download:

/lstprjct/IDM-Activation-Script/archive/refs/heads/main.zip

Full analysis: https://app.any.run/tasks/36f0ebd4-e9ab-40fd-b8c6-bc215fee42c1
Verdict: Malicious activity
Analysis date: May 10, 2025, 14:22:23
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
arch-scr
idm
tool
github
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract, compression method=store
MD5:

59E89B051AF47ACC25F7380555C48B42

SHA1:

8885A18EC5F36C26F387713B9BFC71CA870E94A0

SHA256:

C03A9E6621006DC69B38D6DADF4E0BB89042FB7A0A542F4F785B16AD76C45092

SSDEEP:

768:ZNXNa3iCCwTjifjHqTT+ISEGM/zEZIWUZtbFXbezaUt0:ZNXNGiVdjHqH+IaM6NU3Rb/40

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 4892)
    • Registers / Runs the DLL via REGSVR32.EXE

      • IDM1.tmp (PID: 8460)
      • IDMan.exe (PID: 8896)
      • IDMan.exe (PID: 9108)
      • Uninstall.exe (PID: 8308)
      • IDMan.exe (PID: 6468)
    • Starts NET.EXE for service management

      • Uninstall.exe (PID: 8308)
      • net.exe (PID: 9184)
    • Changes powershell execution policy (Bypass)

      • WinRAR.exe (PID: 4892)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 7360)
    • Execute application with conhost.exe as parent process

      • powershell.exe (PID: 4528)
  • SUSPICIOUS

    • Starts application with an unusual extension

      • idman642build36.exe (PID: 8428)
    • Creates a software uninstall entry

      • IDM1.tmp (PID: 8460)
    • The process creates files with name similar to system file names

      • IDM1.tmp (PID: 8460)
    • Creates/Modifies COM task schedule object

      • IDM1.tmp (PID: 8460)
      • regsvr32.exe (PID: 8828)
      • regsvr32.exe (PID: 8864)
      • regsvr32.exe (PID: 8844)
      • IDMan.exe (PID: 8896)
      • regsvr32.exe (PID: 9020)
      • regsvr32.exe (PID: 9060)
      • regsvr32.exe (PID: 9084)
      • regsvr32.exe (PID: 9116)
    • Reads security settings of Internet Explorer

      • IDMan.exe (PID: 8896)
      • IDM1.tmp (PID: 8460)
      • Uninstall.exe (PID: 8308)
    • Executable content was dropped or overwritten

      • IDMan.exe (PID: 8896)
      • rundll32.exe (PID: 8420)
      • drvinst.exe (PID: 8892)
    • Uses RUNDLL32.EXE to load library

      • Uninstall.exe (PID: 8308)
    • Drops a system driver (possible attempt to evade defenses)

      • rundll32.exe (PID: 8420)
      • drvinst.exe (PID: 8892)
    • Starts POWERSHELL.EXE for commands execution

      • WinRAR.exe (PID: 4892)
      • cmd.exe (PID: 8268)
      • cmd.exe (PID: 9200)
      • conhost.exe (PID: 4108)
      • cmd.exe (PID: 7932)
      • cmd.exe (PID: 8636)
      • cmd.exe (PID: 7368)
    • The process executes Powershell scripts

      • WinRAR.exe (PID: 4892)
    • Executing commands from ".cmd" file

      • powershell.exe (PID: 7360)
      • powershell.exe (PID: 5796)
      • cmd.exe (PID: 9200)
      • cmd.exe (PID: 8268)
      • powershell.exe (PID: 4528)
      • cmd.exe (PID: 7932)
    • Starts CMD.EXE for commands execution

      • powershell.exe (PID: 7360)
      • cmd.exe (PID: 8268)
      • cmd.exe (PID: 3240)
      • powershell.exe (PID: 5796)
      • cmd.exe (PID: 9200)
      • cmd.exe (PID: 5548)
      • powershell.exe (PID: 4528)
      • cmd.exe (PID: 7932)
      • cmd.exe (PID: 9200)
    • Windows service management via SC.EXE

      • sc.exe (PID: 7932)
      • sc.exe (PID: 8000)
      • sc.exe (PID: 8636)
    • Starts SC.EXE for service management

      • cmd.exe (PID: 8268)
      • cmd.exe (PID: 9200)
      • cmd.exe (PID: 7932)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 8268)
      • cmd.exe (PID: 9200)
      • cmd.exe (PID: 7932)
    • Possibly malicious use of IEX has been detected

      • cmd.exe (PID: 8268)
      • cmd.exe (PID: 9200)
      • cmd.exe (PID: 7932)
    • Application launched itself

      • cmd.exe (PID: 3240)
      • cmd.exe (PID: 9200)
      • cmd.exe (PID: 5548)
      • cmd.exe (PID: 8268)
      • cmd.exe (PID: 7932)
      • cmd.exe (PID: 9200)
    • Probably obfuscated PowerShell command line is found

      • cmd.exe (PID: 8268)
      • cmd.exe (PID: 9200)
      • cmd.exe (PID: 7932)
    • Hides command output

      • cmd.exe (PID: 8636)
      • cmd.exe (PID: 4000)
      • cmd.exe (PID: 6192)
      • cmd.exe (PID: 2800)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 7932)
      • cmd.exe (PID: 2800)
      • cmd.exe (PID: 4000)
    • Get information on the list of running processes

      • cmd.exe (PID: 7932)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 7932)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 7932)
  • INFO

    • Manual execution by a user

      • msedge.exe (PID: 1184)
      • firefox.exe (PID: 5556)
    • Checks supported languages

      • identity_helper.exe (PID: 8004)
      • idman642build36.exe (PID: 8428)
      • IDM1.tmp (PID: 8460)
      • idmBroker.exe (PID: 8852)
      • IDMan.exe (PID: 8896)
      • Uninstall.exe (PID: 8308)
      • drvinst.exe (PID: 8892)
    • Reads Environment values

      • identity_helper.exe (PID: 8004)
    • Reads the computer name

      • identity_helper.exe (PID: 8004)
      • idman642build36.exe (PID: 8428)
      • IDM1.tmp (PID: 8460)
      • idmBroker.exe (PID: 8852)
      • IDMan.exe (PID: 8896)
      • Uninstall.exe (PID: 8308)
    • Application launched itself

      • msedge.exe (PID: 1184)
      • firefox.exe (PID: 5556)
      • firefox.exe (PID: 8360)
    • Executable content was dropped or overwritten

      • msedge.exe (PID: 1184)
      • msedge.exe (PID: 6872)
    • INTERNETDOWNLOADMANAGER mutex has been found

      • idman642build36.exe (PID: 8428)
      • IDM1.tmp (PID: 8460)
      • IDMan.exe (PID: 8896)
    • The sample compiled with english language support

      • msedge.exe (PID: 6872)
      • IDMan.exe (PID: 8896)
      • rundll32.exe (PID: 8420)
      • drvinst.exe (PID: 8892)
    • Create files in a temporary directory

      • idman642build36.exe (PID: 8428)
      • IDM1.tmp (PID: 8460)
      • IDMan.exe (PID: 8896)
      • rundll32.exe (PID: 8420)
    • Creates files in the program directory

      • IDM1.tmp (PID: 8460)
      • IDMan.exe (PID: 8896)
    • Reads the machine GUID from the registry

      • IDMan.exe (PID: 8896)
    • Disables trace logs

      • IDMan.exe (PID: 8896)
    • Reads the software policy settings

      • IDMan.exe (PID: 8896)
    • Creates files or folders in the user directory

      • IDM1.tmp (PID: 8460)
      • IDMan.exe (PID: 8896)
    • Process checks computer location settings

      • IDM1.tmp (PID: 8460)
      • Uninstall.exe (PID: 8308)
      • IDMan.exe (PID: 8896)
    • Checks proxy server information

      • IDMan.exe (PID: 8896)
    • Checks operating system version

      • cmd.exe (PID: 9200)
      • cmd.exe (PID: 8268)
      • cmd.exe (PID: 7932)
    • Starts MODE.COM to configure console settings

      • mode.com (PID: 9208)
      • mode.com (PID: 2596)
      • mode.com (PID: 5756)
      • mode.com (PID: 6752)
      • mode.com (PID: 6240)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2025:02:17 05:38:30
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: IDM-Activation-Script-main/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
388
Monitored processes
250
Malicious processes
13
Suspicious processes
3

Behavior graph

Click at the process to see the details
start winrar.exe no specs sppextcomobj.exe no specs slui.exe msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs idman642build36.exe no specs idman642build36.exe idm1.tmp no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs idmbroker.exe no specs regsvr32.exe no specs idman.exe regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe uninstall.exe no specs rundll32.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs drvinst.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs drvinst.exe no specs runonce.exe no specs grpconv.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs regsvr32.exe no specs regsvr32.exe no specs mediumilstart.exe no specs idman.exe no specs firefox.exe no specs regsvr32.exe no specs regsvr32.exe no specs slui.exe powershell.exe conhost.exe no specs msedge.exe no specs cmd.exe no specs conhost.exe no specs msedge.exe no specs sc.exe no specs find.exe no specs findstr.exe no specs cmd.exe no specs reg.exe no specs find.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs find.exe no specs powershell.exe no specs find.exe no specs fltmc.exe no specs powershell.exe no specs cmd.exe conhost.exe no specs sc.exe no specs find.exe no specs findstr.exe no specs cmd.exe no specs reg.exe no specs find.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs find.exe no specs powershell.exe no specs find.exe no specs fltmc.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs sc.exe no specs find.exe no specs findstr.exe no specs cmd.exe no specs reg.exe no specs find.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs find.exe no specs powershell.exe no specs find.exe no specs fltmc.exe no specs powershell.exe no specs find.exe no specs cmd.exe no specs powershell.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs mode.com no specs choice.exe no specs msedge.exe no specs mode.com no specs powershell.exe no specs choice.exe no specs mode.com no specs choice.exe no specs msedge.exe no specs mode.com no specs powershell.exe no specs cmd.exe no specs ping.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs cmd.exe no specs reg.exe no specs tasklist.exe no specs findstr.exe no specs taskkill.exe no specs cmd.exe no specs powershell.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs powershell.exe no specs idman.exe timeout.exe no specs idmintegrator64.exe no specs timeout.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs timeout.exe no specs timeout.exe no specs timeout.exe no specs timeout.exe no specs idman.exe no specs timeout.exe no specs timeout.exe no specs timeout.exe no specs timeout.exe no specs idman.exe no specs timeout.exe no specs timeout.exe no specs timeout.exe no specs timeout.exe no specs timeout.exe no specs msedge.exe no specs timeout.exe no specs tasklist.exe no specs findstr.exe no specs msedge.exe no specs taskkill.exe no specs powershell.exe no specs mode.com no specs choice.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
232reg query "HKCU\Software\DownloadManager" "/v" "Email" C:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ws2_32.dll
456\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
540findstr /i "idman.exe" C:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
840C:\WINDOWS\system32\net1 start IDMWFPC:\Windows\SysWOW64\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Net Command
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\net1.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\sechost.dll
856reg query "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Environment" /v PROCESSOR_ARCHITECTUREC:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ws2_32.dll
920C:\WINDOWS\system32\cmd.exe /S /D /c" echo "C:\Users\admin\AppData\Local\Temp\IAS_50948030.cmd" "C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
1052"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2180 -parentBuildID 20240213221259 -prefsHandle 2172 -prefMapHandle 2160 -prefsLen 31031 -prefMapSize 244583 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1d7a2610-3568-43b3-92fb-5051ec5b6ac5} 8360 "\\.\pipe\gecko-crash-server-pipe.8360" 2dd2f582110 socketC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Version:
123.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\msvcp140.dll
c:\windows\system32\vcruntime140.dll
1184"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=DefaultC:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1196ping -n 1 internetdownloadmanager.comC:\Windows\System32\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
TCP/IP Ping Command
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\ping.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\mswsock.dll
c:\windows\system32\dnsapi.dll
2104C:\WINDOWS\system32\cmd.exe /c reg query "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Environment" /v PROCESSOR_ARCHITECTUREC:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
Total events
116 717
Read events
115 625
Write events
771
Delete events
321

Modification events

(PID) Process:(4892) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(4892) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(4892) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(4892) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\main.zip
(PID) Process:(4892) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(4892) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(4892) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(4892) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1184) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(1184) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
2CA922195F932F00
Executable files
56
Suspicious files
977
Text files
229
Unknown types
0

Dropped files

PID
Process
Filename
Type
1184msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old~RF10d5ff.TMP
MD5:
SHA256:
1184msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
1184msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old~RF10d60f.TMP
MD5:
SHA256:
1184msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
1184msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF10d60f.TMP
MD5:
SHA256:
1184msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
1184msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old~RF10d60f.TMP
MD5:
SHA256:
1184msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
1184msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF10d61e.TMP
MD5:
SHA256:
1184msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
53
TCP/UDP connections
178
DNS requests
223
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.139:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2104
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7596
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7596
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
8360
firefox.exe
POST
200
142.250.186.67:80
http://o.pki.goog/s/wr3/FIY
unknown
whitelisted
8360
firefox.exe
POST
200
2.16.168.117:80
http://r11.o.lencr.org/
unknown
whitelisted
8360
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
whitelisted
8360
firefox.exe
POST
200
2.16.168.117:80
http://r11.o.lencr.org/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.139:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.131:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1184
msedge.exe
239.255.255.250:1900
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 23.48.23.139
  • 23.48.23.183
  • 23.48.23.177
  • 23.48.23.190
  • 23.48.23.138
  • 23.48.23.173
  • 23.48.23.176
  • 23.48.23.194
  • 23.48.23.193
whitelisted
google.com
  • 142.250.185.174
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 95.101.149.131
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 20.190.159.131
  • 40.126.31.67
  • 40.126.31.130
  • 20.190.159.68
  • 20.190.159.128
  • 40.126.31.131
  • 40.126.31.2
  • 40.126.31.71
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
edge.microsoft.com
  • 150.171.27.11
  • 150.171.28.11
whitelisted
edge-mobile-static.azureedge.net
  • 13.107.246.45
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access raw user content on GitHub
No debug info