File name:

BrowsingHistoryView.exe

Full analysis: https://app.any.run/tasks/815bc3f2-742b-4d6f-ad26-7116563801b1
Verdict: Malicious activity
Analysis date: November 08, 2023, 15:33:52
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

1796576CE29ECA1E8A4D280025984A23

SHA1:

21AA4C07E946EE3F39DF1E8E8EA28D3D65566559

SHA256:

CC878FB48ACE3AAE8B067DDFA1879FCD747AE95AA8CBD2348AE39EEADD8BBF72

SSDEEP:

12288:BHf9BV/GPLarNGs2jbdqFKTBgB3A/xV/nzKXnmoBjO17mHU9RS:BHFjyLarNd2jjxV/nzT72cR

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Web Browser History Viewer utility (NirSoft) is detected

      • BrowsingHistoryView.exe (PID: 3440)
    • Steals credentials from Web Browsers

      • BrowsingHistoryView.exe (PID: 3440)
    • Actions looks like stealing of personal data

      • BrowsingHistoryView.exe (PID: 3440)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Checks supported languages

      • BrowsingHistoryView.exe (PID: 3440)
      • wmpnscfg.exe (PID: 2904)
    • Reads the computer name

      • BrowsingHistoryView.exe (PID: 3440)
      • wmpnscfg.exe (PID: 2904)
    • Create files in a temporary directory

      • BrowsingHistoryView.exe (PID: 3440)
    • Creates files or folders in the user directory

      • BrowsingHistoryView.exe (PID: 3440)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 2904)
    • Reads the machine GUID from the registry

      • wmpnscfg.exe (PID: 2904)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:08:30 16:03:11+02:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 470528
InitializedDataSize: 95232
UninitializedDataSize: -
EntryPoint: 0x193e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 2.5.6.30
ProductVersionNumber: 2.5.6.30
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: NirSoft
FileDescription: Web Browser History Viewer
FileVersion: 2.56
LegalCopyright: Copyright © 2012 - 2023 Nir Sofer
OriginalFileName: BrowsingHistoryView.exe
ProductName: BrowsingHistoryView
ProductVersion: 2.56
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start browsinghistoryview.exe wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2904"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\ole32.dll
3440"C:\Users\admin\Desktop\BrowsingHistoryView.exe" C:\Users\admin\Desktop\BrowsingHistoryView.exe
explorer.exe
User:
admin
Company:
NirSoft
Integrity Level:
MEDIUM
Description:
Web Browser History Viewer
Exit code:
0
Version:
2.56
Modules
Images
c:\users\admin\desktop\browsinghistoryview.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
89
Read events
86
Write events
0
Delete events
3

Modification events

(PID) Process:(2904) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{B2CE9E65-512A-4A03-86AF-133223ABF3A6}\{72EDE687-1C69-4BEF-93A9-6F9BDF1A1DD8}
Operation:delete keyName:(default)
Value:
(PID) Process:(2904) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{B2CE9E65-512A-4A03-86AF-133223ABF3A6}
Operation:delete keyName:(default)
Value:
(PID) Process:(2904) wmpnscfg.exeKey:HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Health\{CF43B087-CF78-4A37-856A-A6264E6FCDB8}
Operation:delete keyName:(default)
Value:
Executable files
0
Suspicious files
2
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
3440BrowsingHistoryView.exeC:\Users\admin\AppData\Local\Temp\bhv8E3B.tmp
MD5:
SHA256:
3440BrowsingHistoryView.exeC:\Users\admin\AppData\Local\Temp\sqp8FA3.tmp
MD5:
SHA256:
3440BrowsingHistoryView.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\places.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
3440BrowsingHistoryView.exeC:\Users\admin\AppData\Local\Temp\sqp8FA3.tmp-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
3440BrowsingHistoryView.exeC:\Users\admin\Desktop\BrowsingHistoryView.cfgtext
MD5:E5E097439FC06378CE5A0D83E90ADD8E
SHA256:07F0B46C80FDE4945A34CA0B8B6322504549DB87B0C28C35D73C8458E925CCEE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
5
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
2588
svchost.exe
239.255.255.250:1900
whitelisted

DNS requests

No data

Threats

No threats detected
No debug info