| File name: | CRACK-IDA-Pro-V-And-_JehGUtJMeN.exe |
| Full analysis: | https://app.any.run/tasks/fe2aa088-35e0-43c0-a9de-7a6a901f97b5 |
| Verdict: | Malicious activity |
| Threats: | Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security. |
| Analysis date: | January 31, 2024, 21:22:55 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 627445FD5BDB8CA234E47F007B5913E7 |
| SHA1: | 7D0AD38EBD8799B54EAEF7135D1E397792F2BA75 |
| SHA256: | 77B519B40FC7F6B63D7F3810EA8BF8D661FED8DF973A64D06748A45E44B9D50C |
| SSDEEP: | 98304:q6Pfr2YayL0m4IHkMfFuyourYEQQQGP0M1NYLiXEyh6lyQoSioc6EE0sxJt/xhpW:D2Yfir+Ab5gX |
| .exe | | | Win32 Executable (generic) (52.9) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (23.5) |
| .exe | | | DOS Executable Generic (23.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2024:02:01 01:20:44+01:00 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi |
| PEType: | PE32 |
| LinkerVersion: | 2.25 |
| CodeSize: | 37888 |
| InitializedDataSize: | 17920 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x9c40 |
| OSVersion: | 1 |
| ImageVersion: | 6 |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 0.0.0.0 |
| ProductVersionNumber: | 0.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| Comments: | This installation was built with Inno Setup. |
| CompanyName: | |
| FileDescription: | VB DateTime Library Setup |
| FileVersion: | |
| LegalCopyright: | |
| ProductName: | VB DateTime Library |
| ProductVersion: |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 240 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 6236 -s 1056 | C:\Windows\SysWOW64\WerFault.exe | — | vbdatetimelib.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.1081 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 360 | "C:\WINDOWS\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64 | C:\Windows\SysWOW64\reg.exe | — | powershell.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Registry Console Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 360 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 540 | schtasks /DELETE /F /TN "gjAnwQJLf" | C:\Windows\SysWOW64\schtasks.exe | — | 4gdwn2UqDf.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 852 | "C:\WINDOWS\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:32 | C:\Windows\SysWOW64\reg.exe | — | powershell.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Registry Console Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 892 | "C:\Users\admin\Desktop\CRACK-IDA-Pro-V-And-_JehGUtJMeN.exe" | C:\Users\admin\Desktop\CRACK-IDA-Pro-V-And-_JehGUtJMeN.exe | explorer.exe | ||||||||||||
User: admin Company: Integrity Level: MEDIUM Description: VB DateTime Library Setup Exit code: 0 Version: Modules
| |||||||||||||||
| 984 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 4152 -s 924 | C:\Windows\SysWOW64\WerFault.exe | — | qgm4TezPaoefaXcA.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.1081 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 984 | schtasks /CREATE /TN "bPPcZpNMztXmfePkur" /SC once /ST 21:28:00 /RU "SYSTEM" /TR "\"C:\Users\admin\AppData\Local\Temp\xYPcSiaUoEfDkthMH\ANhhloVNxKIOlNN\WmtqAfv.exe\" rR /WZsite_idJal 757674 /S" /V1 /F | C:\Windows\SysWOW64\schtasks.exe | — | 4gdwn2UqDf.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1004 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 6236 -s 2068 | C:\Windows\SysWOW64\WerFault.exe | — | vbdatetimelib.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.1081 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1016 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 6236 -s 988 | C:\Windows\SysWOW64\WerFault.exe | — | vbdatetimelib.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.1081 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (6972) WerFault.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\{11517B7C-E79D-4e20-961B-75A811715ADD} |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (6972) WerFault.exe | Key: | \REGISTRY\A\{5b1d3a4b-93c5-ab69-b48e-fbcb995f4a36}\Root\InventoryApplicationFile\PermissionsCheckTestKey |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (6972) WerFault.exe | Key: | \REGISTRY\A\{5b1d3a4b-93c5-ab69-b48e-fbcb995f4a36}\Root\InventoryApplicationFile |
| Operation: | write | Name: | WritePermissionsCheck |
Value: 1 | |||
| (PID) Process: | (3740) WerFault.exe | Key: | \REGISTRY\A\{b186e80d-31b2-58d2-ae7a-8278c6f4e470}\Root\InventoryApplicationFile |
| Operation: | write | Name: | WritePermissionsCheck |
Value: 1 | |||
| (PID) Process: | (3740) WerFault.exe | Key: | \REGISTRY\A\{b186e80d-31b2-58d2-ae7a-8278c6f4e470}\Root\InventoryApplicationFile\PermissionsCheckTestKey |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (1016) WerFault.exe | Key: | \REGISTRY\A\{7502c29b-b1f2-f7c6-b280-36aa792cd894}\Root\InventoryApplicationFile |
| Operation: | write | Name: | WritePermissionsCheck |
Value: 1 | |||
| (PID) Process: | (1016) WerFault.exe | Key: | \REGISTRY\A\{7502c29b-b1f2-f7c6-b280-36aa792cd894}\Root\InventoryApplicationFile\PermissionsCheckTestKey |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (240) WerFault.exe | Key: | \REGISTRY\A\{edca080f-97ff-e08f-dc60-c60598114bcc}\Root\InventoryApplicationFile |
| Operation: | write | Name: | WritePermissionsCheck |
Value: 1 | |||
| (PID) Process: | (240) WerFault.exe | Key: | \REGISTRY\A\{edca080f-97ff-e08f-dc60-c60598114bcc}\Root\InventoryApplicationFile\PermissionsCheckTestKey |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (5440) WerFault.exe | Key: | \REGISTRY\A\{2f090b79-06b6-1337-6d1f-17181712b282}\Root\InventoryApplicationFile |
| Operation: | write | Name: | WritePermissionsCheck |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2612 | CRACK-IDA-Pro-V-And-_JehGUtJMeN.tmp | C:\Users\admin\AppData\Local\Temp\is-T5P59.tmp\_isetup\_shfoldr.dll | executable | |
MD5:92DC6EF532FBB4A5C3201469A5B5EB63 | SHA256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87 | |||
| 2612 | CRACK-IDA-Pro-V-And-_JehGUtJMeN.tmp | C:\Users\admin\AppData\Local\VB DateTime Library\image\is-DKSTK.tmp | image | |
MD5:9C205EAAC846EDC120A15A338D095BB9 | SHA256:7A9FFA5FA6AB6B043830211571FF3A38F0820F232332F68B21AD573D6CD61876 | |||
| 2612 | CRACK-IDA-Pro-V-And-_JehGUtJMeN.tmp | C:\Users\admin\AppData\Local\VB DateTime Library\is-OCQV9.tmp | executable | |
MD5:90F98B538B5C5DE8A740139548EBF286 | SHA256:C8A5822CF036F366F9B486CE6D45DFD201B3A0A1EF8E901D1D7E61059EAB0033 | |||
| 2612 | CRACK-IDA-Pro-V-And-_JehGUtJMeN.tmp | C:\Users\admin\AppData\Local\VB DateTime Library\image\btn_min.png | image | |
MD5:9C205EAAC846EDC120A15A338D095BB9 | SHA256:7A9FFA5FA6AB6B043830211571FF3A38F0820F232332F68B21AD573D6CD61876 | |||
| 2612 | CRACK-IDA-Pro-V-And-_JehGUtJMeN.tmp | C:\Users\admin\AppData\Local\VB DateTime Library\unins000.exe | executable | |
MD5:90F98B538B5C5DE8A740139548EBF286 | SHA256:C8A5822CF036F366F9B486CE6D45DFD201B3A0A1EF8E901D1D7E61059EAB0033 | |||
| 2612 | CRACK-IDA-Pro-V-And-_JehGUtJMeN.tmp | C:\Users\admin\AppData\Local\Temp\is-T5P59.tmp\_isetup\_iscrypt.dll | executable | |
MD5:A69559718AB506675E907FE49DEB71E9 | SHA256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC | |||
| 2612 | CRACK-IDA-Pro-V-And-_JehGUtJMeN.tmp | C:\Users\admin\AppData\Local\VB DateTime Library\image\is-IPB2K.tmp | image | |
MD5:F21D9F4E5FD3DE18CF43A848AFEA354C | SHA256:DE2E6326DFC91D3D63C2AF1FFA47333A0C66C378EA2A3F05FA9151BB8F84E0B2 | |||
| 2612 | CRACK-IDA-Pro-V-And-_JehGUtJMeN.tmp | C:\Users\admin\AppData\Local\Temp\is-T5P59.tmp\_isetup\_setup64.tmp | executable | |
MD5:C8871EFD8AF2CF4D9D42D1FF8FADBF89 | SHA256:E4FC574A01B272C2D0AED0EC813F6D75212E2A15A5F5C417129DD65D69768F40 | |||
| 892 | CRACK-IDA-Pro-V-And-_JehGUtJMeN.exe | C:\Users\admin\AppData\Local\Temp\is-M9GBF.tmp\CRACK-IDA-Pro-V-And-_JehGUtJMeN.tmp | executable | |
MD5:FAD0A2DE5BA1691C529BCF4C3E679223 | SHA256:E2CF32C666191396F09815775C5D59F069AC4CC652A05C1011D099090AA15AF7 | |||
| 2612 | CRACK-IDA-Pro-V-And-_JehGUtJMeN.tmp | C:\Users\admin\AppData\Local\VB DateTime Library\image\btn_size.png | image | |
MD5:4AAE66ADE92F470AB559495FA9D3D749 | SHA256:50D14E63802AA4EAA95C4F420BD698FBCDB7C8E58D8B9EA077DED375AC714F41 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
6236 | vbdatetimelib.exe | POST | — | 188.114.96.3:80 | http://trenininmiba.gq/new/net_api | unknown | — | — | unknown |
5612 | MoUsoCoreWorker.exe | GET | 200 | 23.218.209.163:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | binary | 814 b | unknown |
6236 | vbdatetimelib.exe | HEAD | — | 5.149.248.111:80 | http://totrakto.com/CRACK-IDA-Pro-V6-8-150423-And-HEX-Rays-Decompiler-ARM-X86-X64-iDAPROl.zip | unknown | — | — | unknown |
6236 | vbdatetimelib.exe | POST | — | 188.114.96.3:80 | http://trenininmiba.gq/new/net_api | unknown | — | — | unknown |
6492 | msedge.exe | GET | 302 | 23.218.209.163:443 | https://go.microsoft.com/fwlink/?linkid=2133855&bucket=15 | unknown | — | — | — |
6236 | vbdatetimelib.exe | GET | 404 | 5.149.248.111:80 | http://totrakto.com/CRACK-IDA-Pro-V6-8-150423-And-HEX-Rays-Decompiler-ARM-X86-X64-iDAPROl.zip | unknown | html | 196 b | unknown |
6236 | vbdatetimelib.exe | POST | — | 188.114.96.3:80 | http://trenininmiba.gq/new/net_api | unknown | — | — | unknown |
6236 | vbdatetimelib.exe | GET | 200 | 95.163.241.63:80 | http://95.163.241.63/setup.exe | unknown | executable | 6.83 Mb | unknown |
6236 | vbdatetimelib.exe | POST | — | 188.114.96.3:80 | http://trenininmiba.gq/new/net_api | unknown | — | — | unknown |
6236 | vbdatetimelib.exe | POST | — | 188.114.96.3:80 | http://trenininmiba.gq/new/net_api | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
5612 | MoUsoCoreWorker.exe | 23.218.209.163:80 | www.microsoft.com | AKAMAI-AS | DE | unknown |
5612 | MoUsoCoreWorker.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4188 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
3720 | svchost.exe | 239.255.255.250:1900 | — | — | — | unknown |
6236 | vbdatetimelib.exe | 188.114.96.3:80 | trenininmiba.gq | CLOUDFLARENET | NL | unknown |
6492 | msedge.exe | 13.107.21.239:443 | edge.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | unknown |
6492 | msedge.exe | 88.221.169.205:443 | go.microsoft.com | AKAMAI-AS | DE | unknown |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
6236 | vbdatetimelib.exe | 5.149.248.111:80 | totrakto.com | HZ Hosting Ltd | NL | unknown |
2644 | OfficeClickToRun.exe | 20.42.65.89:443 | self.events.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | unknown |
Domain | IP | Reputation |
|---|---|---|
www.microsoft.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
trenininmiba.gq |
| unknown |
go.microsoft.com |
| whitelisted |
edge.microsoft.com |
| whitelisted |
totrakto.com |
| unknown |
self.events.data.microsoft.com |
| whitelisted |
edgeassetservice.azureedge.net |
| whitelisted |
bobisawinner.xyz |
| unknown |
umwatson.events.data.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2136 | svchost.exe | Potentially Bad Traffic | ET INFO DNS Query for Suspicious .gq Domain |
6236 | vbdatetimelib.exe | Potentially Bad Traffic | ET INFO HTTP POST Request to Suspicious *.gq domain |
6236 | vbdatetimelib.exe | Potentially Bad Traffic | ET INFO HTTP Request to a *.gq domain |
6236 | vbdatetimelib.exe | Misc activity | ADWARE [ANY.RUN] DownloadAssistant |
6236 | vbdatetimelib.exe | Misc activity | ADWARE [ANY.RUN] DownloadAssistant |
6236 | vbdatetimelib.exe | Potentially Bad Traffic | ET INFO HTTP POST Request to Suspicious *.gq domain |
6236 | vbdatetimelib.exe | Potentially Bad Traffic | ET INFO HTTP Request to a *.gq domain |
6236 | vbdatetimelib.exe | Potentially Bad Traffic | ET INFO HTTP POST Request to Suspicious *.gq domain |
6236 | vbdatetimelib.exe | Potentially Bad Traffic | ET INFO HTTP Request to a *.gq domain |
6236 | vbdatetimelib.exe | Misc activity | ADWARE [ANY.RUN] DownloadAssistant |