URL:

ublockorigin.com

Full analysis: https://app.any.run/tasks/696b0346-853a-4f37-861d-17cc67a02f67
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: January 21, 2025, 20:26:14
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-scr
arch-doc
arch-html
stealer
Indicators:
MD5:

3DF315B2FF6059C9EBEE5A51CA60291F

SHA1:

77E3852FECFF560B5BA3D0458A1D4D6A5E83F760

SHA256:

F58FD4CB2C558E19CAA8A50995FDF35545DCC5BF042162C8A4C3DE6F3BA38B97

SSDEEP:

3:SJMQK2:SW12

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Registers / Runs the DLL via REGSVR32.EXE

      • IDMan.exe (PID: 3220)
      • IDM1.tmp (PID: 7520)
      • Uninstall.exe (PID: 8000)
      • IDMan.exe (PID: 6276)
    • Adds path to the Windows Defender exclusion list

      • cmd.exe (PID: 3288)
    • Starts NET.EXE for service management

      • Uninstall.exe (PID: 8000)
      • net.exe (PID: 1400)
    • Changes the autorun value in the registry

      • IDMan.exe (PID: 3220)
    • Execute application with conhost.exe as parent process

      • powershell.exe (PID: 7532)
    • Adds process to the Windows Defender exclusion list

      • cmd.exe (PID: 3288)
    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 3288)
    • Actions looks like stealing of personal data

      • IDMan.exe (PID: 6276)
      • IDMan.exe (PID: 1016)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 3552)
      • IDM1.tmp (PID: 7520)
      • IDMan.exe (PID: 3220)
      • IDM 6.xx Activator or Resetter v3.3.exe (PID: 7192)
      • Uninstall.exe (PID: 8000)
      • IDMan.exe (PID: 6276)
      • IDMan.exe (PID: 3828)
      • IDMan.exe (PID: 1016)
    • Application launched itself

      • WinRAR.exe (PID: 3552)
      • cmd.exe (PID: 7500)
      • cmd.exe (PID: 7464)
      • cmd.exe (PID: 5464)
      • cmd.exe (PID: 5588)
    • Starts application with an unusual extension

      • idman642build26.exe (PID: 1796)
    • Creates a software uninstall entry

      • IDM1.tmp (PID: 7520)
    • Creates/Modifies COM task schedule object

      • IDM1.tmp (PID: 7520)
      • regsvr32.exe (PID: 5008)
      • IDMan.exe (PID: 3220)
      • regsvr32.exe (PID: 2008)
      • regsvr32.exe (PID: 6880)
      • regsvr32.exe (PID: 5392)
      • regsvr32.exe (PID: 1944)
      • regsvr32.exe (PID: 4624)
      • regsvr32.exe (PID: 5992)
      • regsvr32.exe (PID: 2632)
      • regsvr32.exe (PID: 7060)
      • IDMan.exe (PID: 6276)
      • regsvr32.exe (PID: 6596)
      • regsvr32.exe (PID: 6456)
      • regsvr32.exe (PID: 6632)
      • regsvr32.exe (PID: 6560)
      • regsvr32.exe (PID: 6716)
      • IDMIntegrator64.exe (PID: 1172)
    • The process creates files with name similar to system file names

      • IDM1.tmp (PID: 7520)
    • Checks Windows Trust Settings

      • IDMan.exe (PID: 3220)
      • drvinst.exe (PID: 5720)
      • IDMan.exe (PID: 6276)
      • IDMan.exe (PID: 3828)
      • IDMan.exe (PID: 1016)
    • Executable content was dropped or overwritten

      • IDM 6.xx Activator or Resetter v3.3.exe (PID: 7192)
      • 7za.exe (PID: 3896)
      • IDMan.exe (PID: 3220)
      • rundll32.exe (PID: 8076)
      • drvinst.exe (PID: 5720)
      • 7za.exe (PID: 5320)
    • Drops 7-zip archiver for unpacking

      • IDM 6.xx Activator or Resetter v3.3.exe (PID: 7192)
    • The executable file from the user directory is run by the CMD process

      • 7za.exe (PID: 6640)
      • 7za.exe (PID: 488)
      • 7za.exe (PID: 3896)
      • 7za.exe (PID: 5780)
      • 7za.exe (PID: 6704)
      • 7za.exe (PID: 5320)
      • NSudo86x.exe (PID: 3692)
    • Uses ATTRIB.EXE to modify file attributes

      • cmd.exe (PID: 3364)
      • cmd.exe (PID: 3288)
    • Executing commands from a ".bat" file

      • cmd.exe (PID: 8164)
      • IDM 6.xx Activator or Resetter v3.3.exe (PID: 7192)
      • powershell.exe (PID: 7532)
    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 8164)
      • IDM 6.xx Activator or Resetter v3.3.exe (PID: 7192)
      • cmd.exe (PID: 7464)
      • cmd.exe (PID: 7500)
      • cmd.exe (PID: 5588)
      • cmd.exe (PID: 5464)
      • powershell.exe (PID: 7532)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 3288)
      • cmd.exe (PID: 7500)
      • conhost.exe (PID: 4872)
      • cmd.exe (PID: 5588)
      • cmd.exe (PID: 6736)
      • cmd.exe (PID: 4328)
      • cmd.exe (PID: 7588)
    • Windows service management via SC.EXE

      • sc.exe (PID: 7412)
      • sc.exe (PID: 7228)
    • Starts SC.EXE for service management

      • cmd.exe (PID: 7500)
      • cmd.exe (PID: 5588)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 7500)
      • cmd.exe (PID: 5588)
    • Script adds exclusion path to Windows Defender

      • cmd.exe (PID: 3288)
    • Possibly malicious use of IEX has been detected

      • cmd.exe (PID: 7500)
      • cmd.exe (PID: 5588)
    • Probably obfuscated PowerShell command line is found

      • cmd.exe (PID: 7500)
      • cmd.exe (PID: 5588)
      • cmd.exe (PID: 7588)
    • Uses RUNDLL32.EXE to load library

      • Uninstall.exe (PID: 8000)
    • Drops a system driver (possible attempt to evade defenses)

      • rundll32.exe (PID: 8076)
      • drvinst.exe (PID: 5720)
      • 7za.exe (PID: 5320)
    • Creates files in the driver directory

      • drvinst.exe (PID: 5720)
    • Creates or modifies Windows services

      • drvinst.exe (PID: 2996)
      • Uninstall.exe (PID: 8000)
    • Script adds exclusion process to Windows Defender

      • cmd.exe (PID: 3288)
    • Hides command output

      • cmd.exe (PID: 6736)
      • cmd.exe (PID: 6364)
      • cmd.exe (PID: 8184)
      • cmd.exe (PID: 4944)
      • cmd.exe (PID: 7588)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 5588)
      • cmd.exe (PID: 6364)
      • cmd.exe (PID: 4944)
    • Process drops legitimate windows executable

      • 7za.exe (PID: 5320)
    • Get information on the list of running processes

      • cmd.exe (PID: 5588)
    • Uses TIMEOUT.EXE to delay execution

      • cmd.exe (PID: 5588)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 5588)
  • INFO

    • Manual execution by a user

      • WinRAR.exe (PID: 3552)
      • idman642build26.exe (PID: 5548)
      • idman642build26.exe (PID: 1796)
      • IDM 6.xx Activator or Resetter v3.3.exe (PID: 7192)
      • IDM 6.xx Activator or Resetter v3.3.exe (PID: 512)
      • firefox.exe (PID: 7080)
      • msedge.exe (PID: 7720)
    • The process uses the downloaded file

      • firefox.exe (PID: 5208)
      • WinRAR.exe (PID: 5200)
      • WinRAR.exe (PID: 3552)
      • IDM1.tmp (PID: 7520)
      • IDMan.exe (PID: 3220)
      • IDM 6.xx Activator or Resetter v3.3.exe (PID: 7192)
      • runonce.exe (PID: 2548)
      • Uninstall.exe (PID: 8000)
      • powershell.exe (PID: 7280)
      • powershell.exe (PID: 6296)
      • powershell.exe (PID: 1400)
      • powershell.exe (PID: 5972)
      • IDMan.exe (PID: 6276)
    • Local mutex for internet shortcut management

      • WinRAR.exe (PID: 3552)
    • Application launched itself

      • firefox.exe (PID: 716)
      • firefox.exe (PID: 5208)
      • firefox.exe (PID: 7628)
      • firefox.exe (PID: 7080)
      • msedge.exe (PID: 3260)
      • msedge.exe (PID: 7720)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3552)
      • WinRAR.exe (PID: 5200)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 3552)
      • IDM 6.xx Activator or Resetter v3.3.exe (PID: 7192)
      • IDMan.exe (PID: 3220)
      • rundll32.exe (PID: 8076)
      • drvinst.exe (PID: 5720)
    • Checks supported languages

      • idman642build26.exe (PID: 1796)
      • idmBroker.exe (PID: 8004)
      • IDM1.tmp (PID: 7520)
      • IDMan.exe (PID: 3220)
      • IDM 6.xx Activator or Resetter v3.3.exe (PID: 7192)
      • 7za.exe (PID: 488)
      • 7za.exe (PID: 6640)
      • 7za.exe (PID: 3896)
      • 7za.exe (PID: 5780)
      • 7za.exe (PID: 6704)
      • Uninstall.exe (PID: 8000)
      • drvinst.exe (PID: 5720)
      • drvinst.exe (PID: 2996)
      • MediumILStart.exe (PID: 2040)
      • 7za.exe (PID: 5320)
      • mode.com (PID: 7808)
      • IDMIntegrator64.exe (PID: 1172)
      • IDMan.exe (PID: 6276)
      • NSudo86x.exe (PID: 3692)
      • IDMan.exe (PID: 1016)
      • IDMan.exe (PID: 3828)
      • IDMan.exe (PID: 8100)
    • Reads the computer name

      • IDM1.tmp (PID: 7520)
      • idmBroker.exe (PID: 8004)
      • IDMan.exe (PID: 3220)
      • IDM 6.xx Activator or Resetter v3.3.exe (PID: 7192)
      • 7za.exe (PID: 6640)
      • 7za.exe (PID: 488)
      • 7za.exe (PID: 3896)
      • 7za.exe (PID: 5780)
      • 7za.exe (PID: 6704)
      • Uninstall.exe (PID: 8000)
      • drvinst.exe (PID: 2996)
      • MediumILStart.exe (PID: 2040)
      • 7za.exe (PID: 5320)
      • IDMIntegrator64.exe (PID: 1172)
      • IDMan.exe (PID: 8100)
      • NSudo86x.exe (PID: 3692)
      • IDMan.exe (PID: 3828)
    • Creates files in the program directory

      • IDM1.tmp (PID: 7520)
      • IDMan.exe (PID: 3220)
    • Create files in a temporary directory

      • idman642build26.exe (PID: 1796)
      • IDM1.tmp (PID: 7520)
      • IDMan.exe (PID: 3220)
      • IDM 6.xx Activator or Resetter v3.3.exe (PID: 7192)
      • 7za.exe (PID: 6640)
      • 7za.exe (PID: 488)
      • 7za.exe (PID: 3896)
      • rundll32.exe (PID: 8076)
      • IDMan.exe (PID: 6276)
    • Creates files or folders in the user directory

      • IDM1.tmp (PID: 7520)
      • IDMan.exe (PID: 3220)
      • IDMan.exe (PID: 6276)
      • IDMan.exe (PID: 1016)
    • Process checks computer location settings

      • IDM1.tmp (PID: 7520)
      • IDMan.exe (PID: 3220)
      • IDM 6.xx Activator or Resetter v3.3.exe (PID: 7192)
      • Uninstall.exe (PID: 8000)
      • IDMan.exe (PID: 6276)
    • Reads the machine GUID from the registry

      • IDMan.exe (PID: 3220)
      • drvinst.exe (PID: 5720)
      • IDMan.exe (PID: 6276)
      • IDMan.exe (PID: 3828)
      • IDMan.exe (PID: 1016)
    • Disables trace logs

      • IDMan.exe (PID: 3220)
      • IDMan.exe (PID: 3828)
      • IDMan.exe (PID: 8100)
      • IDMan.exe (PID: 1016)
    • Reads the software policy settings

      • IDMan.exe (PID: 3220)
      • drvinst.exe (PID: 5720)
      • IDMan.exe (PID: 1016)
      • IDMan.exe (PID: 3828)
    • Checks proxy server information

      • IDMan.exe (PID: 3220)
      • powershell.exe (PID: 6800)
      • IDMan.exe (PID: 6276)
    • Checks operating system version

      • cmd.exe (PID: 7500)
      • cmd.exe (PID: 5588)
    • Reads security settings of Internet Explorer

      • runonce.exe (PID: 2548)
    • Reads the time zone

      • runonce.exe (PID: 2548)
    • Gets a random number, or selects objects randomly from a collection (POWERSHELL)

      • powershell.exe (PID: 6220)
      • powershell.exe (PID: 8068)
      • powershell.exe (PID: 7348)
      • powershell.exe (PID: 7284)
    • Converts byte array into ASCII string (POWERSHELL)

      • powershell.exe (PID: 6220)
      • powershell.exe (PID: 8068)
      • powershell.exe (PID: 7348)
      • powershell.exe (PID: 7284)
    • Checks whether the specified file exists (POWERSHELL)

      • powershell.exe (PID: 6220)
      • powershell.exe (PID: 8068)
      • powershell.exe (PID: 7348)
      • powershell.exe (PID: 7284)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 7280)
      • powershell.exe (PID: 6296)
      • powershell.exe (PID: 1400)
      • powershell.exe (PID: 5972)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 7280)
      • powershell.exe (PID: 6296)
      • powershell.exe (PID: 1400)
      • powershell.exe (PID: 5972)
    • Starts MODE.COM to configure console settings

      • mode.com (PID: 7328)
      • mode.com (PID: 7808)
    • The sample compiled with japanese language support

      • 7za.exe (PID: 5320)
    • Process checks whether UAC notifications are on

      • IDMan.exe (PID: 6276)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
401
Monitored processes
262
Malicious processes
15
Suspicious processes
8

Behavior graph

Click at the process to see the details
start firefox.exe no specs firefox.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs winrar.exe winrar.exe idman642build26.exe no specs idman642build26.exe idm1.tmp no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs idmbroker.exe no specs idman.exe regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs idm 6.xx activator or resetter v3.3.exe no specs idm 6.xx activator or resetter v3.3.exe cmd.exe no specs conhost.exe no specs attrib.exe no specs 7za.exe no specs 7za.exe no specs 7za.exe 7za.exe no specs 7za.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs reg.exe no specs find.exe no specs reg.exe no specs find.exe no specs cmd.exe no specs conhost.exe no specs attrib.exe no specs powershell.exe no specs sc.exe no specs find.exe no specs findstr.exe no specs cmd.exe no specs reg.exe no specs find.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs powershell.exe no specs find.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe uninstall.exe no specs rundll32.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs drvinst.exe firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs firefox.exe no specs drvinst.exe no specs runonce.exe no specs grpconv.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs regsvr32.exe no specs regsvr32.exe no specs firefox.exe no specs mediumilstart.exe no specs regsvr32.exe no specs fltmc.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs sc.exe no specs find.exe no specs findstr.exe no specs cmd.exe no specs reg.exe no specs find.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs powershell.exe no specs find.exe no specs powershell.exe no specs fltmc.exe no specs powershell.exe no specs find.exe no specs powershell.exe no specs cmd.exe no specs powershell.exe no specs powershell.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs mode.com no specs choice.exe no specs powershell.exe 7za.exe schtasks.exe no specs mode.com no specs powershell.exe no specs cmd.exe no specs ping.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs cmd.exe no specs reg.exe no specs tasklist.exe no specs findstr.exe no specs cmd.exe no specs powershell.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs powershell.exe no specs cmd.exe no specs powershell.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs idman.exe timeout.exe no specs regsvr32.exe no specs idmintegrator64.exe no specs regsvr32.exe no specs timeout.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs timeout.exe no specs idman.exe no specs timeout.exe no specs timeout.exe no specs idman.exe no specs timeout.exe no specs timeout.exe no specs timeout.exe no specs tasklist.exe no specs findstr.exe no specs taskkill.exe no specs powershell.exe no specs nsudo86x.exe no specs idman.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
4887za e files.tmp -ptmp@tmp420 -aoa IDM.batC:\Users\admin\AppData\Local\Temp\ytmp\7za.execmd.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
HIGH
Description:
7-Zip Standalone Console
Exit code:
0
Version:
16.04
Modules
Images
c:\users\admin\appdata\local\temp\ytmp\7za.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
512"C:\Users\admin\Desktop\IDM 6.xx Activator or Resetter v3.3.exe" C:\Users\admin\Desktop\IDM 6.xx Activator or Resetter v3.3.exeexplorer.exe
User:
admin
Company:
CrackingCity.com
Integrity Level:
MEDIUM
Description:
IDM 6.xx Activator or Resetter
Exit code:
3221226540
Version:
3.3.0.0
Modules
Images
c:\users\admin\desktop\idm 6.xx activator or resetter v3.3.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
716"C:\Program Files\Mozilla Firefox\firefox.exe" "ublockorigin.com"C:\Program Files\Mozilla Firefox\firefox.exeexplorer.exe
User:
admin
Company:
Mozilla Corporation
Integrity Level:
MEDIUM
Description:
Firefox
Exit code:
0
Version:
123.0
Modules
Images
c:\program files\mozilla firefox\firefox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\program files\mozilla firefox\mozglue.dll
c:\program files\mozilla firefox\vcruntime140.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\bcrypt.dll
c:\program files\mozilla firefox\vcruntime140_1.dll
1016"C:\Program Files (x86)\Internet Download Manager\IDMan.exe" /onboot C:\Program Files (x86)\Internet Download Manager\IDMan.exe
NSudo86x.exe
User:
SYSTEM
Company:
Tonec Inc.
Integrity Level:
SYSTEM
Description:
Internet Download Manager (IDM)
Version:
6, 42, 25, 2
1076"C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\IDMIECC64.dll"C:\Windows\SysWOW64\regsvr32.exeIDMan.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
1076tasklist /fi "imagename eq idman.exe" C:\Windows\System32\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
1080"C:\Windows\System32\regsvr32.exe" /s "C:\Program Files (x86)\Internet Download Manager\IDMShellExt64.dll"C:\Windows\SysWOW64\regsvr32.exeIDMan.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\regsvr32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
1080reg delete HKCU\IAS_TEST /fC:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ws2_32.dll
1140"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=6932 --field-trial-handle=2328,i,12469017006251114699,4459717136057540770,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
1144"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=4544 --field-trial-handle=2328,i,12469017006251114699,4459717136057540770,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Total events
146 211
Read events
144 890
Write events
939
Delete events
382

Modification events

(PID) Process:(5208) firefox.exeKey:HKEY_CURRENT_USER\SOFTWARE\Mozilla\Firefox\DllPrefetchExperiment
Operation:writeName:C:\Program Files\Mozilla Firefox\firefox.exe
Value:
0
(PID) Process:(3552) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3552) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3552) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3552) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3552) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(3552) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(3552) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(3552) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Downloads\idm.6.42.26_with_activator_v3.3.rar
(PID) Process:(3552) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface
Operation:writeName:ShowPassword
Value:
0
Executable files
38
Suspicious files
666
Text files
193
Unknown types
0

Dropped files

PID
Process
Filename
Type
5208firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\9kie7cg6.default-release\startupCache\scriptCache-current.bin
MD5:
SHA256:
5208firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\9kie7cg6.default-release\startupCache\urlCache-current.binbinary
MD5:297E88D7CEB26E549254EC875649F4EB
SHA256:8B75D4FB1845BAA06122888D11F6B65E6A36B140C54A72CC13DF390FD7C95702
5208firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\AlternateServices.binbinary
MD5:C29244CA2D68E96B1BAD58F60FAF7D44
SHA256:7DB07F7BC15AECE607B810A5DD0F73268AB4870B198616B3F21C94211DA4FA1E
5208firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
MD5:
SHA256:
5208firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\datareporting\glean\db\data.safe.tmpbinary
MD5:C78F36BF78A74A5C37232FA18305FA6E
SHA256:319C730AC6614FDCE611894E281CBE1B5E1A304DCD812D6B642D3BE978E82EEC
5208firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\cert9.db-journalbinary
MD5:2C37A0C52FC49DBDDBA2170198F1FE60
SHA256:500715A3C49697CB0ED5A5A0618B6C7E191A2D5CC8E991DEDDE87104C721D09B
5208firefox.exeC:\Users\admin\AppData\Local\Mozilla\Firefox\Profiles\9kie7cg6.default-release\startupCache\scriptCache-child-current.binbinary
MD5:C95DDC2B1A525D1A243E4C294DA2F326
SHA256:3A5919E086BFB31E36110CF636D2D5109EB51F2C410B107F126126AB25D67363
5208firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\cert9.dbbinary
MD5:D75C1A0C682ED0B15E370F733304A869
SHA256:9697D36B92AB796FC9235932FE7CB4A432942FEF7DE1C8EB23E328F1CED9C563
5208firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\sessionCheckpoints.jsonbinary
MD5:EA8B62857DFDBD3D0BE7D7E4A954EC9A
SHA256:792955295AE9C382986222C6731C5870BD0E921E7F7E34CC4615F5CD67F225DA
5208firefox.exeC:\Users\admin\AppData\Roaming\Mozilla\Firefox\Profiles\9kie7cg6.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite-shmbinary
MD5:B7C14EC6110FA820CA6B65F5AEC85911
SHA256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
82
TCP/UDP connections
281
DNS requests
334
Threats
45

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2736
svchost.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5208
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
whitelisted
5208
firefox.exe
POST
200
142.250.181.227:80
http://o.pki.goog/s/wr3/3cs
unknown
whitelisted
2736
svchost.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5208
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/canonical.html
unknown
whitelisted
5208
firefox.exe
GET
104.21.32.1:80
http://ublockorigin.com/
unknown
whitelisted
5208
firefox.exe
POST
200
142.250.181.227:80
http://o.pki.goog/s/wr3/jLM
unknown
whitelisted
5208
firefox.exe
POST
200
2.16.241.8:80
http://r11.o.lencr.org/
unknown
whitelisted
5208
firefox.exe
POST
200
2.16.241.8:80
http://r10.o.lencr.org/
unknown
whitelisted
5208
firefox.exe
POST
200
2.16.241.8:80
http://r10.o.lencr.org/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2736
svchost.exe
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:137
whitelisted
2736
svchost.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4712
MoUsoCoreWorker.exe
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
2.21.65.132:443
www.bing.com
Akamai International B.V.
NL
whitelisted
5208
firefox.exe
34.117.188.166:443
contile.services.mozilla.com
whitelisted
5208
firefox.exe
34.107.221.82:80
detectportal.firefox.com
GOOGLE
US
whitelisted
5208
firefox.exe
104.21.32.1:80
ublockorigin.com
CLOUDFLARENET
whitelisted

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 2.16.241.12
  • 2.16.241.19
whitelisted
www.microsoft.com
  • 2.23.246.101
  • 184.30.21.171
whitelisted
google.com
  • 142.250.185.206
whitelisted
www.bing.com
  • 2.21.65.132
  • 2.21.65.154
  • 104.126.37.131
  • 104.126.37.130
  • 104.126.37.170
  • 104.126.37.139
  • 104.126.37.178
  • 104.126.37.185
  • 104.126.37.162
  • 104.126.37.145
  • 104.126.37.136
  • 104.126.37.144
  • 104.126.37.154
  • 104.126.37.155
  • 104.126.37.161
  • 104.126.37.152
  • 104.126.37.146
  • 104.126.37.177
whitelisted
ublockorigin.com
  • 104.21.32.1
  • 104.21.112.1
  • 104.21.16.1
  • 104.21.48.1
  • 104.21.80.1
  • 104.21.96.1
  • 104.21.64.1
  • 2606:4700:3030::6815:5001
  • 2606:4700:3030::6815:4001
  • 2606:4700:3030::6815:6001
  • 2606:4700:3030::6815:1001
  • 2606:4700:3030::6815:2001
  • 2606:4700:3030::6815:3001
  • 2606:4700:3030::6815:7001
whitelisted
detectportal.firefox.com
  • 34.107.221.82
whitelisted
prod.detectportal.prod.cloudops.mozgcp.net
  • 34.107.221.82
  • 2600:1901:0:38d7::
whitelisted
example.org
  • 96.7.128.192
  • 23.215.0.133
  • 23.215.0.132
  • 96.7.128.186
whitelisted
ipv4only.arpa
  • 192.0.0.171
  • 192.0.0.170
whitelisted
contile.services.mozilla.com
  • 34.117.188.166
whitelisted

Threats

PID
Process
Class
Message
2192
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Requests to a free CDN for open source projects (jsdelivr .net)
2192
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Requests to a free CDN for open source projects (jsdelivr .net)
2192
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Requests to a free CDN for open source projects (jsdelivr .net)
2192
svchost.exe
Misc activity
ET INFO DNS Query to Cloudflare Page Developer Domain (pages .dev)
2192
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare Pages platform for frontend developers to collaborate and deploy websites (pages .dev)
5208
firefox.exe
Misc activity
ET INFO Observed Cloudflare Page Developer Domain (pages .dev in TLS SNI)
2192
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare Pages platform for frontend developers to collaborate and deploy websites (pages .dev)
2192
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare Pages platform for frontend developers to collaborate and deploy websites (pages .dev)
2192
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Cloudflare Pages platform for frontend developers to collaborate and deploy websites (pages .dev)
2192
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Hosted Libraries (ajax .googleapis .com)
No debug info