File name:

idm.6.42.27_with_activator_v3.3.rar

Full analysis: https://app.any.run/tasks/d191ab2a-ad53-43cb-a315-2431aaadd461
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: February 23, 2025, 17:44:20
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-scr
arch-html
stealer
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

FE3DEF1A73CE71128F4811375A1A6D85

SHA1:

D5F874533ADA0A702BB351C9005EE9D21A61F8F6

SHA256:

CEF2A6288FDECA597AC77119F7DE8E01C8987694B4671EB362A910A11D51E98E

SSDEEP:

98304:yGFiXWFrsaGqEHYuX7cBLzZmYbLUdzTY1s0U2cpVi+1A64iMM1T7HnNYnUWC5JuO:kM56B774PkUI5BQTB0/xa0T

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Registers / Runs the DLL via REGSVR32.EXE

      • IDM1.tmp (PID: 7096)
      • IDMan.exe (PID: 3692)
      • Uninstall.exe (PID: 4704)
      • IDMan.exe (PID: 8172)
      • IDMan.exe (PID: 5592)
    • Changes the autorun value in the registry

      • rundll32.exe (PID: 836)
      • IDMan.exe (PID: 3692)
    • Starts NET.EXE for service management

      • net.exe (PID: 7720)
      • Uninstall.exe (PID: 4704)
    • Adds path to the Windows Defender exclusion list

      • cmd.exe (PID: 6192)
    • Execute application with conhost.exe as parent process

      • powershell.exe (PID: 7528)
    • Adds process to the Windows Defender exclusion list

      • cmd.exe (PID: 6192)
    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 6192)
    • Actions looks like stealing of personal data

      • IDMan.exe (PID: 5592)
      • IDMan.exe (PID: 6668)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 6404)
      • IDM1.tmp (PID: 7096)
      • IDMan.exe (PID: 3692)
      • Uninstall.exe (PID: 4704)
      • IDMan.exe (PID: 8172)
      • WinRAR.exe (PID: 2216)
      • IDM 6.xx Activator or Resetter v3.3.exe (PID: 7556)
      • IDMan.exe (PID: 5592)
      • IDMan.exe (PID: 4972)
      • IDMan.exe (PID: 5732)
      • IDMan.exe (PID: 6668)
      • IDMan.exe (PID: 2076)
    • Starts application with an unusual extension

      • idman642build27.exe (PID: 7068)
    • The process creates files with name similar to system file names

      • IDM1.tmp (PID: 7096)
      • 7za.exe (PID: 7196)
    • Creates a software uninstall entry

      • IDM1.tmp (PID: 7096)
    • Creates/Modifies COM task schedule object

      • IDM1.tmp (PID: 7096)
      • regsvr32.exe (PID: 3140)
      • regsvr32.exe (PID: 4864)
      • regsvr32.exe (PID: 5592)
      • IDMan.exe (PID: 3692)
      • regsvr32.exe (PID: 5556)
      • regsvr32.exe (PID: 6524)
      • regsvr32.exe (PID: 1852)
      • regsvr32.exe (PID: 6300)
      • regsvr32.exe (PID: 8080)
      • IDMan.exe (PID: 5592)
      • IDMIntegrator64.exe (PID: 5640)
      • regsvr32.exe (PID: 4704)
      • regsvr32.exe (PID: 4652)
      • regsvr32.exe (PID: 7988)
      • regsvr32.exe (PID: 3992)
    • Checks Windows Trust Settings

      • IDMan.exe (PID: 3692)
      • drvinst.exe (PID: 1520)
      • IDMan.exe (PID: 8172)
      • IDMan.exe (PID: 5592)
      • IDMan.exe (PID: 4972)
      • IDMan.exe (PID: 5732)
      • IDMan.exe (PID: 6668)
      • IDMan.exe (PID: 2076)
    • Uses RUNDLL32.EXE to load library

      • Uninstall.exe (PID: 4704)
    • Drops a system driver (possible attempt to evade defenses)

      • rundll32.exe (PID: 836)
      • drvinst.exe (PID: 1520)
      • 7za.exe (PID: 7196)
    • Executable content was dropped or overwritten

      • rundll32.exe (PID: 836)
      • drvinst.exe (PID: 1520)
      • IDMan.exe (PID: 3692)
      • IDM 6.xx Activator or Resetter v3.3.exe (PID: 7556)
      • 7za.exe (PID: 7792)
      • 7za.exe (PID: 7196)
    • Creates files in the driver directory

      • drvinst.exe (PID: 1520)
    • Creates or modifies Windows services

      • drvinst.exe (PID: 7564)
      • Uninstall.exe (PID: 4704)
    • Application launched itself

      • WinRAR.exe (PID: 6404)
      • cmd.exe (PID: 7068)
      • cmd.exe (PID: 7392)
      • cmd.exe (PID: 7748)
      • cmd.exe (PID: 7340)
    • Starts CMD.EXE for commands execution

      • IDM 6.xx Activator or Resetter v3.3.exe (PID: 7556)
      • cmd.exe (PID: 6348)
      • cmd.exe (PID: 7392)
      • cmd.exe (PID: 7068)
      • powershell.exe (PID: 7528)
      • cmd.exe (PID: 7340)
      • cmd.exe (PID: 7748)
    • Drops 7-zip archiver for unpacking

      • IDM 6.xx Activator or Resetter v3.3.exe (PID: 7556)
    • Executing commands from a ".bat" file

      • IDM 6.xx Activator or Resetter v3.3.exe (PID: 7556)
      • cmd.exe (PID: 6348)
      • powershell.exe (PID: 7528)
    • Uses ATTRIB.EXE to modify file attributes

      • cmd.exe (PID: 6160)
      • cmd.exe (PID: 6192)
    • The executable file from the user directory is run by the CMD process

      • 7za.exe (PID: 8004)
      • 7za.exe (PID: 7724)
      • 7za.exe (PID: 7792)
      • 7za.exe (PID: 5788)
      • 7za.exe (PID: 8092)
      • 7za.exe (PID: 7196)
      • NSudo86x.exe (PID: 6888)
    • Script adds exclusion path to Windows Defender

      • cmd.exe (PID: 6192)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 6192)
      • cmd.exe (PID: 7392)
      • conhost.exe (PID: 7484)
      • cmd.exe (PID: 7748)
      • cmd.exe (PID: 7564)
      • cmd.exe (PID: 7220)
      • cmd.exe (PID: 6176)
    • Starts SC.EXE for service management

      • cmd.exe (PID: 7392)
      • cmd.exe (PID: 7748)
    • Windows service management via SC.EXE

      • sc.exe (PID: 7980)
      • sc.exe (PID: 7800)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 7392)
      • cmd.exe (PID: 7748)
    • Probably obfuscated PowerShell command line is found

      • cmd.exe (PID: 7392)
      • cmd.exe (PID: 7748)
      • cmd.exe (PID: 6176)
    • Possibly malicious use of IEX has been detected

      • cmd.exe (PID: 7748)
      • cmd.exe (PID: 7392)
    • Script adds exclusion process to Windows Defender

      • cmd.exe (PID: 6192)
    • Hides command output

      • cmd.exe (PID: 7564)
      • cmd.exe (PID: 2484)
      • cmd.exe (PID: 7488)
      • cmd.exe (PID: 6532)
      • cmd.exe (PID: 6176)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 2484)
      • cmd.exe (PID: 7748)
      • cmd.exe (PID: 7488)
    • Process drops legitimate windows executable

      • 7za.exe (PID: 7196)
    • Get information on the list of running processes

      • cmd.exe (PID: 7748)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 7748)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 7748)
  • INFO

    • Local mutex for internet shortcut management

      • WinRAR.exe (PID: 6404)
    • Reads the computer name

      • IDM1.tmp (PID: 7096)
      • idman642build27.exe (PID: 7068)
      • idmBroker.exe (PID: 6172)
      • IDMan.exe (PID: 3692)
      • Uninstall.exe (PID: 4704)
      • drvinst.exe (PID: 7564)
      • drvinst.exe (PID: 1520)
      • IDMan.exe (PID: 8172)
      • MediumILStart.exe (PID: 8112)
      • IDM 6.xx Activator or Resetter v3.3.exe (PID: 7556)
      • 7za.exe (PID: 8092)
      • 7za.exe (PID: 8004)
      • 7za.exe (PID: 7724)
      • 7za.exe (PID: 7792)
      • 7za.exe (PID: 5788)
      • 7za.exe (PID: 7196)
      • IDMan.exe (PID: 5592)
      • IDMIntegrator64.exe (PID: 5640)
      • IDMan.exe (PID: 4972)
      • IDMan.exe (PID: 5732)
      • NSudo86x.exe (PID: 6888)
      • IDMan.exe (PID: 6668)
      • identity_helper.exe (PID: 7480)
      • identity_helper.exe (PID: 6780)
      • IDMan.exe (PID: 2076)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6404)
      • WinRAR.exe (PID: 2216)
    • Checks supported languages

      • idman642build27.exe (PID: 7068)
      • IDM1.tmp (PID: 7096)
      • idmBroker.exe (PID: 6172)
      • IDMan.exe (PID: 3692)
      • Uninstall.exe (PID: 4704)
      • drvinst.exe (PID: 1520)
      • drvinst.exe (PID: 7564)
      • MediumILStart.exe (PID: 8112)
      • IDM 6.xx Activator or Resetter v3.3.exe (PID: 7556)
      • IDMan.exe (PID: 8172)
      • 7za.exe (PID: 8004)
      • 7za.exe (PID: 7724)
      • 7za.exe (PID: 7792)
      • 7za.exe (PID: 5788)
      • 7za.exe (PID: 8092)
      • mode.com (PID: 2436)
      • 7za.exe (PID: 7196)
      • mode.com (PID: 5488)
      • IDMan.exe (PID: 5592)
      • IDMIntegrator64.exe (PID: 5640)
      • IDMan.exe (PID: 4972)
      • IDMan.exe (PID: 5732)
      • NSudo86x.exe (PID: 6888)
      • IDMan.exe (PID: 6668)
      • identity_helper.exe (PID: 7480)
      • identity_helper.exe (PID: 6780)
      • IDMan.exe (PID: 2076)
    • Create files in a temporary directory

      • IDM1.tmp (PID: 7096)
      • idman642build27.exe (PID: 7068)
      • IDMan.exe (PID: 3692)
      • rundll32.exe (PID: 836)
      • IDMan.exe (PID: 8172)
      • IDM 6.xx Activator or Resetter v3.3.exe (PID: 7556)
      • 7za.exe (PID: 8004)
      • 7za.exe (PID: 7724)
      • 7za.exe (PID: 7792)
      • reg.exe (PID: 7796)
      • IDMan.exe (PID: 5592)
      • IDMan.exe (PID: 6668)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 6404)
      • IDMan.exe (PID: 3692)
      • rundll32.exe (PID: 836)
      • drvinst.exe (PID: 1520)
      • IDM 6.xx Activator or Resetter v3.3.exe (PID: 7556)
    • Creates files in the program directory

      • IDM1.tmp (PID: 7096)
      • IDMan.exe (PID: 3692)
    • Creates files or folders in the user directory

      • IDM1.tmp (PID: 7096)
      • IDMan.exe (PID: 3692)
      • 7za.exe (PID: 7196)
      • IDMan.exe (PID: 5592)
      • IDMan.exe (PID: 6668)
    • Process checks computer location settings

      • IDM1.tmp (PID: 7096)
      • IDMan.exe (PID: 3692)
      • Uninstall.exe (PID: 4704)
      • IDMan.exe (PID: 8172)
      • IDM 6.xx Activator or Resetter v3.3.exe (PID: 7556)
      • IDMan.exe (PID: 5592)
    • Disables trace logs

      • IDMan.exe (PID: 3692)
      • IDMan.exe (PID: 8172)
      • powershell.exe (PID: 3436)
      • IDMan.exe (PID: 5592)
      • IDMan.exe (PID: 4972)
      • IDMan.exe (PID: 5732)
      • IDMan.exe (PID: 6668)
      • IDMan.exe (PID: 2076)
    • Reads the software policy settings

      • IDMan.exe (PID: 3692)
      • drvinst.exe (PID: 1520)
      • IDMan.exe (PID: 8172)
      • IDMan.exe (PID: 5592)
      • IDMan.exe (PID: 4972)
      • IDMan.exe (PID: 5732)
      • IDMan.exe (PID: 6668)
      • IDMan.exe (PID: 2076)
    • Reads the machine GUID from the registry

      • IDMan.exe (PID: 3692)
      • drvinst.exe (PID: 1520)
      • IDMan.exe (PID: 8172)
      • IDMan.exe (PID: 5592)
      • IDMan.exe (PID: 4972)
      • IDMan.exe (PID: 5732)
      • IDMan.exe (PID: 6668)
      • IDMIntegrator64.exe (PID: 5640)
      • IDMan.exe (PID: 2076)
    • Checks proxy server information

      • IDMan.exe (PID: 3692)
      • IDMan.exe (PID: 8172)
      • powershell.exe (PID: 3436)
      • IDMan.exe (PID: 5592)
    • Application launched itself

      • firefox.exe (PID: 3620)
      • firefox.exe (PID: 5872)
      • msedge.exe (PID: 776)
      • msedge.exe (PID: 3896)
      • msedge.exe (PID: 5548)
    • Manual execution by a user

      • firefox.exe (PID: 3620)
      • msedge.exe (PID: 5548)
      • IDMan.exe (PID: 2076)
    • Reads the time zone

      • runonce.exe (PID: 7588)
    • Reads security settings of Internet Explorer

      • runonce.exe (PID: 7588)
    • Checks operating system version

      • cmd.exe (PID: 7392)
      • cmd.exe (PID: 7748)
    • Converts byte array into ASCII string (POWERSHELL)

      • powershell.exe (PID: 6304)
      • powershell.exe (PID: 7120)
      • powershell.exe (PID: 2976)
      • powershell.exe (PID: 4548)
    • Checks whether the specified file exists (POWERSHELL)

      • powershell.exe (PID: 6304)
      • powershell.exe (PID: 7120)
      • powershell.exe (PID: 2976)
      • powershell.exe (PID: 4548)
    • Gets a random number, or selects objects randomly from a collection (POWERSHELL)

      • powershell.exe (PID: 6304)
      • powershell.exe (PID: 7120)
      • powershell.exe (PID: 2976)
      • powershell.exe (PID: 4548)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 7808)
      • powershell.exe (PID: 7576)
      • powershell.exe (PID: 7588)
      • powershell.exe (PID: 7592)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 7576)
      • powershell.exe (PID: 7588)
      • powershell.exe (PID: 7592)
      • powershell.exe (PID: 7808)
    • Starts MODE.COM to configure console settings

      • mode.com (PID: 2436)
      • mode.com (PID: 5488)
    • The sample compiled with japanese language support

      • 7za.exe (PID: 7196)
    • Process checks whether UAC notifications are on

      • IDMan.exe (PID: 5592)
    • Reads Environment values

      • identity_helper.exe (PID: 7480)
      • identity_helper.exe (PID: 6780)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)

EXIF

ZIP

FileVersion: RAR v5
CompressedSize: 12145984
UncompressedSize: 12263256
OperatingSystem: Win32
ArchivedFileName: idman642build27.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
400
Monitored processes
265
Malicious processes
16
Suspicious processes
9

Behavior graph

Click at the process to see the details
start winrar.exe idman642build27.exe no specs idman642build27.exe idm1.tmp no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs idmbroker.exe no specs regsvr32.exe no specs idman.exe regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs firefox.exe no specs uninstall.exe no specs firefox.exe no specs firefox.exe rundll32.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs drvinst.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs drvinst.exe no specs runonce.exe no specs grpconv.exe no specs net.exe no specs firefox.exe no specs conhost.exe no specs net1.exe no specs regsvr32.exe no specs regsvr32.exe no specs mediumilstart.exe no specs idman.exe no specs regsvr32.exe no specs regsvr32.exe no specs winrar.exe idm 6.xx activator or resetter v3.3.exe no specs idm 6.xx activator or resetter v3.3.exe cmd.exe no specs conhost.exe no specs attrib.exe no specs 7za.exe no specs 7za.exe no specs 7za.exe 7za.exe no specs 7za.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs find.exe no specs reg.exe no specs find.exe no specs attrib.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs sc.exe no specs find.exe no specs findstr.exe no specs cmd.exe no specs reg.exe no specs find.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs powershell.exe no specs find.exe no specs fltmc.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs sc.exe no specs find.exe no specs findstr.exe no specs cmd.exe no specs reg.exe no specs find.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs powershell.exe no specs find.exe no specs powershell.exe no specs fltmc.exe no specs powershell.exe no specs find.exe no specs cmd.exe no specs powershell.exe no specs powershell.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs mode.com no specs choice.exe no specs powershell.exe no specs powershell.exe 7za.exe schtasks.exe no specs mode.com no specs powershell.exe no specs cmd.exe no specs ping.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs cmd.exe no specs reg.exe no specs tasklist.exe no specs findstr.exe no specs taskkill.exe no specs cmd.exe no specs powershell.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs powershell.exe no specs cmd.exe no specs powershell.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs idman.exe timeout.exe no specs idmintegrator64.exe no specs timeout.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs timeout.exe no specs idman.exe no specs timeout.exe no specs timeout.exe no specs idman.exe no specs timeout.exe no specs timeout.exe no specs timeout.exe no specs mspaint.exe no specs tasklist.exe no specs findstr.exe no specs taskkill.exe no specs powershell.exe no specs nsudo86x.exe no specs idman.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs msedge.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs idman.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
396C:\WINDOWS\system32\cmd.exe /c ping -n 1 internetdownloadmanager.comC:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
488reg query "HKU\S-1-5-21-1693682860-607145093-2874071422-1001\Software\DownloadManager" /v idmvers C:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ws2_32.dll
536"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6720 --field-trial-handle=2360,i,3265381384295507145,18064882715177313716,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
556\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
640reg add "HKLM\SOFTWARE\Wow6432Node\Internet Download Manager" /v "AdvIntDriverEnabled2" /t REG_DWORD /d "1" /f C:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ws2_32.dll
644powershell.exe "(Get-Date).ToString('yyyyMMdd-HHmmssfff')"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
732"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=3844 --field-trial-handle=2360,i,3265381384295507145,18064882715177313716,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
768"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5648 --field-trial-handle=2360,i,3265381384295507145,18064882715177313716,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
776"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-windowC:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
836"C:\WINDOWS\Sysnative\RUNDLL32.EXE" SETUPAPI.DLL,InstallHinfSection DefaultInstall 128 C:\Program Files (x86)\Internet Download Manager\idmwfp.infC:\Windows\System32\rundll32.exe
Uninstall.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
Total events
143 710
Read events
142 317
Write events
1 054
Delete events
339

Modification events

(PID) Process:(6404) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6404) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6404) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6404) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\idm.6.42.27_with_activator_v3.3.rar
(PID) Process:(6404) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6404) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6404) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6404) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6404) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
(PID) Process:(7096) IDM1.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Internet Download Manager
Operation:writeName:UninstallString
Value:
C:\Program Files (x86)\Internet Download Manager\Uninstall.exe
Executable files
46
Suspicious files
507
Text files
201
Unknown types
2

Dropped files

PID
Process
Filename
Type
6404WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb6404.47755\idman642build27.exeexecutable
MD5:85CB23830796C3B754F4DBFE65BA6427
SHA256:CE11F4450C5F4FDC090A3E655EE5996D2A2234AAA5FC68B618546DBCCAD00139
6404WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb6404.47755\www.crackingcity.com - Free full version software.urlbinary
MD5:075E86F12563B1EA5A6E307F1A0FBF3B
SHA256:4DE29B8987250D20BDD095148E21E504493E0E2A160D4106AE97EED1E5F92175
7096IDM1.tmpC:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Download Manager\Internet Download Manager.lnkbinary
MD5:3122AA8D0D5AF87EBFC1A182154AF94D
SHA256:23647282CA59BDAA41828CEEC3700FDA648FEA39D00AAF4D39E833C4398939C0
7096IDM1.tmpC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Internet Download Manager\TUTORIALS.lnkbinary
MD5:5FF330840D10FB370B35492D1E21457A
SHA256:20B0D7C83F9051801E8539B6D2904C4C6BF64563BEB330B0766C83372F8819E6
7096IDM1.tmpC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Internet Download Manager\Grabber Help.lnkbinary
MD5:EF2A18F02F3C10368AB0B3903E658D45
SHA256:1998BB65EE3F0CD499ACB13008F42AD5AD333230C2A5DA1CC78FAFEB3F2825DE
7096IDM1.tmpC:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Download Manager\Grabber Help.lnkbinary
MD5:FA48A05FD92422266FC2EF5B4D3BC566
SHA256:205966F1466DD16150CEF54A6EE0861AD48CD1AF2BC84103E79A31377376BBB7
7096IDM1.tmpC:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Download Manager\TUTORIALS.lnkbinary
MD5:63EB3D0C960C65FCE7287390D2638AFF
SHA256:6DECD76B0549866AC70C8FB079F0BBDCAFA1710BE9EF7679CB9C93F547AC0179
7096IDM1.tmpC:\Program Files (x86)\Internet Download Manager\IDMSetup2.logbinary
MD5:E571B9F7F8462CF2E232B8C018E53F28
SHA256:9C1E2874D7135A2C7BACC46FFA1D967AAC23FE766498486DFCE0DFC39C4B3BD3
7096IDM1.tmpC:\ProgramData\Microsoft\Windows\Start Menu\Programs\Internet Download Manager\IDM Help.lnkbinary
MD5:7D338F1D76CAB01918079FF8E2EDA835
SHA256:0EC29510212D7EFD36FA31BBDE5E70C58E33827278443CA787A71F9E08EFB647
6404WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXb6404.47755\IDM 6.xx Activator or Resetter v3.3.rarcompressed
MD5:80B622CB8A4EB0B1EE0412BA7B383495
SHA256:C17B7A2EAF68B8767F6A53E394E1BE6661342162831EF3067AE5316D00D78A1F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
54
TCP/UDP connections
235
DNS requests
335
Threats
14

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2736
svchost.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.19.11.105:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1176
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5872
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/canonical.html
unknown
whitelisted
2736
svchost.exe
GET
200
2.19.11.105:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5872
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
whitelisted
6708
backgroundTaskHost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
5872
firefox.exe
POST
172.217.18.99:80
http://o.pki.goog/we2
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3416
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2736
svchost.exe
2.19.11.105:80
crl.microsoft.com
Elisa Oyj
NL
whitelisted
4712
MoUsoCoreWorker.exe
2.19.11.105:80
crl.microsoft.com
Elisa Oyj
NL
whitelisted
4712
MoUsoCoreWorker.exe
23.219.150.101:80
www.microsoft.com
AKAMAI-AS
CL
whitelisted
2736
svchost.exe
23.219.150.101:80
www.microsoft.com
AKAMAI-AS
CL
whitelisted
5064
SearchApp.exe
2.19.122.34:443
www.bing.com
Akamai International B.V.
DE
whitelisted
5064
SearchApp.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
unknown
4
System
192.168.100.255:138
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 2.19.11.105
  • 2.19.11.120
whitelisted
google.com
  • 142.250.186.46
whitelisted
www.microsoft.com
  • 23.219.150.101
  • 23.209.214.100
whitelisted
www.bing.com
  • 2.19.122.34
  • 2.19.122.48
  • 2.19.122.33
  • 2.19.122.47
  • 2.19.122.44
  • 2.19.122.35
  • 2.19.122.49
  • 2.19.122.46
  • 2.19.122.37
  • 2.19.122.25
  • 2.19.122.26
  • 2.19.122.17
  • 2.19.122.16
  • 2.19.122.30
  • 2.19.122.27
  • 2.19.122.19
  • 2.19.122.20
  • 2.19.122.22
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
login.live.com
  • 40.126.32.133
  • 20.190.160.131
  • 40.126.32.136
  • 20.190.160.20
  • 40.126.32.72
  • 40.126.32.74
  • 40.126.32.140
  • 20.190.160.5
whitelisted
go.microsoft.com
  • 2.19.106.8
  • 2.18.97.227
whitelisted
arc.msn.com
  • 20.74.47.205
whitelisted
fd.api.iris.microsoft.com
  • 20.199.58.43
whitelisted

Threats

PID
Process
Class
Message
Not Suspicious Traffic
INFO [ANY.RUN] Google Hosted Libraries (ajax .googleapis .com)
Not Suspicious Traffic
INFO [ANY.RUN] Google Hosted Libraries (ajax .googleapis .com)
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
5936
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Hosted Libraries (ajax .googleapis .com)
5936
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Hosted Libraries (ajax .googleapis .com)
5936
msedge.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
5936
msedge.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
No debug info