File name:

VictorKill.exe

Full analysis: https://app.any.run/tasks/625f71b1-577e-4e0b-805d-3ca1317210b9
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: April 25, 2025, 04:42:28
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
loader
sfx
dropper
inno
installer
delphi
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, RAR self-extracting archive, 4 sections
MD5:

F70B7BE648112F6427156F72972DB9EC

SHA1:

6B37519A32115F1C78344A1BE36FDF6D9C11E0D6

SHA256:

F080DF95B2F046184FE6BCD96DE8B9CCE820ECD35E30F4F831551157E76FEA2A

SSDEEP:

786432:hgATYBuLDHIF9j3gXYPfYLjrw36F3mJ52gh+RmW:hVTYBuLEF953Yfrw36UJ52d8W

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • msagent.exe (PID: 5408)
      • spchcpl.exe (PID: 7668)
      • tv_enua.exe (PID: 7980)
      • Flash.exe (PID: 3884)
      • optimize.exe (PID: 3804)
      • optimize.exe (PID: 5364)
    • Registers / Runs the DLL via REGSVR32.EXE

      • mash_full_setup.exe.tmp (PID: 6660)
      • tv_enua.exe (PID: 7980)
      • msagent.exe (PID: 5408)
    • SFX dropper has been detected

      • VictorKill.exe (PID: 5392)
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • VictorKill.exe (PID: 5392)
    • Reads security settings of Internet Explorer

      • VictorKill.exe (PID: 5392)
      • mash_full_setup.exe.tmp (PID: 7736)
    • Reads Internet Explorer settings

      • VictorKill.exe (PID: 5392)
    • Potential Corporate Privacy Violation

      • firefox.exe (PID: 1676)
    • There is functionality for taking screenshot (YARA)

      • VictorKill.exe (PID: 5392)
    • Executable content was dropped or overwritten

      • mash_full_setup.exe (PID: 4224)
      • mash_full_setup.exe.tmp (PID: 6660)
      • mash_full_setup.exe (PID: 2852)
      • tv_enua.exe (PID: 7980)
      • spchcpl.exe (PID: 7668)
      • msagent.exe (PID: 5408)
      • SPCHAPI.EXE (PID: 4448)
      • VictorKill.exe (PID: 5576)
      • WindowsUpdate.exe (PID: 6752)
      • LimePro.exe (PID: 7768)
    • Process drops legitimate windows executable

      • mash_full_setup.exe.tmp (PID: 6660)
      • spchcpl.exe (PID: 7668)
      • SPCHAPI.EXE (PID: 4448)
      • msagent.exe (PID: 5408)
      • tv_enua.exe (PID: 7980)
      • VictorKill.exe (PID: 5576)
      • WindowsUpdate.exe (PID: 6752)
    • Reads the Windows owner or organization settings

      • mash_full_setup.exe.tmp (PID: 6660)
    • Starts a Microsoft application from unusual location

      • msagent.exe (PID: 5408)
      • spchcpl.exe (PID: 7668)
      • SPCHAPI.EXE (PID: 4448)
      • tv_enua.exe (PID: 7980)
    • Creates/Modifies COM task schedule object

      • regsvr32.exe (PID: 456)
      • regsvr32.exe (PID: 3304)
      • regsvr32.exe (PID: 6416)
      • regsvr32.exe (PID: 5736)
    • Application launched itself

      • VictorKill.exe (PID: 5392)
      • LimePro.exe (PID: 7768)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 7984)
    • Process requests binary or script from the Internet

      • optimize.exe (PID: 5364)
  • INFO

    • Checks supported languages

      • VictorKill.exe (PID: 5392)
      • mash_full_setup.exe.tmp (PID: 7736)
      • mash_full_setup.exe (PID: 4224)
      • mash_full_setup.exe (PID: 2852)
      • mash_full_setup.exe.tmp (PID: 6660)
      • msagent.exe (PID: 5408)
    • Reads the computer name

      • VictorKill.exe (PID: 5392)
      • mash_full_setup.exe.tmp (PID: 7736)
      • mash_full_setup.exe.tmp (PID: 6660)
    • Application launched itself

      • firefox.exe (PID: 1616)
      • firefox.exe (PID: 1676)
    • Manual execution by a user

      • firefox.exe (PID: 1616)
      • WindowsUpdate.exe (PID: 5988)
      • VictorKill.exe (PID: 7576)
      • WindowsUpdate.exe (PID: 6752)
      • vlc.exe (PID: 6192)
      • Pingu.exe (PID: 5308)
      • vlc.exe (PID: 5232)
      • Pingu.exe (PID: 7416)
      • Pingu.exe (PID: 1748)
      • cmd.exe (PID: 7956)
      • Pingu.exe (PID: 6560)
      • Dogpc.exe (PID: 7948)
      • clippy.exe (PID: 1180)
      • Flash.exe (PID: 3884)
      • clippy.exe (PID: 4208)
      • cmd.exe (PID: 7984)
      • Dogpc.exe (PID: 7440)
      • clippy.exe (PID: 5960)
      • clippy.exe (PID: 7652)
      • MASHPlay.exe (PID: 7592)
      • optimize.exe (PID: 3804)
      • LimePro.exe (PID: 7768)
      • cmd.exe (PID: 7628)
      • MASHPlay.exe (PID: 7544)
      • vlc.exe (PID: 7836)
      • cmd.exe (PID: 5780)
      • MASHPlay.exe (PID: 2596)
      • Pingu.exe (PID: 7236)
      • optimize.exe (PID: 5364)
    • The sample compiled with english language support

      • firefox.exe (PID: 1676)
      • mash_full_setup.exe (PID: 4224)
      • mash_full_setup.exe.tmp (PID: 6660)
      • mash_full_setup.exe (PID: 2852)
      • tv_enua.exe (PID: 7980)
      • SPCHAPI.EXE (PID: 4448)
      • spchcpl.exe (PID: 7668)
      • msagent.exe (PID: 5408)
      • VictorKill.exe (PID: 5576)
      • WindowsUpdate.exe (PID: 6752)
    • Checks proxy server information

      • VictorKill.exe (PID: 5392)
    • Executable content was dropped or overwritten

      • firefox.exe (PID: 1676)
    • Create files in a temporary directory

      • mash_full_setup.exe (PID: 4224)
      • mash_full_setup.exe.tmp (PID: 6660)
      • mash_full_setup.exe (PID: 2852)
      • msagent.exe (PID: 5408)
    • Process checks computer location settings

      • mash_full_setup.exe.tmp (PID: 7736)
    • Creates files in the program directory

      • mash_full_setup.exe.tmp (PID: 6660)
    • Creates a software uninstall entry

      • mash_full_setup.exe.tmp (PID: 6660)
    • Reads mouse settings

      • regsvr32.exe (PID: 5736)
    • Detects InnoSetup installer (YARA)

      • mash_full_setup.exe (PID: 4224)
      • mash_full_setup.exe.tmp (PID: 7736)
    • Compiled with Borland Delphi (YARA)

      • mash_full_setup.exe.tmp (PID: 7736)
    • The sample compiled with german language support

      • VictorKill.exe (PID: 5576)
      • WindowsUpdate.exe (PID: 6752)
    • The sample compiled with polish language support

      • WindowsUpdate.exe (PID: 6752)
    • The sample compiled with turkish language support

      • WindowsUpdate.exe (PID: 6752)
    • The sample compiled with swedish language support

      • WindowsUpdate.exe (PID: 6752)
    • The sample compiled with chinese language support

      • WindowsUpdate.exe (PID: 6752)
    • The sample compiled with czech language support

      • WindowsUpdate.exe (PID: 6752)
    • The sample compiled with japanese language support

      • WindowsUpdate.exe (PID: 6752)
    • The sample compiled with korean language support

      • WindowsUpdate.exe (PID: 6752)
    • The sample compiled with spanish language support

      • WindowsUpdate.exe (PID: 6752)
    • The sample compiled with arabic language support

      • WindowsUpdate.exe (PID: 6752)
    • The sample compiled with french language support

      • WindowsUpdate.exe (PID: 6752)
    • The sample compiled with russian language support

      • WindowsUpdate.exe (PID: 6752)
    • The sample compiled with portuguese language support

      • WindowsUpdate.exe (PID: 6752)
    • The sample compiled with Italian language support

      • WindowsUpdate.exe (PID: 6752)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2016:01:20 18:59:36+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 9
CodeSize: 169984
InitializedDataSize: 50176
UninitializedDataSize: -
EntryPoint: 0x1e64b
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
228
Monitored processes
97
Malicious processes
10
Suspicious processes
6

Behavior graph

Click at the process to see the details
start #DROPPER victorkill.exe no specs firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs mash_full_setup.exe mash_full_setup.exe.tmp no specs mash_full_setup.exe mash_full_setup.exe.tmp regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs slui.exe regsvr32.exe no specs msagent.exe regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs agentsvr.exe no specs grpconv.exe no specs tv_enua.exe regsvr32.exe no specs regsvr32.exe no specs grpconv.exe no specs spchcpl.exe spchapi.exe grpconv.exe no specs grpconv.exe no specs victorkill.exe victor.exe no specs agentsvr.exe no specs rundll32.exe no specs victorkill.exe victor.exe no specs agentsvr.exe no specs windowsupdate.exe no specs windowsupdate.exe wusetup.exe no specs pingu.exe no specs vlc.exe no specs vlc.exe no specs pingu.exe no specs pingu.exe no specs pingu.exe no specs pingu.exe no specs cmd.exe no specs conhost.exe no specs dogpc.exe no specs agentsvr.exe no specs dogpc.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs clippy.exe no specs clippy.exe no specs cmd.exe no specs conhost.exe no specs clippy.exe no specs clippy.exe no specs mashplay.exe no specs flash.exe no specs limepro.exe limepro.exe no specs optimize.exe no specs optimize.exe mashplay.exe no specs mashplay.exe no specs vlc.exe no specs cmd.exe no specs conhost.exe no specs wmplayer.exe no specs setup_wm.exe no specs unregmp2.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
456"C:\WINDOWS\system32\regsvr32.exe" /s "C:\WINDOWS\system32\MSVBVM60.dll"C:\Windows\SysWOW64\regsvr32.exemash_full_setup.exe.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
732C:\WINDOWS\msagent\AgentSvr.exe -EmbeddingC:\Windows\MSAGENT\AgentSvr.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Agent Server
Version:
2.00.0.2202
Modules
Images
c:\windows\msagent\agentsvr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
1180"C:\victor\clippy.exe" C:\victor\clippy.exeexplorer.exe
User:
admin
Company:
RJL Software, Inc.
Integrity Level:
MEDIUM
Description:
Simulates an annoying clippy help assistant
Version:
1.0.0.0
Modules
Images
c:\victor\clippy.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
1300regsvr32 /s C:\WINDOWS\lhsp\tv\tv_enua.dllC:\Windows\SysWOW64\regsvr32.exetv_enua.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
1616"C:\Program Files\Mozilla Firefox\firefox.exe" C:\Program Files\Mozilla Firefox\firefox.exeexplorer.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
123.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\program files\mozilla firefox\vcruntime140.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\bcrypt.dll
c:\program files\mozilla firefox\msvcp140.dll
1676"C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe
firefox.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
123.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\msvcp140.dll
c:\windows\system32\vcruntime140.dll
1748regsvr32 /s "C:\WINDOWS\msagent\AgentCtl.dll"C:\Windows\SysWOW64\regsvr32.exemsagent.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
1748"C:\victor\Pingu.exe" C:\victor\Pingu.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Pingu MFC Application
Version:
1, 0, 0, 1
Modules
Images
c:\victor\pingu.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\user32.dll
2084reg add "HKCU\control panel\desktop" /v wallpaper /t REG_SZ /d "C:\victor\wanw.png" /f C:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ws2_32.dll
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
Total events
34 685
Read events
34 129
Write events
459
Delete events
97

Modification events

(PID) Process:(5392) VictorKill.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(5392) VictorKill.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(5392) VictorKill.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(1676) firefox.exeKey:HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\DllPrefetchExperiment
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe
Value:
0
(PID) Process:(1676) firefox.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
(PID) Process:(3304) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F9043C85-F6F2-101A-A3C9-08002B2F49FB}
Operation:delete keyName:(default)
Value:
(PID) Process:(3304) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F9043C85-F6F2-101A-A3C9-08002B2F49FB}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Apartment
(PID) Process:(3304) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7629CFA2-3FE5-101B-A3C9-08002B2F49FB}
Operation:delete keyName:(default)
Value:
(PID) Process:(3304) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7629CFA2-3FE5-101B-A3C9-08002B2F49FB}\InprocServer32
Operation:delete valueName:ThreadingModel
Value:
(PID) Process:(3304) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7629CFA4-3FE5-101B-A3C9-08002B2F49FB}
Operation:delete keyName:(default)
Value:
Executable files
318
Suspicious files
373
Text files
148
Unknown types
3

Dropped files

PID
Process
Filename
Type
1676firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\9kie7cg6.default-release\startupCache\scriptCache-current.bin
MD5:
SHA256:
1676firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\cert9.db-journalbinary
MD5:94B06CB7824AD49B228484ED0F42431A
SHA256:4587E5817E75CEE923AFCF248F1D4910BC5A4CB5BACE029E5FA8847A6AA36525
1676firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
1676firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
1676firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\cert9.dbbinary
MD5:8EF360BB3E8D26D8A309137F53ED4591
SHA256:47004B3F8A7AD7B77304196B29A2B640C61E3B69CE8A152FF453EEB6027C4496
1676firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
MD5:
SHA256:
1676firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\datareporting\glean\db\data.safe.tmpbinary
MD5:4006DDC2918B16C7EF5516C58373842B
SHA256:269EA23B77EDE0874628BD8611BCC5A3E87E0C44CA8A821C0D028B929D4F468F
1676firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\storage\permanent\chrome\idb\2918063365piupsah.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
1676firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
1676firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\sessionCheckpoints.json.tmpbinary
MD5:EA8B62857DFDBD3D0BE7D7E4A954EC9A
SHA256:792955295AE9C382986222C6731C5870BD0E921E7F7E34CC4615F5CD67F225DA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
284
TCP/UDP connections
208
DNS requests
247
Threats
6

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1676
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
whitelisted
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1676
firefox.exe
POST
200
142.250.185.227:80
http://o.pki.goog/s/wr3/FIY
unknown
whitelisted
1676
firefox.exe
POST
200
95.101.54.131:80
http://r11.o.lencr.org/
unknown
whitelisted
GET
200
2.16.164.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1676
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/canonical.html
unknown
whitelisted
1676
firefox.exe
POST
200
95.101.54.131:80
http://r11.o.lencr.org/
unknown
whitelisted
1676
firefox.exe
POST
200
2.16.202.121:80
http://r10.o.lencr.org/
unknown
whitelisted
1676
firefox.exe
POST
200
142.250.185.227:80
http://o.pki.goog/we2
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
2.16.164.120:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
23.219.150.101:80
www.microsoft.com
AKAMAI-AS
CL
whitelisted
4
System
192.168.100.255:138
whitelisted
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.160.64:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1676
firefox.exe
34.36.137.203:443
contile.services.mozilla.com
whitelisted
1676
firefox.exe
34.107.221.82:80
detectportal.firefox.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 2.16.164.120
  • 2.16.164.49
whitelisted
www.microsoft.com
  • 23.219.150.101
  • 2.23.181.156
whitelisted
google.com
  • 142.250.184.206
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 20.190.160.64
  • 20.190.160.22
  • 40.126.32.138
  • 40.126.32.76
  • 20.190.160.67
  • 40.126.32.72
  • 40.126.32.74
  • 20.190.160.131
whitelisted
ocsp.digicert.com
  • 2.23.77.188
  • 23.63.118.230
whitelisted
detectportal.firefox.com
  • 34.107.221.82
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
contile.services.mozilla.com
  • 34.36.137.203
whitelisted

Threats

PID
Process
Class
Message
1676
firefox.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
1676
firefox.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
5364
optimize.exe
Misc activity
ET INFO Observed ZeroSSL SSL/TLS Certificate
2196
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] BootstrapCDN (maxcdn .bootstrapcdn .com)
5364
optimize.exe
A Network Trojan was detected
ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
5364
optimize.exe
A Network Trojan was detected
ET MALWARE Potential Dridex.Maldoc Minimal Executable Request
No debug info