File name:

temp.7z

Full analysis: https://app.any.run/tasks/67aeb66e-b800-40be-a46f-51f1dde5c2c8
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: April 18, 2025, 16:18:20
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
idm
tool
stealer
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

AF489A7D0EE58A9AFA1388658D3CEFFB

SHA1:

6FCC1A8636D1C15CA726860DD57051939337861C

SHA256:

8AC56E90F27D3F62EA566257AD1E48022FF4CE5CD2A54D9DA3DE6246B435C54A

SSDEEP:

98304:4t9ZRligm7JREIxBfQ6BmSfrK8u5K/8WJ9emmwuiuXlIUhBb+rQbbRfM3Lsip6A3:VVeD7wnvgjFo7gxr1HJlg3vKPWxd7b

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 7452)
    • Registers / Runs the DLL via REGSVR32.EXE

      • IDM1.tmp (PID: 7764)
      • IDMan.exe (PID: 3676)
      • Uninstall.exe (PID: 3768)
      • IDMan.exe (PID: 5132)
    • Changes the autorun value in the registry

      • rundll32.exe (PID: 5512)
      • IDMan.exe (PID: 3676)
    • Starts NET.EXE for service management

      • Uninstall.exe (PID: 3768)
      • net.exe (PID: 6988)
    • Actions looks like stealing of personal data

      • IDMan.exe (PID: 2796)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 7452)
      • IDM1.tmp (PID: 7764)
      • IDMan.exe (PID: 3676)
      • Uninstall.exe (PID: 3768)
      • IDMan.exe (PID: 5132)
      • IDMan.exe (PID: 2796)
    • Starts application with an unusual extension

      • idman642build32.exe (PID: 7732)
      • cmd.exe (PID: 1240)
      • cmd.exe (PID: 7388)
    • Creates a software uninstall entry

      • IDM1.tmp (PID: 7764)
    • The process creates files with name similar to system file names

      • IDM1.tmp (PID: 7764)
    • Creates/Modifies COM task schedule object

      • IDM1.tmp (PID: 7764)
      • regsvr32.exe (PID: 7328)
      • regsvr32.exe (PID: 7316)
      • regsvr32.exe (PID: 7300)
      • regsvr32.exe (PID: 6724)
      • IDMan.exe (PID: 3676)
      • regsvr32.exe (PID: 5056)
      • regsvr32.exe (PID: 4988)
      • regsvr32.exe (PID: 5988)
      • regsvr32.exe (PID: 4608)
    • Creates files in the driver directory

      • drvinst.exe (PID: 8008)
    • Executable content was dropped or overwritten

      • IDMan.exe (PID: 3676)
      • rundll32.exe (PID: 5512)
      • drvinst.exe (PID: 8008)
      • IDM_6.4x_Crack_v19.7.exe (PID: 8028)
    • Uses RUNDLL32.EXE to load library

      • Uninstall.exe (PID: 3768)
    • Creates or modifies Windows services

      • drvinst.exe (PID: 4812)
      • Uninstall.exe (PID: 3768)
    • Drops a system driver (possible attempt to evade defenses)

      • drvinst.exe (PID: 8008)
      • rundll32.exe (PID: 5512)
    • Uses REG/REGEDIT.EXE to modify registry

      • IDM_6.4x_Crack_v19.7.exe (PID: 8028)
      • cmd.exe (PID: 4008)
      • cmd.exe (PID: 1240)
      • IDM_6.4x_Crack_v19.7.exe (PID: 1812)
      • cmd.exe (PID: 8028)
      • cmd.exe (PID: 7388)
    • Starts CMD.EXE for commands execution

      • IDM_6.4x_Crack_v19.7.exe (PID: 8028)
      • cmd.exe (PID: 1240)
      • cmd.exe (PID: 6108)
      • cmd.exe (PID: 1228)
      • IDM_6.4x_Crack_v19.7.exe (PID: 1812)
      • cmd.exe (PID: 7388)
    • Executing commands from a ".bat" file

      • IDM_6.4x_Crack_v19.7.exe (PID: 8028)
      • cmd.exe (PID: 1240)
      • cmd.exe (PID: 7388)
      • IDM_6.4x_Crack_v19.7.exe (PID: 1812)
    • Application launched itself

      • cmd.exe (PID: 6108)
      • cmd.exe (PID: 1240)
      • cmd.exe (PID: 1228)
      • cmd.exe (PID: 7388)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 1088)
      • cmd.exe (PID: 3240)
      • cmd.exe (PID: 1240)
      • cmd.exe (PID: 7388)
      • cmd.exe (PID: 6644)
      • cmd.exe (PID: 6584)
    • Probably obfuscated PowerShell command line is found

      • cmd.exe (PID: 1240)
      • cmd.exe (PID: 7388)
    • Possibly malicious use of IEX has been detected

      • cmd.exe (PID: 1240)
      • cmd.exe (PID: 7388)
    • Hides command output

      • cmd.exe (PID: 1088)
      • cmd.exe (PID: 4008)
      • cmd.exe (PID: 8028)
      • cmd.exe (PID: 6644)
    • There is functionality for taking screenshot (YARA)

      • IDMIntegrator64.exe (PID: 5624)
  • INFO

    • Checks supported languages

      • IDM1.tmp (PID: 7764)
      • idman642build32.exe (PID: 7732)
      • idmBroker.exe (PID: 7340)
      • IDMan.exe (PID: 3676)
      • Uninstall.exe (PID: 3768)
      • drvinst.exe (PID: 8008)
      • drvinst.exe (PID: 4812)
      • IDMan.exe (PID: 5132)
      • MediumILStart.exe (PID: 1228)
      • IDM_6.4x_Crack_v19.7.exe (PID: 8028)
      • chcp.com (PID: 8104)
      • IDM_6.4x_Crack_v19.7.exe (PID: 1812)
      • chcp.com (PID: 6976)
      • IDMan.exe (PID: 2796)
      • IDMIntegrator64.exe (PID: 5624)
    • Reads the computer name

      • idman642build32.exe (PID: 7732)
      • IDM1.tmp (PID: 7764)
      • idmBroker.exe (PID: 7340)
      • IDMan.exe (PID: 3676)
      • Uninstall.exe (PID: 3768)
      • drvinst.exe (PID: 8008)
      • drvinst.exe (PID: 4812)
      • IDMan.exe (PID: 5132)
      • MediumILStart.exe (PID: 1228)
      • IDM_6.4x_Crack_v19.7.exe (PID: 8028)
      • IDM_6.4x_Crack_v19.7.exe (PID: 1812)
      • IDMan.exe (PID: 2796)
      • IDMIntegrator64.exe (PID: 5624)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 7452)
      • rundll32.exe (PID: 5512)
      • IDMan.exe (PID: 3676)
      • drvinst.exe (PID: 8008)
      • IDM_6.4x_Crack_v19.7.exe (PID: 8028)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7452)
    • Create files in a temporary directory

      • idman642build32.exe (PID: 7732)
      • IDM1.tmp (PID: 7764)
      • IDMan.exe (PID: 3676)
      • rundll32.exe (PID: 5512)
      • IDMan.exe (PID: 5132)
      • IDM_6.4x_Crack_v19.7.exe (PID: 8028)
      • reg.exe (PID: 6252)
      • IDM_6.4x_Crack_v19.7.exe (PID: 1812)
      • reg.exe (PID: 7812)
      • IDMan.exe (PID: 2796)
    • INTERNETDOWNLOADMANAGER mutex has been found

      • IDM1.tmp (PID: 7764)
      • IDMan.exe (PID: 3676)
      • IDMan.exe (PID: 5132)
      • IDMan.exe (PID: 2796)
      • IDMIntegrator64.exe (PID: 5624)
    • Creates files in the program directory

      • IDM1.tmp (PID: 7764)
      • IDMan.exe (PID: 3676)
      • IDM_6.4x_Crack_v19.7.exe (PID: 8028)
    • Creates files or folders in the user directory

      • IDM1.tmp (PID: 7764)
      • IDMan.exe (PID: 3676)
      • IDMan.exe (PID: 2796)
    • Process checks computer location settings

      • IDM1.tmp (PID: 7764)
      • IDMan.exe (PID: 3676)
      • Uninstall.exe (PID: 3768)
      • IDMan.exe (PID: 5132)
      • IDMan.exe (PID: 2796)
    • Reads the machine GUID from the registry

      • IDMan.exe (PID: 3676)
      • drvinst.exe (PID: 8008)
      • IDMan.exe (PID: 5132)
      • IDMan.exe (PID: 2796)
    • Reads the software policy settings

      • IDMan.exe (PID: 3676)
      • drvinst.exe (PID: 8008)
      • IDMan.exe (PID: 5132)
      • slui.exe (PID: 7628)
      • slui.exe (PID: 6080)
      • IDMan.exe (PID: 2796)
    • Disables trace logs

      • IDMan.exe (PID: 3676)
      • IDMan.exe (PID: 5132)
      • IDMan.exe (PID: 2796)
    • Checks proxy server information

      • IDMan.exe (PID: 3676)
      • IDMan.exe (PID: 5132)
      • slui.exe (PID: 6080)
      • IDMan.exe (PID: 2796)
    • Application launched itself

      • firefox.exe (PID: 5972)
      • firefox.exe (PID: 4120)
    • Manual execution by a user

      • firefox.exe (PID: 5972)
      • IDM_6.4x_Crack_v19.7.exe (PID: 8028)
      • IDM_6.4x_Crack_v19.7.exe (PID: 3784)
      • IDM_6.4x_Crack_v19.7.exe (PID: 1188)
      • IDM_6.4x_Crack_v19.7.exe (PID: 1812)
      • IDMan.exe (PID: 2796)
    • Reads the time zone

      • runonce.exe (PID: 7320)
    • Reads security settings of Internet Explorer

      • runonce.exe (PID: 7320)
    • Checks operating system version

      • cmd.exe (PID: 1240)
      • cmd.exe (PID: 7388)
    • Checks whether the specified file exists (POWERSHELL)

      • powershell.exe (PID: 4268)
      • powershell.exe (PID: 7284)
      • powershell.exe (PID: 2980)
      • powershell.exe (PID: 7744)
    • Changes the display of characters in the console

      • cmd.exe (PID: 1240)
      • cmd.exe (PID: 7388)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)

EXIF

ZIP

FileVersion: 7z v0.04
ModifyDate: 2025:04:10 22:06:09+00:00
ArchivedFileName: IDM_6.4x_Crack_v20.0.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
296
Monitored processes
156
Malicious processes
11
Suspicious processes
2

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe idman642build32.exe no specs idman642build32.exe idm1.tmp no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs idmbroker.exe no specs regsvr32.exe no specs idman.exe regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe uninstall.exe no specs rundll32.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs drvinst.exe firefox.exe no specs drvinst.exe no specs runonce.exe no specs grpconv.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs regsvr32.exe no specs regsvr32.exe no specs mediumilstart.exe no specs idman.exe no specs regsvr32.exe no specs regsvr32.exe no specs idm_6.4x_crack_v19.7.exe no specs idm_6.4x_crack_v19.7.exe reg.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs reg.exe no specs find.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs find.exe no specs powershell.exe no specs find.exe no specs powershell.exe no specs find.exe no specs cmd.exe no specs powershell.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs cmd.exe no specs powershell.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs powershell.exe no specs chcp.com no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs slui.exe rundll32.exe no specs idm_6.4x_crack_v19.7.exe no specs idm_6.4x_crack_v19.7.exe reg.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs reg.exe no specs find.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs find.exe no specs powershell.exe no specs find.exe no specs powershell.exe no specs find.exe no specs cmd.exe no specs powershell.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs cmd.exe no specs powershell.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs powershell.exe no specs chcp.com no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs idman.exe idmintegrator64.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
208\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
632C:\WINDOWS\system32\cmd.exe /S /D /c" echo prompt $E "C:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
660REG ADD "HKLM\Software\Internet Download Manager" /v "AdvIntDriverEnabled2" /t REG_DWORD /d "1" /fC:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
896C:\WINDOWS\system32\cmd.exe /S /D /c" echo "C:\Users\admin\AppData\Local\Temp\BATCLEN.bat" "C:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
904reg query "HKCU\Software\DownloadManager" "/v" "tvfrdt" C:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
904find /i "computersystem" C:\Windows\System32\find.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (grep) Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\find.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\fsutilext.dll
1088C:\WINDOWS\system32\cmd.exe /c powershell.exe "([System.Security.Principal.NTAccount](Get-WmiObject -Class Win32_ComputerSystem).UserName).Translate([System.Security.Principal.SecurityIdentifier]).Value" 2>nulC:\Windows\SysWOW64\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1184powershell.exe "([System.Security.Principal.NTAccount](Get-WmiObject -Class Win32_ComputerSystem).UserName).Translate([System.Security.Principal.SecurityIdentifier]).Value" C:\Windows\System32\WindowsPowerShell\v1.0\powershell.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
1188"C:\Users\admin\Desktop\IDM_6.4x_Crack_v19.7.exe" C:\Users\admin\Desktop\IDM_6.4x_Crack_v19.7.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\desktop\idm_6.4x_crack_v19.7.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
1196"C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\IDMGetAll64.dll"C:\Windows\SysWOW64\regsvr32.exeIDM1.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
Total events
78 891
Read events
78 084
Write events
617
Delete events
190

Modification events

(PID) Process:(7452) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(7452) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(7452) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(7452) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\temp.7z
(PID) Process:(7452) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7452) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7452) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7452) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7764) IDM1.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Internet Download Manager
Operation:writeName:DisplayVersion
Value:
6.42.32
(PID) Process:(7764) IDM1.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Internet Download Manager
Operation:writeName:DisplayIcon
Value:
C:\Program Files (x86)\Internet Download Manager\IDMan.exe
Executable files
20
Suspicious files
94
Text files
47
Unknown types
0

Dropped files

PID
Process
Filename
Type
7452WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa7452.42097\idman642build32.exeexecutable
MD5:FB92734F62D9F245501B431EA2A8A0DD
SHA256:61044611E584662744ED08014D9A14CF76955128A9B997D008EFC09EBC1FEB49
7764IDM1.tmpC:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Download Manager\Uninstall IDM.lnkbinary
MD5:F91931245F4E820D5F17992B5EA9D7AE
SHA256:01D85080C4A24BA563C7321233D729CCD71274058F3A4FB0A58EEF54981E8C23
7764IDM1.tmpC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Internet Download Manager\Uninstall IDM.lnkbinary
MD5:C16CB3779854EEBC5F6C2E26A171B74E
SHA256:9212DD4D61E2784E25038EEC5E1D28478AC0365C5BB379FE57D89B218C180B5A
7764IDM1.tmpC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Internet Download Manager\IDM Help.lnkbinary
MD5:0B738ACD6897D33E267469D90AFA4DAB
SHA256:0129F85EBD9DFBA3E3CB7CC974D38934007610090D81A3CC9076A6A21A6E0909
7764IDM1.tmpC:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Download Manager\IDM Help.lnkbinary
MD5:FD6B033F40D7FD4490FA3EB738B3D4C5
SHA256:F03B4C9E2650CB3EAE18D407A2F4A80FB1DF18893742BC15D80B4CDD220E5314
7764IDM1.tmpC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Internet Download Manager\license.lnkbinary
MD5:0A4D63BF57A10CE7EE905AE3ED1EF289
SHA256:6454A64365559AB535CDA06519C66205097DBE881FD6AEFD1EBCE9DECD999FB4
7764IDM1.tmpC:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Download Manager\Grabber Help.lnkbinary
MD5:BA4BAC055FCD4D6F84666C002F77C572
SHA256:88969CE5334BA61B9431207B7E2542322C6492FA5217CF57DDC96E1C40D98BBA
7764IDM1.tmpC:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Download Manager\Internet Download Manager.lnkbinary
MD5:BB53B03CF61AC6FA301D4B7DF129F689
SHA256:A6F619C307F80756C3153655B670C335E063EFA3FBCCEF431D2AE0564E631CC2
7764IDM1.tmpC:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Download Manager\TUTORIALS.lnkbinary
MD5:70B088BD5BE1D98B39072B1BFDBC8FA8
SHA256:B2A840EA51C302CD82542D77EBC04FFD3032DD899D2DAB2AF973FBED1D54C7ED
7764IDM1.tmpC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Internet Download Manager\Grabber Help.lnkbinary
MD5:CA565ACA3AE5D141DF787C475D83BF76
SHA256:FBB0421284E1EBD14A1DFE60D82849FF0A22DFE6A05179CB4967FCF7EEC29023
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
14
TCP/UDP connections
51
DNS requests
65
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.216.77.25:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4120
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/canonical.html
unknown
whitelisted
4120
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
whitelisted
4120
firefox.exe
POST
200
18.173.205.57:80
http://ocsps.ssl.com/
unknown
whitelisted
4120
firefox.exe
POST
200
184.24.77.81:80
http://r11.o.lencr.org/
unknown
whitelisted
4120
firefox.exe
POST
200
184.24.77.81:80
http://r11.o.lencr.org/
unknown
whitelisted
4120
firefox.exe
POST
200
172.217.16.131:80
http://o.pki.goog/we2
unknown
whitelisted
4120
firefox.exe
POST
200
172.217.16.131:80
http://o.pki.goog/s/wr3/cgo
unknown
whitelisted
4120
firefox.exe
POST
200
184.24.77.79:80
http://r10.o.lencr.org/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.216.77.25:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.5:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2112
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.216.77.25
  • 23.216.77.30
  • 23.216.77.18
  • 23.216.77.31
  • 23.216.77.29
  • 23.216.77.19
  • 23.216.77.20
  • 23.216.77.15
  • 23.216.77.13
whitelisted
google.com
  • 142.250.184.206
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 20.190.160.5
  • 40.126.32.76
  • 40.126.32.138
  • 20.190.160.132
  • 40.126.32.68
  • 20.190.160.3
  • 40.126.32.134
  • 40.126.32.140
  • 20.190.160.22
  • 20.190.160.2
  • 20.190.160.67
  • 20.190.160.65
  • 40.126.32.72
  • 40.126.32.133
  • 20.190.160.64
  • 20.190.160.14
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
detectportal.firefox.com
  • 34.107.221.82
whitelisted
www.internetdownloadmanager.com
  • 169.61.27.133
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
example.org
  • 96.7.128.192
  • 23.215.0.132
  • 23.215.0.133
  • 96.7.128.186
whitelisted

Threats

No threats detected
No debug info