File name:

SearchFilter.7z

Full analysis: https://app.any.run/tasks/eaa3b031-f619-4206-bfd5-828ef04cbce4
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: July 07, 2025, 13:28:49
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
evasion
stealer
susp-powershell
api-base64
telegram
nodejs
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

D796369B23FBC85C949A7D37810E2E13

SHA1:

20F097DA56DE080BBF76D8477EB864D813A7003C

SHA256:

577C1E288B1D7EF69330A86F0C14D06BB67980FBA64896AADF556F52B770CF56

SSDEEP:

786432:qRfuRIpW7Qr/httL3Eoz7WRogI6kwrJDl:qR2CpWcr/T97WRogewrdl

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes powershell execution policy (Bypass)

      • cmd.exe (PID: 4100)
      • cmd.exe (PID: 4888)
      • cmd.exe (PID: 684)
      • cmd.exe (PID: 5712)
      • SearchFilter.exe (PID: 3672)
      • cmd.exe (PID: 1328)
      • powershell.exe (PID: 5720)
      • cmd.exe (PID: 4828)
      • cmd.exe (PID: 1080)
      • cmd.exe (PID: 5744)
      • cmd.exe (PID: 5988)
      • cmd.exe (PID: 6380)
      • cmd.exe (PID: 1760)
      • cmd.exe (PID: 4052)
      • cmd.exe (PID: 5460)
      • cmd.exe (PID: 2680)
      • powershell.exe (PID: 7128)
      • wscript.exe (PID: 1268)
      • cmd.exe (PID: 7636)
      • wscript.exe (PID: 7472)
      • cmd.exe (PID: 8144)
      • cmd.exe (PID: 5744)
      • wscript.exe (PID: 7652)
      • cmd.exe (PID: 1056)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 1872)
      • powershell.exe (PID: 2876)
      • powershell.exe (PID: 6228)
      • powershell.exe (PID: 5284)
      • powershell.exe (PID: 2520)
      • powershell.exe (PID: 5720)
      • powershell.exe (PID: 4104)
      • powershell.exe (PID: 6516)
      • powershell.exe (PID: 6788)
      • powershell.exe (PID: 6772)
      • powershell.exe (PID: 2388)
      • powershell.exe (PID: 6128)
      • powershell.exe (PID: 4860)
      • powershell.exe (PID: 3976)
      • powershell.exe (PID: 7128)
      • powershell.exe (PID: 1728)
      • powershell.exe (PID: 3688)
      • powershell.exe (PID: 6956)
      • powershell.exe (PID: 7272)
      • powershell.exe (PID: 7692)
      • powershell.exe (PID: 7612)
      • powershell.exe (PID: 8172)
      • powershell.exe (PID: 7940)
      • powershell.exe (PID: 7480)
      • powershell.exe (PID: 7440)
      • powershell.exe (PID: 6540)
    • Run PowerShell with an invisible window

      • powershell.exe (PID: 6228)
      • powershell.exe (PID: 5720)
      • powershell.exe (PID: 7128)
      • powershell.exe (PID: 6956)
      • powershell.exe (PID: 7612)
      • powershell.exe (PID: 7480)
    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 2320)
      • cmd.exe (PID: 6748)
      • cmd.exe (PID: 3964)
      • cmd.exe (PID: 7224)
      • cmd.exe (PID: 7852)
      • cmd.exe (PID: 7732)
      • cmd.exe (PID: 1944)
    • UAC/LUA settings modification

      • reg.exe (PID: 1936)
      • reg.exe (PID: 5712)
    • Disables Windows Defender

      • reg.exe (PID: 4748)
      • reg.exe (PID: 4844)
      • reg.exe (PID: 6180)
      • reg.exe (PID: 1976)
      • reg.exe (PID: 1964)
      • reg.exe (PID: 3956)
      • reg.exe (PID: 7708)
      • reg.exe (PID: 8000)
      • reg.exe (PID: 7984)
      • reg.exe (PID: 6836)
    • Deletes shadow copies

      • powershell.exe (PID: 4104)
      • powershell.exe (PID: 3688)
    • The DLL Hijacking

      • taskhostw.exe (PID: 5424)
      • Microsoft.exe (PID: 2588)
    • Actions looks like stealing of personal data

      • NVIDIA Control Panel.exe (PID: 5652)
    • Steals credentials from Web Browsers

      • NVIDIA Control Panel.exe (PID: 5652)
    • Deletes a file (SCRIPT)

      • wscript.exe (PID: 1268)
      • wscript.exe (PID: 7472)
      • wscript.exe (PID: 7652)
    • Uses AES cipher (POWERSHELL)

      • powershell.exe (PID: 6956)
      • powershell.exe (PID: 7612)
      • powershell.exe (PID: 7480)
    • Gets or sets the symmetric key that is used for encryption and decryption (POWERSHELL)

      • powershell.exe (PID: 6956)
      • powershell.exe (PID: 7612)
      • powershell.exe (PID: 7480)
    • Starts CMD.EXE for self-deleting

      • powershell.exe (PID: 6956)
      • powershell.exe (PID: 7612)
      • powershell.exe (PID: 7480)
    • Gets or sets the initialization vector for the symmetric algorithm (POWERSHELL)

      • powershell.exe (PID: 6956)
      • powershell.exe (PID: 7612)
      • powershell.exe (PID: 7480)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 6104)
    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 6104)
      • SearchFilter.exe (PID: 3672)
      • 7z.exe (PID: 7020)
      • 7z4.exe (PID: 2288)
      • 7z.exe (PID: 2192)
    • Starts NET.EXE to display or manage information about active sessions

      • cmd.exe (PID: 1352)
      • net.exe (PID: 4664)
      • cmd.exe (PID: 4820)
      • net.exe (PID: 6788)
      • cmd.exe (PID: 7520)
      • net.exe (PID: 7580)
      • net.exe (PID: 3048)
      • cmd.exe (PID: 7472)
      • cmd.exe (PID: 2632)
      • net.exe (PID: 1044)
    • Executable content was dropped or overwritten

      • SearchFilter.exe (PID: 3672)
      • csc.exe (PID: 5564)
      • SearchFilter.exe (PID: 7160)
      • 7z.exe (PID: 7020)
      • csc.exe (PID: 4948)
      • 7z4.exe (PID: 2288)
      • taskhostw.exe (PID: 592)
      • NVIDIA Control Panel.exe (PID: 5652)
      • 7z.exe (PID: 2192)
    • Application launched itself

      • SearchFilter.exe (PID: 3672)
      • powershell.exe (PID: 5720)
      • SearchFilter.exe (PID: 7160)
      • taskhostw.exe (PID: 592)
      • NVIDIA Control Panel.exe (PID: 5652)
      • Microsoft.exe (PID: 3780)
      • powershell.exe (PID: 7128)
    • Starts CMD.EXE for commands execution

      • SearchFilter.exe (PID: 3672)
      • SearchFilter.exe (PID: 7160)
      • NVIDIA Control Panel.exe (PID: 5652)
      • taskhostw.exe (PID: 592)
      • Microsoft.exe (PID: 3780)
      • powershell.exe (PID: 6956)
      • powershell.exe (PID: 7612)
      • powershell.exe (PID: 7480)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 4888)
      • cmd.exe (PID: 5712)
      • cmd.exe (PID: 4100)
      • cmd.exe (PID: 684)
      • SearchFilter.exe (PID: 3672)
      • cmd.exe (PID: 1328)
      • powershell.exe (PID: 5720)
      • cmd.exe (PID: 4828)
      • cmd.exe (PID: 1080)
      • cmd.exe (PID: 5744)
      • cmd.exe (PID: 5988)
      • cmd.exe (PID: 4052)
      • cmd.exe (PID: 1760)
      • cmd.exe (PID: 6380)
      • cmd.exe (PID: 5460)
      • cmd.exe (PID: 2680)
      • wscript.exe (PID: 1268)
      • powershell.exe (PID: 7128)
      • cmd.exe (PID: 7636)
      • cmd.exe (PID: 5744)
      • wscript.exe (PID: 7472)
      • cmd.exe (PID: 8144)
      • wscript.exe (PID: 7652)
      • cmd.exe (PID: 8096)
      • cmd.exe (PID: 7884)
      • cmd.exe (PID: 7400)
      • cmd.exe (PID: 8184)
      • cmd.exe (PID: 1056)
    • Uses WMIC.EXE to obtain local storage devices information

      • cmd.exe (PID: 6424)
      • cmd.exe (PID: 6652)
    • Uses WMIC.EXE to obtain a list of video controllers

      • cmd.exe (PID: 4160)
      • cmd.exe (PID: 7388)
    • Accesses video controller name via WMI (SCRIPT)

      • WMIC.exe (PID: 4088)
      • WMIC.exe (PID: 7448)
    • Starts process via Powershell

      • powershell.exe (PID: 2520)
      • powershell.exe (PID: 5720)
      • powershell.exe (PID: 6788)
      • powershell.exe (PID: 7128)
    • The process executes Powershell scripts

      • cmd.exe (PID: 5712)
      • cmd.exe (PID: 1328)
      • powershell.exe (PID: 5720)
      • cmd.exe (PID: 6380)
      • cmd.exe (PID: 1760)
      • cmd.exe (PID: 5460)
      • powershell.exe (PID: 7128)
      • wscript.exe (PID: 1268)
      • wscript.exe (PID: 7472)
      • wscript.exe (PID: 7652)
    • CSC.EXE is used to compile C# code

      • csc.exe (PID: 5564)
      • csc.exe (PID: 4948)
    • Found strings related to reading or modifying Windows Defender settings

      • SearchFilter.exe (PID: 7160)
      • Microsoft.exe (PID: 3780)
    • The process bypasses the loading of PowerShell profile settings

      • cmd.exe (PID: 1328)
      • powershell.exe (PID: 5720)
      • cmd.exe (PID: 5460)
      • powershell.exe (PID: 7128)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 4236)
      • cmd.exe (PID: 6200)
      • cmd.exe (PID: 2680)
      • cmd.exe (PID: 3288)
      • cmd.exe (PID: 3388)
      • cmd.exe (PID: 1052)
      • cmd.exe (PID: 2220)
      • cmd.exe (PID: 1880)
      • cmd.exe (PID: 5780)
      • cmd.exe (PID: 5248)
      • cmd.exe (PID: 3028)
      • cmd.exe (PID: 1868)
      • cmd.exe (PID: 5436)
      • cmd.exe (PID: 1760)
      • cmd.exe (PID: 3388)
      • cmd.exe (PID: 2992)
      • cmd.exe (PID: 1700)
      • cmd.exe (PID: 5500)
      • cmd.exe (PID: 6148)
      • cmd.exe (PID: 3936)
      • cmd.exe (PID: 480)
      • cmd.exe (PID: 2368)
      • cmd.exe (PID: 6956)
      • cmd.exe (PID: 7152)
      • cmd.exe (PID: 5432)
      • cmd.exe (PID: 5780)
      • cmd.exe (PID: 3900)
      • cmd.exe (PID: 5720)
      • cmd.exe (PID: 5500)
      • cmd.exe (PID: 5444)
      • cmd.exe (PID: 2116)
      • cmd.exe (PID: 2992)
      • cmd.exe (PID: 5168)
      • cmd.exe (PID: 7020)
      • cmd.exe (PID: 3980)
      • cmd.exe (PID: 7976)
      • cmd.exe (PID: 8080)
      • cmd.exe (PID: 5724)
      • cmd.exe (PID: 1632)
      • cmd.exe (PID: 7336)
      • cmd.exe (PID: 7248)
      • cmd.exe (PID: 7572)
      • cmd.exe (PID: 8076)
      • cmd.exe (PID: 7876)
      • cmd.exe (PID: 7324)
      • cmd.exe (PID: 6732)
      • cmd.exe (PID: 7756)
      • cmd.exe (PID: 6688)
      • cmd.exe (PID: 7644)
      • cmd.exe (PID: 3976)
      • cmd.exe (PID: 6380)
      • cmd.exe (PID: 7764)
      • cmd.exe (PID: 7416)
      • cmd.exe (PID: 1520)
      • cmd.exe (PID: 7320)
      • cmd.exe (PID: 7292)
      • cmd.exe (PID: 8004)
      • cmd.exe (PID: 7724)
      • cmd.exe (PID: 3976)
      • cmd.exe (PID: 8168)
      • cmd.exe (PID: 7528)
      • cmd.exe (PID: 5340)
      • cmd.exe (PID: 7968)
      • cmd.exe (PID: 1136)
      • cmd.exe (PID: 7736)
      • cmd.exe (PID: 3716)
      • cmd.exe (PID: 2996)
      • cmd.exe (PID: 1700)
      • cmd.exe (PID: 7220)
      • cmd.exe (PID: 7724)
      • cmd.exe (PID: 7696)
    • Modifies existing scheduled task

      • schtasks.exe (PID: 4500)
      • schtasks.exe (PID: 1800)
      • schtasks.exe (PID: 4948)
      • schtasks.exe (PID: 7152)
      • schtasks.exe (PID: 4860)
      • schtasks.exe (PID: 6772)
      • schtasks.exe (PID: 3656)
      • schtasks.exe (PID: 324)
      • schtasks.exe (PID: 7340)
      • schtasks.exe (PID: 7540)
    • Drops 7-zip archiver for unpacking

      • SearchFilter.exe (PID: 3672)
    • Executes as Windows Service

      • VSSVC.exe (PID: 1976)
      • VSSVC.exe (PID: 7548)
    • Get information on the list of running processes

      • SearchFilter.exe (PID: 3672)
      • cmd.exe (PID: 4828)
      • cmd.exe (PID: 6308)
      • NVIDIA Control Panel.exe (PID: 5652)
      • cmd.exe (PID: 7304)
      • cmd.exe (PID: 7596)
      • taskhostw.exe (PID: 592)
      • Microsoft.exe (PID: 3780)
      • cmd.exe (PID: 1056)
    • There is functionality for taking screenshot (YARA)

      • SearchFilter.exe (PID: 5708)
    • Hides command output

      • cmd.exe (PID: 768)
      • cmd.exe (PID: 7180)
      • cmd.exe (PID: 6180)
      • cmd.exe (PID: 6372)
      • cmd.exe (PID: 7352)
      • cmd.exe (PID: 7664)
      • cmd.exe (PID: 7564)
    • Lists all scheduled tasks

      • schtasks.exe (PID: 3608)
      • schtasks.exe (PID: 6268)
      • schtasks.exe (PID: 2116)
      • schtasks.exe (PID: 2124)
      • schtasks.exe (PID: 7360)
      • schtasks.exe (PID: 1732)
      • schtasks.exe (PID: 7556)
      • schtasks.exe (PID: 1760)
      • schtasks.exe (PID: 7888)
      • schtasks.exe (PID: 3836)
    • The process executes via Task Scheduler

      • taskhostw.exe (PID: 592)
      • Microsoft.exe (PID: 3780)
      • powershell.exe (PID: 6540)
    • Checks for external IP

      • curl.exe (PID: 1564)
      • svchost.exe (PID: 2200)
      • Microsoft.exe (PID: 3780)
      • SearchFilter.exe (PID: 3672)
      • NVIDIA Control Panel.exe (PID: 5652)
    • The process executes VB scripts

      • cmd.exe (PID: 4916)
      • cmd.exe (PID: 7360)
      • cmd.exe (PID: 7240)
    • Gets full path of the running script (SCRIPT)

      • wscript.exe (PID: 1268)
      • wscript.exe (PID: 7472)
      • wscript.exe (PID: 7652)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 1268)
      • wscript.exe (PID: 7472)
      • wscript.exe (PID: 7652)
    • Creates FileSystem object to access computer's file system (SCRIPT)

      • wscript.exe (PID: 1268)
      • wscript.exe (PID: 7472)
      • wscript.exe (PID: 7652)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 7984)
      • cmd.exe (PID: 8184)
      • cmd.exe (PID: 7684)
    • Converts a specified value to an integer (POWERSHELL)

      • powershell.exe (PID: 6956)
      • powershell.exe (PID: 7612)
      • powershell.exe (PID: 7480)
    • Uses WMIC.EXE to obtain Windows Installer data

      • cmd.exe (PID: 7452)
    • Query Microsoft Defender preferences

      • SearchFilter.exe (PID: 3672)
    • Accesses antivirus product name via WMI (SCRIPT)

      • WMIC.exe (PID: 7360)
    • Uses ATTRIB.EXE to modify file attributes

      • cmd.exe (PID: 4236)
    • Process communicates with Telegram (possibly using it as an attacker's C2 server)

      • SearchFilter.exe (PID: 3672)
      • NVIDIA Control Panel.exe (PID: 5652)
    • Connects to unusual port

      • DWWIN.EXE (PID: 1136)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 7780)
    • The process verifies whether the antivirus software is installed

      • powershell.exe (PID: 6540)
  • INFO

    • Reads the computer name

      • SearchFilter.exe (PID: 3672)
      • SearchFilter.exe (PID: 5708)
      • SearchFilter.exe (PID: 6936)
      • SearchFilter.exe (PID: 6172)
      • SearchFilter.exe (PID: 7160)
      • SearchFilter.exe (PID: 1948)
      • 7z.exe (PID: 5992)
      • 7z.exe (PID: 7020)
      • 7z4.exe (PID: 2288)
      • taskhostw.exe (PID: 592)
      • taskhostw.exe (PID: 5424)
      • taskhostw.exe (PID: 1512)
      • NVIDIA Control Panel.exe (PID: 5652)
      • curl.exe (PID: 1564)
      • NVIDIA Control Panel.exe (PID: 984)
      • NVIDIA Control Panel.exe (PID: 5528)
      • 7z.exe (PID: 2192)
      • Microsoft.exe (PID: 3780)
      • Microsoft.exe (PID: 2588)
      • Microsoft.exe (PID: 5908)
      • 7z.exe (PID: 8036)
      • 7z.exe (PID: 344)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 6104)
      • SearchFilter.exe (PID: 3672)
      • 7z.exe (PID: 7020)
      • 7z4.exe (PID: 2288)
      • 7z.exe (PID: 2192)
    • Reads product name

      • SearchFilter.exe (PID: 3672)
      • SearchFilter.exe (PID: 7160)
      • taskhostw.exe (PID: 592)
      • Microsoft.exe (PID: 3780)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6104)
    • Checks supported languages

      • SearchFilter.exe (PID: 3672)
      • SearchFilter.exe (PID: 5708)
      • SearchFilter.exe (PID: 6936)
      • csc.exe (PID: 5564)
      • cvtres.exe (PID: 6268)
      • SearchFilter.exe (PID: 7160)
      • SearchFilter.exe (PID: 6172)
      • SearchFilter.exe (PID: 1948)
      • 7z.exe (PID: 7020)
      • 7z.exe (PID: 5992)
      • cvtres.exe (PID: 3844)
      • 7z4.exe (PID: 2288)
      • taskhostw.exe (PID: 592)
      • csc.exe (PID: 4948)
      • taskhostw.exe (PID: 5424)
      • taskhostw.exe (PID: 1512)
      • curl.exe (PID: 1564)
      • NVIDIA Control Panel.exe (PID: 984)
      • NVIDIA Control Panel.exe (PID: 5652)
      • 7z.exe (PID: 2192)
      • NVIDIA Control Panel.exe (PID: 5528)
      • Microsoft.exe (PID: 3780)
      • Microsoft.exe (PID: 2588)
      • Microsoft.exe (PID: 5908)
      • 7z.exe (PID: 8036)
      • 7z.exe (PID: 344)
    • Process checks computer location settings

      • SearchFilter.exe (PID: 3672)
      • SearchFilter.exe (PID: 7160)
      • NVIDIA Control Panel.exe (PID: 5652)
    • Reads Environment values

      • SearchFilter.exe (PID: 3672)
      • SearchFilter.exe (PID: 7160)
      • taskhostw.exe (PID: 592)
      • Microsoft.exe (PID: 3780)
    • Create files in a temporary directory

      • SearchFilter.exe (PID: 3672)
      • csc.exe (PID: 5564)
      • cvtres.exe (PID: 6268)
      • SearchFilter.exe (PID: 7160)
      • powershell.exe (PID: 4104)
      • csc.exe (PID: 4948)
      • cvtres.exe (PID: 3844)
      • taskhostw.exe (PID: 592)
      • NVIDIA Control Panel.exe (PID: 5652)
      • powershell.exe (PID: 7940)
      • Microsoft.exe (PID: 3780)
      • 7z.exe (PID: 344)
    • Checks proxy server information

      • SearchFilter.exe (PID: 3672)
      • SearchFilter.exe (PID: 7160)
      • taskhostw.exe (PID: 592)
      • NVIDIA Control Panel.exe (PID: 5652)
      • slui.exe (PID: 2132)
      • Microsoft.exe (PID: 3780)
    • Reads the machine GUID from the registry

      • SearchFilter.exe (PID: 3672)
      • csc.exe (PID: 5564)
      • SearchFilter.exe (PID: 7160)
      • csc.exe (PID: 4948)
      • NVIDIA Control Panel.exe (PID: 5652)
    • Reads security settings of Internet Explorer

      • WMIC.exe (PID: 4088)
      • WMIC.exe (PID: 5424)
      • powershell.exe (PID: 4104)
      • WMIC.exe (PID: 7448)
      • powershell.exe (PID: 7940)
      • WMIC.exe (PID: 7360)
      • WMIC.exe (PID: 2320)
    • Creates files or folders in the user directory

      • SearchFilter.exe (PID: 3672)
      • 7z.exe (PID: 7020)
      • 7z4.exe (PID: 2288)
      • taskhostw.exe (PID: 592)
      • Microsoft.exe (PID: 3780)
      • NVIDIA Control Panel.exe (PID: 5652)
      • 7z.exe (PID: 8036)
    • The executable file from the user directory is run by the Powershell process

      • SearchFilter.exe (PID: 7160)
      • NVIDIA Control Panel.exe (PID: 5652)
    • Found Base64 encoded reflection usage via PowerShell (YARA)

      • SearchFilter.exe (PID: 3672)
    • Launching a file from Task Scheduler

      • cmd.exe (PID: 2320)
      • cmd.exe (PID: 3964)
      • cmd.exe (PID: 6748)
      • cmd.exe (PID: 7224)
      • cmd.exe (PID: 7732)
      • cmd.exe (PID: 7852)
      • cmd.exe (PID: 1944)
    • Found Base64 encoded access to processes via PowerShell (YARA)

      • SearchFilter.exe (PID: 3672)
    • Potential access to remote process (Base64 Encoded 'OpenProcess')

      • SearchFilter.exe (PID: 3672)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 4104)
      • powershell.exe (PID: 3688)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 4104)
      • powershell.exe (PID: 3688)
      • powershell.exe (PID: 7940)
    • Node.js compiler has been detected

      • SearchFilter.exe (PID: 3672)
      • SearchFilter.exe (PID: 5708)
      • SearchFilter.exe (PID: 6936)
    • Creates files in the program directory

      • SearchFilter.exe (PID: 3672)
      • 7z.exe (PID: 2192)
      • Microsoft.exe (PID: 3780)
    • Reads the software policy settings

      • powershell.exe (PID: 4104)
      • slui.exe (PID: 2132)
      • powershell.exe (PID: 7940)
    • Reads CPU info

      • SearchFilter.exe (PID: 3672)
      • NVIDIA Control Panel.exe (PID: 5652)
      • Microsoft.exe (PID: 3780)
    • Execution of CURL command

      • cmd.exe (PID: 4880)
    • Uses string replace method (POWERSHELL)

      • powershell.exe (PID: 3976)
    • Gets or sets the time when the file was last written to (POWERSHELL)

      • powershell.exe (PID: 3976)
    • Gets data length (POWERSHELL)

      • powershell.exe (PID: 6956)
      • powershell.exe (PID: 7612)
      • powershell.exe (PID: 7480)
    • Creates a new folder

      • cmd.exe (PID: 7572)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)

EXIF

ZIP

FileVersion: 7z v0.04
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
663
Monitored processes
521
Malicious processes
36
Suspicious processes
16

Behavior graph

Click at the process to see the details
start winrar.exe slui.exe searchfilter.exe cmd.exe no specs conhost.exe no specs net.exe no specs net1.exe no specs searchfilter.exe no specs searchfilter.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs csc.exe cvtres.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs powershell.exe no specs conhost.exe no specs searchfilter.exe cmd.exe no specs conhost.exe no specs powershell.exe no specs searchfilter.exe no specs searchfilter.exe no specs powershell.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs vssadmin.exe no specs vssvc.exe no specs cmd.exe no specs conhost.exe no specs 7z.exe no specs cmd.exe no specs conhost.exe no specs 7z.exe cmd.exe no specs conhost.exe no specs powershell.exe no specs powershell.exe no specs conhost.exe no specs csc.exe cvtres.exe no specs cmd.exe no specs conhost.exe no specs 7z4.exe cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs taskhostw.exe taskhostw.exe no specs taskhostw.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs nvidia control panel.exe cmd.exe no specs conhost.exe no specs curl.exe nvidia control panel.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs nvidia control panel.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs cmd.exe no specs conhost.exe no specs 7z.exe cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs microsoft.exe cmd.exe no specs conhost.exe no specs powershell.exe no specs microsoft.exe no specs microsoft.exe no specs cmd.exe no specs conhost.exe no specs wscript.exe no specs cmd.exe no specs conhost.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs powershell.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs svchost.exe powershell.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs regasm.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs regasm.exe no specs regasm.exe no specs regasm.exe no specs regasm.exe no specs regasm.exe no specs regasm.exe no specs regasm.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs timeout.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs powershell.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs wscript.exe no specs reg.exe no specs powershell.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs vssadmin.exe no specs reg.exe no specs vssvc.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs powershell.exe no specs conhost.exe no specs cmd.exe no specs regasm.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs regasm.exe no specs regasm.exe no specs regasm.exe no specs cmd.exe no specs regasm.exe no specs conhost.exe no specs regasm.exe no specs regasm.exe no specs regasm.exe no specs reg.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs timeout.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs wscript.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs attrib.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs regasm.exe no specs regasm.exe no specs regasm.exe no specs regasm.exe no specs regasm.exe no specs regasm.exe no specs regasm.exe no specs regasm.exe no specs cmd.exe no specs timeout.exe no specs dwwin.exe cmd.exe no specs conhost.exe no specs tasklist.exe no specs cmd.exe no specs conhost.exe no specs 7z.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs cmd.exe no specs conhost.exe no specs 7z.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs schtasks.exe no specs powershell.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
324schtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /DisableC:\Windows\System32\schtasks.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
340\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
344"C:\ProgramData\sevenZip\7z.exe" x "C:\Users\admin\AppData\Local\Temp\bqbo4.7z" -p7KoLumBiyaDTX001!! -o"C:\Users\admin\AppData\Local\Temp\bqbo4" -yC:\ProgramData\sevenZip\7z.execmd.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
HIGH
Description:
7-Zip Reduced Standalone Console
Exit code:
0
Version:
25.00
Modules
Images
c:\programdata\sevenzip\7z.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\oleaut32.dll
c:\windows\syswow64\msvcp_win.dll
348C:\WINDOWS\system32\cmd.exe /d /s /c "schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable"C:\Windows\System32\cmd.exeMicrosoft.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
480C:\WINDOWS\system32\cmd.exe /d /s /c "reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f"C:\Windows\System32\cmd.exeSearchFilter.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
504schtasks /run /tn "Microsoft\Windows\Device Guide\RegisterDeviceNetworkChange"C:\Windows\System32\schtasks.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
504#system32C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft .NET Assembly Registration Utility
Version:
4.8.9037.0 built by: NET481REL1
592\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
592"C:\Users\admin\AppData\Local\Programs\Common\OneDriveCloud\taskhostw.exe"C:\Users\admin\AppData\Local\Programs\Common\OneDriveCloud\taskhostw.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Teams
Exit code:
1
Version:
1.6.00.33567
Modules
Images
c:\users\admin\appdata\local\programs\common\onedrivecloud\taskhostw.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ws2_32.dll
684C:\WINDOWS\system32\cmd.exe /d /s /c "powershell -ExecutionPolicy Bypass -Command "Get-ItemPropertyValue -Path 'HKLM:\Software\Microsoft\Windows\CurrentVersion\Policies\System' -Name ConsentPromptBehaviorAdmin""C:\Windows\System32\cmd.exeSearchFilter.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
Total events
159 535
Read events
159 444
Write events
75
Delete events
16

Modification events

(PID) Process:(6104) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(6104) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(6104) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(6104) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6104) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6104) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6104) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\SearchFilter.7z
(PID) Process:(6104) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6104) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6104) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
Executable files
63
Suspicious files
65
Text files
101
Unknown types
302

Dropped files

PID
Process
Filename
Type
6104WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb6104.29588\icudtl.dat
MD5:
SHA256:
6104WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb6104.29588\locales\am.pakpgc
MD5:2009647C3E7AED2C4C6577EE4C546E19
SHA256:6D61E5189438F3728F082AD6F694060D7EE8E571DF71240DFD5B77045A62954E
6104WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb6104.29588\chrome_200_percent.pakpgc
MD5:4610337E3332B7E65B73A6EA738B47DF
SHA256:C91ABF556E55C29D1EA9F560BB17CC3489CB67A5D0C7A22B58485F5F2FBCF25C
6104WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb6104.29588\chrome_100_percent.pakpgc
MD5:ACD0FA0A90B43CD1C87A55A991B4FAC3
SHA256:CCBCA246B9A93FA8D4F01A01345E7537511C590E4A8EFD5777B1596D10923B4B
6104WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb6104.29588\locales\af.pakpgc
MD5:7E51349EDC7E6AED122BFA00970FAB80
SHA256:F528E698B164283872F76DF2233A47D7D41E1ABA980CE39F6B078E577FD14C97
6104WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb6104.29588\locales\ar.pakpgc
MD5:47A6D10B4112509852D4794229C0A03B
SHA256:857FE3AB766B60A8D82B7B6043137E3A7D9F5CFB8DDD942316452838C67D0495
6104WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb6104.29588\locales\el.pakpgc
MD5:9528D21E8A3F5BAD7CA273999012EBE8
SHA256:E79C1E7A47250D88581E8E3BAF78DCAF31FE660B74A1E015BE0F4BAFDFD63E12
6104WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb6104.29588\locales\cs.pakpgc
MD5:04A680847C4A66AD9F0A88FB9FB1FC7B
SHA256:1CC44C5FBE1C0525DF37C5B6267A677F79C9671F86EDA75B6FC13ABF5D5356EB
6104WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb6104.29588\locales\da.pakpgc
MD5:1A53D374B9C37F795A462AAC7A3F118F
SHA256:D0C38EB889EE27D81183A0535762D8EF314F0FDEB90CCCA9176A0CE9AB09B820
6104WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb6104.29588\locales\bg.pakpgc
MD5:A19269683A6347E07C55325B9ECC03A4
SHA256:AD65351A240205E881EF5C4CF30AD1BC6B6E04414343583597086B62D48D8A24
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
65
DNS requests
33
Threats
26

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
23.216.77.6:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6876
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1192
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2940
svchost.exe
GET
200
2.16.252.233:80
http://x1.c.lencr.org/
unknown
whitelisted
3780
Microsoft.exe
GET
200
104.26.13.205:80
http://api.ipify.org/
unknown
malicious
1564
curl.exe
GET
200
104.26.13.205:80
http://api.ipify.org/
unknown
malicious
2760
backgroundTaskHost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D
unknown
whitelisted
1192
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
3672
SearchFilter.exe
GET
200
104.26.13.205:80
http://api.ipify.org/
unknown
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5944
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5560
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
1268
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1268
svchost.exe
23.216.77.6:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
2.16.253.202:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
6876
svchost.exe
20.190.160.128:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6876
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.124.78.146
  • 20.73.194.208
whitelisted
google.com
  • 142.250.186.174
whitelisted
crl.microsoft.com
  • 23.216.77.6
  • 23.216.77.28
whitelisted
www.microsoft.com
  • 2.16.253.202
  • 2.23.246.101
whitelisted
login.live.com
  • 20.190.160.128
  • 40.126.32.76
  • 20.190.160.65
  • 20.190.160.66
  • 20.190.160.2
  • 20.190.160.17
  • 20.190.160.4
  • 20.190.160.131
  • 40.126.32.133
  • 20.190.160.3
  • 40.126.32.138
  • 20.190.160.130
whitelisted
ocsp.digicert.com
  • 2.17.190.73
  • 2.23.77.188
whitelisted
nexusrules.officeapps.live.com
  • 52.111.229.48
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

PID
Process
Class
Message
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
2200
svchost.exe
Misc activity
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
1564
curl.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup api.ipify.org
1564
curl.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External IP Lookup by HTTP (api .ipify .org)
1564
curl.exe
Device Retrieving External IP Address Detected
SUSPICIOUS [ANY.RUN] An IP address was received from the server as a result of an HTTP request
3780
Microsoft.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup api.ipify.org
3780
Microsoft.exe
Device Retrieving External IP Address Detected
SUSPICIOUS [ANY.RUN] An IP address was received from the server as a result of an HTTP request
3780
Microsoft.exe
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External IP Lookup by HTTP (api .ipify .org)
3672
SearchFilter.exe
Device Retrieving External IP Address Detected
SUSPICIOUS [ANY.RUN] An IP address was received from the server as a result of an HTTP request
3672
SearchFilter.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup api.ipify.org
No debug info