URL:

https://1progs.ru/bandicam-polnaya-versiya-crack/

Full analysis: https://app.any.run/tasks/45d0a337-712e-48f7-ac3e-bff0d0353714
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: October 13, 2021, 12:15:44
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MD5:

07B9167E4648651FB995C5BC28616824

SHA1:

A3A9C7A897A75F9DD2941ED529C236CDDB67F371

SHA256:

556241E222A20709AB78A15CAB81997FBE521C29AC8C3C00752EC71767636A9A

SSDEEP:

3:N8+aCMv7ff4QXN:2+aCa7ffxN

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops executable file immediately after starts

      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2424)
      • Bandicam.5.3.1.1880.exe (PID: 2552)
      • Bandicam.5.3.1.1880.tmp (PID: 1988)
    • Application was dropped or rewritten from another process

      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2516)
      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2424)
      • tt-installer-helper.exe (PID: 2652)
      • tt-installer-helper.exe (PID: 2980)
      • Bandicam.5.3.1.1880.exe (PID: 3448)
      • Bandicam.5.3.1.1880.exe (PID: 2552)
      • tt-installer-helper.exe (PID: 3384)
      • tt-cleaner.exe (PID: 116)
      • downloader.exe (PID: 2372)
      • tt-cleaner.exe (PID: 4004)
      • downloader.exe (PID: 1104)
      • YandexPackSetup.exe (PID: 4084)
      • QtWebEngineProcess.exe (PID: 412)
      • sender.exe (PID: 4532)
      • lite_installer.exe (PID: 3240)
      • Yandex.exe (PID: 5572)
      • seederexe.exe (PID: 4408)
      • Windows11InstallationAssistant.exe (PID: 5716)
    • Loads dropped or rewritten executable

      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2424)
      • tt-cleaner.exe (PID: 116)
      • tt-cleaner.exe (PID: 4004)
      • QtWebEngineProcess.exe (PID: 412)
    • Changes settings of System certificates

      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2424)
      • downloader.exe (PID: 2372)
    • Uses Task Scheduler to run other applications

      • tt-cleaner.exe (PID: 116)
    • Loads the Task Scheduler COM API

      • schtasks.exe (PID: 3056)
      • tt-cleaner.exe (PID: 4004)
    • Actions looks like stealing of personal data

      • tt-cleaner.exe (PID: 4004)
      • lite_installer.exe (PID: 3240)
      • seederexe.exe (PID: 4408)
    • Steals credentials from Web Browsers

      • seederexe.exe (PID: 4408)
      • tt-cleaner.exe (PID: 4004)
    • Changes Windows auto-update feature

      • tt-cleaner.exe (PID: 4004)
    • Disables Windows Defender

      • tt-cleaner.exe (PID: 4004)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • firefox.exe (PID: 4060)
      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2424)
      • WinRAR.exe (PID: 3544)
      • Bandicam.5.3.1.1880.exe (PID: 2552)
      • Bandicam.5.3.1.1880.tmp (PID: 1988)
      • downloader.exe (PID: 2372)
      • MsiExec.exe (PID: 2560)
      • msiexec.exe (PID: 3788)
      • lite_installer.exe (PID: 3240)
    • Checks supported languages

      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2424)
      • ns7A27.tmp (PID: 3176)
      • tt-installer-helper.exe (PID: 2980)
      • ns7CF7.tmp (PID: 2620)
      • tt-installer-helper.exe (PID: 2652)
      • WinRAR.exe (PID: 3544)
      • Bandicam.5.3.1.1880.exe (PID: 2552)
      • Bandicam.5.3.1.1880.tmp (PID: 1988)
      • tt-installer-helper.exe (PID: 3384)
      • downloader.exe (PID: 2372)
      • nsD804.tmp (PID: 3296)
      • tt-cleaner.exe (PID: 116)
      • tt-cleaner.exe (PID: 4004)
      • YandexPackSetup.exe (PID: 4084)
      • downloader.exe (PID: 1104)
      • QtWebEngineProcess.exe (PID: 412)
      • lite_installer.exe (PID: 3240)
      • seederexe.exe (PID: 4408)
      • Yandex.exe (PID: 5572)
      • sender.exe (PID: 4532)
      • WinRAR.exe (PID: 4284)
      • WinRAR.exe (PID: 5372)
    • Reads the computer name

      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2424)
      • tt-installer-helper.exe (PID: 2980)
      • WinRAR.exe (PID: 3544)
      • Bandicam.5.3.1.1880.tmp (PID: 1988)
      • downloader.exe (PID: 2372)
      • tt-cleaner.exe (PID: 116)
      • tt-cleaner.exe (PID: 4004)
      • YandexPackSetup.exe (PID: 4084)
      • lite_installer.exe (PID: 3240)
      • seederexe.exe (PID: 4408)
      • downloader.exe (PID: 1104)
      • Yandex.exe (PID: 5572)
      • sender.exe (PID: 4532)
      • WinRAR.exe (PID: 4284)
      • WinRAR.exe (PID: 5372)
    • Drops a file with a compile date too recent

      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2424)
      • lite_installer.exe (PID: 3240)
    • Drops a file that was compiled in debug mode

      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2424)
      • Bandicam.5.3.1.1880.tmp (PID: 1988)
      • downloader.exe (PID: 2372)
      • MsiExec.exe (PID: 2560)
      • msiexec.exe (PID: 3788)
      • lite_installer.exe (PID: 3240)
      • firefox.exe (PID: 4060)
    • Starts application with an unusual extension

      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2424)
    • Creates a directory in Program Files

      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2424)
      • tt-cleaner.exe (PID: 116)
      • tt-cleaner.exe (PID: 4004)
    • Adds / modifies Windows certificates

      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2424)
      • downloader.exe (PID: 2372)
    • Drops a file with too old compile date

      • WinRAR.exe (PID: 3544)
      • Bandicam.5.3.1.1880.exe (PID: 2552)
      • Bandicam.5.3.1.1880.tmp (PID: 1988)
      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2424)
      • firefox.exe (PID: 4060)
    • Reads the Windows organization settings

      • Bandicam.5.3.1.1880.tmp (PID: 1988)
      • msiexec.exe (PID: 3788)
    • Reads Windows owner or organization settings

      • Bandicam.5.3.1.1880.tmp (PID: 1988)
      • msiexec.exe (PID: 3788)
    • Reads Environment values

      • Bandicam.5.3.1.1880.tmp (PID: 1988)
      • MsiExec.exe (PID: 2560)
    • Creates files in the program directory

      • tt-cleaner.exe (PID: 116)
      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2424)
      • tt-cleaner.exe (PID: 4004)
      • regedit.exe (PID: 5772)
      • regedit.exe (PID: 5876)
      • regedit.exe (PID: 6132)
      • regedit.exe (PID: 5984)
      • regedit.exe (PID: 4228)
      • regedit.exe (PID: 4504)
      • regedit.exe (PID: 4692)
      • regedit.exe (PID: 4716)
      • regedit.exe (PID: 2424)
      • regedit.exe (PID: 4944)
      • regedit.exe (PID: 5472)
      • regedit.exe (PID: 1268)
      • regedit.exe (PID: 5388)
      • regedit.exe (PID: 5216)
      • regedit.exe (PID: 5792)
      • regedit.exe (PID: 5612)
      • regedit.exe (PID: 5924)
      • regedit.exe (PID: 6128)
      • regedit.exe (PID: 6008)
      • regedit.exe (PID: 4344)
      • regedit.exe (PID: 4588)
      • regedit.exe (PID: 4736)
      • regedit.exe (PID: 3212)
      • regedit.exe (PID: 5276)
      • regedit.exe (PID: 5140)
      • regedit.exe (PID: 4796)
      • regedit.exe (PID: 4000)
    • Creates files in the user directory

      • tt-cleaner.exe (PID: 116)
      • MsiExec.exe (PID: 2560)
      • seederexe.exe (PID: 4408)
      • Yandex.exe (PID: 5572)
    • Reads the date of Windows installation

      • tt-cleaner.exe (PID: 116)
      • Yandex.exe (PID: 5572)
    • Application launched itself

      • downloader.exe (PID: 2372)
      • tt-cleaner.exe (PID: 116)
      • msiexec.exe (PID: 3788)
    • Creates a software uninstall entry

      • tt-cleaner.exe (PID: 116)
      • Yandex.exe (PID: 5572)
    • Executed as Windows Service

      • msiexec.exe (PID: 3788)
    • Searches for installed software

      • seederexe.exe (PID: 4408)
      • tt-cleaner.exe (PID: 4004)
    • Reads default file associations for system extensions

      • Yandex.exe (PID: 5572)
    • Changes the started page of IE

      • seederexe.exe (PID: 4408)
  • INFO

    • Checks supported languages

      • firefox.exe (PID: 3948)
      • firefox.exe (PID: 4060)
      • firefox.exe (PID: 1200)
      • firefox.exe (PID: 1776)
      • firefox.exe (PID: 1208)
      • firefox.exe (PID: 3008)
      • firefox.exe (PID: 4012)
      • firefox.exe (PID: 3732)
      • firefox.exe (PID: 1492)
      • firefox.exe (PID: 3184)
      • firefox.exe (PID: 2960)
      • firefox.exe (PID: 2184)
      • firefox.exe (PID: 2252)
      • schtasks.exe (PID: 3056)
      • firefox.exe (PID: 3480)
      • msiexec.exe (PID: 3788)
      • MsiExec.exe (PID: 2560)
      • firefox.exe (PID: 712)
      • firefox.exe (PID: 5728)
      • regedit.exe (PID: 5664)
      • regedit.exe (PID: 5772)
      • regedit.exe (PID: 5876)
      • regedit.exe (PID: 6132)
      • regedit.exe (PID: 5984)
      • regedit.exe (PID: 4228)
      • regedit.exe (PID: 4504)
      • regedit.exe (PID: 4716)
      • regedit.exe (PID: 2424)
      • regedit.exe (PID: 4944)
      • regedit.exe (PID: 1268)
      • regedit.exe (PID: 5216)
      • regedit.exe (PID: 5388)
      • regedit.exe (PID: 4692)
      • regedit.exe (PID: 5612)
      • regedit.exe (PID: 5472)
      • regedit.exe (PID: 5792)
      • regedit.exe (PID: 5924)
      • regedit.exe (PID: 6008)
      • regedit.exe (PID: 4588)
      • regedit.exe (PID: 6128)
      • regedit.exe (PID: 4344)
      • regedit.exe (PID: 4736)
      • regedit.exe (PID: 4000)
      • regedit.exe (PID: 3212)
      • regedit.exe (PID: 5140)
      • regedit.exe (PID: 5276)
      • regedit.exe (PID: 4796)
    • Application launched itself

      • firefox.exe (PID: 3948)
      • firefox.exe (PID: 4060)
    • Reads CPU info

      • firefox.exe (PID: 4060)
    • Reads the computer name

      • firefox.exe (PID: 3008)
      • firefox.exe (PID: 4060)
      • firefox.exe (PID: 3732)
      • firefox.exe (PID: 1208)
      • firefox.exe (PID: 1200)
      • firefox.exe (PID: 1776)
      • firefox.exe (PID: 4012)
      • firefox.exe (PID: 1492)
      • firefox.exe (PID: 3184)
      • firefox.exe (PID: 2960)
      • firefox.exe (PID: 2184)
      • firefox.exe (PID: 2252)
      • schtasks.exe (PID: 3056)
      • firefox.exe (PID: 3480)
      • msiexec.exe (PID: 3788)
      • MsiExec.exe (PID: 2560)
      • firefox.exe (PID: 712)
      • firefox.exe (PID: 5728)
    • Creates files in the program directory

      • firefox.exe (PID: 4060)
    • Checks Windows Trust Settings

      • firefox.exe (PID: 4060)
      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2424)
      • downloader.exe (PID: 2372)
      • msiexec.exe (PID: 3788)
      • lite_installer.exe (PID: 3240)
    • Reads settings of System Certificates

      • firefox.exe (PID: 4060)
      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2424)
      • downloader.exe (PID: 2372)
      • msiexec.exe (PID: 3788)
    • Creates files in the user directory

      • firefox.exe (PID: 4060)
    • Dropped object may contain Bitcoin addresses

      • firefox.exe (PID: 4060)
      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2424)
    • Manual execution by user

      • WinRAR.exe (PID: 3544)
      • WinRAR.exe (PID: 4284)
      • WinRAR.exe (PID: 5372)
    • Reads the date of Windows installation

      • firefox.exe (PID: 4060)
    • Loads dropped or rewritten executable

      • Bandicam.5.3.1.1880.tmp (PID: 1988)
    • Application was dropped or rewritten from another process

      • Bandicam.5.3.1.1880.tmp (PID: 1988)
    • Reads the hosts file

      • tt-cleaner.exe (PID: 4004)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
125
Monitored processes
72
Malicious processes
13
Suspicious processes
4

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs telamoncleaner_id6166cdfd20beaf2.exe no specs telamoncleaner_id6166cdfd20beaf2.exe ns7a27.tmp no specs tt-installer-helper.exe ns7cf7.tmp no specs tt-installer-helper.exe no specs firefox.exe no specs firefox.exe no specs winrar.exe bandicam.5.3.1.1880.exe no specs bandicam.5.3.1.1880.exe bandicam.5.3.1.1880.tmp tt-cleaner.exe nsd804.tmp no specs tt-installer-helper.exe no specs downloader.exe schtasks.exe no specs tt-cleaner.exe firefox.exe no specs yandexpacksetup.exe downloader.exe msiexec.exe msiexec.exe firefox.exe no specs qtwebengineprocess.exe no specs lite_installer.exe seederexe.exe yandex.exe no specs sender.exe firefox.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs winrar.exe no specs winrar.exe no specs windows11installationassistant.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
116"C:\Program Files\Telamon Cleaner\tt-cleaner.exe" --install --l=tC:\Program Files\Telamon Cleaner\tt-cleaner.exe
TelamonCleaner_id6166cdfd20beaf2.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\program files\telamon cleaner\tt-cleaner.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
412"C:\Program Files\Telamon Cleaner\QtWebEngineProcess.exe" --type=renderer --no-sandbox --disable-gpu-memory-buffer-video-frames --enable-threaded-compositing --enable-features=AllowContentInitiatedDataUrlNavigations,TracingServiceInProcess --disable-features=BackgroundFetch,BlinkGenPropertyTrees,MojoVideoCapture,NetworkServiceNotSupported,OriginTrials,SmsReceiver,UsePdfCompositorServiceForPrint,UseSurfaceLayerForVideo,VizDisplayCompositor,WebAuthentication,WebAuthenticationCable,WebPayments,WebUSB --disable-gpu-compositing --lang=en-US --webengine-schemes=qrc:sLV --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=9663699920617863324 --renderer-client-id=2 --mojo-platform-channel-handle=1600 /prefetch:1C:\Program Files\Telamon Cleaner\QtWebEngineProcess.exett-cleaner.exe
User:
admin
Company:
The Qt Company Ltd.
Integrity Level:
HIGH
Description:
Qt Qtwebengineprocess
Exit code:
0
Version:
5.14.0.0
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\telamon cleaner\qtwebengineprocess.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\telamon cleaner\qt5core.dll
c:\windows\system32\mpr.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\profapi.dll
c:\windows\system32\version.dll
712"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4060.83.1324388935\625370998" -childID 12 -isForBrowser -prefsHandle 6140 -prefMapHandle 7788 -prefsLen 9654 -prefMapSize 238726 -parentBuildID 20201112153044 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4060 "\\.\pipe\gecko-crash-server-pipe.4060" 6084 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
83.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
1104C:\Users\admin\AppData\Local\Temp\nsa791D.tmp\downloader.exe --stat dwnldr/p=19568/cnt=0/dt=5/ct=1/rt=0 --dh 1416 --st 1634127460C:\Users\admin\AppData\Local\Temp\nsa791D.tmp\downloader.exe
downloader.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup Downloader
Exit code:
0
Version:
0.1.0.32
Modules
Images
c:\users\admin\appdata\local\temp\nsa791d.tmp\downloader.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\secur32.dll
c:\windows\system32\user32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspicli.dll
1200"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4060.6.1043080404\515274368" -childID 1 -isForBrowser -prefsHandle 2796 -prefMapHandle 2792 -prefsLen 245 -prefMapSize 238726 -parentBuildID 20201112153044 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4060 "\\.\pipe\gecko-crash-server-pipe.4060" 2808 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
83.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
1208"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4060.22.1799312795\1277640531" -childID 5 -isForBrowser -prefsHandle 3864 -prefMapHandle 1684 -prefsLen 7378 -prefMapSize 238726 -parentBuildID 20201112153044 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4060 "\\.\pipe\gecko-crash-server-pipe.4060" 3868 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
83.0
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\program files\mozilla firefox\firefox.exe
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\rpcrt4.dll
1268"regedit" /s /e "C:\Program Files\Telamon Cleaner\Quarantine\2021-10-13-13-17-38\Registry\4ad53d87-295b-4f9f-a5e3-dcdd4b472f39.reg" "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDlls"C:\Windows\regedit.exett-cleaner.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Editor
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\regedit.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ntdsapi.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\sechost.dll
1492"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4060.41.297289172\2056073893" -childID 6 -isForBrowser -prefsHandle 7760 -prefMapHandle 7732 -prefsLen 8818 -prefMapSize 238726 -parentBuildID 20201112153044 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4060 "\\.\pipe\gecko-crash-server-pipe.4060" 7720 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
83.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\rpcrt4.dll
1776"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4060.13.6396446\1212562223" -childID 2 -isForBrowser -prefsHandle 3108 -prefMapHandle 3104 -prefsLen 6644 -prefMapSize 238726 -parentBuildID 20201112153044 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4060 "\\.\pipe\gecko-crash-server-pipe.4060" 3120 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
83.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
1988"C:\Users\admin\AppData\Local\Temp\is-R52F3.tmp\Bandicam.5.3.1.1880.tmp" /SL5="$600E8,32243398,93696,C:\Users\admin\AppData\Local\Temp\Rar$EXb3544.9301\Bandicam 5.3.1.1880 Rus Repack\Bandicam.5.3.1.1880.exe" C:\Users\admin\AppData\Local\Temp\is-R52F3.tmp\Bandicam.5.3.1.1880.tmp
Bandicam.5.3.1.1880.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
2
Version:
51.52.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-r52f3.tmp\bandicam.5.3.1.1880.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
Total events
73 988
Read events
72 933
Write events
979
Delete events
76

Modification events

(PID) Process:(3948) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
Value:
424D2F1CC8000000
(PID) Process:(4060) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Browser
Value:
C3562F1CC8000000
(PID) Process:(4060) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Telemetry
Value:
0
(PID) Process:(4060) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\DllPrefetchExperiment
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe
Value:
0
(PID) Process:(4060) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|DisableTelemetry
Value:
1
(PID) Process:(4060) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|DisableDefaultBrowserAgent
Value:
0
(PID) Process:(4060) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|ServicesSettingsServer
Value:
https://firefox.settings.services.mozilla.com/v1
(PID) Process:(4060) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|SecurityContentSignatureRootHash
Value:
97:E8:BA:9C:F1:2F:B3:DE:53:CC:42:A4:E6:57:7E:D6:4D:F4:93:C2:47:B4:14:FE:A0:36:81:8D:38:23:56:0E
(PID) Process:(4060) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(4060) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
460000003B010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A80164000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
Executable files
114
Suspicious files
296
Text files
332
Unknown types
115

Dropped files

PID
Process
Filename
Type
4060firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-current.bin
MD5:
SHA256:
4060firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
MD5:
SHA256:
4060firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite-walbinary
MD5:
SHA256:
4060firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\settings\main\ms-language-packs\asrouter.ftltext
MD5:
SHA256:
4060firefox.exeC:\Users\admin\AppData\Local\Temp\mz_etilqs_zw3B5vdUsvBiJUsbinary
MD5:
SHA256:
4060firefox.exeC:\Users\admin\AppData\Local\Temp\mz_etilqs_6mEpfaKLg6ABzKbbinary
MD5:
SHA256:
4060firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\settings\main\ms-language-packs\asrouter.ftl.tmptext
MD5:
SHA256:
4060firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs.jstext
MD5:299A2B747C11E4BDA194E563FEA4A699
SHA256:94EE461F62E8B4A0A65471A41E10C8C56722B73C0A019D76ACA7F5BAF109813E
4060firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs-1.jstext
MD5:299A2B747C11E4BDA194E563FEA4A699
SHA256:94EE461F62E8B4A0A65471A41E10C8C56722B73C0A019D76ACA7F5BAF109813E
4060firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
69
TCP/UDP connections
243
DNS requests
370
Threats
9

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4060
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
4060
firefox.exe
POST
200
142.250.186.131:80
http://ocsp.pki.goog/gts1c3
US
der
472 b
whitelisted
4060
firefox.exe
POST
200
5.45.205.241:80
http://yandex.ocsp-responder.com/
RU
der
1.48 Kb
whitelisted
2424
TelamonCleaner_id6166cdfd20beaf2.exe
GET
200
151.139.128.14:80
http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m%2FWqorSs9UgOHYm8Cd8rIDZssCEH1bUSa0droR23QWC7xTDac%3D
US
der
727 b
whitelisted
4060
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
2424
TelamonCleaner_id6166cdfd20beaf2.exe
GET
200
104.18.30.182:80
http://ocsp.sectigo.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRDC9IOTxN6GmyRjyTl2n4yTUczyAQUjYxexFStiuF36Zv5mwXhuAGNYeECED7mcD26FWvlZ%2BluOA9T1P0%3D
US
der
471 b
whitelisted
2424
TelamonCleaner_id6166cdfd20beaf2.exe
GET
200
151.139.128.14:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEDlyRDr5IrdR19NsEN0xNZU%3D
US
der
471 b
whitelisted
4060
firefox.exe
POST
200
2.16.186.33:80
http://r3.o.lencr.org/
unknown
der
503 b
shared
4060
firefox.exe
POST
200
142.250.186.131:80
http://ocsp.pki.goog/gts1c3
US
der
472 b
whitelisted
4060
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4060
firefox.exe
34.107.221.82:80
detectportal.firefox.com
US
whitelisted
4060
firefox.exe
185.244.217.198:443
1progs.ru
unknown
4060
firefox.exe
52.222.214.84:443
firefox.settings.services.mozilla.com
Amazon.com, Inc.
US
suspicious
51.124.78.146:443
Microsoft Corporation
GB
whitelisted
4060
firefox.exe
44.235.94.69:443
location.services.mozilla.com
University of California, San Diego
US
unknown
4060
firefox.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
4060
firefox.exe
142.250.185.202:443
safebrowsing.googleapis.com
Google Inc.
US
whitelisted
4060
firefox.exe
142.250.186.131:80
ocsp.pki.goog
Google Inc.
US
whitelisted
4060
firefox.exe
35.163.208.27:443
push.services.mozilla.com
Amazon.com, Inc.
US
unknown
4060
firefox.exe
52.222.236.127:443
firefox-settings-attachments.cdn.mozilla.net
Amazon.com, Inc.
US
suspicious

DNS requests

Domain
IP
Reputation
detectportal.firefox.com
  • 34.107.221.82
whitelisted
1progs.ru
  • 185.244.217.198
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
firefox.settings.services.mozilla.com
  • 52.222.214.84
  • 52.222.214.96
  • 52.222.214.105
  • 52.222.214.116
whitelisted
example.org
  • 93.184.216.34
whitelisted
ipv4only.arpa
  • 192.0.0.171
  • 192.0.0.170
whitelisted
location.services.mozilla.com
  • 44.235.94.69
  • 50.112.161.155
  • 52.41.54.29
  • 44.235.0.194
  • 54.187.118.206
  • 35.164.166.80
whitelisted
locprod2-elb-us-west-2.prod.mozaws.net
  • 35.164.166.80
  • 54.187.118.206
  • 44.235.0.194
  • 52.41.54.29
  • 50.112.161.155
  • 44.235.94.69
whitelisted
r3.o.lencr.org
  • 2.16.186.33
  • 2.16.186.34
  • 2.16.186.42
  • 2.16.186.35
  • 2.16.186.25
shared
a1887.dscq.akamai.net
  • 2.16.186.35
  • 2.16.186.42
  • 2.16.186.34
  • 2.16.186.33
  • 2a02:26f0:6c00::210:ba60
  • 2a02:26f0:6c00::210:ba41
  • 2.16.186.25
whitelisted

Threats

PID
Process
Class
Message
2424
TelamonCleaner_id6166cdfd20beaf2.exe
Potentially Bad Traffic
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
2424
TelamonCleaner_id6166cdfd20beaf2.exe
Potentially Bad Traffic
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
2424
TelamonCleaner_id6166cdfd20beaf2.exe
Potentially Bad Traffic
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
2424
TelamonCleaner_id6166cdfd20beaf2.exe
Potentially Bad Traffic
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
2424
TelamonCleaner_id6166cdfd20beaf2.exe
Potentially Bad Traffic
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
2372
downloader.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
1104
downloader.exe
Attempted Information Leak
ET POLICY curl User-Agent Outbound
3240
lite_installer.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
1 ETPRO signatures available at the full report
Process
Message
tt-installer-helper.exe
[2021-10-13 13:16:04] E regstorage.cpp:62 [RegStorage] get<std::wstring>() RegOpenKeyEx failed. 2
tt-cleaner.exe
[2021-10-13 13:17:34] M log.cpp:93 Logging to C:\Program Files\Telamon Cleaner\logs\tt-cln-app-2021-10-13-13-17-34.log
tt-cleaner.exe
[2021-10-13 13:17:34] M main.cpp:43 Start main: "C:\Program Files\Telamon Cleaner\tt-cleaner.exe" --install --l=t thread id: 3388 process id: 116
tt-cleaner.exe
[2021-10-13 13:17:34] M main.cpp:44 Version: 1.0.189
tt-cleaner.exe
[2021-10-13 13:17:34] M main.cpp:110 Running app with options: ==================== isInstall: true clid: isUninstall: false isAutorun: false isFinishUpdate: false prevAppId: 0 updateId: updateDelay: 1200 updatePeriod: 1200 ====================
tt-cleaner.exe
[2021-10-13 13:17:34] M app.cpp:470 Found installer_path: C:\Users\admin\Downloads\TelamonCleaner_id6166cdfd20beaf2.exe
tt-cleaner.exe
[2021-10-13 13:17:34] E regstorage.cpp:62 [RegStorage] get<std::wstring>() Cannot get size of string value: RegGetValue failed. 2
tt-cleaner.exe
[2021-10-13 13:17:35] M main.cpp:114 App exit code: 0
tt-cleaner.exe
[2021-10-13 13:17:35] M log.cpp:93 Logging to C:\Program Files\Telamon Cleaner\logs\tt-cln-app-2021-10-13-13-17-35.log
tt-cleaner.exe
[2021-10-13 13:17:35] M main.cpp:43 Start main: "C:\Program Files\Telamon Cleaner\tt-cleaner.exe" thread id: 576 process id: 4004