File name:

Your File Is Ready To Download.exe.danger

Full analysis: https://app.any.run/tasks/b3443366-8b30-497a-877e-67061cf52950
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: May 24, 2025, 15:33:36
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
stealer
adware
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections
MD5:

4939CD1620712D37759293DE62C3A03D

SHA1:

C8D66C59A62C5D055D40096665EB5B9252FDB2CA

SHA256:

B6FD486840A14EF414238D38CDA7DF90D4ECAAE4D73FF3DDB870960E1857C631

SSDEEP:

98304:O6VnvKp9IxG+A+4CMP9jxFsTGxNWqzHeJTOuEYLoBRvSEjf7zvZgP6h/zhEuSuTq:DOXy2V664

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • GenericSetup.exe (PID: 1676)
    • ADWARE has been detected (SURICATA)

      • GenericSetup.exe (PID: 1676)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Your File Is Ready To Download.exe.danger.exe (PID: 6944)
      • kodi-19.1-Matrix-x64.exe (PID: 5776)
      • GenericSetup.exe (PID: 1676)
    • Reads security settings of Internet Explorer

      • GenericSetup.exe (PID: 1676)
    • Adds/modifies Windows certificates

      • GenericSetup.exe (PID: 1676)
    • Starts CMD.EXE for commands execution

      • GenericSetup.exe (PID: 1676)
    • Access to an unwanted program domain was detected

      • GenericSetup.exe (PID: 1676)
    • There is functionality for taking screenshot (YARA)

      • GenericSetup.exe (PID: 1676)
    • The process creates files with name similar to system file names

      • kodi-19.1-Matrix-x64.exe (PID: 5776)
    • The executable file from the user directory is run by the CMD process

      • kodi-19.1-Matrix-x64.exe (PID: 5776)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • kodi-19.1-Matrix-x64.exe (PID: 5776)
  • INFO

    • Create files in a temporary directory

      • Your File Is Ready To Download.exe.danger.exe (PID: 6944)
      • GenericSetup.exe (PID: 1676)
      • kodi-19.1-Matrix-x64.exe (PID: 5776)
    • Reads the computer name

      • GenericSetup.exe (PID: 1676)
      • kodi-19.1-Matrix-x64.exe (PID: 5776)
    • Reads the software policy settings

      • GenericSetup.exe (PID: 1676)
    • The sample compiled with english language support

      • Your File Is Ready To Download.exe.danger.exe (PID: 6944)
    • Creates files or folders in the user directory

      • GenericSetup.exe (PID: 1676)
    • Checks supported languages

      • GenericSetup.exe (PID: 1676)
      • kodi-19.1-Matrix-x64.exe (PID: 5776)
      • Your File Is Ready To Download.exe.danger.exe (PID: 6944)
    • Reads the machine GUID from the registry

      • GenericSetup.exe (PID: 1676)
    • Checks proxy server information

      • GenericSetup.exe (PID: 1676)
    • Disables trace logs

      • GenericSetup.exe (PID: 1676)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | InstallShield setup (36.8)
.exe | Win32 Executable MS Visual C++ (generic) (26.6)
.exe | Win64 Executable (generic) (23.6)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2011:04:18 18:54:06+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 104448
InitializedDataSize: 35328
UninitializedDataSize: -
EntryPoint: 0x148d4
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 6.91.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileVersion: 6.91.0.0
ProductVersion: 1.0.0.0
CompanyName: IC001
FileDescription: Software Installation
InternalName: 7zS.sfx
LegalCopyright: Copyright © Adaware 2022
OriginalFileName: GenericSetup.exe
ProductName: InstallCapital
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
136
Monitored processes
8
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start your file is ready to download.exe.danger.exe #ADWARE genericsetup.exe sppextcomobj.exe no specs slui.exe no specs cmd.exe no specs conhost.exe no specs kodi-19.1-matrix-x64.exe your file is ready to download.exe.danger.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
632"C:\WINDOWS\system32\cmd.exe" /C ""C:\Users\admin\Downloads\kodi-19.1-Matrix-x64.exe""C:\Windows\SysWOW64\cmd.exeGenericSetup.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1020"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
1676.\GenericSetup.exeC:\Users\admin\AppData\Local\Temp\7zS02B172F0\GenericSetup.exe
Your File Is Ready To Download.exe.danger.exe
User:
admin
Integrity Level:
HIGH
Description:
InstallCapital
Version:
1.4.3.5835
Modules
Images
c:\users\admin\appdata\local\temp\7zs02b172f0\genericsetup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
5064C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
5576"C:\Users\admin\Desktop\Your File Is Ready To Download.exe.danger.exe" C:\Users\admin\Desktop\Your File Is Ready To Download.exe.danger.exeexplorer.exe
User:
admin
Company:
IC001
Integrity Level:
MEDIUM
Description:
Software Installation
Exit code:
3221226540
Version:
6.91.0.0
Modules
Images
c:\users\admin\desktop\your file is ready to download.exe.danger.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
5776"C:\Users\admin\Downloads\kodi-19.1-Matrix-x64.exe"C:\Users\admin\Downloads\kodi-19.1-Matrix-x64.exe
cmd.exe
User:
admin
Company:
XBMC Foundation
Integrity Level:
HIGH
Description:
Kodi 19.1.0.0 Setup
Version:
19.1.0.0
Modules
Images
c:\users\admin\downloads\kodi-19.1-matrix-x64.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6512\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6944"C:\Users\admin\Desktop\Your File Is Ready To Download.exe.danger.exe" C:\Users\admin\Desktop\Your File Is Ready To Download.exe.danger.exe
explorer.exe
User:
admin
Company:
IC001
Integrity Level:
HIGH
Description:
Software Installation
Version:
6.91.0.0
Modules
Images
c:\users\admin\desktop\your file is ready to download.exe.danger.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
Total events
5 500
Read events
5 482
Write events
16
Delete events
2

Modification events

(PID) Process:(1676) GenericSetup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates
Operation:delete valueName:8CF427FD790C3AD166068DE81E57EFBB932272D4
Value:
(PID) Process:(1676) GenericSetup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\8CF427FD790C3AD166068DE81E57EFBB932272D4
Operation:writeName:Blob
Value:
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
(PID) Process:(1676) GenericSetup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\8CF427FD790C3AD166068DE81E57EFBB932272D4
Operation:writeName:Blob
Value:
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
(PID) Process:(1676) GenericSetup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GenericSetup_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(1676) GenericSetup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GenericSetup_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(1676) GenericSetup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GenericSetup_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(1676) GenericSetup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GenericSetup_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(1676) GenericSetup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GenericSetup_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(1676) GenericSetup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GenericSetup_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(1676) GenericSetup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\GenericSetup_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
Executable files
11
Suspicious files
5
Text files
21
Unknown types
0

Dropped files

PID
Process
Filename
Type
6944Your File Is Ready To Download.exe.danger.exeC:\Users\admin\AppData\Local\Temp\7zS02B172F0\GenericSetup.exe.configxml
MD5:FD63EE3928EDD99AFC5BDF17E4F1E7B6
SHA256:2A2DDBDC4600E829AD756FD5E84A79C0401FA846AD4F2F2FB235B410E82434A9
6944Your File Is Ready To Download.exe.danger.exeC:\Users\admin\AppData\Local\Temp\7zS02B172F0\es\GenericSetup.resources.dllexecutable
MD5:244CD3A33B0A6FE36AA0274C0C1211D1
SHA256:FA03335241496436583DFC1AFF605A61EB26E3CA84321B2334709C5F7ECDCBCC
1676GenericSetup.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A37B8BA80004D3266CB4D93B2052DC10_5F5F520ABA6509FB550A7DDEB645B50Fbinary
MD5:6ACE7913605F697E31DFEA6FD813DB30
SHA256:E38A9DFB0E2246050FD6073DEE345601B1DC6C959585FE0BC7538AA01FAC68FE
1676GenericSetup.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A37B8BA80004D3266CB4D93B2052DC10_5F5F520ABA6509FB550A7DDEB645B50Fbinary
MD5:5AB3584D2361B70F85B4B7A87ED0A3DF
SHA256:AA239EE3A36EAADF7CBF61E4EC2C9B7A439BA51B89673BCC6F9D8E6B276822BA
1676GenericSetup.exeC:\Users\admin\AppData\Local\Temp\GenericSetup.exe_1748100827\Resources\tis\Config.tistext
MD5:BF5328E51E8AB1211C509B5A65AB9972
SHA256:98F22FB45530506548AE320C32EE4939D27017481D2AD0D784AA5516F939545B
6944Your File Is Ready To Download.exe.danger.exeC:\Users\admin\AppData\Local\Temp\7zS02B172F0\pt\GenericSetup.resources.dllexecutable
MD5:CFF7140936B8C88003ADB80A77F78627
SHA256:83AE59AB44D59356CCD25DE6AC04743230045917D80534AD6436409BBB19AD6E
1676GenericSetup.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B59C386ACF967256F47CEB4C030EC6CA_09374BCDA06F0FB4474C5CB3B17DA434binary
MD5:4CF1C5F97852C742AC5FB5AF0D610056
SHA256:6A350FE75FFECD7A509317ED6512574CEEDDECAF1A11EAFEB7FD2FBFF488572F
1676GenericSetup.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B59C386ACF967256F47CEB4C030EC6CA_09374BCDA06F0FB4474C5CB3B17DA434binary
MD5:B52DB262B8A73D0DECD5DF36F7A91825
SHA256:C7D5F6371FBA68B45BEBD3735DF0A1EDC50F724597C30C28863FD0600B99C4AB
1676GenericSetup.exeC:\Users\admin\AppData\Local\Temp\GenericSetup.exe_1748100827\BundleConfig.jsonbinary
MD5:36C0DB24CE7F45D4A0FD1CAF2EA8AC4D
SHA256:511CE4B5FE18E8783BA0AE4ED56EAC161A53505EF7898616B27029122BABC70A
1676GenericSetup.exeC:\Users\admin\AppData\Local\_\GenericSetup.exe_Url_blceftx12sg4l41414ghugc1ebzttdmg\1.4.3.5835\user.configxml
MD5:C76D70D8440A273C2B2A2764F33323B8
SHA256:8F6658DFB498D9BC831670DFFD055D850D327A2DEFD82E1F24416316B037135D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
23
DNS requests
18
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1676
GenericSetup.exe
GET
200
23.192.154.58:80
http://ocsp.entrust.net/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTLXNCzDvBhHecWjg70iJhBW0InywQUanImetAe733nO2lR1GyNn5ASZqsCDQCHglJgAAAAAFHTc9k%3D
unknown
whitelisted
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1676
GenericSetup.exe
GET
200
23.192.154.58:80
http://ocsp.entrust.net/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQQYZiPAAGkmN%2BgbjpL0XWVofDLNAQUKgpvMiwpICF2arGsjDyvk44Oa6ICEB5Qi7I5iAi8QgpaH2e6XQs%3D
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7000
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7000
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
1676
GenericSetup.exe
23.192.154.58:80
ocsp.entrust.net
AKAMAI-AS
GB
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
1676
GenericSetup.exe
104.16.213.94:443
h2oapi.adaware.com
CLOUDFLARENET
whitelisted
6544
svchost.exe
40.126.31.0:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
google.com
  • 142.250.185.206
whitelisted
crl.microsoft.com
  • 23.53.40.178
  • 23.53.40.176
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
ocsp.entrust.net
  • 23.192.154.58
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
h2oapi.adaware.com
  • 104.16.213.94
  • 104.16.212.94
whitelisted
www.google.com
  • 172.217.16.132
whitelisted
sos.adaware.com
  • 104.16.213.94
  • 104.16.212.94
whitelisted
login.live.com
  • 40.126.31.0
  • 20.190.159.75
  • 20.190.159.71
  • 20.190.159.64
  • 40.126.31.69
  • 40.126.31.131
  • 40.126.31.128
  • 20.190.159.23
whitelisted

Threats

PID
Process
Class
Message
1676
GenericSetup.exe
Possibly Unwanted Program Detected
ADWARE [ANY.RUN] TLS SNI Domain related with Unwanted Software (sos .adaware .com)
No debug info