File name:

frzfonts_d165396.exe

Full analysis: https://app.any.run/tasks/0ecc18c5-1121-4738-a0c7-5732db71c914
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: April 17, 2025, 18:56:49
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 40 sections
MD5:

F68BF72E89DFEFAB0EFEB866F2396551

SHA1:

F54943439D4396F0D308DD047065587ABAA0D1CB

SHA256:

222F95E867DB0F9A8C6C7F6F107D66EB2B14351C0B5D2697D96AD764CC197F94

SSDEEP:

49152:byjIdaWHLLj7Qwx7awpKapkwuqFLKYjXaotrNOb04vWgskAjt+kk0J7zzRj2xmRf:bsh2gw8wpKapkPqBKY7BOb04+gqt9J7/

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • frzfonts_d165396.exe (PID: 496)
      • frzfonts_d165396.exe (PID: 900)
      • frzfonts_d165396.exe (PID: 6708)
    • Steals credentials from Web Browsers

      • frzfonts_d165396.exe (PID: 900)
  • SUSPICIOUS

    • Application launched itself

      • frzfonts_d165396.exe (PID: 6708)
    • Reads security settings of Internet Explorer

      • cookieman.exe (PID: 7204)
      • frzfonts_d165396.exe (PID: 900)
    • Executable content was dropped or overwritten

      • frzfonts_d165396.exe (PID: 900)
    • Potential Corporate Privacy Violation

      • frzfonts_d165396.exe (PID: 900)
  • INFO

    • Checks supported languages

      • frzfonts_d165396.exe (PID: 6708)
      • frzfonts_d165396.exe (PID: 900)
      • cookieman.exe (PID: 7204)
    • Create files in a temporary directory

      • frzfonts_d165396.exe (PID: 6708)
      • frzfonts_d165396.exe (PID: 900)
    • Reads the computer name

      • frzfonts_d165396.exe (PID: 900)
      • cookieman.exe (PID: 7204)
      • frzfonts_d165396.exe (PID: 6708)
    • Creates files or folders in the user directory

      • frzfonts_d165396.exe (PID: 900)
      • cookieman.exe (PID: 7204)
    • Process checks whether UAC notifications are on

      • frzfonts_d165396.exe (PID: 900)
      • frzfonts_d165396.exe (PID: 6708)
    • Checks proxy server information

      • cookieman.exe (PID: 7204)
      • frzfonts_d165396.exe (PID: 900)
    • The sample compiled with english language support

      • frzfonts_d165396.exe (PID: 6708)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (56.1)
.scr | Windows screen saver (26.6)
.exe | Win32 Executable (generic) (9.1)
.exe | Generic Win/DOS Executable (4)
.exe | DOS Executable Generic (4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2012:10:10 21:52:17+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 9
CodeSize: 1098240
InitializedDataSize: 528896
UninitializedDataSize: -
EntryPoint: 0x38d4
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 2.119.2.0
ProductVersionNumber: 2.119.2.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: W3i, LLC
FileDescription: InstallIQ Installation Utility
FileVersion: 2.119.2.0
InternalName: InstallIQ.exe
LegalCopyright: Copyright ©2011 W3i Holdings, LLC. All rights reserved.
OriginalFileName: InstallIQ.exe
ProductName: InstallIQ Installation Utility
ProductVersion: 2.119.2.0
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
135
Monitored processes
6
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start frzfonts_d165396.exe frzfonts_d165396.exe cookieman.exe no specs sppextcomobj.exe no specs slui.exe no specs frzfonts_d165396.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
496"C:\Users\admin\AppData\Local\Temp\frzfonts_d165396.exe" C:\Users\admin\AppData\Local\Temp\frzfonts_d165396.exeexplorer.exe
User:
admin
Company:
W3i, LLC
Integrity Level:
MEDIUM
Description:
InstallIQ Installation Utility
Exit code:
3221226540
Version:
2.119.2.0
Modules
Images
c:\users\admin\appdata\local\temp\frzfonts_d165396.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
900"C:\Users\admin\AppData\Local\Temp\frzfonts_d165396.exe" /wrapper /dir="C:\Users\admin\AppData\Local\Temp\pkg_1238372990"C:\Users\admin\AppData\Local\Temp\frzfonts_d165396.exe
frzfonts_d165396.exe
User:
admin
Company:
W3i, LLC
Integrity Level:
HIGH
Description:
InstallIQ Installation Utility
Version:
2.119.2.0
Modules
Images
c:\users\admin\appdata\local\temp\frzfonts_d165396.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6708"C:\Users\admin\AppData\Local\Temp\frzfonts_d165396.exe" C:\Users\admin\AppData\Local\Temp\frzfonts_d165396.exe
explorer.exe
User:
admin
Company:
W3i, LLC
Integrity Level:
HIGH
Description:
InstallIQ Installation Utility
Version:
2.119.2.0
Modules
Images
c:\users\admin\appdata\local\temp\frzfonts_d165396.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
7204"C:\Users\admin\AppData\LocalLow\cookieman.exe" /mode=read installiq.comC:\Users\admin\AppData\LocalLow\cookieman.exefrzfonts_d165396.exe
User:
admin
Integrity Level:
LOW
Exit code:
0
Modules
Images
c:\users\admin\appdata\locallow\cookieman.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
7332C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7364"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
950
Read events
946
Write events
1
Delete events
3

Modification events

(PID) Process:(900) frzfonts_d165396.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Freeze.com\Installer
Operation:writeName:test
Value:
1
(PID) Process:(900) frzfonts_d165396.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Freeze.com\Installer
Operation:delete valueName:test
Value:
1
(PID) Process:(900) frzfonts_d165396.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Freeze.com\Installer
Operation:delete keyName:(default)
Value:
(PID) Process:(900) frzfonts_d165396.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Freeze.com
Operation:delete keyName:(default)
Value:
Executable files
2
Suspicious files
1
Text files
4
Unknown types
0

Dropped files

PID
Process
Filename
Type
6708frzfonts_d165396.exeC:\Users\admin\AppData\Local\Temp\pkg_1238372990\timings.txttext
MD5:A4F073929843019089F6CEDDBC3A7349
SHA256:474E637E57CEEB777BBF4CCE8E8881E933B4CAD5E817DEAB6320FD68784E0A4A
6708frzfonts_d165396.exeC:\Users\admin\AppData\Local\Temp\pkg_1238372990\stub.logtext
MD5:88F8DCE81BF85EA6A742583C6EE243EC
SHA256:CBA44AFAC479BC201D559E841B71A5B9B2CD37B9BB6117740DBA2F3C2AEF03E8
6708frzfonts_d165396.exeC:\Users\admin\AppData\Local\Temp\pkg_1238372990\wrapper.xmltext
MD5:44601E00FF712607D2A0B64DE786D843
SHA256:424EF303F88BCD0C6AF1858CDACC0E3225545957FCB6C49110E39FF39B26B7F9
900frzfonts_d165396.exeC:\Users\admin\AppData\LocalLow\cookieman.exeexecutable
MD5:464785E8DC7A5EF92CB25009156D8F3E
SHA256:C04E67495D6349BB2A5819E05A112D5EC12C7660E55557A7D6F2F6D9C0884B1E
6708frzfonts_d165396.exeC:\Users\admin\AppData\Local\Temp\pkg_1238372990\autorun.txttext
MD5:6DBB52B31EDA160FF7D94F0E6740D265
SHA256:B08CFCC78361B170F55272DAC1504CA43F5DA37B4A819C800BB1F49F1CA3693F
900frzfonts_d165396.exeC:\Users\admin\AppData\Local\Temp\pkg_1238372990\detectionrules.datbinary
MD5:16B103D537DD0931956EE61294CF599F
SHA256:448C78AA009CAE1F3B98FD34DFFDBD4580CD3F902B24FA9D85EB0A4CB79DA99B
7204cookieman.exeC:\Users\admin\AppData\LocalLow\cookie.initext
MD5:3F4519B56CB1E006DFE4341E72112913
SHA256:125ADF4924899F2026436C0919853BB78B718C7CB6F2187148B01938B79388A2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
21
DNS requests
14
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
104.124.11.17:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
900
frzfonts_d165396.exe
GET
302
192.157.56.141:80
http://dl.installiq.com/api/detectionrequest.aspx?keyid=1&shortname=frzfonts&langid=0x0409
unknown
unknown
900
frzfonts_d165396.exe
GET
200
208.91.196.145:80
http://ww1.installiq.com/
unknown
malicious
7884
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7884
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
104.124.11.17:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
6544
svchost.exe
20.190.160.131:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
900
frzfonts_d165396.exe
192.157.56.141:80
dl.installiq.com
SERVER-MANIA
US
suspicious
900
frzfonts_d165396.exe
208.91.196.145:80
ww1.installiq.com
CONFLUENCE-NETWORK-INC
VG
malicious
2112
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.206.78
whitelisted
crl.microsoft.com
  • 104.124.11.17
  • 104.124.11.58
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
  • 20.73.194.208
whitelisted
login.live.com
  • 20.190.160.131
  • 20.190.160.14
  • 20.190.160.128
  • 20.190.160.22
  • 40.126.32.138
  • 40.126.32.133
  • 20.190.160.67
  • 20.190.160.17
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
dl.installiq.com
  • 192.157.56.141
unknown
ww1.installiq.com
  • 208.91.196.145
malicious
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
www.microsoft.com
  • 2.16.253.202
whitelisted

Threats

PID
Process
Class
Message
900
frzfonts_d165396.exe
Potential Corporate Privacy Violation
ET INFO InstallIQ Updater Software request
No debug info