URL:

https://wi1.fidelizare.com/clients/wlm/trks.php?C=1&mi=198471&list_id=5851&u=2815433&te=bWFnZGFsZW5hLWV1Z2VuaWEuc3RlZmFuZXNjdUBsZXJveW1lcmxpbi5ybw%3D%3D&server=2&eid=NTUxNzA3&ts=[[trg_ts]]

Full analysis: https://app.any.run/tasks/5c5909f7-88cd-4588-b448-1415fc93ee16
Verdict: No threats detected
Analysis date: September 04, 2020, 07:58:14
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
MD5:

C93FAFD7970F8E25858A8EFF83E75A46

SHA1:

C16CE4F8DFD3F80288E062734C9D44E7071158F4

SHA256:

EF7FA2BE30A47F4384E86050621EEBFCA09D52D955DC74112F9FF3FFE5CC748C

SSDEEP:

3:N8dUeEHJMu/6vVqNUstVXRuIQKpDaL/RXfVza8Q4nYUcQzRjjDpjffDwO/4:2rEHJMEQqntVXktGWJNzQ4nxzRpffDJ4

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Creates files in the user directory

      • opera.exe (PID: 3612)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
1
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start opera.exe

Process information

PID
CMD
Path
Indicators
Parent process
3612"C:\Program Files\Opera\opera.exe" "https://wi1.fidelizare.com/clients/wlm/trks.php?C=1&mi=198471&list_id=5851&u=2815433&te=bWFnZGFsZW5hLWV1Z2VuaWEuc3RlZmFuZXNjdUBsZXJveW1lcmxpbi5ybw%3D%3D&server=2&eid=NTUxNzA3&ts=[[trg_ts]]"C:\Program Files\Opera\opera.exe
explorer.exe
User:
admin
Company:
Opera Software
Integrity Level:
MEDIUM
Description:
Opera Internet Browser
Exit code:
0
Version:
1748
Modules
Images
c:\program files\opera\opera.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\psapi.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\rpcrt4.dll
Total events
289
Read events
228
Write events
61
Delete events
0

Modification events

(PID) Process:(3612) opera.exeKey:HKEY_CURRENT_USER\Software\Opera Software
Operation:writeName:Last CommandLine v2
Value:
C:\Program Files\Opera\opera.exe "https://wi1.fidelizare.com/clients/wlm/trks.php?C=1&mi=198471&list_id=5851&u=2815433&te=bWFnZGFsZW5hLWV1Z2VuaWEuc3RlZmFuZXNjdUBsZXJveW1lcmxpbi5ybw%3D%3D&server=2&eid=NTUxNzA3&ts=[[trg_ts]]"
(PID) Process:(3612) opera.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\139\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3612) opera.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\139\52C64B7E
Operation:writeName:@"%windir%\System32\ie4uinit.exe",-732
Value:
Finds and displays information and Web sites on the Internet.
Executable files
0
Suspicious files
18
Text files
10
Unknown types
0

Dropped files

PID
Process
Filename
Type
3612opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\sessions\opr296D.tmp
MD5:
SHA256:
3612opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\opr296E.tmp
MD5:
SHA256:
3612opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\opr29AD.tmp
MD5:
SHA256:
3612opera.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\JB7XQN6OM1D44R3OXCNE.temp
MD5:
SHA256:
3612opera.exeC:\Users\admin\AppData\Local\Opera\Opera\cache\sesn\opr00002.tmp
MD5:
SHA256:
3612opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\sessions\oprAE40.tmp
MD5:
SHA256:
3612opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\sessions\oprBA18.tmp
MD5:
SHA256:
3612opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\operaprefs.initext
MD5:
SHA256:
3612opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\opssl6.datbinary
MD5:
SHA256:
3612opera.exeC:\Users\admin\AppData\Roaming\Opera\Opera\tasks.xmlxml
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
17
DNS requests
11
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3612
opera.exe
GET
200
216.58.205.227:80
http://crl.pki.goog/gsr2/gsr2.crl
US
der
950 b
whitelisted
3612
opera.exe
GET
200
172.217.18.163:80
http://ocsp.pki.goog/gts1o1core/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCED69XSno9BaUCAAAAABUygo%3D
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3612
opera.exe
89.234.10.20:443
wi1.fidelizare.com
Rackspace Ltd.
GB
unknown
3612
opera.exe
82.145.216.16:443
sitecheck2.opera.com
Opera Software AS
suspicious
3612
opera.exe
185.26.182.93:443
certs.opera.com
Opera Software AS
whitelisted
3612
opera.exe
93.184.220.29:80
crl4.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
3612
opera.exe
185.26.182.94:443
certs.opera.com
Opera Software AS
whitelisted
3612
opera.exe
172.217.22.38:443
ad.doubleclick.net
Google Inc.
US
whitelisted
3612
opera.exe
172.217.18.163:80
ocsp.pki.goog
Google Inc.
US
whitelisted
3612
opera.exe
216.58.205.227:80
crl.pki.goog
Google Inc.
US
whitelisted
3612
opera.exe
143.204.201.107:443
www.dacia.ro
US
suspicious

DNS requests

Domain
IP
Reputation
wi1.fidelizare.com
  • 89.234.10.20
unknown
sitecheck2.opera.com
  • 82.145.216.16
  • 82.145.216.15
whitelisted
certs.opera.com
  • 185.26.182.93
  • 185.26.182.94
whitelisted
crl4.digicert.com
  • 93.184.220.29
whitelisted
cdp.rapidssl.com
  • 93.184.220.29
whitelisted
crl3.digicert.com
  • 93.184.220.29
whitelisted
status.rapidssl.com
  • 93.184.220.29
shared
ad.doubleclick.net
  • 172.217.22.38
whitelisted
crl.pki.goog
  • 216.58.205.227
whitelisted
ocsp.pki.goog
  • 172.217.18.163
whitelisted

Threats

PID
Process
Class
Message
Generic Protocol Command Decode
SURICATA Applayer Detect protocol only one direction
No debug info