File name:

five-nights-at-freddys-3_rdk2-W1.exe

Full analysis: https://app.any.run/tasks/19999e80-c228-42d9-bfe7-074ffc186f23
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: May 11, 2025, 16:10:09
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
delphi
inno
installer
bundleinstaller
adware
innosetup
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 10 sections
MD5:

B0EEE66BF0EB45069FB89593120BD046

SHA1:

4ABDA86A1A11502F7BFF47EB3505F212DDE42F48

SHA256:

17DF3932367CB177C0B96D12AB1B10C3B67B6E62A178EC27A2363DC6D5B31B57

SSDEEP:

49152:a7HecD4dnbibBlECLepI7UT4Jk+5UqXgt19Cu8vihuzSZ4PKxsngD1mQhNl0NmNP:K+cD4dnyLiI7UT4unFt19CvviszSPsnC

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • five-nights-at-freddys-3_rdk2-W1.exe (PID: 6404)
      • five-nights-at-freddys-3_rdk2-W1.exe (PID: 7020)
    • Bundleinstaller mutex has been found

      • file_rdk2-W1.tmp (PID: 4920)
    • INNOSETUP has been detected (SURICATA)

      • file_rdk2-W1.tmp (PID: 4920)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • five-nights-at-freddys-3_rdk2-W1.tmp (PID: 6964)
      • file_rdk2-W1.tmp (PID: 4920)
      • WinRAR.exe (PID: 732)
      • Five_Nights_at_Freddys_3.exe (PID: 728)
    • Executable content was dropped or overwritten

      • five-nights-at-freddys-3_rdk2-W1.exe (PID: 6404)
      • five-nights-at-freddys-3_rdk2-W1.exe (PID: 7020)
      • five-nights-at-freddys-3_rdk2-W1.tmp (PID: 496)
      • file_rdk2-W1.exe (PID: 4812)
      • file_rdk2-W1.tmp (PID: 4920)
      • Five_Nights_at_Freddys_3.exe (PID: 728)
      • FiveNightsatFreddys3.exe (PID: 7456)
      • FiveNightsatFreddys3.exe (PID: 7420)
      • FiveNightsatFreddys3.exe (PID: 2800)
    • Reads the Windows owner or organization settings

      • five-nights-at-freddys-3_rdk2-W1.tmp (PID: 496)
      • file_rdk2-W1.tmp (PID: 4920)
    • Access to an unwanted program domain was detected

      • file_rdk2-W1.tmp (PID: 4920)
    • There is functionality for taking screenshot (YARA)

      • file_rdk2-W1.tmp (PID: 4920)
      • Five_Nights_at_Freddys_3.exe (PID: 728)
      • FiveNightsatFreddys3.exe (PID: 7456)
      • FiveNightsatFreddys3.exe (PID: 7420)
    • Process drops legitimate windows executable

      • Five_Nights_at_Freddys_3.exe (PID: 728)
  • INFO

    • Checks supported languages

      • five-nights-at-freddys-3_rdk2-W1.exe (PID: 6404)
      • five-nights-at-freddys-3_rdk2-W1.tmp (PID: 6964)
      • five-nights-at-freddys-3_rdk2-W1.exe (PID: 7020)
      • five-nights-at-freddys-3_rdk2-W1.tmp (PID: 496)
      • file_rdk2-W1.exe (PID: 4812)
      • file_rdk2-W1.tmp (PID: 4920)
      • identity_helper.exe (PID: 6828)
      • Five_Nights_at_Freddys_3.exe (PID: 728)
      • FiveNightsatFreddys3.exe (PID: 7420)
      • FiveNightsatFreddys3.exe (PID: 7456)
      • GameBar.exe (PID: 7600)
    • Create files in a temporary directory

      • five-nights-at-freddys-3_rdk2-W1.exe (PID: 6404)
      • five-nights-at-freddys-3_rdk2-W1.exe (PID: 7020)
      • five-nights-at-freddys-3_rdk2-W1.tmp (PID: 496)
      • file_rdk2-W1.exe (PID: 4812)
      • file_rdk2-W1.tmp (PID: 4920)
      • FiveNightsatFreddys3.exe (PID: 7456)
      • FiveNightsatFreddys3.exe (PID: 7420)
    • Reads the computer name

      • five-nights-at-freddys-3_rdk2-W1.tmp (PID: 6964)
      • five-nights-at-freddys-3_rdk2-W1.tmp (PID: 496)
      • file_rdk2-W1.tmp (PID: 4920)
      • identity_helper.exe (PID: 6828)
      • Five_Nights_at_Freddys_3.exe (PID: 728)
      • FiveNightsatFreddys3.exe (PID: 7420)
      • FiveNightsatFreddys3.exe (PID: 7456)
    • Process checks computer location settings

      • five-nights-at-freddys-3_rdk2-W1.tmp (PID: 6964)
      • file_rdk2-W1.tmp (PID: 4920)
      • Five_Nights_at_Freddys_3.exe (PID: 728)
    • Reads the software policy settings

      • five-nights-at-freddys-3_rdk2-W1.tmp (PID: 496)
      • file_rdk2-W1.tmp (PID: 4920)
      • slui.exe (PID: 4892)
      • slui.exe (PID: 7000)
    • Checks proxy server information

      • five-nights-at-freddys-3_rdk2-W1.tmp (PID: 496)
      • file_rdk2-W1.tmp (PID: 4920)
      • slui.exe (PID: 7000)
      • Five_Nights_at_Freddys_3.exe (PID: 728)
    • The sample compiled with english language support

      • file_rdk2-W1.tmp (PID: 4920)
      • Five_Nights_at_Freddys_3.exe (PID: 728)
      • FiveNightsatFreddys3.exe (PID: 7420)
      • FiveNightsatFreddys3.exe (PID: 7456)
      • FiveNightsatFreddys3.exe (PID: 2800)
    • Detects InnoSetup installer (YARA)

      • five-nights-at-freddys-3_rdk2-W1.tmp (PID: 6964)
      • five-nights-at-freddys-3_rdk2-W1.exe (PID: 6404)
      • file_rdk2-W1.exe (PID: 4812)
      • file_rdk2-W1.tmp (PID: 4920)
    • Reads the machine GUID from the registry

      • file_rdk2-W1.tmp (PID: 4920)
    • Compiled with Borland Delphi (YARA)

      • five-nights-at-freddys-3_rdk2-W1.exe (PID: 6404)
      • five-nights-at-freddys-3_rdk2-W1.tmp (PID: 6964)
      • file_rdk2-W1.exe (PID: 4812)
      • file_rdk2-W1.tmp (PID: 4920)
    • Reads Environment values

      • identity_helper.exe (PID: 6828)
    • Application launched itself

      • msedge.exe (PID: 1116)
      • msedge.exe (PID: 5260)
      • msedge.exe (PID: 2644)
    • Manual execution by a user

      • msedge.exe (PID: 5260)
      • FiveNightsatFreddys3.exe (PID: 7420)
      • FiveNightsatFreddys3.exe (PID: 7456)
      • FiveNightsatFreddys3.exe (PID: 2800)
    • Local mutex for internet shortcut management

      • Five_Nights_at_Freddys_3.exe (PID: 728)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (53.5)
.exe | InstallShield setup (21)
.exe | Win32 EXE PECompact compressed (generic) (20.2)
.exe | Win32 Executable (generic) (2.1)
.exe | Win16/32 Executable Delphi generic (1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:02:15 14:54:16+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 741888
InitializedDataSize: 89600
UninitializedDataSize: -
EntryPoint: 0xb5eec
OSVersion: 6.1
ImageVersion: 6
SubsystemVersion: 6.1
Subsystem: Windows GUI
FileVersionNumber: 6.32.1033.0
ProductVersionNumber: 6.32.1033.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription: Wizard
FileVersion: 6.32.1033
LegalCopyright:
OriginalFileName:
ProductName: Wizard
ProductVersion: 6.32.1033
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
221
Monitored processes
82
Malicious processes
5
Suspicious processes
2

Behavior graph

Click at the process to see the details
start five-nights-at-freddys-3_rdk2-w1.exe five-nights-at-freddys-3_rdk2-w1.tmp no specs five-nights-at-freddys-3_rdk2-w1.exe five-nights-at-freddys-3_rdk2-w1.tmp sppextcomobj.exe no specs slui.exe file_rdk2-w1.exe #BUNDLEINSTALLER file_rdk2-w1.tmp slui.exe winrar.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs msedge.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs five_nights_at_freddys_3.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs fivenightsatfreddys3.exe fivenightsatfreddys3.exe gamebarpresencewriter.exe no specs gamebar.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs fivenightsatfreddys3.exe gamebarpresencewriter.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
232"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --extension-process --renderer-sub-type=extension --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3160 --field-trial-handle=2352,i,4986435527407943445,18288686142724543363,262144 --variations-seed-version /prefetch:2C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
232"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=3264 --field-trial-handle=2352,i,4986435527407943445,18288686142724543363,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
496"C:\Users\admin\AppData\Local\Temp\is-BDI2M.tmp\five-nights-at-freddys-3_rdk2-W1.tmp" /SL5="$90200,832512,832512,C:\Users\admin\Downloads\five-nights-at-freddys-3_rdk2-W1.exe" /SPAWNWND=$402E2 /NOTIFYWND=$602DA C:\Users\admin\AppData\Local\Temp\is-BDI2M.tmp\five-nights-at-freddys-3_rdk2-W1.tmp
five-nights-at-freddys-3_rdk2-W1.exe
User:
admin
Company:
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-bdi2m.tmp\five-nights-at-freddys-3_rdk2-w1.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comdlg32.dll
684"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5492 --field-trial-handle=2352,i,4986435527407943445,18288686142724543363,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
728"C:\Users\admin\AppData\Local\Temp\Rar$EXa732.22471\Five_Nights_at_Freddys_3\Five_Nights_at_Freddys_3.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa732.22471\Five_Nights_at_Freddys_3\Five_Nights_at_Freddys_3.exe
WinRAR.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa732.22471\five_nights_at_freddys_3\five_nights_at_freddys_3.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
732"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Downloads\five-nights-at-freddys-3.zip"C:\Program Files\WinRAR\WinRAR.exefile_rdk2-W1.tmp
User:
admin
Company:
Alexander Roshal
Integrity Level:
HIGH
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
872"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=3372 --field-trial-handle=2352,i,4986435527407943445,18288686142724543363,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
896"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5184 --field-trial-handle=2352,i,4986435527407943445,18288686142724543363,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
896"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --extension-process --renderer-sub-type=extension --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=5812 --field-trial-handle=2352,i,4986435527407943445,18288686142724543363,262144 --variations-seed-version /prefetch:2C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1116"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://es.download.it/?typ=1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exefile_rdk2-W1.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Exit code:
1
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
Total events
13 979
Read events
13 898
Write events
77
Delete events
4

Modification events

(PID) Process:(4920) file_rdk2-W1.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Operation:writeName:Owner
Value:
381300007DAA9F348FC2DB01
(PID) Process:(4920) file_rdk2-W1.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Operation:writeName:SessionHash
Value:
5713B6D545DCA5919B05F37032BF0433E1B6D08B5592E53A10142989660409B8
(PID) Process:(4920) file_rdk2-W1.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Operation:writeName:Sequence
Value:
1
(PID) Process:(4920) file_rdk2-W1.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Operation:writeName:WinRAR.ZIP
Value:
(PID) Process:(4920) file_rdk2-W1.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
(PID) Process:(4920) file_rdk2-W1.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(4920) file_rdk2-W1.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(4920) file_rdk2-W1.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(4920) file_rdk2-W1.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Operation:delete valueName:Sequence
Value:

(PID) Process:(4920) file_rdk2-W1.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0001
Operation:delete valueName:SessionHash
Value:
ፗ햶�醥֛烳뼲㌄뛡诐鉕㫥ᐐ褩Ѧ렉
Executable files
53
Suspicious files
510
Text files
126
Unknown types
0

Dropped files

PID
Process
Filename
Type
4920file_rdk2-W1.tmpC:\Users\admin\AppData\Local\Temp\is-J69GR.tmp\is-PNQ1G.tmp
MD5:
SHA256:
4920file_rdk2-W1.tmpC:\Users\admin\AppData\Local\Temp\is-J69GR.tmp\five-nights-at-freddys-3.zip
MD5:
SHA256:
4920file_rdk2-W1.tmpC:\Users\admin\Downloads\five-nights-at-freddys-3.zip
MD5:
SHA256:
7020five-nights-at-freddys-3_rdk2-W1.exeC:\Users\admin\AppData\Local\Temp\is-BDI2M.tmp\five-nights-at-freddys-3_rdk2-W1.tmpexecutable
MD5:B4107A576702C64AEDC9838C2BF8D422
SHA256:E74854263FF92F48C49E5C155BC0D76F1FCD9C7C7D1AE40D4D8407C724C86A87
496five-nights-at-freddys-3_rdk2-W1.tmpC:\Users\admin\AppData\Local\Temp\is-I8634.tmp\_isetup\_setup64.tmpexecutable
MD5:E4211D6D009757C078A9FAC7FF4F03D4
SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
4920file_rdk2-W1.tmpC:\Users\admin\AppData\Local\Temp\is-J69GR.tmp\AVG_AV.pngimage
MD5:AEE8E80B35DCB3CF2A5733BA99231560
SHA256:35BBD8F390865173D65BA2F38320A04755541A0783E9F825FDB9862F80D97AA9
4812file_rdk2-W1.exeC:\Users\admin\AppData\Local\Temp\is-IAL94.tmp\file_rdk2-W1.tmpexecutable
MD5:8CF2935FF1AB8729D059BDA47761E0A7
SHA256:21D9CA1FC088AFFAD73821C5983847779B5E97C4926068746715DE256CF360E9
496five-nights-at-freddys-3_rdk2-W1.tmpC:\Users\admin\AppData\Local\Temp\is-I8634.tmp\file_rdk2-W1.exeexecutable
MD5:DF85661C015A03E71A9313B2F72D1EFA
SHA256:D2F397B0F81E098F0DB0A293F47032D354EE9CEAFCECD5AC474E5DDA1B05C14E
4920file_rdk2-W1.tmpC:\Users\admin\AppData\Local\Temp\is-J69GR.tmp\Helper.dllexecutable
MD5:4EB0347E66FA465F602E52C03E5C0B4B
SHA256:C73E53CBB7B98FEAFE27CC7DE8FDAD51DF438E2235E91891461C5123888F73CC
4920file_rdk2-W1.tmpC:\Users\admin\AppData\Local\Temp\is-J69GR.tmp\is-MD2JH.tmpimage
MD5:AEE8E80B35DCB3CF2A5733BA99231560
SHA256:35BBD8F390865173D65BA2F38320A04755541A0783E9F825FDB9862F80D97AA9
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
20
TCP/UDP connections
214
DNS requests
274
Threats
17

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4920
file_rdk2-W1.tmp
GET
200
95.168.168.24:80
http://dl.jalecdn.com/ES/five-nights-at-freddys-3.zip
unknown
unknown
6324
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6324
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
8036
svchost.exe
HEAD
200
208.89.74.23:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/3aeadfbf-fadd-43ac-a5d9-c143db5f63d8?P1=1747463157&P2=404&P3=2&P4=cFRAUxi4zTY%2b1eFDaRZdpqkJgESRNHwIHDKEbYQaNCSMORyW60Vxiy7Wvday%2bxscVtO2cPEAzqo2Uh0CW5G%2bBg%3d%3d
unknown
whitelisted
8036
svchost.exe
GET
206
208.89.74.23:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/3aeadfbf-fadd-43ac-a5d9-c143db5f63d8?P1=1747463157&P2=404&P3=2&P4=cFRAUxi4zTY%2b1eFDaRZdpqkJgESRNHwIHDKEbYQaNCSMORyW60Vxiy7Wvday%2bxscVtO2cPEAzqo2Uh0CW5G%2bBg%3d%3d
unknown
whitelisted
8036
svchost.exe
GET
206
208.89.74.23:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/3aeadfbf-fadd-43ac-a5d9-c143db5f63d8?P1=1747463157&P2=404&P3=2&P4=cFRAUxi4zTY%2b1eFDaRZdpqkJgESRNHwIHDKEbYQaNCSMORyW60Vxiy7Wvday%2bxscVtO2cPEAzqo2Uh0CW5G%2bBg%3d%3d
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.32.133:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.194
  • 23.48.23.147
  • 23.48.23.146
  • 23.48.23.193
  • 23.48.23.140
  • 23.48.23.138
  • 23.48.23.141
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
google.com
  • 216.58.206.78
whitelisted
client.wns.windows.com
  • 172.211.123.249
  • 172.211.123.248
whitelisted
login.live.com
  • 40.126.32.133
  • 20.190.160.22
  • 20.190.160.3
  • 40.126.32.136
  • 40.126.32.140
  • 20.190.160.5
  • 20.190.160.65
  • 20.190.160.66
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
dy5wf71dvafjw.cloudfront.net
  • 108.138.2.53
  • 108.138.2.61
  • 108.138.2.86
  • 108.138.2.72
whitelisted
de1k8xcm09f8m.cloudfront.net
  • 3.160.156.109
  • 3.160.156.96
  • 3.160.156.117
  • 3.160.156.104
whitelisted
cdn.download.it
  • 104.22.56.224
  • 104.22.57.224
  • 172.67.26.92
whitelisted

Threats

PID
Process
Class
Message
4920
file_rdk2-W1.tmp
Possibly Unwanted Program Detected
ADWARE [ANY.RUN] InnoSetup Installer
5392
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Hosted Libraries (ajax .googleapis .com)
5392
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Hosted Libraries (ajax .googleapis .com)
5392
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Hosted Libraries (ajax .googleapis .com)
5392
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Hosted Libraries (ajax .googleapis .com)
5392
msedge.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
5392
msedge.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
5392
msedge.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
5392
msedge.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
5392
msedge.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
No debug info