URL:

https://1progs.ru/bandicam-polnaya-versiya-crack/

Full analysis: https://app.any.run/tasks/45d0a337-712e-48f7-ac3e-bff0d0353714
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: October 13, 2021, 12:15:44
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MD5:

07B9167E4648651FB995C5BC28616824

SHA1:

A3A9C7A897A75F9DD2941ED529C236CDDB67F371

SHA256:

556241E222A20709AB78A15CAB81997FBE521C29AC8C3C00752EC71767636A9A

SSDEEP:

3:N8+aCMv7ff4QXN:2+aCa7ffxN

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2516)
      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2424)
      • tt-installer-helper.exe (PID: 2980)
      • tt-installer-helper.exe (PID: 2652)
      • Bandicam.5.3.1.1880.exe (PID: 2552)
      • Bandicam.5.3.1.1880.exe (PID: 3448)
      • tt-installer-helper.exe (PID: 3384)
      • tt-cleaner.exe (PID: 116)
      • downloader.exe (PID: 2372)
      • tt-cleaner.exe (PID: 4004)
      • downloader.exe (PID: 1104)
      • YandexPackSetup.exe (PID: 4084)
      • QtWebEngineProcess.exe (PID: 412)
      • seederexe.exe (PID: 4408)
      • sender.exe (PID: 4532)
      • lite_installer.exe (PID: 3240)
      • Yandex.exe (PID: 5572)
      • Windows11InstallationAssistant.exe (PID: 5716)
    • Drops executable file immediately after starts

      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2424)
      • Bandicam.5.3.1.1880.exe (PID: 2552)
      • Bandicam.5.3.1.1880.tmp (PID: 1988)
    • Loads dropped or rewritten executable

      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2424)
      • tt-cleaner.exe (PID: 116)
      • tt-cleaner.exe (PID: 4004)
      • QtWebEngineProcess.exe (PID: 412)
    • Changes settings of System certificates

      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2424)
      • downloader.exe (PID: 2372)
    • Loads the Task Scheduler COM API

      • schtasks.exe (PID: 3056)
      • tt-cleaner.exe (PID: 4004)
    • Uses Task Scheduler to run other applications

      • tt-cleaner.exe (PID: 116)
    • Actions looks like stealing of personal data

      • tt-cleaner.exe (PID: 4004)
      • lite_installer.exe (PID: 3240)
      • seederexe.exe (PID: 4408)
    • Steals credentials from Web Browsers

      • seederexe.exe (PID: 4408)
      • tt-cleaner.exe (PID: 4004)
    • Changes Windows auto-update feature

      • tt-cleaner.exe (PID: 4004)
    • Disables Windows Defender

      • tt-cleaner.exe (PID: 4004)
  • SUSPICIOUS

    • Checks supported languages

      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2424)
      • ns7A27.tmp (PID: 3176)
      • tt-installer-helper.exe (PID: 2980)
      • ns7CF7.tmp (PID: 2620)
      • tt-installer-helper.exe (PID: 2652)
      • WinRAR.exe (PID: 3544)
      • Bandicam.5.3.1.1880.exe (PID: 2552)
      • Bandicam.5.3.1.1880.tmp (PID: 1988)
      • tt-installer-helper.exe (PID: 3384)
      • nsD804.tmp (PID: 3296)
      • downloader.exe (PID: 2372)
      • tt-cleaner.exe (PID: 116)
      • tt-cleaner.exe (PID: 4004)
      • YandexPackSetup.exe (PID: 4084)
      • downloader.exe (PID: 1104)
      • QtWebEngineProcess.exe (PID: 412)
      • seederexe.exe (PID: 4408)
      • lite_installer.exe (PID: 3240)
      • Yandex.exe (PID: 5572)
      • sender.exe (PID: 4532)
      • WinRAR.exe (PID: 4284)
      • WinRAR.exe (PID: 5372)
    • Executable content was dropped or overwritten

      • firefox.exe (PID: 4060)
      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2424)
      • WinRAR.exe (PID: 3544)
      • Bandicam.5.3.1.1880.exe (PID: 2552)
      • Bandicam.5.3.1.1880.tmp (PID: 1988)
      • downloader.exe (PID: 2372)
      • MsiExec.exe (PID: 2560)
      • msiexec.exe (PID: 3788)
      • lite_installer.exe (PID: 3240)
    • Reads the computer name

      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2424)
      • tt-installer-helper.exe (PID: 2980)
      • WinRAR.exe (PID: 3544)
      • Bandicam.5.3.1.1880.tmp (PID: 1988)
      • downloader.exe (PID: 2372)
      • tt-cleaner.exe (PID: 116)
      • tt-cleaner.exe (PID: 4004)
      • YandexPackSetup.exe (PID: 4084)
      • lite_installer.exe (PID: 3240)
      • seederexe.exe (PID: 4408)
      • downloader.exe (PID: 1104)
      • Yandex.exe (PID: 5572)
      • sender.exe (PID: 4532)
      • WinRAR.exe (PID: 4284)
      • WinRAR.exe (PID: 5372)
    • Drops a file with a compile date too recent

      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2424)
      • lite_installer.exe (PID: 3240)
    • Drops a file that was compiled in debug mode

      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2424)
      • Bandicam.5.3.1.1880.tmp (PID: 1988)
      • downloader.exe (PID: 2372)
      • msiexec.exe (PID: 3788)
      • MsiExec.exe (PID: 2560)
      • firefox.exe (PID: 4060)
      • lite_installer.exe (PID: 3240)
    • Starts application with an unusual extension

      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2424)
    • Drops a file with too old compile date

      • WinRAR.exe (PID: 3544)
      • Bandicam.5.3.1.1880.exe (PID: 2552)
      • Bandicam.5.3.1.1880.tmp (PID: 1988)
      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2424)
      • firefox.exe (PID: 4060)
    • Reads Windows owner or organization settings

      • Bandicam.5.3.1.1880.tmp (PID: 1988)
      • msiexec.exe (PID: 3788)
    • Reads the Windows organization settings

      • Bandicam.5.3.1.1880.tmp (PID: 1988)
      • msiexec.exe (PID: 3788)
    • Reads Environment values

      • Bandicam.5.3.1.1880.tmp (PID: 1988)
      • MsiExec.exe (PID: 2560)
    • Creates a directory in Program Files

      • tt-cleaner.exe (PID: 116)
      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2424)
      • tt-cleaner.exe (PID: 4004)
    • Creates files in the program directory

      • tt-cleaner.exe (PID: 116)
      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2424)
      • tt-cleaner.exe (PID: 4004)
      • regedit.exe (PID: 5772)
      • regedit.exe (PID: 5876)
      • regedit.exe (PID: 5984)
      • regedit.exe (PID: 4692)
      • regedit.exe (PID: 4504)
      • regedit.exe (PID: 4228)
      • regedit.exe (PID: 4716)
      • regedit.exe (PID: 2424)
      • regedit.exe (PID: 4944)
      • regedit.exe (PID: 6132)
      • regedit.exe (PID: 5216)
      • regedit.exe (PID: 5472)
      • regedit.exe (PID: 5792)
      • regedit.exe (PID: 5612)
      • regedit.exe (PID: 5924)
      • regedit.exe (PID: 6008)
      • regedit.exe (PID: 6128)
      • regedit.exe (PID: 1268)
      • regedit.exe (PID: 5388)
      • regedit.exe (PID: 4588)
      • regedit.exe (PID: 4736)
      • regedit.exe (PID: 4796)
      • regedit.exe (PID: 4000)
      • regedit.exe (PID: 3212)
      • regedit.exe (PID: 5276)
      • regedit.exe (PID: 5140)
      • regedit.exe (PID: 4344)
    • Creates files in the user directory

      • tt-cleaner.exe (PID: 116)
      • MsiExec.exe (PID: 2560)
      • seederexe.exe (PID: 4408)
      • Yandex.exe (PID: 5572)
    • Reads the date of Windows installation

      • tt-cleaner.exe (PID: 116)
      • Yandex.exe (PID: 5572)
    • Adds / modifies Windows certificates

      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2424)
      • downloader.exe (PID: 2372)
    • Creates a software uninstall entry

      • tt-cleaner.exe (PID: 116)
      • Yandex.exe (PID: 5572)
    • Application launched itself

      • tt-cleaner.exe (PID: 116)
      • downloader.exe (PID: 2372)
      • msiexec.exe (PID: 3788)
    • Executed as Windows Service

      • msiexec.exe (PID: 3788)
    • Searches for installed software

      • seederexe.exe (PID: 4408)
      • tt-cleaner.exe (PID: 4004)
    • Changes the started page of IE

      • seederexe.exe (PID: 4408)
    • Reads default file associations for system extensions

      • Yandex.exe (PID: 5572)
  • INFO

    • Application launched itself

      • firefox.exe (PID: 3948)
      • firefox.exe (PID: 4060)
    • Checks supported languages

      • firefox.exe (PID: 3948)
      • firefox.exe (PID: 3008)
      • firefox.exe (PID: 1200)
      • firefox.exe (PID: 4060)
      • firefox.exe (PID: 1776)
      • firefox.exe (PID: 4012)
      • firefox.exe (PID: 1208)
      • firefox.exe (PID: 3732)
      • firefox.exe (PID: 2960)
      • firefox.exe (PID: 1492)
      • firefox.exe (PID: 3184)
      • firefox.exe (PID: 2184)
      • firefox.exe (PID: 2252)
      • schtasks.exe (PID: 3056)
      • firefox.exe (PID: 3480)
      • msiexec.exe (PID: 3788)
      • MsiExec.exe (PID: 2560)
      • firefox.exe (PID: 712)
      • firefox.exe (PID: 5728)
      • regedit.exe (PID: 5664)
      • regedit.exe (PID: 5772)
      • regedit.exe (PID: 5876)
      • regedit.exe (PID: 6132)
      • regedit.exe (PID: 5984)
      • regedit.exe (PID: 4692)
      • regedit.exe (PID: 4716)
      • regedit.exe (PID: 2424)
      • regedit.exe (PID: 4944)
      • regedit.exe (PID: 1268)
      • regedit.exe (PID: 4228)
      • regedit.exe (PID: 4504)
      • regedit.exe (PID: 5216)
      • regedit.exe (PID: 5388)
      • regedit.exe (PID: 5472)
      • regedit.exe (PID: 5792)
      • regedit.exe (PID: 5924)
      • regedit.exe (PID: 6008)
      • regedit.exe (PID: 6128)
      • regedit.exe (PID: 5612)
      • regedit.exe (PID: 4736)
      • regedit.exe (PID: 4000)
      • regedit.exe (PID: 3212)
      • regedit.exe (PID: 5140)
      • regedit.exe (PID: 5276)
      • regedit.exe (PID: 4344)
      • regedit.exe (PID: 4588)
      • regedit.exe (PID: 4796)
    • Reads the computer name

      • firefox.exe (PID: 4060)
      • firefox.exe (PID: 3008)
      • firefox.exe (PID: 1776)
      • firefox.exe (PID: 3732)
      • firefox.exe (PID: 1200)
      • firefox.exe (PID: 4012)
      • firefox.exe (PID: 1208)
      • firefox.exe (PID: 3184)
      • firefox.exe (PID: 2960)
      • firefox.exe (PID: 2184)
      • firefox.exe (PID: 2252)
      • firefox.exe (PID: 1492)
      • schtasks.exe (PID: 3056)
      • firefox.exe (PID: 3480)
      • msiexec.exe (PID: 3788)
      • MsiExec.exe (PID: 2560)
      • firefox.exe (PID: 712)
      • firefox.exe (PID: 5728)
    • Reads CPU info

      • firefox.exe (PID: 4060)
    • Creates files in the program directory

      • firefox.exe (PID: 4060)
    • Creates files in the user directory

      • firefox.exe (PID: 4060)
    • Checks Windows Trust Settings

      • firefox.exe (PID: 4060)
      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2424)
      • downloader.exe (PID: 2372)
      • msiexec.exe (PID: 3788)
      • lite_installer.exe (PID: 3240)
    • Reads settings of System Certificates

      • firefox.exe (PID: 4060)
      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2424)
      • downloader.exe (PID: 2372)
      • msiexec.exe (PID: 3788)
    • Dropped object may contain Bitcoin addresses

      • firefox.exe (PID: 4060)
      • TelamonCleaner_id6166cdfd20beaf2.exe (PID: 2424)
    • Manual execution by user

      • WinRAR.exe (PID: 3544)
      • WinRAR.exe (PID: 4284)
      • WinRAR.exe (PID: 5372)
    • Loads dropped or rewritten executable

      • Bandicam.5.3.1.1880.tmp (PID: 1988)
    • Application was dropped or rewritten from another process

      • Bandicam.5.3.1.1880.tmp (PID: 1988)
    • Reads the date of Windows installation

      • firefox.exe (PID: 4060)
    • Reads the hosts file

      • tt-cleaner.exe (PID: 4004)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
125
Monitored processes
72
Malicious processes
13
Suspicious processes
4

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start drop and start firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs telamoncleaner_id6166cdfd20beaf2.exe no specs telamoncleaner_id6166cdfd20beaf2.exe ns7a27.tmp no specs tt-installer-helper.exe ns7cf7.tmp no specs tt-installer-helper.exe no specs firefox.exe no specs firefox.exe no specs winrar.exe bandicam.5.3.1.1880.exe no specs bandicam.5.3.1.1880.exe bandicam.5.3.1.1880.tmp tt-cleaner.exe nsd804.tmp no specs tt-installer-helper.exe no specs downloader.exe schtasks.exe no specs tt-cleaner.exe firefox.exe no specs yandexpacksetup.exe downloader.exe msiexec.exe msiexec.exe firefox.exe no specs qtwebengineprocess.exe no specs lite_installer.exe seederexe.exe yandex.exe no specs sender.exe firefox.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs regedit.exe no specs winrar.exe no specs winrar.exe no specs windows11installationassistant.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
116"C:\Program Files\Telamon Cleaner\tt-cleaner.exe" --install --l=tC:\Program Files\Telamon Cleaner\tt-cleaner.exe
TelamonCleaner_id6166cdfd20beaf2.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\program files\telamon cleaner\tt-cleaner.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\advapi32.dll
412"C:\Program Files\Telamon Cleaner\QtWebEngineProcess.exe" --type=renderer --no-sandbox --disable-gpu-memory-buffer-video-frames --enable-threaded-compositing --enable-features=AllowContentInitiatedDataUrlNavigations,TracingServiceInProcess --disable-features=BackgroundFetch,BlinkGenPropertyTrees,MojoVideoCapture,NetworkServiceNotSupported,OriginTrials,SmsReceiver,UsePdfCompositorServiceForPrint,UseSurfaceLayerForVideo,VizDisplayCompositor,WebAuthentication,WebAuthenticationCable,WebPayments,WebUSB --disable-gpu-compositing --lang=en-US --webengine-schemes=qrc:sLV --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=9663699920617863324 --renderer-client-id=2 --mojo-platform-channel-handle=1600 /prefetch:1C:\Program Files\Telamon Cleaner\QtWebEngineProcess.exett-cleaner.exe
User:
admin
Company:
The Qt Company Ltd.
Integrity Level:
HIGH
Description:
Qt Qtwebengineprocess
Exit code:
0
Version:
5.14.0.0
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\telamon cleaner\qtwebengineprocess.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\telamon cleaner\qt5core.dll
c:\windows\system32\mpr.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\profapi.dll
c:\windows\system32\version.dll
712"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4060.83.1324388935\625370998" -childID 12 -isForBrowser -prefsHandle 6140 -prefMapHandle 7788 -prefsLen 9654 -prefMapSize 238726 -parentBuildID 20201112153044 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4060 "\\.\pipe\gecko-crash-server-pipe.4060" 6084 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
83.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
1104C:\Users\admin\AppData\Local\Temp\nsa791D.tmp\downloader.exe --stat dwnldr/p=19568/cnt=0/dt=5/ct=1/rt=0 --dh 1416 --st 1634127460C:\Users\admin\AppData\Local\Temp\nsa791D.tmp\downloader.exe
downloader.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup Downloader
Exit code:
0
Version:
0.1.0.32
Modules
Images
c:\users\admin\appdata\local\temp\nsa791d.tmp\downloader.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\secur32.dll
c:\windows\system32\user32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspicli.dll
1200"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4060.6.1043080404\515274368" -childID 1 -isForBrowser -prefsHandle 2796 -prefMapHandle 2792 -prefsLen 245 -prefMapSize 238726 -parentBuildID 20201112153044 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4060 "\\.\pipe\gecko-crash-server-pipe.4060" 2808 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
83.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
1208"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4060.22.1799312795\1277640531" -childID 5 -isForBrowser -prefsHandle 3864 -prefMapHandle 1684 -prefsLen 7378 -prefMapSize 238726 -parentBuildID 20201112153044 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4060 "\\.\pipe\gecko-crash-server-pipe.4060" 3868 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
83.0
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\program files\mozilla firefox\firefox.exe
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\rpcrt4.dll
1268"regedit" /s /e "C:\Program Files\Telamon Cleaner\Quarantine\2021-10-13-13-17-38\Registry\4ad53d87-295b-4f9f-a5e3-dcdd4b472f39.reg" "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDlls"C:\Windows\regedit.exett-cleaner.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Editor
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\regedit.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ntdsapi.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\sechost.dll
1492"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4060.41.297289172\2056073893" -childID 6 -isForBrowser -prefsHandle 7760 -prefMapHandle 7732 -prefsLen 8818 -prefMapSize 238726 -parentBuildID 20201112153044 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4060 "\\.\pipe\gecko-crash-server-pipe.4060" 7720 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
83.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\rpcrt4.dll
1776"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4060.13.6396446\1212562223" -childID 2 -isForBrowser -prefsHandle 3108 -prefMapHandle 3104 -prefsLen 6644 -prefMapSize 238726 -parentBuildID 20201112153044 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4060 "\\.\pipe\gecko-crash-server-pipe.4060" 3120 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
83.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
1988"C:\Users\admin\AppData\Local\Temp\is-R52F3.tmp\Bandicam.5.3.1.1880.tmp" /SL5="$600E8,32243398,93696,C:\Users\admin\AppData\Local\Temp\Rar$EXb3544.9301\Bandicam 5.3.1.1880 Rus Repack\Bandicam.5.3.1.1880.exe" C:\Users\admin\AppData\Local\Temp\is-R52F3.tmp\Bandicam.5.3.1.1880.tmp
Bandicam.5.3.1.1880.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
2
Version:
51.52.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-r52f3.tmp\bandicam.5.3.1.1880.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
Total events
73 988
Read events
72 933
Write events
979
Delete events
76

Modification events

(PID) Process:(3948) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
Value:
424D2F1CC8000000
(PID) Process:(4060) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Browser
Value:
C3562F1CC8000000
(PID) Process:(4060) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Telemetry
Value:
0
(PID) Process:(4060) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\DllPrefetchExperiment
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe
Value:
0
(PID) Process:(4060) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|DisableTelemetry
Value:
1
(PID) Process:(4060) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|DisableDefaultBrowserAgent
Value:
0
(PID) Process:(4060) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|ServicesSettingsServer
Value:
https://firefox.settings.services.mozilla.com/v1
(PID) Process:(4060) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|SecurityContentSignatureRootHash
Value:
97:E8:BA:9C:F1:2F:B3:DE:53:CC:42:A4:E6:57:7E:D6:4D:F4:93:C2:47:B4:14:FE:A0:36:81:8D:38:23:56:0E
(PID) Process:(4060) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(4060) firefox.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
460000003B010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A80164000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
Executable files
114
Suspicious files
296
Text files
332
Unknown types
115

Dropped files

PID
Process
Filename
Type
4060firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-current.bin
MD5:
SHA256:
4060firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
MD5:
SHA256:
4060firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite-walbinary
MD5:D0B29BDDDA003AEA5742402F06CDA443
SHA256:DF14E5E78065388D7C5891DF3339F6220D6414502F1B069E5AA9D15067D1B66F
4060firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\settings\main\ms-language-packs\asrouter.ftltext
MD5:3625F1DDA6D119478AD89D13950C9ACA
SHA256:CB40F6A8D58901D612A86690A41D4E273F24936FC926E98F82C0918CBEF4FC64
4060firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\settings\main\ms-language-packs\asrouter.ftl.tmptext
MD5:3625F1DDA6D119478AD89D13950C9ACA
SHA256:CB40F6A8D58901D612A86690A41D4E273F24936FC926E98F82C0918CBEF4FC64
4060firefox.exeC:\Users\admin\AppData\Local\Temp\mz_etilqs_6mEpfaKLg6ABzKbbinary
MD5:C58C03139BFB0F972F76BB6B5BBABEF3
SHA256:ED12788ECB51670DA77945455BC435F49E46E08437E32FF34FAC8533C5B9C128
4060firefox.exeC:\Users\admin\AppData\Local\Temp\mz_etilqs_zw3B5vdUsvBiJUsbinary
MD5:9EB13BBD52A343210BDA2B5321DC066C
SHA256:2AAFDCA5D79C83A69E3594B79125E4557D611F5E0D604EDC9D076035D9CDADF4
4060firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
4060firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\urlCache-current.binbinary
MD5:994A33896BB41A278A315D0D796422B6
SHA256:54EC50A20FFF8CC016710E49437CF6A11D3FE5EE7B28C185E4A9AAFEE2908B63
4060firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
69
TCP/UDP connections
243
DNS requests
370
Threats
9

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4060
firefox.exe
POST
200
2.16.186.33:80
http://r3.o.lencr.org/
unknown
der
503 b
shared
4060
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
2424
TelamonCleaner_id6166cdfd20beaf2.exe
GET
200
178.79.242.128:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?7a3b367a1ffc7192
DE
compressed
4.70 Kb
whitelisted
4060
firefox.exe
POST
200
142.250.186.131:80
http://ocsp.pki.goog/gts1c3
US
der
472 b
whitelisted
4060
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt
US
text
8 b
whitelisted
4060
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
4060
firefox.exe
POST
200
2.16.186.33:80
http://r3.o.lencr.org/
unknown
der
503 b
shared
4060
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
US
text
8 b
whitelisted
2424
TelamonCleaner_id6166cdfd20beaf2.exe
GET
200
104.18.30.182:80
http://ocsp.sectigo.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRDC9IOTxN6GmyRjyTl2n4yTUczyAQUjYxexFStiuF36Zv5mwXhuAGNYeECED7mcD26FWvlZ%2BluOA9T1P0%3D
US
der
471 b
whitelisted
2424
TelamonCleaner_id6166cdfd20beaf2.exe
POST
200
54.186.106.83:80
http://api.amplitude.com/httpapi
US
text
7 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4060
firefox.exe
34.107.221.82:80
detectportal.firefox.com
US
whitelisted
4060
firefox.exe
185.244.217.198:443
1progs.ru
unknown
4060
firefox.exe
44.235.94.69:443
location.services.mozilla.com
University of California, San Diego
US
unknown
4060
firefox.exe
2.16.186.33:80
r3.o.lencr.org
Akamai International B.V.
whitelisted
4060
firefox.exe
52.222.214.84:443
firefox.settings.services.mozilla.com
Amazon.com, Inc.
US
suspicious
4060
firefox.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
51.124.78.146:443
Microsoft Corporation
GB
whitelisted
4060
firefox.exe
142.250.185.202:443
safebrowsing.googleapis.com
Google Inc.
US
whitelisted
4060
firefox.exe
142.250.186.131:80
ocsp.pki.goog
Google Inc.
US
whitelisted
4060
firefox.exe
18.66.139.125:443
content-signature-2.cdn.mozilla.net
Massachusetts Institute of Technology
US
malicious

DNS requests

Domain
IP
Reputation
detectportal.firefox.com
  • 34.107.221.82
whitelisted
1progs.ru
  • 185.244.217.198
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
firefox.settings.services.mozilla.com
  • 52.222.214.84
  • 52.222.214.96
  • 52.222.214.105
  • 52.222.214.116
whitelisted
example.org
  • 93.184.216.34
whitelisted
ipv4only.arpa
  • 192.0.0.171
  • 192.0.0.170
whitelisted
location.services.mozilla.com
  • 44.235.94.69
  • 50.112.161.155
  • 52.41.54.29
  • 44.235.0.194
  • 54.187.118.206
  • 35.164.166.80
whitelisted
locprod2-elb-us-west-2.prod.mozaws.net
  • 35.164.166.80
  • 54.187.118.206
  • 44.235.0.194
  • 52.41.54.29
  • 50.112.161.155
  • 44.235.94.69
whitelisted
r3.o.lencr.org
  • 2.16.186.33
  • 2.16.186.34
  • 2.16.186.42
  • 2.16.186.35
  • 2.16.186.25
shared
a1887.dscq.akamai.net
  • 2.16.186.35
  • 2.16.186.42
  • 2.16.186.34
  • 2.16.186.33
  • 2a02:26f0:6c00::210:ba60
  • 2a02:26f0:6c00::210:ba41
  • 2.16.186.25
whitelisted

Threats

PID
Process
Class
Message
2424
TelamonCleaner_id6166cdfd20beaf2.exe
Potentially Bad Traffic
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
2424
TelamonCleaner_id6166cdfd20beaf2.exe
Potentially Bad Traffic
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
2424
TelamonCleaner_id6166cdfd20beaf2.exe
Potentially Bad Traffic
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
2424
TelamonCleaner_id6166cdfd20beaf2.exe
Potentially Bad Traffic
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
2424
TelamonCleaner_id6166cdfd20beaf2.exe
Potentially Bad Traffic
ET USER_AGENTS Observed Suspicious UA (NSIS_Inetc (Mozilla))
2372
downloader.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
1104
downloader.exe
Attempted Information Leak
ET POLICY curl User-Agent Outbound
3240
lite_installer.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
1 ETPRO signatures available at the full report
Process
Message
tt-installer-helper.exe
[2021-10-13 13:16:04] E regstorage.cpp:62 [RegStorage] get<std::wstring>() RegOpenKeyEx failed. 2
tt-cleaner.exe
[2021-10-13 13:17:34] M log.cpp:93 Logging to C:\Program Files\Telamon Cleaner\logs\tt-cln-app-2021-10-13-13-17-34.log
tt-cleaner.exe
[2021-10-13 13:17:34] M main.cpp:43 Start main: "C:\Program Files\Telamon Cleaner\tt-cleaner.exe" --install --l=t thread id: 3388 process id: 116
tt-cleaner.exe
[2021-10-13 13:17:34] M main.cpp:44 Version: 1.0.189
tt-cleaner.exe
[2021-10-13 13:17:34] M main.cpp:110 Running app with options: ==================== isInstall: true clid: isUninstall: false isAutorun: false isFinishUpdate: false prevAppId: 0 updateId: updateDelay: 1200 updatePeriod: 1200 ====================
tt-cleaner.exe
[2021-10-13 13:17:34] M app.cpp:470 Found installer_path: C:\Users\admin\Downloads\TelamonCleaner_id6166cdfd20beaf2.exe
tt-cleaner.exe
[2021-10-13 13:17:34] E regstorage.cpp:62 [RegStorage] get<std::wstring>() Cannot get size of string value: RegGetValue failed. 2
tt-cleaner.exe
[2021-10-13 13:17:35] M main.cpp:114 App exit code: 0
tt-cleaner.exe
[2021-10-13 13:17:35] M log.cpp:93 Logging to C:\Program Files\Telamon Cleaner\logs\tt-cln-app-2021-10-13-13-17-35.log
tt-cleaner.exe
[2021-10-13 13:17:35] M main.cpp:43 Start main: "C:\Program Files\Telamon Cleaner\tt-cleaner.exe" thread id: 576 process id: 4004