URL:

https://www.crackingcity.com/idm-crack/

Full analysis: https://app.any.run/tasks/a8de5420-a28e-46eb-8f54-2b8360a27b24
Verdict: Malicious activity
Analysis date: May 31, 2024, 20:20:10
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

5D91DA13F2DE9367F54F80D3D118E9AF

SHA1:

4662EFF267E35446C40CD13D31ABBFA09801E272

SHA256:

D00B8E831BD1D0303B23DA37F8CDB7BEA97B696F593F1DCEE29E152FD8CBBA48

SSDEEP:

3:N8DSLbMLF8TKtfl:2OLQ9

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • IDM 6.xx Activator or Resetter v3.3.exe (PID: 3648)
      • 7za.exe (PID: 2676)
      • IDMan.exe (PID: 2420)
    • Starts NET.EXE for service management

      • Uninstall.exe (PID: 3140)
      • net.exe (PID: 3160)
    • Changes the autorun value in the registry

      • IDMan.exe (PID: 2420)
      • rundll32.exe (PID: 2864)
    • Creates a writable file in the system directory

      • rundll32.exe (PID: 2864)
    • Actions looks like stealing of personal data

      • IDMan.exe (PID: 2420)
  • SUSPICIOUS

    • Starts application with an unusual extension

      • idman642build10.exe (PID: 1900)
    • The process creates files with name similar to system file names

      • IDM1.tmp (PID: 3056)
    • Creates a software uninstall entry

      • IDM1.tmp (PID: 3056)
    • Reads security settings of Internet Explorer

      • IDM 6.xx Activator or Resetter v3.3.exe (PID: 3648)
      • IDMan.exe (PID: 2420)
      • Uninstall.exe (PID: 3140)
      • IDMan.exe (PID: 2388)
      • IDMan.exe (PID: 2856)
    • Drops 7-zip archiver for unpacking

      • IDM 6.xx Activator or Resetter v3.3.exe (PID: 3648)
    • Executable content was dropped or overwritten

      • IDM 6.xx Activator or Resetter v3.3.exe (PID: 3648)
      • 7za.exe (PID: 2676)
      • IDMan.exe (PID: 2420)
      • rundll32.exe (PID: 2864)
    • Reads the Internet Settings

      • IDM 6.xx Activator or Resetter v3.3.exe (PID: 3648)
      • IDMan.exe (PID: 2420)
      • Uninstall.exe (PID: 3140)
      • runonce.exe (PID: 3320)
      • cmd.exe (PID: 2528)
    • Starts CMD.EXE for commands execution

      • IDM 6.xx Activator or Resetter v3.3.exe (PID: 3648)
      • cmd.exe (PID: 2528)
    • Executing commands from a ".bat" file

      • IDM 6.xx Activator or Resetter v3.3.exe (PID: 3648)
    • Uses ATTRIB.EXE to modify file attributes

      • cmd.exe (PID: 3244)
    • The executable file from the user directory is run by the CMD process

      • 7za.exe (PID: 2456)
      • 7za.exe (PID: 3632)
      • 7za.exe (PID: 2676)
      • 7za.exe (PID: 3356)
      • 7za.exe (PID: 3496)
      • NSudo86x.exe (PID: 5284)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 2528)
    • Possibly malicious use of IEX has been detected

      • cmd.exe (PID: 2528)
    • Application launched itself

      • cmd.exe (PID: 2528)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 2528)
      • cmd.exe (PID: 3476)
      • cmd.exe (PID: 2320)
      • cmd.exe (PID: 3760)
    • Probably obfuscated PowerShell command line is found

      • cmd.exe (PID: 2528)
      • cmd.exe (PID: 3760)
    • Hides command output

      • cmd.exe (PID: 3476)
      • cmd.exe (PID: 1820)
      • cmd.exe (PID: 2844)
      • cmd.exe (PID: 3508)
      • cmd.exe (PID: 3760)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 1820)
      • cmd.exe (PID: 2528)
      • cmd.exe (PID: 3508)
    • Starts SC.EXE for service management

      • cmd.exe (PID: 2528)
    • Get information on the list of running processes

      • cmd.exe (PID: 2528)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 2528)
    • Reads settings of System Certificates

      • IDMan.exe (PID: 2420)
      • IDMan.exe (PID: 2388)
      • IDMan.exe (PID: 2856)
    • Checks Windows Trust Settings

      • IDMan.exe (PID: 2420)
      • IDMan.exe (PID: 2388)
      • IDMan.exe (PID: 2856)
      • IDMan.exe (PID: 5296)
    • Creates/Modifies COM task schedule object

      • IDMan.exe (PID: 2420)
      • Uninstall.exe (PID: 3140)
    • Uses RUNDLL32.EXE to load library

      • Uninstall.exe (PID: 3140)
    • Drops a system driver (possible attempt to evade defenses)

      • rundll32.exe (PID: 2864)
    • Creates or modifies Windows services

      • Uninstall.exe (PID: 3140)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 2528)
  • INFO

    • Manual execution by a user

      • wmpnscfg.exe (PID: 2908)
      • idman642build10.exe (PID: 1900)
      • WinRAR.exe (PID: 3784)
      • idman642build10.exe (PID: 3092)
      • WinRAR.exe (PID: 3000)
      • IDM 6.xx Activator or Resetter v3.3.exe (PID: 3924)
      • WinRAR.exe (PID: 2712)
      • IDM 6.xx Activator or Resetter v3.3.exe (PID: 3648)
      • firefox.exe (PID: 2324)
      • msedge.exe (PID: 3124)
    • Checks supported languages

      • wmpnscfg.exe (PID: 2908)
      • idman642build10.exe (PID: 1900)
      • IDM1.tmp (PID: 3056)
      • IDM 6.xx Activator or Resetter v3.3.exe (PID: 3648)
      • 7za.exe (PID: 2456)
      • 7za.exe (PID: 2676)
      • 7za.exe (PID: 3632)
      • 7za.exe (PID: 3356)
      • 7za.exe (PID: 3496)
      • mode.com (PID: 3256)
      • IDMan.exe (PID: 2420)
      • mode.com (PID: 2412)
      • Uninstall.exe (PID: 3140)
      • IDMan.exe (PID: 2856)
      • IDMan.exe (PID: 2388)
      • NSudo86x.exe (PID: 5284)
      • IDMan.exe (PID: 5296)
      • IEMonitor.exe (PID: 5532)
      • mode.com (PID: 4128)
      • mode.com (PID: 4416)
      • mode.com (PID: 4480)
      • mode.com (PID: 4516)
      • mode.com (PID: 4668)
      • mode.com (PID: 4528)
      • mode.com (PID: 4556)
      • mode.com (PID: 4596)
      • mode.com (PID: 5936)
    • Application launched itself

      • firefox.exe (PID: 3976)
      • firefox.exe (PID: 3992)
      • firefox.exe (PID: 2324)
      • msedge.exe (PID: 992)
      • msedge.exe (PID: 3124)
      • msedge.exe (PID: 5328)
    • Reads the computer name

      • wmpnscfg.exe (PID: 2908)
      • IDM1.tmp (PID: 3056)
      • IDM 6.xx Activator or Resetter v3.3.exe (PID: 3648)
      • 7za.exe (PID: 2456)
      • 7za.exe (PID: 3632)
      • 7za.exe (PID: 3356)
      • 7za.exe (PID: 2676)
      • 7za.exe (PID: 3496)
      • IDMan.exe (PID: 2420)
      • Uninstall.exe (PID: 3140)
      • IDMan.exe (PID: 2856)
      • IDMan.exe (PID: 2388)
      • NSudo86x.exe (PID: 5284)
      • IDMan.exe (PID: 5296)
      • IEMonitor.exe (PID: 5532)
    • The process uses the downloaded file

      • firefox.exe (PID: 3992)
      • WinRAR.exe (PID: 3784)
    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 3784)
      • firefox.exe (PID: 3992)
      • WinRAR.exe (PID: 2712)
      • rundll32.exe (PID: 2864)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3784)
      • firefox.exe (PID: 3992)
      • WinRAR.exe (PID: 2712)
    • Create files in a temporary directory

      • idman642build10.exe (PID: 1900)
      • IDM1.tmp (PID: 3056)
      • IDM 6.xx Activator or Resetter v3.3.exe (PID: 3648)
      • 7za.exe (PID: 2676)
      • 7za.exe (PID: 2456)
      • 7za.exe (PID: 3632)
      • reg.exe (PID: 2324)
      • IDMan.exe (PID: 2420)
      • IDMan.exe (PID: 5296)
    • Reads the machine GUID from the registry

      • IDM1.tmp (PID: 3056)
      • IDMan.exe (PID: 2420)
      • IDMan.exe (PID: 2388)
      • IDMan.exe (PID: 2856)
      • IDMan.exe (PID: 5296)
    • Creates files or folders in the user directory

      • IDM1.tmp (PID: 3056)
      • IDMan.exe (PID: 2420)
      • IDMan.exe (PID: 5296)
    • Checks operating system version

      • cmd.exe (PID: 2528)
    • Checks whether the specified file exists (POWERSHELL)

      • powershell.exe (PID: 3912)
      • powershell.exe (PID: 2392)
      • powershell.exe (PID: 4844)
    • Converts byte array into ASCII string (POWERSHELL)

      • powershell.exe (PID: 3912)
      • powershell.exe (PID: 2392)
      • powershell.exe (PID: 4844)
    • Gets a random number, or selects objects randomly from a collection (POWERSHELL)

      • powershell.exe (PID: 3912)
      • powershell.exe (PID: 2392)
      • powershell.exe (PID: 4844)
    • Disables trace logs

      • IDMan.exe (PID: 2420)
      • IDMan.exe (PID: 2388)
      • IDMan.exe (PID: 2856)
      • IDMan.exe (PID: 5296)
    • Reads the software policy settings

      • IDMan.exe (PID: 2420)
      • IDMan.exe (PID: 2388)
      • IDMan.exe (PID: 2856)
      • IDMan.exe (PID: 5296)
    • Checks proxy server information

      • IDMan.exe (PID: 2420)
    • Creates files in the program directory

      • IDMan.exe (PID: 2420)
      • IDM1.tmp (PID: 3056)
    • Reads security settings of Internet Explorer

      • runonce.exe (PID: 3320)
    • Reads the time zone

      • runonce.exe (PID: 3320)
    • Process checks whether UAC notifications are on

      • IDMan.exe (PID: 2420)
    • Creates files in the driver directory

      • rundll32.exe (PID: 2864)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
258
Monitored processes
203
Malicious processes
8
Suspicious processes
5

Behavior graph

Click at the process to see the details
start firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs wmpnscfg.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs winrar.exe idman642build10.exe no specs idman642build10.exe winrar.exe no specs idm1.tmp no specs winrar.exe idm 6.xx activator or resetter v3.3.exe no specs idm 6.xx activator or resetter v3.3.exe cmd.exe no specs attrib.exe no specs 7za.exe no specs 7za.exe no specs 7za.exe 7za.exe no specs 7za.exe no specs cmd.exe no specs cmd.exe no specs reg.exe no specs find.exe no specs reg.exe no specs sc.exe no specs find.exe no specs find.exe no specs findstr.exe no specs cmd.exe no specs powershell.exe no specs find.exe no specs fltmc.exe no specs reg.exe no specs find.exe no specs powershell.exe no specs find.exe no specs cmd.exe no specs powershell.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs mode.com no specs powershell.exe no specs choice.exe no specs mode.com no specs powershell.exe no specs cmd.exe no specs ping.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs cmd.exe no specs reg.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs powershell.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs powershell.exe no specs cmd.exe no specs powershell.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs idman.exe timeout.exe no specs timeout.exe no specs timeout.exe no specs timeout.exe no specs timeout.exe no specs timeout.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs uninstall.exe no specs rundll32.exe runonce.exe no specs grpconv.exe no specs net.exe no specs net1.exe no specs timeout.exe no specs msedge.exe no specs msedge.exe no specs firefox.exe no specs firefox.exe no specs timeout.exe no specs idman.exe no specs timeout.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs timeout.exe no specs idman.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs timeout.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs timeout.exe no specs msedge.exe no specs tasklist.exe no specs findstr.exe no specs msedge.exe no specs msedge.exe no specs taskkill.exe no specs powershell.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs powershell.exe no specs powershell.exe no specs nsudo86x.exe no specs idman.exe msedge.exe no specs powershell.exe no specs msedge.exe no specs msedge.exe no specs iemonitor.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs mode.com no specs powershell.exe no specs choice.exe no specs mode.com no specs powershell.exe no specs choice.exe no specs mode.com no specs powershell.exe no specs choice.exe no specs mode.com no specs powershell.exe no specs choice.exe no specs mode.com no specs powershell.exe no specs choice.exe no specs mode.com no specs powershell.exe no specs choice.exe no specs mode.com no specs powershell.exe no specs choice.exe no specs mode.com no specs powershell.exe no specs choice.exe no specs mode.com no specs powershell.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
124"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3992.1.1088134197\516750012" -parentBuildID 20230710165010 -prefsHandle 1436 -prefMapHandle 1432 -prefsLen 28600 -prefMapSize 244195 -appDir "C:\Program Files\Mozilla Firefox\browser" - {591fa58d-073c-4ec5-9c4c-827c70c3ee61} 3992 "\\.\pipe\gecko-crash-server-pipe.3992" 1448 ef8d390 socketC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
115.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
312reg query HKU\S-1-5-21-1302019708-1500728564-335382590-1000\Software C:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
316powershell.exe "Get-WmiObject -Class Win32_ComputerSystem | Select-Object -Property CreationClassName" C:\Windows\System32\WindowsPowerShell\v1.0\powershell.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
368REG QUERY "HKLM\Hardware\Description\System\CentralProcessor\0" C:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
560"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3992.6.443800782\166689045" -childID 5 -isForBrowser -prefsHandle 4192 -prefMapHandle 4200 -prefsLen 29209 -prefMapSize 244195 -jsInitHandle 900 -jsInitLen 240908 -parentBuildID 20230710165010 -appDir "C:\Program Files\Mozilla Firefox\browser" - {90bba365-4515-47ee-bde5-d2000ed841dd} 3992 "\\.\pipe\gecko-crash-server-pipe.3992" 4176 18ba9280 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
115.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
580"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3992.21.1693671243\808594994" -childID 20 -isForBrowser -prefsHandle 7612 -prefMapHandle 7420 -prefsLen 31981 -prefMapSize 244195 -jsInitHandle 900 -jsInitLen 240908 -parentBuildID 20230710165010 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c5c85257-77c8-408f-94da-a6f880536e2b} 3992 "\\.\pipe\gecko-crash-server-pipe.3992" 7272 18b19e00 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
115.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
924powershell.exe "(Get-Date).ToString('yyyyMMdd-HHmmssfff')"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.14409.1005 (rs1_srvoob.161208-1155)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\atl.dll
c:\windows\system32\user32.dll
936"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1184 --field-trial-handle=1352,i,16578303349411664436,13538207998792407227,131072 /prefetch:2C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
956"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1220 --field-trial-handle=1284,i,8316670753150841619,10111295456082779758,131072 /prefetch:2C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
960"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3992.4.941802623\851853167" -childID 3 -isForBrowser -prefsHandle 3852 -prefMapHandle 3888 -prefsLen 29209 -prefMapSize 244195 -jsInitHandle 900 -jsInitLen 240908 -parentBuildID 20230710165010 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6e5087ac-e2f5-4d90-bd5a-0f0ef9d34305} 3992 "\\.\pipe\gecko-crash-server-pipe.3992" 3900 18ba9560 tabC:\Program Files\Mozilla Firefox\firefox.exefirefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
LOW
Description:
Firefox
Exit code:
0
Version:
115.0.2
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\msasn1.dll
c:\program files\mozilla firefox\msvcp140.dll
c:\program files\mozilla firefox\vcruntime140.dll
Total events
127 317
Read events
126 171
Write events
1 059
Delete events
87

Modification events

(PID) Process:(3976) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Launcher
Value:
FABEFBE200000000
(PID) Process:(3992) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Browser
Value:
1235FDE200000000
(PID) Process:(3992) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Installer\308046B0AF4A39CB
Operation:delete valueName:installer.taskbarpin.win10.enabled
Value:
(PID) Process:(3992) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Launcher
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Telemetry
Value:
0
(PID) Process:(3992) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\DllPrefetchExperiment
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe
Value:
0
(PID) Process:(3992) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\PreXULSkeletonUISettings
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Theme
Value:
1
(PID) Process:(3992) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\PreXULSkeletonUISettings
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe|Enabled
Value:
1
(PID) Process:(3992) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|DisableTelemetry
Value:
1
(PID) Process:(3992) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|DisableDefaultBrowserAgent
Value:
0
(PID) Process:(3992) firefox.exeKey:HKEY_CURRENT_USER\Software\Mozilla\Firefox\Default Browser Agent
Operation:writeName:C:\Program Files\Mozilla Firefox|SetDefaultBrowserUserChoice
Value:
1
Executable files
24
Suspicious files
502
Text files
153
Unknown types
35

Dropped files

PID
Process
Filename
Type
3992firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\scriptCache-current.bin
MD5:
SHA256:
3992firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\cookies.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
3992firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs-1.jstext
MD5:A4C0253717519EB0B07D5D8DD14F5D02
SHA256:115B88AA451EA9D5CD010C60DB4B97759E55ECE806CF6C4EBA737C6290C0D044
3992firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\sessionCheckpoints.json.tmpbinary
MD5:EA8B62857DFDBD3D0BE7D7E4A954EC9A
SHA256:792955295AE9C382986222C6731C5870BD0E921E7F7E34CC4615F5CD67F225DA
3992firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\qldyz51w.default\startupCache\urlCache-current.binbinary
MD5:04BADC0A17F546BBD91CC2404D2776D9
SHA256:54CD83D3031D15EA1F5B1C5D73416C0B2F9151F93E130DD525DDA488A8EB9110
3992firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\prefs.jstext
MD5:A4C0253717519EB0B07D5D8DD14F5D02
SHA256:115B88AA451EA9D5CD010C60DB4B97759E55ECE806CF6C4EBA737C6290C0D044
3992firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
3992firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
3992firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\storage\permanent\chrome\idb\2823318777ntouromlalnodry--naod.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
3992firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default\sessionCheckpoints.jsonbinary
MD5:EA8B62857DFDBD3D0BE7D7E4A954EC9A
SHA256:792955295AE9C382986222C6731C5870BD0E921E7F7E34CC4615F5CD67F225DA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
57
TCP/UDP connections
247
DNS requests
414
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3992
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/canonical.html
unknown
unknown
3992
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
unknown
3992
firefox.exe
POST
200
142.250.186.35:80
http://o.pki.goog/wr2
unknown
unknown
3992
firefox.exe
POST
200
142.250.186.35:80
http://o.pki.goog/wr2
unknown
unknown
3992
firefox.exe
POST
200
142.250.186.35:80
http://o.pki.goog/wr2
unknown
unknown
3992
firefox.exe
POST
142.250.186.35:80
http://o.pki.goog/wr2
unknown
unknown
3992
firefox.exe
POST
200
23.211.60.70:80
http://r3.o.lencr.org/
unknown
unknown
3992
firefox.exe
POST
200
23.211.60.70:80
http://r3.o.lencr.org/
unknown
unknown
3992
firefox.exe
POST
23.211.60.70:80
http://r3.o.lencr.org/
unknown
unknown
3992
firefox.exe
POST
200
142.250.186.35:80
http://o.pki.goog/wr2
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1088
svchost.exe
224.0.0.252:5355
unknown
3992
firefox.exe
188.114.96.3:443
www.crackingcity.com
CLOUDFLARENET
NL
unknown
3992
firefox.exe
34.107.243.93:443
push.services.mozilla.com
GOOGLE
US
unknown
3992
firefox.exe
142.250.185.74:443
safebrowsing.googleapis.com
whitelisted
3992
firefox.exe
34.107.221.82:80
detectportal.firefox.com
GOOGLE
US
whitelisted
3992
firefox.exe
142.250.186.35:80
o.pki.goog
GOOGLE
US
whitelisted
3992
firefox.exe
142.250.186.138:443
ajax.googleapis.com
whitelisted

DNS requests

Domain
IP
Reputation
www.crackingcity.com
  • 188.114.96.3
  • 188.114.97.3
  • 2a06:98c1:3121::3
  • 2a06:98c1:3120::3
unknown
detectportal.firefox.com
  • 34.107.221.82
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
example.org
  • 93.184.215.14
whitelisted
ipv4only.arpa
  • 192.0.0.170
  • 192.0.0.171
whitelisted
contile.services.mozilla.com
  • 34.117.188.166
whitelisted
spocs.getpocket.com
  • 34.117.188.166
shared
prod.ads.prod.webservices.mozgcp.net
  • 34.117.188.166
unknown
r3.o.lencr.org
  • 23.211.60.70
  • 23.211.60.74
shared
a1887.dscq.akamai.net
  • 23.211.60.70
  • 23.211.60.74
  • 2a02:26f0:3500:e::1732:835b
  • 2a02:26f0:3500:e::1732:834e
  • 2a02:26f0:3500:e::1732:834c
  • 2a02:26f0:3500:e::1732:8357
  • 2a02:26f0:3500:e::1732:8352
  • 2a02:26f0:3500:e::1732:8353
  • 2a02:26f0:3500:e::1732:834a
whitelisted

Threats

No threats detected
No debug info