File name:

free4pc.org_IDM _ 6.38 Build 2____ _.rar

Full analysis: https://app.any.run/tasks/51ecfedd-7c61-49fc-8da0-85598e7c88cd
Verdict: Malicious activity
Threats:

Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links.

Analysis date: August 26, 2020, 04:56:43
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
rat
remcos
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

E43F1BB7120FE6C4F57005A2F4474D6F

SHA1:

4FF8421BBDFFF2DD61FA290BB0185B6A59FC408C

SHA256:

9A67AE0F49040DF71A38C03846A7247E4D7EDB945754D55A7240874189C89F05

SSDEEP:

196608:ePBnC9zfqmfNxoqdAPsulI3wxSJDLMVPHr84PEJjd41f3BF2gNtWavC3Oqcll4aQ:jfqCom+FIgSMVvo4PEJUvBlNZYlcll2

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • idman638build2f.exe (PID: 2324)
      • idman638build2f.exe (PID: 2972)
      • IDM_6.3x_Crack_v17.8.exe (PID: 3044)
      • IDM_6.3x_Crack_v17.8.exe (PID: 2824)
      • IDMan.exe (PID: 4064)
      • UnSigner.exe (PID: 3804)
      • UnSigner.exe (PID: 1704)
      • UnSigner.exe (PID: 3444)
      • UnSigner.exe (PID: 2780)
      • IDMan.exe (PID: 2480)
      • IDMan.exe (PID: 3828)
      • IDMan.exe (PID: 2880)
    • Changes settings of System certificates

      • IDMan.exe (PID: 4064)
    • Changes the autorun value in the registry

      • rundll32.exe (PID: 2500)
      • IDMan.exe (PID: 4064)
    • Starts NET.EXE for service management

      • Uninstall.exe (PID: 1432)
    • REMCOS was detected

      • IDMan.exe (PID: 4064)
      • IDMan.exe (PID: 2480)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2964)
      • IDM_6.3x_Crack_v17.8.exe (PID: 2824)
      • IDMan.exe (PID: 4064)
      • wscript.exe (PID: 2068)
      • rundll32.exe (PID: 2500)
      • UnSigner.exe (PID: 3804)
      • UnSigner.exe (PID: 3444)
    • Creates a software uninstall entry

      • IDM1.tmp (PID: 3500)
    • Creates files in the user directory

      • IDM1.tmp (PID: 3500)
      • IDMan.exe (PID: 4064)
      • IDMan.exe (PID: 2480)
    • Starts application with an unusual extension

      • idman638build2f.exe (PID: 2324)
    • Creates COM task schedule object

      • IDM1.tmp (PID: 3500)
      • IDMan.exe (PID: 4064)
      • Uninstall.exe (PID: 1432)
    • Adds / modifies Windows certificates

      • IDMan.exe (PID: 4064)
    • Executes scripts

      • IDM_6.3x_Crack_v17.8.exe (PID: 2824)
    • Creates files in the program directory

      • wscript.exe (PID: 2068)
      • IDMan.exe (PID: 4064)
      • IDM1.tmp (PID: 3500)
      • firefox.exe (PID: 3316)
    • Removes files from Windows directory

      • rundll32.exe (PID: 2500)
    • Uses RUNDLL32.EXE to load library

      • Uninstall.exe (PID: 1432)
    • Creates files in the Windows directory

      • rundll32.exe (PID: 2500)
    • Creates files in the driver directory

      • rundll32.exe (PID: 2500)
    • Creates or modifies windows services

      • Uninstall.exe (PID: 1432)
    • Executed via COM

      • IDMan.exe (PID: 3828)
    • Searches for installed software

      • IDM_6.3x_Crack_v17.8.exe (PID: 2824)
    • Uses TASKKILL.EXE to kill process

      • IDM_6.3x_Crack_v17.8.exe (PID: 2824)
    • Uses REG.EXE to modify Windows registry

      • IDM_6.3x_Crack_v17.8.exe (PID: 2824)
    • Reads Internet Cache Settings

      • IDMan.exe (PID: 2480)
  • INFO

    • Manual execution by user

      • idman638build2f.exe (PID: 2972)
      • WinRAR.exe (PID: 3968)
      • IDM_6.3x_Crack_v17.8.exe (PID: 3044)
      • idman638build2f.exe (PID: 2324)
      • IDM_6.3x_Crack_v17.8.exe (PID: 2824)
      • firefox.exe (PID: 3316)
      • IDMan.exe (PID: 2880)
      • IDMan.exe (PID: 2480)
    • Dropped object may contain Bitcoin addresses

      • IDMan.exe (PID: 4064)
      • firefox.exe (PID: 3316)
    • Application launched itself

      • firefox.exe (PID: 3316)
    • Reads CPU info

      • firefox.exe (PID: 3316)
    • Creates files in the user directory

      • firefox.exe (PID: 3316)
    • Reads Internet Cache Settings

      • firefox.exe (PID: 3316)
      • pingsender.exe (PID: 3732)
    • Reads settings of System Certificates

      • IDMan.exe (PID: 4064)
    • Adds / modifies Windows certificates

      • pingsender.exe (PID: 3732)
    • Changes settings of System certificates

      • pingsender.exe (PID: 3732)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
98
Monitored processes
35
Malicious processes
9
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start winrar.exe idman638build2f.exe no specs idman638build2f.exe idm1.tmp no specs idmbroker.exe no specs #REMCOS idman.exe winrar.exe no specs idm_6.3x_crack_v17.8.exe no specs idm_6.3x_crack_v17.8.exe wscript.exe firefox.exe no specs uninstall.exe no specs firefox.exe rundll32.exe runonce.exe no specs grpconv.exe no specs net.exe no specs net1.exe no specs firefox.exe no specs firefox.exe firefox.exe mediumilstart.exe no specs idman.exe pingsender.exe taskkill.exe no specs iemonitor.exe no specs taskkill.exe no specs reg.exe no specs unsigner.exe unsigner.exe unsigner.exe no specs unsigner.exe no specs #REMCOS idman.exe iemonitor.exe no specs idman.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
700taskkill.exe /IM IDMan.exe /FC:\Windows\system32\taskkill.exeIDM_6.3x_Crack_v17.8.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskkill.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
c:\windows\system32\user32.dll
1432"C:\Program Files\Internet Download Manager\Uninstall.exe" -instdrivC:\Program Files\Internet Download Manager\Uninstall.exeIDMan.exe
User:
admin
Company:
Tonec Inc.
Integrity Level:
HIGH
Description:
Internet Download Manager installer
Exit code:
1
Version:
6, 37, 15, 1
Modules
Images
c:\program files\internet download manager\uninstall.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1520"C:\Windows\system32\runonce.exe" -rC:\Windows\system32\runonce.exerundll32.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Run Once Wrapper
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\runonce.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1704"C:\Users\admin\AppData\Local\Temp\UnSigner.exe" -f -b "C:\Program Files\Internet Download Manager\IDMan.exe~~"C:\Users\admin\AppData\Local\Temp\UnSigner.exeIDM_6.3x_Crack_v17.8.exe
User:
admin
Integrity Level:
HIGH
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\unsigner.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
1760C:\Windows\system32\net1 start IDMWFPC:\Windows\system32\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Net Command
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\net1.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dsrole.dll
c:\windows\system32\netutils.dll
2068wscript.exe "C:\Users\admin\AppData\Local\Temp\IDM_BAK.vbs" /idmdir:"C:\Program Files\Internet Download Manager\"C:\Windows\system32\wscript.exe
IDM_6.3x_Crack_v17.8.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2068"C:\Windows\System32\net.exe" start IDMWFPC:\Windows\System32\net.exeUninstall.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Net Command
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\msxml3.dll
c:\windows\system32\wshom.ocx
c:\windows\system32\scrobj.dll
c:\windows\system32\shell32.dll
c:\windows\system32\wshext.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\cryptbase.dll
2220"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3316.3.322127494\694654513" -childID 1 -isForBrowser -prefsHandle 1684 -prefMapHandle 836 -prefsLen 1 -prefMapSize 191824 -parentBuildID 20190717172542 -greomni "C:\Program Files\Mozilla Firefox\omni.ja" -appomni "C:\Program Files\Mozilla Firefox\browser\omni.ja" -appdir "C:\Program Files\Mozilla Firefox\browser" - 3316 "\\.\pipe\gecko-crash-server-pipe.3316" 1772 tabC:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
68.0.1
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dbghelp.dll
2264reg.exe import C:\Users\admin\AppData\Local\Temp\IDMRegClean.regC:\Windows\system32\reg.exeIDM_6.3x_Crack_v17.8.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2304"C:\Program Files\Internet Download Manager\IEMonitor.exe"C:\Program Files\Internet Download Manager\IEMonitor.exeIDMan.exe
User:
admin
Company:
Tonec Inc.
Integrity Level:
MEDIUM
Description:
Internet Download Manager agent for click monitoring in IE-based browsers
Exit code:
0
Version:
6, 37, 8, 1
Modules
Images
c:\program files\internet download manager\iemonitor.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
Total events
3 500
Read events
2 160
Write events
1 204
Delete events
136

Modification events

(PID) Process:(2964) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2964) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2964) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\139\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2964) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\139\52C64B7E
Operation:writeName:@C:\Windows\system32\NetworkExplorer.dll,-1
Value:
Network
(PID) Process:(2964) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\free4pc.org_IDM _ 6.38 Build 2____ _.rar
(PID) Process:(2964) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2964) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2964) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2964) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2964) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
Executable files
16
Suspicious files
200
Text files
41
Unknown types
66

Dropped files

PID
Process
Filename
Type
3500IDM1.tmpC:\Users\admin\AppData\Local\Temp\~DFD8BEF3526B4360C1.TMP
MD5:
SHA256:
2964WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2964.16297\free4pc.org_IDM Crack 6.38 Build 2_Patch_Serial Key\Cracked PC Software's,Serial Keys Direct Links.urltext
MD5:
SHA256:
2964WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2964.16297\free4pc.org_IDM Crack 6.38 Build 2_Patch_Serial Key\idman638build2f.exeexecutable
MD5:
SHA256:
3968WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3968.21431\IDM_6.3x_Crack_v17.8.exe
MD5:
SHA256:
2964WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2964.16297\free4pc.org_IDM Crack 6.38 Build 2_Patch_Serial Key\IDM_6.3x_Crack_v17.8_Ali.Dbg.rarcompressed
MD5:
SHA256:
2824IDM_6.3x_Crack_v17.8.exeC:\Users\admin\AppData\Local\Temp\IDM_BAK.vbs
MD5:
SHA256:
3500IDM1.tmpC:\Users\admin\AppData\Local\Temp\IDM_Setup_Temp\IDMSetup2.logbinary
MD5:
SHA256:
3500IDM1.tmpC:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Download Manager\IDM Help.lnklnk
MD5:
SHA256:
3500IDM1.tmpC:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Download Manager\Grabber Help.lnklnk
MD5:
SHA256:
3500IDM1.tmpC:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Download Manager\TUTORIALS.lnklnk
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
15
DNS requests
50
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3828
IDMan.exe
GET
304
93.184.221.240:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
US
whitelisted
2480
IDMan.exe
GET
304
93.184.221.240:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
US
whitelisted
4064
IDMan.exe
GET
304
93.184.221.240:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
US
compressed
57.0 Kb
whitelisted
3316
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
3316
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
4064
IDMan.exe
GET
200
93.184.221.240:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
US
compressed
57.0 Kb
whitelisted
3732
pingsender.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAH9o%2BtuynXIiEOLckvPvJE%3D
US
der
471 b
whitelisted
3732
pingsender.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQQX6Z6gAidtSefNc6DC0OInqPHDQQUD4BhHIIxYdUvKOeNRji0LOHG2eICEAzmtf2PsbB81NVMrv5Nv1c%3D
US
der
471 b
whitelisted
3316
firefox.exe
POST
200
93.184.220.29:80
http://ocsp.digicert.com/
US
der
471 b
whitelisted
2480
IDMan.exe
POST
200
169.55.0.224:80
http://www.internetdownloadmanager.com/data/update623.txt?v=638b02
US
text
15.2 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4064
IDMan.exe
93.184.221.240:80
www.download.windowsupdate.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3316
firefox.exe
169.55.0.224:443
www.internetdownloadmanager.com
SoftLayer Technologies Inc.
US
suspicious
3316
firefox.exe
52.13.211.193:443
search.services.mozilla.com
Amazon.com, Inc.
US
unknown
3316
firefox.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3316
firefox.exe
52.89.233.136:443
addons.mozilla.org
Amazon.com, Inc.
US
unknown
3732
pingsender.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2480
IDMan.exe
93.184.221.240:80
www.download.windowsupdate.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2480
IDMan.exe
169.55.0.224:80
www.internetdownloadmanager.com
SoftLayer Technologies Inc.
US
suspicious
169.55.0.224:80
www.internetdownloadmanager.com
SoftLayer Technologies Inc.
US
suspicious
3316
firefox.exe
2.16.177.88:80
detectportal.firefox.com
Akamai International B.V.
suspicious

DNS requests

Domain
IP
Reputation
www.download.windowsupdate.com
  • 93.184.221.240
whitelisted
detectportal.firefox.com
  • 2.16.177.88
  • 2.16.177.18
whitelisted
a1089.dscd.akamai.net
  • 2.16.177.18
  • 2.16.177.88
whitelisted
www.internetdownloadmanager.com
  • 169.55.0.224
whitelisted
test.internetdownloadmanager.com
  • 185.80.221.18
whitelisted
secure.internetdownloadmanager.com
  • 169.55.0.227
whitelisted
mirror3.internetdownloadmanager.com
  • 174.127.73.85
whitelisted
mirror5.internetdownloadmanager.com
  • 185.80.221.19
whitelisted
registeridm.com
  • 169.55.40.5
suspicious
search.services.mozilla.com
  • 52.13.211.193
  • 35.161.199.137
  • 54.148.7.60
whitelisted

Threats

PID
Process
Class
Message
2480
IDMan.exe
Potential Corporate Privacy Violation
ET POLICY Outgoing Basic Auth Base64 HTTP Password detected unencrypted
No debug info