
api.downloadmr.com80(null)(null)

 

 

Downloaded File Summary:

What's been foundSeverity Level
Downloads/requests other files from Internet.

 

Technical Details:

NOTICE: The content shown in the above window is captured automatically and is not controlled or endorsed by ThreatExpert.
Please contact us on this link should any material be offensive or inappropriate and we will ensure any such content is blocked from future viewers of the report.

 

Memory Modifications

Process NameProcess FilenameMain Module Size
[filename of the sample #1][file and pathname of the sample #1]5,263,360 bytes

 

Registry Modifications

 

Other details

Server NameServer PortConnect as UserConnection Password
download.cdn.bearshare.com80(null)(null)

 

 

Downloaded File Summary (Generation #2):

What's been foundSeverity Level
Downloads/requests other files from Internet.
Registers a 32-bit in-process server DLL.

 

Technical Details:

NOTICE: The content shown in the above window is captured automatically and is not controlled or endorsed by ThreatExpert.
Please contact us on this link should any material be offensive or inappropriate and we will ensure any such content is blocked from future viewers of the report.

 

File System Modifications

 

Memory Modifications

Process NameProcess FilenameMain Module Size
ns1D.tmp%Temp%\nsc4.tmp\ns1D.tmp20,480 bytes
ns11.tmp%Temp%\nsc4.tmp\ns11.tmp20,480 bytes
Starter.exe%Temp%\nsc4\Starter.exe1,073,152 bytes
ns2A.tmp%Temp%\nsc4.tmp\ns2A.tmp20,480 bytes
[filename of the sample #1][file and pathname of the sample #1]4,894,720 bytes
BearShareMediaBar.exe%Temp%\nsc4\nsh8.tmp\BearShareMediaBar.exe348,160 bytes
ns23.tmp%Temp%\nsc4.tmp\ns23.tmp20,480 bytes
ns9.tmp%Temp%\nsc4.tmp\ns9.tmp20,480 bytes
pack.exe%Temp%\nsc4\nsh8.tmp\pack.exe184,320 bytes
[filename of the sample #2][file and pathname of the sample #2]184,320 bytes
[generic host process][generic host process filename]45,056 bytes
[filename of the sample #3][file and pathname of the sample #3]184,320 bytes
mediabar.exe%Temp%\nsc4\nsh8.tmp\mediabar.exe184,320 bytes
datamngrcoordinator.exe%ProgramFiles%\music toolbar\datamngr\datamngrcoordinator.exe3,203,072 bytes
nsE.tmp%Temp%\nsc4.tmp\nsE.tmp20,480 bytes
ns17.tmp%Temp%\nsc4.tmp\ns17.tmp20,480 bytes
Internet Explorer Settings.exe%ProgramFiles%\Music Toolbar\Datamngr\Internet Explorer Settings.exe1,003,520 bytes
ns26.tmp%Temp%\nsc4.tmp\ns26.tmp20,480 bytes

Service NameDisplay NameStatusService Filename
DatamngrCoordinatorDatamngr Coordinator"Running"%ProgramFiles%\Music Toolbar\Datamngr\DatamngrCoordinator.exe

 

Registry Modifications

 

Other details

Server NameServer PortConnect as UserConnection Password
www.search.ask.com80(null)(null)
service.imeshbe.com80service.imeshbe.comservice.imeshbe.com

 

 

All content ("Information") contained in this report is the copyrighted work of Threat Expert Ltd and its associated companies ("ThreatExpert") and may not be copied without the express permission of ThreatExpert.

The Information is provided on an "as is" basis. ThreatExpert disclaims all warranties, whether express or implied, to the maximum extent permitted by law, including the implied warranties that the Information is merchantable, of satisfactory quality, accurate, fit for a particular purpose or need, or non-infringing, unless such implied warranties are legally incapable of exclusion. Further, ThreatExpert does not warrant or make any representations regarding the use or the results of the use of the Information in terms of their correctness, accuracy, reliability, or otherwise.

Copyright © 2014 ThreatExpert. All rights reserved.