File name:

SearchFilter.7z

Full analysis: https://app.any.run/tasks/bddb9db3-9d8a-49a2-9447-1f102d022223
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: July 08, 2025, 13:04:50
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
susp-powershell
api-base64
evasion
stealer
nodejs
telegram
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

D796369B23FBC85C949A7D37810E2E13

SHA1:

20F097DA56DE080BBF76D8477EB864D813A7003C

SHA256:

577C1E288B1D7EF69330A86F0C14D06BB67980FBA64896AADF556F52B770CF56

SSDEEP:

786432:qRfuRIpW7Qr/httL3Eoz7WRogI6kwrJDl:qR2CpWcr/T97WRogewrdl

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes powershell execution policy (Bypass)

      • cmd.exe (PID: 6236)
      • cmd.exe (PID: 4708)
      • cmd.exe (PID: 6676)
      • SearchFilter.exe (PID: 4580)
      • cmd.exe (PID: 1944)
      • cmd.exe (PID: 6172)
      • powershell.exe (PID: 6896)
      • cmd.exe (PID: 3968)
      • cmd.exe (PID: 2280)
      • cmd.exe (PID: 1268)
      • cmd.exe (PID: 5236)
      • cmd.exe (PID: 6320)
      • cmd.exe (PID: 5168)
      • wscript.exe (PID: 2180)
      • cmd.exe (PID: 4572)
      • cmd.exe (PID: 6220)
      • powershell.exe (PID: 1080)
      • cmd.exe (PID: 592)
      • cmd.exe (PID: 7868)
      • wscript.exe (PID: 3924)
      • cmd.exe (PID: 7628)
      • cmd.exe (PID: 3460)
      • wscript.exe (PID: 7404)
      • cmd.exe (PID: 8108)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 7004)
      • powershell.exe (PID: 6572)
      • powershell.exe (PID: 4804)
      • powershell.exe (PID: 2296)
      • powershell.exe (PID: 3108)
      • powershell.exe (PID: 6896)
      • powershell.exe (PID: 2708)
      • powershell.exe (PID: 5576)
      • powershell.exe (PID: 5708)
      • powershell.exe (PID: 6304)
      • powershell.exe (PID: 5060)
      • powershell.exe (PID: 3880)
      • powershell.exe (PID: 4868)
      • powershell.exe (PID: 4804)
      • powershell.exe (PID: 7160)
      • powershell.exe (PID: 1080)
      • powershell.exe (PID: 7000)
      • powershell.exe (PID: 7252)
      • powershell.exe (PID: 7960)
      • powershell.exe (PID: 7428)
      • powershell.exe (PID: 7752)
      • powershell.exe (PID: 4236)
      • powershell.exe (PID: 7244)
      • powershell.exe (PID: 7724)
      • powershell.exe (PID: 6860)
    • Run PowerShell with an invisible window

      • powershell.exe (PID: 3108)
      • powershell.exe (PID: 6896)
      • powershell.exe (PID: 4804)
      • powershell.exe (PID: 1080)
      • powershell.exe (PID: 7428)
      • powershell.exe (PID: 7724)
    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 32)
      • cmd.exe (PID: 3948)
      • cmd.exe (PID: 3944)
      • cmd.exe (PID: 7312)
      • cmd.exe (PID: 7516)
      • cmd.exe (PID: 7600)
      • cmd.exe (PID: 7964)
    • UAC/LUA settings modification

      • reg.exe (PID: 6412)
      • reg.exe (PID: 7548)
    • Disables Windows Defender

      • reg.exe (PID: 3148)
      • reg.exe (PID: 4664)
      • reg.exe (PID: 3936)
      • reg.exe (PID: 4112)
      • reg.exe (PID: 3836)
      • reg.exe (PID: 4692)
      • reg.exe (PID: 3720)
      • reg.exe (PID: 7808)
      • reg.exe (PID: 7612)
      • reg.exe (PID: 6892)
    • Deletes shadow copies

      • powershell.exe (PID: 2708)
      • powershell.exe (PID: 7252)
    • The DLL Hijacking

      • taskhostw.exe (PID: 5920)
      • Microsoft.exe (PID: 4528)
    • Actions looks like stealing of personal data

      • NVIDIA Control Panel.exe (PID: 4828)
    • Steals credentials from Web Browsers

      • NVIDIA Control Panel.exe (PID: 4828)
    • Deletes a file (SCRIPT)

      • wscript.exe (PID: 2180)
      • wscript.exe (PID: 3924)
      • wscript.exe (PID: 7404)
    • Gets or sets the symmetric key that is used for encryption and decryption (POWERSHELL)

      • powershell.exe (PID: 4804)
      • powershell.exe (PID: 7428)
      • powershell.exe (PID: 7724)
    • Gets or sets the initialization vector for the symmetric algorithm (POWERSHELL)

      • powershell.exe (PID: 4804)
      • powershell.exe (PID: 7428)
      • powershell.exe (PID: 7724)
    • Uses AES cipher (POWERSHELL)

      • powershell.exe (PID: 4804)
      • powershell.exe (PID: 7428)
      • powershell.exe (PID: 7724)
    • Starts CMD.EXE for self-deleting

      • powershell.exe (PID: 4804)
      • powershell.exe (PID: 7428)
      • powershell.exe (PID: 7724)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 7032)
      • 7z.exe (PID: 6652)
      • SearchFilter.exe (PID: 4580)
      • 7z4.exe (PID: 6152)
      • 7z.exe (PID: 2804)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 7032)
    • Starts NET.EXE to display or manage information about active sessions

      • cmd.exe (PID: 6672)
      • net.exe (PID: 3936)
      • cmd.exe (PID: 2116)
      • net.exe (PID: 6936)
      • cmd.exe (PID: 7680)
      • net.exe (PID: 7772)
      • cmd.exe (PID: 7420)
      • net.exe (PID: 8056)
      • cmd.exe (PID: 6308)
      • net.exe (PID: 7152)
    • Application launched itself

      • SearchFilter.exe (PID: 4580)
      • powershell.exe (PID: 6896)
      • SearchFilter.exe (PID: 3720)
      • taskhostw.exe (PID: 4264)
      • NVIDIA Control Panel.exe (PID: 4828)
      • Microsoft.exe (PID: 1468)
      • powershell.exe (PID: 1080)
    • Executable content was dropped or overwritten

      • SearchFilter.exe (PID: 4580)
      • csc.exe (PID: 6016)
      • SearchFilter.exe (PID: 3720)
      • 7z.exe (PID: 6652)
      • csc.exe (PID: 3388)
      • 7z4.exe (PID: 6152)
      • taskhostw.exe (PID: 4264)
      • NVIDIA Control Panel.exe (PID: 4828)
      • 7z.exe (PID: 2804)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 4708)
      • cmd.exe (PID: 6236)
      • cmd.exe (PID: 1944)
      • cmd.exe (PID: 6676)
      • SearchFilter.exe (PID: 4580)
      • cmd.exe (PID: 6172)
      • powershell.exe (PID: 6896)
      • cmd.exe (PID: 3968)
      • cmd.exe (PID: 2280)
      • cmd.exe (PID: 1268)
      • cmd.exe (PID: 5236)
      • cmd.exe (PID: 6320)
      • cmd.exe (PID: 5168)
      • wscript.exe (PID: 2180)
      • cmd.exe (PID: 4572)
      • cmd.exe (PID: 6220)
      • cmd.exe (PID: 592)
      • powershell.exe (PID: 1080)
      • cmd.exe (PID: 7868)
      • wscript.exe (PID: 3924)
      • cmd.exe (PID: 7628)
      • cmd.exe (PID: 3460)
      • wscript.exe (PID: 7404)
      • cmd.exe (PID: 7920)
      • cmd.exe (PID: 7240)
      • cmd.exe (PID: 8108)
      • cmd.exe (PID: 8044)
      • cmd.exe (PID: 1044)
    • Uses WMIC.EXE to obtain a list of video controllers

      • cmd.exe (PID: 1936)
      • cmd.exe (PID: 7416)
    • Uses WMIC.EXE to obtain local storage devices information

      • cmd.exe (PID: 632)
      • cmd.exe (PID: 6016)
    • Accesses video controller name via WMI (SCRIPT)

      • WMIC.exe (PID: 5564)
      • WMIC.exe (PID: 7484)
    • The process executes Powershell scripts

      • cmd.exe (PID: 1944)
      • cmd.exe (PID: 6172)
      • powershell.exe (PID: 6896)
      • cmd.exe (PID: 5168)
      • wscript.exe (PID: 2180)
      • cmd.exe (PID: 4572)
      • cmd.exe (PID: 6220)
      • powershell.exe (PID: 1080)
      • wscript.exe (PID: 3924)
      • wscript.exe (PID: 7404)
    • Starts CMD.EXE for commands execution

      • SearchFilter.exe (PID: 4580)
      • SearchFilter.exe (PID: 3720)
      • NVIDIA Control Panel.exe (PID: 4828)
      • taskhostw.exe (PID: 4264)
      • Microsoft.exe (PID: 1468)
      • powershell.exe (PID: 4804)
      • powershell.exe (PID: 7428)
      • powershell.exe (PID: 7724)
    • Starts process via Powershell

      • powershell.exe (PID: 4804)
      • powershell.exe (PID: 6896)
      • powershell.exe (PID: 5708)
      • powershell.exe (PID: 1080)
    • CSC.EXE is used to compile C# code

      • csc.exe (PID: 6016)
      • csc.exe (PID: 3388)
    • Found strings related to reading or modifying Windows Defender settings

      • SearchFilter.exe (PID: 3720)
      • Microsoft.exe (PID: 1468)
    • The process bypasses the loading of PowerShell profile settings

      • powershell.exe (PID: 6896)
      • cmd.exe (PID: 6172)
      • cmd.exe (PID: 6220)
      • powershell.exe (PID: 1080)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 7092)
      • cmd.exe (PID: 2536)
      • cmd.exe (PID: 1468)
      • cmd.exe (PID: 1832)
      • cmd.exe (PID: 6488)
      • cmd.exe (PID: 1880)
      • cmd.exe (PID: 6812)
      • cmd.exe (PID: 6376)
      • cmd.exe (PID: 420)
      • cmd.exe (PID: 7160)
      • cmd.exe (PID: 1180)
      • cmd.exe (PID: 3872)
      • cmd.exe (PID: 2368)
      • cmd.exe (PID: 1232)
      • cmd.exe (PID: 3752)
      • cmd.exe (PID: 1852)
      • cmd.exe (PID: 1352)
      • cmd.exe (PID: 4232)
      • cmd.exe (PID: 6672)
      • cmd.exe (PID: 2536)
      • cmd.exe (PID: 5468)
      • cmd.exe (PID: 5552)
      • cmd.exe (PID: 1520)
      • cmd.exe (PID: 3584)
      • cmd.exe (PID: 5172)
      • cmd.exe (PID: 6284)
      • cmd.exe (PID: 4708)
      • cmd.exe (PID: 6748)
      • cmd.exe (PID: 2536)
      • cmd.exe (PID: 6676)
      • cmd.exe (PID: 4808)
      • cmd.exe (PID: 5372)
      • cmd.exe (PID: 4664)
      • cmd.exe (PID: 4752)
      • cmd.exe (PID: 3100)
      • cmd.exe (PID: 7728)
      • cmd.exe (PID: 7876)
      • cmd.exe (PID: 8000)
      • cmd.exe (PID: 8084)
      • cmd.exe (PID: 3948)
      • cmd.exe (PID: 8188)
      • cmd.exe (PID: 6268)
      • cmd.exe (PID: 7248)
      • cmd.exe (PID: 7188)
      • cmd.exe (PID: 7360)
      • cmd.exe (PID: 7472)
      • cmd.exe (PID: 7760)
      • cmd.exe (PID: 7984)
      • cmd.exe (PID: 8020)
      • cmd.exe (PID: 2588)
      • cmd.exe (PID: 5900)
      • cmd.exe (PID: 4192)
      • cmd.exe (PID: 7980)
      • cmd.exe (PID: 7492)
      • cmd.exe (PID: 7596)
      • cmd.exe (PID: 8120)
      • cmd.exe (PID: 7948)
      • cmd.exe (PID: 7764)
      • cmd.exe (PID: 8164)
      • cmd.exe (PID: 1028)
      • cmd.exe (PID: 7576)
      • cmd.exe (PID: 7928)
      • cmd.exe (PID: 5444)
      • cmd.exe (PID: 8032)
      • cmd.exe (PID: 7180)
      • cmd.exe (PID: 7860)
      • cmd.exe (PID: 7732)
      • cmd.exe (PID: 7840)
      • cmd.exe (PID: 7424)
      • cmd.exe (PID: 984)
      • cmd.exe (PID: 6892)
    • Modifies existing scheduled task

      • schtasks.exe (PID: 5372)
      • schtasks.exe (PID: 3936)
      • schtasks.exe (PID: 4372)
      • schtasks.exe (PID: 4808)
      • schtasks.exe (PID: 1852)
      • schtasks.exe (PID: 7972)
      • schtasks.exe (PID: 7596)
      • schtasks.exe (PID: 7644)
      • schtasks.exe (PID: 7404)
      • schtasks.exe (PID: 7372)
    • Executes as Windows Service

      • VSSVC.exe (PID: 2276)
      • VSSVC.exe (PID: 7208)
    • There is functionality for taking screenshot (YARA)

      • SearchFilter.exe (PID: 6388)
    • Get information on the list of running processes

      • SearchFilter.exe (PID: 4580)
      • cmd.exe (PID: 3968)
      • cmd.exe (PID: 4160)
      • NVIDIA Control Panel.exe (PID: 4828)
      • cmd.exe (PID: 3948)
      • taskhostw.exe (PID: 4264)
      • cmd.exe (PID: 340)
      • Microsoft.exe (PID: 1468)
      • cmd.exe (PID: 8108)
    • Drops 7-zip archiver for unpacking

      • SearchFilter.exe (PID: 4580)
    • Hides command output

      • cmd.exe (PID: 7016)
      • cmd.exe (PID: 7380)
      • cmd.exe (PID: 7632)
      • cmd.exe (PID: 8088)
      • cmd.exe (PID: 8116)
      • cmd.exe (PID: 5552)
      • cmd.exe (PID: 7300)
    • Lists all scheduled tasks

      • schtasks.exe (PID: 4456)
      • schtasks.exe (PID: 5960)
      • schtasks.exe (PID: 3724)
      • schtasks.exe (PID: 6228)
      • schtasks.exe (PID: 2136)
      • schtasks.exe (PID: 7712)
      • schtasks.exe (PID: 1180)
      • schtasks.exe (PID: 7508)
      • schtasks.exe (PID: 7504)
      • schtasks.exe (PID: 7976)
    • The process executes via Task Scheduler

      • taskhostw.exe (PID: 4264)
      • Microsoft.exe (PID: 1468)
    • Checks for external IP

      • svchost.exe (PID: 2200)
      • curl.exe (PID: 72)
      • Microsoft.exe (PID: 1468)
      • SearchFilter.exe (PID: 4580)
      • NVIDIA Control Panel.exe (PID: 4828)
    • The process executes VB scripts

      • cmd.exe (PID: 1288)
      • cmd.exe (PID: 6756)
      • cmd.exe (PID: 2612)
    • Creates FileSystem object to access computer's file system (SCRIPT)

      • wscript.exe (PID: 2180)
      • wscript.exe (PID: 3924)
      • wscript.exe (PID: 7404)
    • Gets full path of the running script (SCRIPT)

      • wscript.exe (PID: 2180)
      • wscript.exe (PID: 3924)
      • wscript.exe (PID: 7404)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 2180)
      • wscript.exe (PID: 3924)
      • wscript.exe (PID: 7404)
    • Converts a specified value to an integer (POWERSHELL)

      • powershell.exe (PID: 4804)
      • powershell.exe (PID: 7428)
      • powershell.exe (PID: 7724)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 5712)
      • cmd.exe (PID: 7264)
      • cmd.exe (PID: 2292)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • SearchFilter.exe (PID: 4580)
      • NVIDIA Control Panel.exe (PID: 4828)
    • Uses WMIC.EXE to obtain Windows Installer data

      • cmd.exe (PID: 7676)
    • Accesses antivirus product name via WMI (SCRIPT)

      • WMIC.exe (PID: 8024)
    • Query Microsoft Defender preferences

      • SearchFilter.exe (PID: 4580)
    • Uses ATTRIB.EXE to modify file attributes

      • cmd.exe (PID: 7816)
    • Connects to unusual port

      • DWWIN.EXE (PID: 7332)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 6936)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7032)
    • Reads product name

      • SearchFilter.exe (PID: 4580)
      • SearchFilter.exe (PID: 3720)
      • taskhostw.exe (PID: 4264)
      • Microsoft.exe (PID: 1468)
    • Checks supported languages

      • SearchFilter.exe (PID: 4580)
      • SearchFilter.exe (PID: 6388)
      • SearchFilter.exe (PID: 2216)
      • cvtres.exe (PID: 5716)
      • csc.exe (PID: 6016)
      • SearchFilter.exe (PID: 3720)
      • SearchFilter.exe (PID: 5284)
      • SearchFilter.exe (PID: 6520)
      • 7z.exe (PID: 6320)
      • 7z.exe (PID: 6652)
      • csc.exe (PID: 3388)
      • cvtres.exe (PID: 4864)
      • 7z4.exe (PID: 6152)
      • taskhostw.exe (PID: 4264)
      • taskhostw.exe (PID: 5920)
      • taskhostw.exe (PID: 3476)
      • NVIDIA Control Panel.exe (PID: 4828)
      • curl.exe (PID: 72)
      • NVIDIA Control Panel.exe (PID: 2192)
      • NVIDIA Control Panel.exe (PID: 4216)
      • 7z.exe (PID: 2804)
      • Microsoft.exe (PID: 1468)
      • Microsoft.exe (PID: 4528)
      • Microsoft.exe (PID: 5060)
      • 7z.exe (PID: 7324)
      • 7z.exe (PID: 8072)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 7032)
      • SearchFilter.exe (PID: 4580)
      • 7z.exe (PID: 6652)
      • 7z4.exe (PID: 6152)
      • 7z.exe (PID: 2804)
    • Reads the computer name

      • SearchFilter.exe (PID: 4580)
      • SearchFilter.exe (PID: 6388)
      • SearchFilter.exe (PID: 2216)
      • SearchFilter.exe (PID: 3720)
      • SearchFilter.exe (PID: 6520)
      • SearchFilter.exe (PID: 5284)
      • 7z.exe (PID: 6320)
      • 7z.exe (PID: 6652)
      • 7z4.exe (PID: 6152)
      • taskhostw.exe (PID: 5920)
      • taskhostw.exe (PID: 4264)
      • taskhostw.exe (PID: 3476)
      • NVIDIA Control Panel.exe (PID: 4828)
      • curl.exe (PID: 72)
      • NVIDIA Control Panel.exe (PID: 2192)
      • NVIDIA Control Panel.exe (PID: 4216)
      • 7z.exe (PID: 2804)
      • Microsoft.exe (PID: 1468)
      • Microsoft.exe (PID: 4528)
      • Microsoft.exe (PID: 5060)
      • 7z.exe (PID: 7324)
      • 7z.exe (PID: 8072)
    • Process checks computer location settings

      • SearchFilter.exe (PID: 4580)
      • SearchFilter.exe (PID: 3720)
      • NVIDIA Control Panel.exe (PID: 4828)
    • Reads Environment values

      • SearchFilter.exe (PID: 4580)
      • SearchFilter.exe (PID: 3720)
      • taskhostw.exe (PID: 4264)
      • Microsoft.exe (PID: 1468)
    • Create files in a temporary directory

      • SearchFilter.exe (PID: 4580)
      • csc.exe (PID: 6016)
      • cvtres.exe (PID: 5716)
      • SearchFilter.exe (PID: 3720)
      • powershell.exe (PID: 2524)
      • csc.exe (PID: 3388)
      • cvtres.exe (PID: 4864)
      • taskhostw.exe (PID: 4264)
      • NVIDIA Control Panel.exe (PID: 4828)
      • powershell.exe (PID: 7244)
      • 7z.exe (PID: 8072)
      • Microsoft.exe (PID: 1468)
    • Reads the machine GUID from the registry

      • SearchFilter.exe (PID: 4580)
      • csc.exe (PID: 6016)
      • SearchFilter.exe (PID: 3720)
      • csc.exe (PID: 3388)
      • NVIDIA Control Panel.exe (PID: 4828)
    • Checks proxy server information

      • SearchFilter.exe (PID: 4580)
      • SearchFilter.exe (PID: 3720)
      • slui.exe (PID: 1336)
      • taskhostw.exe (PID: 4264)
      • NVIDIA Control Panel.exe (PID: 4828)
      • Microsoft.exe (PID: 1468)
    • Reads security settings of Internet Explorer

      • WMIC.exe (PID: 5564)
      • WMIC.exe (PID: 4644)
      • powershell.exe (PID: 2524)
      • WMIC.exe (PID: 7484)
      • WMIC.exe (PID: 8024)
      • powershell.exe (PID: 7244)
      • WMIC.exe (PID: 7916)
    • Creates files or folders in the user directory

      • SearchFilter.exe (PID: 4580)
      • 7z.exe (PID: 6652)
      • taskhostw.exe (PID: 4264)
      • 7z4.exe (PID: 6152)
      • NVIDIA Control Panel.exe (PID: 4828)
      • Microsoft.exe (PID: 1468)
      • 7z.exe (PID: 7324)
    • Potential access to remote process (Base64 Encoded 'OpenProcess')

      • SearchFilter.exe (PID: 4580)
    • Found Base64 encoded reflection usage via PowerShell (YARA)

      • SearchFilter.exe (PID: 4580)
    • The executable file from the user directory is run by the Powershell process

      • SearchFilter.exe (PID: 3720)
      • NVIDIA Control Panel.exe (PID: 4828)
    • Found Base64 encoded access to processes via PowerShell (YARA)

      • SearchFilter.exe (PID: 4580)
    • Launching a file from Task Scheduler

      • cmd.exe (PID: 32)
      • cmd.exe (PID: 3944)
      • cmd.exe (PID: 3948)
      • cmd.exe (PID: 7312)
      • cmd.exe (PID: 7516)
      • cmd.exe (PID: 7600)
      • cmd.exe (PID: 7964)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 2708)
      • powershell.exe (PID: 7252)
      • powershell.exe (PID: 7244)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 2708)
      • powershell.exe (PID: 7252)
    • Node.js compiler has been detected

      • SearchFilter.exe (PID: 4580)
      • SearchFilter.exe (PID: 6388)
    • Creates files in the program directory

      • SearchFilter.exe (PID: 4580)
      • 7z.exe (PID: 2804)
      • Microsoft.exe (PID: 1468)
    • Reads the software policy settings

      • powershell.exe (PID: 2524)
      • slui.exe (PID: 1336)
      • powershell.exe (PID: 7244)
    • Reads CPU info

      • SearchFilter.exe (PID: 4580)
      • NVIDIA Control Panel.exe (PID: 4828)
      • Microsoft.exe (PID: 1468)
    • Execution of CURL command

      • cmd.exe (PID: 5644)
    • Uses string replace method (POWERSHELL)

      • powershell.exe (PID: 7160)
    • Gets or sets the time when the file was last written to (POWERSHELL)

      • powershell.exe (PID: 7160)
    • Gets data length (POWERSHELL)

      • powershell.exe (PID: 4804)
      • powershell.exe (PID: 7428)
      • powershell.exe (PID: 7724)
    • Creates a new folder

      • cmd.exe (PID: 3388)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)

EXIF

ZIP

FileVersion: 7z v0.04
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
665
Monitored processes
519
Malicious processes
36
Suspicious processes
15

Behavior graph

Click at the process to see the details
start winrar.exe no specs slui.exe searchfilter.exe cmd.exe no specs conhost.exe no specs net.exe no specs net1.exe no specs searchfilter.exe no specs searchfilter.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs csc.exe no specs cvtres.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs powershell.exe no specs conhost.exe no specs searchfilter.exe cmd.exe no specs conhost.exe no specs powershell.exe no specs searchfilter.exe no specs searchfilter.exe no specs powershell.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs vssadmin.exe no specs vssvc.exe no specs cmd.exe no specs conhost.exe no specs 7z.exe no specs cmd.exe no specs conhost.exe no specs 7z.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs powershell.exe no specs conhost.exe no specs csc.exe no specs cvtres.exe no specs cmd.exe no specs conhost.exe no specs 7z4.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs taskhostw.exe no specs taskhostw.exe no specs taskhostw.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs nvidia control panel.exe cmd.exe no specs conhost.exe no specs curl.exe nvidia control panel.exe no specs nvidia control panel.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs 7z.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs microsoft.exe cmd.exe no specs conhost.exe no specs wscript.exe no specs powershell.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs microsoft.exe no specs microsoft.exe no specs cmd.exe no specs conhost.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs svchost.exe cmd.exe no specs conhost.exe no specs powershell.exe no specs regasm.exe no specs regasm.exe no specs regasm.exe no specs regasm.exe no specs regasm.exe no specs regasm.exe no specs regasm.exe no specs regasm.exe no specs cmd.exe no specs timeout.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs powershell.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs net.exe no specs net1.exe no specs reg.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs powershell.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs wscript.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs powershell.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs vssadmin.exe no specs vssvc.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs regasm.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs regasm.exe no specs regasm.exe no specs regasm.exe no specs regasm.exe no specs reg.exe no specs regasm.exe no specs regasm.exe no specs cmd.exe no specs conhost.exe no specs regasm.exe no specs powershell.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs timeout.exe no specs cmd.exe no specs conhost.exe no specs wscript.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs attrib.exe no specs regasm.exe no specs regasm.exe no specs regasm.exe no specs regasm.exe no specs regasm.exe no specs regasm.exe no specs regasm.exe no specs regasm.exe no specs cmd.exe no specs timeout.exe no specs dwwin.exe cmd.exe no specs conhost.exe no specs tasklist.exe no specs cmd.exe no specs conhost.exe no specs 7z.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs cmd.exe no specs conhost.exe no specs 7z.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
32C:\WINDOWS\system32\cmd.exe /d /s /c "schtasks /create /tn "\Microsoft\Windows\Device Guide\RegisterDeviceSecurityAlert" /tr "powershell -ExecutionPolicy Bypass -File \"C:\Users\admin\AppData\Local\Programs\Common\OneDriveCloud\mbam.ps1\"" /sc once /st 00:00 /du 9999:59 /ri 58 /ru "SYSTEM" /RL HIGHEST /F"C:\Windows\System32\cmd.exeSearchFilter.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
32\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
32reg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /fC:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
72curl http://api.ipify.org/ --ssl-no-revokeC:\Windows\SysWOW64\curl.exe
cmd.exe
User:
admin
Company:
curl, https://curl.se/
Integrity Level:
MEDIUM
Description:
The curl executable
Exit code:
0
Version:
8.4.0
Modules
Images
c:\windows\syswow64\curl.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\ws2_32.dll
c:\windows\syswow64\rpcrt4.dll
72\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
340C:\WINDOWS\system32\cmd.exe /d /s /c "tasklist"C:\Windows\System32\cmd.exetaskhostw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
344reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /fC:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ws2_32.dll
348\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
420\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
420C:\WINDOWS\system32\cmd.exe /d /s /c "reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v EnableLUA /t REG_DWORD /d 0 /f"C:\Windows\System32\cmd.exeSearchFilter.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
Total events
153 597
Read events
153 508
Write events
73
Delete events
16

Modification events

(PID) Process:(7032) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(7032) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7032) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7032) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7032) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\SearchFilter.7z
(PID) Process:(7032) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7032) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7032) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7032) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(4708) reg.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Microsoft.WindowsDefender.SecurityCenter.Notifications
Operation:writeName:Enabled
Value:
0
Executable files
63
Suspicious files
65
Text files
99
Unknown types
302

Dropped files

PID
Process
Filename
Type
7032WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb7032.26661\icudtl.dat
MD5:
SHA256:
7032WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb7032.26661\chrome_100_percent.pakpgc
MD5:ACD0FA0A90B43CD1C87A55A991B4FAC3
SHA256:CCBCA246B9A93FA8D4F01A01345E7537511C590E4A8EFD5777B1596D10923B4B
7032WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb7032.26661\locales\bn.pakpgc
MD5:5CDD07FA357C846771058C2DB67EB13B
SHA256:01C830B0007B8CE6ACA46E26D812947C3DF818927B826F7D8C5FFD0008A32384
7032WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb7032.26661\locales\ca.pakpgc
MD5:D259469E94F2ADF54380195555154518
SHA256:F98B7442BEFC285398A5DD6A96740CBA31D2F5AADADD4D5551A05712D693029B
7032WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb7032.26661\locales\am.pakpgc
MD5:2009647C3E7AED2C4C6577EE4C546E19
SHA256:6D61E5189438F3728F082AD6F694060D7EE8E571DF71240DFD5B77045A62954E
7032WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb7032.26661\locales\af.pakpgc
MD5:7E51349EDC7E6AED122BFA00970FAB80
SHA256:F528E698B164283872F76DF2233A47D7D41E1ABA980CE39F6B078E577FD14C97
7032WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb7032.26661\locales\bg.pakpgc
MD5:A19269683A6347E07C55325B9ECC03A4
SHA256:AD65351A240205E881EF5C4CF30AD1BC6B6E04414343583597086B62D48D8A24
7032WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb7032.26661\locales\ar.pakpgc
MD5:47A6D10B4112509852D4794229C0A03B
SHA256:857FE3AB766B60A8D82B7B6043137E3A7D9F5CFB8DDD942316452838C67D0495
7032WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb7032.26661\locales\cs.pakpgc
MD5:04A680847C4A66AD9F0A88FB9FB1FC7B
SHA256:1CC44C5FBE1C0525DF37C5B6267A677F79C9671F86EDA75B6FC13ABF5D5356EB
7032WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb7032.26661\chrome_200_percent.pakpgc
MD5:4610337E3332B7E65B73A6EA738B47DF
SHA256:C91ABF556E55C29D1EA9F560BB17CC3489CB67A5D0C7A22B58485F5F2FBCF25C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
71
DNS requests
34
Threats
30

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6700
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4520
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
4520
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
72
curl.exe
GET
200
104.26.12.205:80
http://api.ipify.org/
unknown
malicious
2940
svchost.exe
GET
200
2.23.197.184:80
http://x1.c.lencr.org/
unknown
whitelisted
1468
Microsoft.exe
GET
200
104.26.12.205:80
http://api.ipify.org/
unknown
malicious
4580
SearchFilter.exe
GET
200
104.26.12.205:80
http://api.ipify.org/
unknown
malicious
4580
SearchFilter.exe
GET
200
104.26.12.205:80
http://api.ipify.org/
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
3720
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5944
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
1268
svchost.exe
2.16.168.114:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
1268
svchost.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
6700
svchost.exe
20.190.160.20:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6700
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
5944
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 172.217.16.206
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
  • 20.73.194.208
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 2.16.168.114
  • 2.16.168.124
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 95.101.149.131
whitelisted
login.live.com
  • 20.190.160.20
  • 20.190.160.5
  • 20.190.160.22
  • 20.190.160.17
  • 20.190.160.64
  • 40.126.32.136
  • 40.126.32.72
  • 20.190.160.131
  • 40.126.31.0
  • 40.126.31.3
  • 40.126.31.128
  • 40.126.31.2
  • 20.190.159.131
  • 20.190.159.0
  • 40.126.31.130
  • 20.190.159.73
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
nexusrules.officeapps.live.com
  • 52.111.227.14
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted

Threats

PID
Process
Class
Message
2200
svchost.exe
Misc activity
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
72
curl.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External IP Lookup by HTTP (api .ipify .org)
72
curl.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup api.ipify.org
72
curl.exe
Device Retrieving External IP Address Detected
SUSPICIOUS [ANY.RUN] An IP address was received from the server as a result of an HTTP request
1468
Microsoft.exe
Device Retrieving External IP Address Detected
SUSPICIOUS [ANY.RUN] An IP address was received from the server as a result of an HTTP request
1468
Microsoft.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External IP Lookup by HTTP (api .ipify .org)
1468
Microsoft.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup api.ipify.org
4580
SearchFilter.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External IP Lookup by HTTP (api .ipify .org)
4580
SearchFilter.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup api.ipify.org
2200
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ipinfo .io)
No debug info