File name:

temp.7z

Full analysis: https://app.any.run/tasks/763f7742-2fef-4041-bd33-d1ad82dfc6d9
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: April 18, 2025, 16:11:00
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
idm
tool
stealer
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

68ABD640FD61F1E99E79CBEA80F4FF6D

SHA1:

DEFD61466A49C4B4D8C5EE895AED5F16BD603A7C

SHA256:

2D91925CE1B9EB5818B82ADFA717DBCBEFB836CCA85DBF2214543D1B57881D80

SSDEEP:

98304:qZRligm7JREIxBfQ6BmSfrK8u5K/8WJ9emmwuiuXlIUhBb+rQbbRfM3Lsip6AZaO:LVeD7wnvgjFo7gxr1HJlg3vKPWxd7L

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 7336)
    • Registers / Runs the DLL via REGSVR32.EXE

      • IDM1.tmp (PID: 7740)
      • IDMan.exe (PID: 7784)
      • IDMan.exe (PID: 2384)
      • Uninstall.exe (PID: 6752)
      • Uninstall.exe (PID: 7820)
    • Changes the autorun value in the registry

      • rundll32.exe (PID: 8036)
      • rundll32.exe (PID: 736)
      • IDMan.exe (PID: 7784)
    • Starts NET.EXE for service management

      • net.exe (PID: 8860)
      • net.exe (PID: 8956)
      • Uninstall.exe (PID: 7820)
      • net.exe (PID: 8220)
      • net.exe (PID: 8212)
      • Uninstall.exe (PID: 6752)
      • net.exe (PID: 8656)
      • net.exe (PID: 8760)
      • net.exe (PID: 8520)
    • Opens an HTTP connection (SCRIPT)

      • wscript.exe (PID: 1812)
      • wscript.exe (PID: 5260)
    • Creates internet connection object (SCRIPT)

      • wscript.exe (PID: 5260)
      • wscript.exe (PID: 1812)
    • Sends HTTP request (SCRIPT)

      • wscript.exe (PID: 1812)
      • wscript.exe (PID: 5260)
    • Deletes a file (SCRIPT)

      • wscript.exe (PID: 1812)
      • wscript.exe (PID: 5260)
    • Actions looks like stealing of personal data

      • IDMan.exe (PID: 8964)
  • SUSPICIOUS

    • Starts application with an unusual extension

      • idman642build32.exe (PID: 7656)
      • cmd.exe (PID: 3240)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 7336)
      • IDM1.tmp (PID: 7740)
      • IDMan.exe (PID: 2384)
      • IDMan.exe (PID: 7784)
      • Uninstall.exe (PID: 7820)
      • Uninstall.exe (PID: 6752)
      • IDMan.exe (PID: 8964)
    • The process creates files with name similar to system file names

      • IDM1.tmp (PID: 7740)
    • Creates a software uninstall entry

      • IDM1.tmp (PID: 7740)
    • Creates/Modifies COM task schedule object

      • IDM1.tmp (PID: 7740)
      • regsvr32.exe (PID: 5072)
      • regsvr32.exe (PID: 7172)
      • regsvr32.exe (PID: 6640)
      • IDMan.exe (PID: 2384)
      • regsvr32.exe (PID: 7264)
      • regsvr32.exe (PID: 5408)
      • regsvr32.exe (PID: 6404)
      • regsvr32.exe (PID: 904)
      • regsvr32.exe (PID: 9072)
      • regsvr32.exe (PID: 8476)
    • Executable content was dropped or overwritten

      • IDMan.exe (PID: 7784)
      • IDMan.exe (PID: 2384)
      • rundll32.exe (PID: 736)
      • rundll32.exe (PID: 8036)
      • drvinst.exe (PID: 7268)
      • drvinst.exe (PID: 2152)
      • IDM_6.4x_Crack_v20.0.exe (PID: 2568)
    • Uses RUNDLL32.EXE to load library

      • Uninstall.exe (PID: 7820)
      • Uninstall.exe (PID: 6752)
    • Drops a system driver (possible attempt to evade defenses)

      • rundll32.exe (PID: 736)
      • drvinst.exe (PID: 7268)
      • drvinst.exe (PID: 2152)
      • rundll32.exe (PID: 8036)
    • Creates files in the driver directory

      • drvinst.exe (PID: 7268)
      • drvinst.exe (PID: 2152)
    • Creates or modifies Windows services

      • drvinst.exe (PID: 1168)
      • drvinst.exe (PID: 6736)
      • Uninstall.exe (PID: 7820)
      • Uninstall.exe (PID: 6752)
    • Creates FileSystem object to access computer's file system (SCRIPT)

      • wscript.exe (PID: 1812)
      • wscript.exe (PID: 5260)
    • The process downloads a VBScript from the remote host

      • IDM_6.4x_Crack_v20.0.exe (PID: 2568)
    • The process executes VB scripts

      • IDM_6.4x_Crack_v20.0.exe (PID: 2568)
    • Gets full path of the running script (SCRIPT)

      • wscript.exe (PID: 1812)
      • wscript.exe (PID: 5260)
    • Adds, changes, or deletes HTTP request header (SCRIPT)

      • wscript.exe (PID: 1812)
      • wscript.exe (PID: 5260)
    • Starts CMD.EXE for commands execution

      • IDM_6.4x_Crack_v20.0.exe (PID: 2568)
      • cmd.exe (PID: 5600)
      • cmd.exe (PID: 3240)
    • Uses REG/REGEDIT.EXE to modify registry

      • IDM_6.4x_Crack_v20.0.exe (PID: 2568)
      • cmd.exe (PID: 3240)
      • cmd.exe (PID: 1188)
    • Application launched itself

      • cmd.exe (PID: 3240)
      • cmd.exe (PID: 5600)
    • Executing commands from a ".bat" file

      • IDM_6.4x_Crack_v20.0.exe (PID: 2568)
      • cmd.exe (PID: 3240)
    • Probably obfuscated PowerShell command line is found

      • cmd.exe (PID: 3240)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 3240)
      • cmd.exe (PID: 8264)
      • cmd.exe (PID: 6264)
    • Possibly malicious use of IEX has been detected

      • cmd.exe (PID: 3240)
    • Sets XML DOM element text (SCRIPT)

      • wscript.exe (PID: 1812)
      • wscript.exe (PID: 5260)
    • Hides command output

      • cmd.exe (PID: 8264)
      • cmd.exe (PID: 1188)
    • There is functionality for taking screenshot (YARA)

      • IDMIntegrator64.exe (PID: 9060)
  • INFO

    • The sample compiled with english language support

      • WinRAR.exe (PID: 7336)
      • IDMan.exe (PID: 7784)
      • IDMan.exe (PID: 2384)
      • drvinst.exe (PID: 7268)
      • drvinst.exe (PID: 2152)
      • rundll32.exe (PID: 736)
      • rundll32.exe (PID: 8036)
      • IDM_6.4x_Crack_v20.0.exe (PID: 2568)
    • Create files in a temporary directory

      • idman642build32.exe (PID: 7656)
      • IDM1.tmp (PID: 7740)
      • IDMan.exe (PID: 2384)
      • IDMan.exe (PID: 7784)
      • rundll32.exe (PID: 736)
      • rundll32.exe (PID: 8036)
      • IDM_6.4x_Crack_v20.0.exe (PID: 2568)
      • reg.exe (PID: 7772)
      • IDMan.exe (PID: 8964)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7336)
    • Checks supported languages

      • idman642build32.exe (PID: 7656)
      • IDM1.tmp (PID: 7740)
      • idmBroker.exe (PID: 8188)
      • IDMan.exe (PID: 2384)
      • IDMan.exe (PID: 7784)
      • IDMIntegrator64.exe (PID: 7828)
      • Uninstall.exe (PID: 7820)
      • Uninstall.exe (PID: 6752)
      • drvinst.exe (PID: 2152)
      • drvinst.exe (PID: 7268)
      • drvinst.exe (PID: 6736)
      • drvinst.exe (PID: 1168)
      • MediumILStart.exe (PID: 9100)
      • IDM_6.4x_Crack_v20.0.exe (PID: 2568)
      • chcp.com (PID: 7812)
      • IDMan.exe (PID: 8964)
      • IDMIntegrator64.exe (PID: 9060)
    • Reads the computer name

      • IDM1.tmp (PID: 7740)
      • idman642build32.exe (PID: 7656)
      • idmBroker.exe (PID: 8188)
      • IDMan.exe (PID: 2384)
      • IDMan.exe (PID: 7784)
      • IDMIntegrator64.exe (PID: 7828)
      • Uninstall.exe (PID: 7820)
      • Uninstall.exe (PID: 6752)
      • drvinst.exe (PID: 7268)
      • drvinst.exe (PID: 6736)
      • drvinst.exe (PID: 1168)
      • MediumILStart.exe (PID: 9100)
      • IDM_6.4x_Crack_v20.0.exe (PID: 2568)
      • IDMan.exe (PID: 8964)
      • IDMIntegrator64.exe (PID: 9060)
    • Creates files in the program directory

      • IDM1.tmp (PID: 7740)
      • IDMan.exe (PID: 2384)
      • IDM_6.4x_Crack_v20.0.exe (PID: 2568)
    • Creates files or folders in the user directory

      • IDM1.tmp (PID: 7740)
      • IDMan.exe (PID: 2384)
      • IDMan.exe (PID: 7784)
      • IDMan.exe (PID: 8964)
    • INTERNETDOWNLOADMANAGER mutex has been found

      • IDM1.tmp (PID: 7740)
      • IDMan.exe (PID: 2384)
      • IDMan.exe (PID: 7784)
      • IDMIntegrator64.exe (PID: 7828)
      • IDMan.exe (PID: 8964)
      • IDMIntegrator64.exe (PID: 9060)
    • Process checks computer location settings

      • IDM1.tmp (PID: 7740)
      • IDMan.exe (PID: 2384)
      • IDMan.exe (PID: 7784)
      • Uninstall.exe (PID: 7820)
      • Uninstall.exe (PID: 6752)
      • IDMan.exe (PID: 8964)
    • Disables trace logs

      • IDMan.exe (PID: 2384)
      • IDMan.exe (PID: 7784)
      • IDMan.exe (PID: 8964)
    • Reads the software policy settings

      • IDMan.exe (PID: 2384)
      • IDMan.exe (PID: 7784)
      • drvinst.exe (PID: 7268)
      • drvinst.exe (PID: 2152)
      • slui.exe (PID: 7500)
      • IDMan.exe (PID: 8964)
      • slui.exe (PID: 8936)
    • Checks proxy server information

      • IDMan.exe (PID: 2384)
      • IDMan.exe (PID: 7784)
      • wscript.exe (PID: 1812)
      • wscript.exe (PID: 5260)
      • IDMan.exe (PID: 8964)
      • slui.exe (PID: 8936)
    • Reads the machine GUID from the registry

      • IDMan.exe (PID: 2384)
      • IDMan.exe (PID: 7784)
      • drvinst.exe (PID: 7268)
      • drvinst.exe (PID: 2152)
      • IDMan.exe (PID: 8964)
    • Manual execution by a user

      • IDMan.exe (PID: 7784)
      • firefox.exe (PID: 7000)
      • IDMan.exe (PID: 8964)
      • firefox.exe (PID: 9200)
    • Application launched itself

      • firefox.exe (PID: 7000)
      • firefox.exe (PID: 4448)
      • firefox.exe (PID: 9200)
      • firefox.exe (PID: 1128)
    • Reads the time zone

      • runonce.exe (PID: 7896)
    • Reads security settings of Internet Explorer

      • runonce.exe (PID: 5984)
    • Checks operating system version

      • cmd.exe (PID: 3240)
    • Checks whether the specified file exists (POWERSHELL)

      • powershell.exe (PID: 8336)
      • powershell.exe (PID: 8004)
    • Changes the display of characters in the console

      • cmd.exe (PID: 3240)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)

EXIF

ZIP

FileVersion: 7z v0.04
ModifyDate: 2025:04:18 16:09:49+00:00
ArchivedFileName: idman642build32.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
285
Monitored processes
143
Malicious processes
14
Suspicious processes
2

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe idman642build32.exe no specs idman642build32.exe idm1.tmp no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs idmbroker.exe no specs regsvr32.exe no specs regsvr32.exe no specs idman.exe regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs idman.exe regsvr32.exe no specs idmintegrator64.exe no specs regsvr32.exe no specs uninstall.exe no specs uninstall.exe rundll32.exe firefox.exe no specs uninstall.exe no specs rundll32.exe firefox.exe no specs firefox.exe firefox.exe no specs drvinst.exe firefox.exe no specs drvinst.exe firefox.exe no specs drvinst.exe no specs drvinst.exe no specs runonce.exe no specs firefox.exe no specs runonce.exe no specs firefox.exe no specs firefox.exe no specs grpconv.exe no specs net.exe no specs net.exe no specs conhost.exe no specs conhost.exe no specs net1.exe no specs net1.exe no specs regsvr32.exe no specs regsvr32.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs regsvr32.exe no specs regsvr32.exe no specs mediumilstart.exe no specs idm_6.4x_crack_v20.0.exe no specs idm_6.4x_crack_v20.0.exe wscript.exe wscript.exe reg.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs reg.exe no specs find.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs find.exe no specs powershell.exe no specs find.exe no specs powershell.exe no specs find.exe no specs cmd.exe no specs powershell.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs cmd.exe no specs powershell.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs powershell.exe no specs chcp.com no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs slui.exe idman.exe idmintegrator64.exe no specs firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs rundll32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
668C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
680"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4908 -childID 3 -isForBrowser -prefsHandle 4832 -prefMapHandle 4900 -prefsLen 36588 -prefMapSize 244583 -jsInitHandle 1484 -jsInitLen 235124 -parentBuildID 20240213221259 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7ff709dd-22a5-4a86-8f6d-9e7eefdfc756} 4448 "\\.\pipe\gecko-crash-server-pipe.4448" 1f78aae9bd0 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
123.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\msvcp140.dll
c:\windows\system32\vcruntime140.dll
736"C:\WINDOWS\Sysnative\RUNDLL32.EXE" SETUPAPI.DLL,InstallHinfSection DefaultInstall 128 C:\Program Files (x86)\Internet Download Manager\idmwfp.infC:\Windows\System32\rundll32.exe
Uninstall.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
904 /s "C:\Program Files (x86)\Internet Download Manager\downlWithIDM64.dll"C:\Windows\System32\regsvr32.exeregsvr32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1128"C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
123.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\msvcp140.dll
c:\windows\system32\vcruntime140.dll
1132reg add HKU\S-1-5-21-1693682860-607145093-2874071422-1001\Software\Classes\Wow6432Node\CLSID\IAS_TESTC:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ws2_32.dll
1168DrvInst.exe "8" "4" "C:\WINDOWS\System32\DriverStore\FileRepository\idmwfp.inf_amd64_8b0ebbc2b4585464\idmwfp.inf" "0" "4fc2928b3" "0000000000000208" "WinSta0\Default"C:\Windows\System32\drvinst.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\drvinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\devrtl.dll
c:\windows\system32\drvstore.dll
1168reg query HKU\S-1-5-21-1693682860-607145093-2874071422-1001\IAS_TEST C:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ws2_32.dll
1188C:\WINDOWS\system32\cmd.exe /c reg query "HKU\S-1-5-21-1693682860-607145093-2874071422-1001\Software\DownloadManager" /v ExePath 2>nulC:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
1512"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5152 -childID 4 -isForBrowser -prefsHandle 5320 -prefMapHandle 5316 -prefsLen 31251 -prefMapSize 244583 -jsInitHandle 1468 -jsInitLen 235124 -parentBuildID 20240213221259 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b600936b-4643-46b4-a1a8-3581ef51dc02} 1128 "\\.\pipe\gecko-crash-server-pipe.1128" 2297cb79310 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
123.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\msvcp140.dll
c:\windows\system32\vcruntime140.dll
Total events
74 998
Read events
74 199
Write events
623
Delete events
176

Modification events

(PID) Process:(7336) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7336) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7336) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7336) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\temp.7z
(PID) Process:(7336) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7336) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7336) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7336) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7740) IDM1.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Internet Download Manager
Operation:writeName:DisplayVersion
Value:
6.42.32
(PID) Process:(7740) IDM1.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Internet Download Manager
Operation:writeName:DisplayIcon
Value:
C:\Program Files (x86)\Internet Download Manager\IDMan.exe
Executable files
24
Suspicious files
238
Text files
57
Unknown types
2

Dropped files

PID
Process
Filename
Type
7336WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa7336.48366\idman642build32.exeexecutable
MD5:FB92734F62D9F245501B431EA2A8A0DD
SHA256:61044611E584662744ED08014D9A14CF76955128A9B997D008EFC09EBC1FEB49
7740IDM1.tmpC:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Download Manager\license.lnkbinary
MD5:6A6081EDC83895F6185D7C10B2491557
SHA256:CCB3E463988D84596C306A1D0741ED65BFC470EB32CBF0037D69635F358AE06D
7740IDM1.tmpC:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Download Manager\IDM Help.lnkbinary
MD5:7C56BD860C110B5B6288B4A8CE9F6C42
SHA256:B4125E4A5092E807C2EFD8ABC8B51CFEC71E602F813A825F890B15E41BB918EC
7336WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa7336.48366\IDM_6.4x_Crack_v20.0.exeexecutable
MD5:7235C81D6A1990BF7301194A9F778F9A
SHA256:D05FFF510254E92AD35A002F6224ED53D2557DF2D9F158A0FCBD6574973B68DD
7740IDM1.tmpC:\Users\admin\AppData\Local\Temp\IDM_Setup_Temp\IDMSetup2.logbinary
MD5:5A032ACD38AB177AE8FBD17D52335C22
SHA256:10F2E057D9A43BC3E7C1D26CA19BC84E43BEB32D79A02EE6744468A2A0FDD808
7740IDM1.tmpC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Internet Download Manager\Uninstall IDM.lnkbinary
MD5:5671C417E593E557E0D579EB6E6E1966
SHA256:57D8EC601CDDBCD4E616FAE3751119779E70B29925BBAC89CAFB8128141B3B6F
7740IDM1.tmpC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Internet Download Manager\Internet Download Manager.lnklnk
MD5:2B76F7109B66FD099B9FD55406CFCA64
SHA256:47A96AD9C3DB971473DAFC11341B87B624BD1241FFBC6577525BC8705ED28E55
7740IDM1.tmpC:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Download Manager\Uninstall IDM.lnklnk
MD5:187385E410CAA19ED0443B5925A06BCF
SHA256:B86C3ABCB5C84B77CE10097AFFBEC258956DBFA33DDAEF5BD16C7D6824C77EEE
7740IDM1.tmpC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Internet Download Manager\license.lnkbinary
MD5:C64E0E5C3E594713A01112CF1B50CD5E
SHA256:74B10A925FAA833460AA28BC10F7A17A59622841565B211C923169CEA852BC33
7740IDM1.tmpC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Internet Download Manager\IDM Help.lnkbinary
MD5:02F2424DC47BF183D7B3A9BA7CFD1413
SHA256:67805103C828B858BAA0DF6BAD95F071275350EC25C16D8C49B570B387D3272F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
42
TCP/UDP connections
111
DNS requests
147
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.216.77.36:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
2924
SearchApp.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
2924
SearchApp.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1328
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
1328
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4448
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/canonical.html
unknown
whitelisted
4448
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
whitelisted
4448
firefox.exe
POST
200
95.101.54.123:80
http://r11.o.lencr.org/
unknown
whitelisted
4448
firefox.exe
POST
200
95.101.54.123:80
http://r11.o.lencr.org/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.216.77.36:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2112
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.31.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.216.77.36
  • 23.216.77.20
  • 23.216.77.6
  • 23.216.77.21
  • 23.216.77.15
  • 23.216.77.16
  • 23.216.77.32
  • 23.216.77.41
  • 23.216.77.18
whitelisted
google.com
  • 216.58.206.46
whitelisted
client.wns.windows.com
  • 172.211.123.249
  • 172.211.123.248
whitelisted
login.live.com
  • 40.126.31.71
  • 40.126.31.1
  • 20.190.159.130
  • 20.190.159.23
  • 20.190.159.75
  • 40.126.31.69
  • 20.190.159.71
  • 20.190.159.129
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
www.bing.com
  • 2.16.241.218
  • 2.16.241.222
  • 2.16.241.207
  • 2.16.241.205
whitelisted
fp.msedge.net
  • 204.79.197.222
whitelisted
th.bing.com
  • 2.16.241.218
  • 2.16.241.207
  • 2.16.241.205
  • 2.16.241.222
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted

Threats

No threats detected
No debug info