File name:

activate-idm.ps1

Full analysis: https://app.any.run/tasks/af09a08a-2575-44a0-b069-2f6316abda7d
Verdict: Malicious activity
Analysis date: July 27, 2025, 16:30:26
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
github
arch-exec
arch-doc
Indicators:
MIME: text/plain
File info: Unicode text, UTF-8 text, with CRLF line terminators
MD5:

6096F67803669F0471E191E01E1873FF

SHA1:

8DFDD5D195E7C6034321142AFC4AE610430CEA7E

SHA256:

258FAD9D13AA4335575F4E47D44001931F606ADB9A69A94E28ACF6A068FFF4F0

SSDEEP:

12:9v9AdRRAVxXt4isgAjmRAVWu22gZV1QUcOFFRAVEMxvU:QwVxXuXDVqzDc/VJxvU

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Bypass execution policy to execute commands

      • powershell.exe (PID: 2716)
    • Script downloads file (POWERSHELL)

      • powershell.exe (PID: 2716)
  • SUSPICIOUS

    • Gets file extension (POWERSHELL)

      • powershell.exe (PID: 2716)
    • Uses sleep to delay execution (POWERSHELL)

      • powershell.exe (PID: 2716)
    • Executable content was dropped or overwritten

      • powershell.exe (PID: 2716)
    • Starts CMD.EXE for commands execution

      • powershell.exe (PID: 2716)
      • wscript.exe (PID: 6636)
      • cmd.exe (PID: 3964)
    • Executing commands from ".cmd" file

      • powershell.exe (PID: 2716)
      • wscript.exe (PID: 6636)
    • Uses ICACLS.EXE to modify access control lists

      • cmd.exe (PID: 4880)
      • cmd.exe (PID: 3964)
    • The process executes VB scripts

      • cmd.exe (PID: 4880)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 6636)
    • Starts application with an unusual extension

      • cmd.exe (PID: 3964)
    • Application launched itself

      • cmd.exe (PID: 3964)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 5372)
  • INFO

    • Disables trace logs

      • powershell.exe (PID: 2716)
    • Checks whether the specified file exists (POWERSHELL)

      • powershell.exe (PID: 2716)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 2716)
    • Checks proxy server information

      • powershell.exe (PID: 2716)
    • The sample compiled with english language support

      • powershell.exe (PID: 2716)
    • Starts MODE.COM to configure console settings

      • mode.com (PID: 1740)
      • mode.com (PID: 1056)
    • Checks supported languages

      • mode.com (PID: 1740)
      • mode.com (PID: 1056)
      • chcp.com (PID: 6240)
      • curl.exe (PID: 3620)
    • Execution of CURL command

      • cmd.exe (PID: 3964)
    • Reads the computer name

      • curl.exe (PID: 3620)
    • Create files in a temporary directory

      • curl.exe (PID: 3620)
    • Changes the display of characters in the console

      • cmd.exe (PID: 3964)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
152
Monitored processes
17
Malicious processes
2
Suspicious processes
2

Behavior graph

Click at the process to see the details
start powershell.exe conhost.exe no specs cmd.exe no specs conhost.exe no specs mode.com no specs cacls.exe no specs wscript.exe no specs cmd.exe conhost.exe no specs mode.com no specs cacls.exe no specs chcp.com no specs ping.exe no specs curl.exe cmd.exe no specs findstr.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1056mode con: cols=120 lines=40C:\Windows\System32\mode.comcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
DOS Device MODE Utility
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\mode.com
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\ureg.dll
c:\windows\system32\ulib.dll
1488"C:\WINDOWS\system32\cacls.exe" "C:\WINDOWS\system32\config\system"C:\Windows\System32\cacls.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Control ACLs Program
Exit code:
5
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cacls.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\ucrtbase.dll
1740mode con: cols=120 lines=40C:\Windows\System32\mode.comcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
DOS Device MODE Utility
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\mode.com
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
2192\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2716"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ep bypass C:\Users\admin\AppData\Local\Temp\activate-idm.ps1C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3620curl -s "https://api.github.com/repos/coporton/IDM-Activation-Script/releases/latest" -o "C:\Users\admin\AppData\Local\Temp\latest_release.json"C:\Windows\System32\curl.exe
cmd.exe
User:
admin
Company:
curl, https://curl.se/
Integrity Level:
HIGH
Description:
The curl executable
Exit code:
0
Version:
8.4.0
Modules
Images
c:\windows\system32\curl.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\cryptsp.dll
3624ping -n 1 google.com C:\Windows\System32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
TCP/IP Ping Command
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\ping.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\dnsapi.dll
3964"C:\WINDOWS\System32\cmd.exe" /C "C:\Users\admin\AppData\Local\Temp\RE0GA1~1\IDM-AC~1\IASL.cmd" C:\Windows\System32\cmd.exe
wscript.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\cmdext.dll
c:\windows\system32\advapi32.dll
4100\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4788C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
12 270
Read events
12 267
Write events
3
Delete events
0

Modification events

(PID) Process:(4880) cmd.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbs\OpenWithProgids
Operation:writeName:VBSFile
Value:
(PID) Process:(6636) wscript.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\WINDOWS\System32\cmd.exe.FriendlyAppName
Value:
Windows Command Processor
(PID) Process:(6636) wscript.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
Operation:writeName:C:\WINDOWS\System32\cmd.exe.ApplicationCompany
Value:
Microsoft Corporation
Executable files
2
Suspicious files
6
Text files
10
Unknown types
0

Dropped files

PID
Process
Filename
Type
2716powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF18cbb7.TMPbinary
MD5:00A03B286E6E0EBFF8D9C492365D5EC2
SHA256:4DBFC417D053BA6867308671F1C61F4DCAFC61F058D4044DB532DA6D3BDE3615
2716powershell.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msbinary
MD5:5BB7E599ED14B2594516FA77AF028B77
SHA256:D5466429E26C18737A9C58D39A96783551DDFA41946A147300FF050C5315A972
2716powershell.exeC:\Users\admin\AppData\Local\Temp\RE0GA1NA-3MD1-AO3L-N3WO-5DT4EN5RE5TN5I\IDM-Activation-Script-main\src\extensions.bintext
MD5:D75CEB6BEC202AC2E4157FA5CCF2EA40
SHA256:DF89AA1FF1712E82FE4C87348A745D5856D52A683C019509F7FFD02BAE7BEE0F
2716powershell.exeC:\Users\admin\AppData\Local\Temp\RE0GA1NA-3MD1-AO3L-N3WO-5DT4EN5RE5TN5I\IDM-Activation-Script-main\src\dataHlp.binexecutable
MD5:3F3303AF5B33D751BB1152110A807C7F
SHA256:DB273CC8CF91A1DF241B7511DB392524CBAB6C40F8DF7D8535ACE4B51FED9FFB
2716powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_evccbzpu.zoc.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
2716powershell.exeC:\Users\admin\AppData\Local\Temp\RE0GA1NA-3MD1-AO3L-N3WO-5DT4EN5RE5TN5I\IDM-Activation-Script-main.zipcompressed
MD5:D13B27B649C1B810EB5508BC190C8AA3
SHA256:53B20C5309487AEBB7BBEAE25415AEFCB0ADCEAA3D10C30B35F2B1A06243972A
2716powershell.exeC:\Users\admin\AppData\Local\Temp\RE0GA1NA-3MD1-AO3L-N3WO-5DT4EN5RE5TN5I\IDM-Activation-Script-main\IASL.cmdtext
MD5:6F859F26BE3669D260D528F9D55EE8D7
SHA256:ECA26504D031FA05CDF97029952843C7471567C76C2794F739F361EAFE5E6950
2716powershell.exeC:\Users\admin\AppData\Local\Temp\RE0GA1NA-3MD1-AO3L-N3WO-5DT4EN5RE5TN5I\IDM-Activation-Script-main\src\banner_art.txttext
MD5:13BFEF56E214DC91015E3341ACDA17E9
SHA256:86EA90A9D22AA5CF5DD15C14C869DA34FEA66E427EE4863A9DA68BAC8740B8EE
2716powershell.exeC:\Users\admin\AppData\Local\Temp\RE0GA1NA-3MD1-AO3L-N3WO-5DT4EN5RE5TN5I\IDM-Activation-Script-main\README.mdtext
MD5:10105C46B39D1AC8C9F28A9C35B24833
SHA256:195F7A8D703B5047DB12BD00FB62B98754D5F22C9B1ACDCECBB9F251A1438FD2
2716powershell.exeC:\Users\admin\AppData\Local\Temp\RE0GA1NA-3MD1-AO3L-N3WO-5DT4EN5RE5TN5I\IDM-Activation-Script-main\LICENSEtext
MD5:354960CCC2E02AD40C438827EC105D18
SHA256:B800A52C77C8AC924A16BBD34136FE2877F477EFAC1EAA1AF7AF0C36703D8966
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
28
DNS requests
24
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5084
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1268
svchost.exe
GET
200
23.216.77.36:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4228
SIHClient.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
4228
SIHClient.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
764
lsass.exe
GET
200
172.64.149.23:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEFZnHQTqT5lMbxCBR1nSdZQ%3D
unknown
whitelisted
764
lsass.exe
GET
200
172.64.149.23:80
http://ocsp.usertrust.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBSr83eyJy3njhjVpn5bEpfc6MXawQQUOuEJhtTPGcKWdnRJdtzgNcZjY5oCEQDzZE5rbgBQI34JRr174fUd
unknown
whitelisted
764
lsass.exe
GET
200
104.18.38.233:80
http://ocsp.sectigo.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTPlNxcMEqnlIVyH5VuZ4lawhZX3QQU9oUKOxGG4QR9DqoLLNLuzGR7e64CECoW9cIBGAf3CpJj3Tw5qfI%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1636
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
2716
powershell.exe
103.118.78.250:443
coporton.com
Vision Technologies Ltd.
BD
unknown
2716
powershell.exe
140.82.121.3:443
github.com
GITHUB
US
whitelisted
2716
powershell.exe
185.199.111.133:443
release-assets.githubusercontent.com
FASTLY
US
unknown
2716
powershell.exe
169.61.27.133:443
www.internetdownloadmanager.com
SOFTLAYER
US
whitelisted
5084
svchost.exe
20.190.159.73:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
  • 40.127.240.158
whitelisted
google.com
  • 142.250.184.238
whitelisted
coporton.com
  • 103.118.78.250
unknown
github.com
  • 140.82.121.3
whitelisted
release-assets.githubusercontent.com
  • 185.199.111.133
  • 185.199.109.133
  • 185.199.110.133
  • 185.199.108.133
unknown
www.internetdownloadmanager.com
  • 169.61.27.133
whitelisted
login.live.com
  • 20.190.159.73
  • 40.126.31.67
  • 40.126.31.130
  • 20.190.159.75
  • 40.126.31.69
  • 20.190.159.0
  • 40.126.31.73
  • 40.126.31.129
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
crl.microsoft.com
  • 23.216.77.36
  • 23.216.77.7
  • 23.216.77.5
  • 23.216.77.25
  • 23.216.77.22
  • 23.216.77.15
  • 23.216.77.28
  • 23.216.77.39
  • 23.216.77.21
whitelisted
www.microsoft.com
  • 69.192.161.161
whitelisted

Threats

PID
Process
Class
Message
Not Suspicious Traffic
ET INFO Windows Powershell User-Agent Usage
2200
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access release user assets on GitHub
Not Suspicious Traffic
ET INFO Windows Powershell User-Agent Usage
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
No debug info