| File name: | procexp.exe |
| Full analysis: | https://app.any.run/tasks/96b2c31d-9b8b-41d0-944a-455323c058a9 |
| Verdict: | Malicious activity |
| Analysis date: | May 23, 2024, 17:37:33 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 7289AA6C0F2C41C29C9B33CAF1C15779 |
| SHA1: | 96387AB157168B22111E3C70B22364C9B71639C4 |
| SHA256: | 0AB0116B34DB0E7168DD5C5B1C917BBB1D38235ECE4430348F068914B4AB87A6 |
| SSDEEP: | 49152:Kug+zejoF8v8F/nluLRpSct4whtfVKevv7m9gcQYPbH51a7y58SG:Nzeo80F/nQRMPbjAyKZ |
| .exe | | | Win32 Executable (generic) (52.9) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (23.5) |
| .exe | | | DOS Executable Generic (23.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2023:07:13 15:01:39+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 14.35 |
| CodeSize: | 1020928 |
| InitializedDataSize: | 3743232 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xc42de |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 17.5.0.0 |
| ProductVersionNumber: | 17.5.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | Private build |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Windows, Latin1 |
| CompanyName: | Sysinternals - www.sysinternals.com |
| FileDescription: | Sysinternals Process Explorer |
| FileVersion: | 17.05 |
| InternalName: | Process Explorer |
| LegalCopyright: | Copyright © 1998-2023 Mark Russinovich |
| LegalTrademarks: | Copyright © 1998-2023 Mark Russinovich |
| OriginalFileName: | Procexp.exe |
| ProductName: | Process Explorer |
| ProductVersion: | 17.05 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 3972 | "C:\Users\admin\AppData\Local\Temp\procexp.exe" | C:\Users\admin\AppData\Local\Temp\procexp.exe | explorer.exe | ||||||||||||
User: admin Company: Sysinternals - www.sysinternals.com Integrity Level: MEDIUM Description: Sysinternals Process Explorer Exit code: 0 Version: 17.05 Modules
| |||||||||||||||
| 4092 | "C:\Program Files\Windows Media Player\wmpnscfg.exe" | C:\Program Files\Windows Media Player\wmpnscfg.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Media Player Network Sharing Service Configuration Application Exit code: 0 Version: 12.0.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (3972) procexp.exe | Key: | HKEY_CURRENT_USER\Software\Sysinternals\Process Explorer |
| Operation: | write | Name: | EulaAccepted |
Value: 1 | |||
| (PID) Process: | (3972) procexp.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3972) procexp.exe | Key: | HKEY_CURRENT_USER\Software\Sysinternals\Process Explorer |
| Operation: | write | Name: | Windowplacement |
Value: 2C00000000000000010000000000000000000000FFFFFFFFFFFFFFFF6400000032000000840300008A020000 | |||
| (PID) Process: | (3972) procexp.exe | Key: | HKEY_CURRENT_USER\Software\Sysinternals\Process Explorer |
| Operation: | write | Name: | FindWindowplacement |
Value: 2C00000000000000000000000000000000000000000000000000000096000000960000000000000000000000 | |||
| (PID) Process: | (3972) procexp.exe | Key: | HKEY_CURRENT_USER\Software\Sysinternals\Process Explorer |
| Operation: | write | Name: | SysinfoWindowplacement |
Value: 2C00000000000000000000000000000000000000000000000000000028000000280000000000000000000000 | |||
| (PID) Process: | (3972) procexp.exe | Key: | HKEY_CURRENT_USER\Software\Sysinternals\Process Explorer |
| Operation: | write | Name: | PropWindowplacement |
Value: 2C00000000000000010000000000000000000000FFFFFFFFFFFFFFFF28000000280000001002000093020000 | |||
| (PID) Process: | (3972) procexp.exe | Key: | HKEY_CURRENT_USER\Software\Sysinternals\Process Explorer |
| Operation: | write | Name: | DllPropWindowplacement |
Value: 2C00000000000000000000000000000000000000000000000000000028000000280000000000000000000000 | |||
| (PID) Process: | (3972) procexp.exe | Key: | HKEY_CURRENT_USER\Software\Sysinternals\Process Explorer |
| Operation: | write | Name: | UnicodeFont |
Value: 080000000000000000000000000000009001000000000000000000004D00530020005300680065006C006C00200044006C00670000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (3972) procexp.exe | Key: | HKEY_CURRENT_USER\Software\Sysinternals\Process Explorer |
| Operation: | write | Name: | Divider |
Value: 000000000000E03F | |||
| (PID) Process: | (3972) procexp.exe | Key: | HKEY_CURRENT_USER\Software\Sysinternals\Process Explorer |
| Operation: | write | Name: | SavedDivider |
Value: 000000000000E03F | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3972 | procexp.exe | C:\Users\admin\AppData\Local\Temp\PROCEXP152.SYS | executable | |
MD5:D80A54CEECFF2B6598F24EC9F8901C97 | SHA256:5492797019E99316E37AA77319DF912A4054B2E718FCA0A39F81D0E8965B0760 | |||
| 3972 | procexp.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B8CC409ACDBF2A2FE04C56F2875B1FD6 | der | |
MD5:5E275DB761AA5A23AC651AF8F6C4A000 | SHA256:3B9B2F75B724FE5354D24A0EF729B8A2AAA8A9313166EAFB1F73B07CF1A745EF | |||
| 3972 | procexp.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\696F3DE637E6DE85B458996D49D759AD | der | |
MD5:6872FAE8288DB34207D9E7EE350157F4 | SHA256:50795B027E2BC566D3B7ACB89913F8EFD23B70615C9DB9BF5B23323AD3132A7D | |||
| 3972 | procexp.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 | binary | |
MD5:85763BE3E62B9068D7BC38B16673A6D8 | SHA256:FBDBD3B380F1E4CC3E33DC127329F6960F7A5D7E8A004A6066E6A6E63C32FE39 | |||
| 3972 | procexp.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B8CC409ACDBF2A2FE04C56F2875B1FD6 | binary | |
MD5:F8C520FF8B2D50DA52C804F20B096003 | SHA256:429A06CFEDB0C6EC87D0DE66B9793FE90437842EBE78463221F8D4371504062F | |||
| 3972 | procexp.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F90F18257CBB4D84216AC1E1F3BB2C76 | binary | |
MD5:D50C89C8912555DD8EC490B9D7EC8E43 | SHA256:64CF707672CECD1B811DC18DE5B50F262A5198EE0EA8A1B12AF6CAB254F4DB91 | |||
| 3972 | procexp.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A583E2A51BFBDC1E492A57B7C8325850 | binary | |
MD5:5B0C2FC75E403C2BD6E6DCE77FBB0131 | SHA256:B823D602E60BC000EDCC7B99299C54D2532AEBE876CA2C9390B6BFF3F989AE67 | |||
| 3972 | procexp.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\696F3DE637E6DE85B458996D49D759AD | binary | |
MD5:F18507F724C71B4C23323983F175F69E | SHA256:5D3898C587E5C76631B78874AD48883B9740FA36DE13A4C804BD79970B323E2C | |||
| 3972 | procexp.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F90F18257CBB4D84216AC1E1F3BB2C76 | der | |
MD5:E95AF9B03513D729D28FD890CFF4EBE9 | SHA256:B19F80A5970542F71E1728CDEEE5D4534598329BA22FABF5BBD2280EBD6BA629 | |||
| 3972 | procexp.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A583E2A51BFBDC1E492A57B7C8325850 | der | |
MD5:3582D5284FE8B34513E337C07AE9B8F8 | SHA256:686C5D8F56C9BC20D444B6F3A32D78C249B94F10080F1B595CC8F856A62B65A6 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3972 | procexp.exe | GET | 200 | 23.48.23.143:80 | http://crl.microsoft.com/pki/crl/products/microsoftrootcert.crl | unknown | — | — | unknown |
3972 | procexp.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicWinProPCA2011_2011-10-19.crl | unknown | — | — | unknown |
3972 | procexp.exe | GET | 200 | 23.48.23.143:80 | http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl | unknown | — | — | unknown |
3972 | procexp.exe | GET | 304 | 199.232.210.172:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?abb89e19eec6ec7a | unknown | — | — | unknown |
3972 | procexp.exe | GET | 200 | 23.48.23.143:80 | http://crl.microsoft.com/pki/crl/products/WinPCA.crl | unknown | — | — | unknown |
3972 | procexp.exe | GET | 200 | 23.48.23.143:80 | http://crl.microsoft.com/pki/crl/products/MicrosoftTimeStampPCA.crl | unknown | — | — | unknown |
1088 | svchost.exe | GET | 304 | 193.108.153.25:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?4f7497503626c948 | unknown | — | — | unknown |
3972 | procexp.exe | GET | 200 | 23.48.23.143:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 224.0.0.252:5355 | — | — | — | unknown |
3972 | procexp.exe | 199.232.210.172:80 | ctldl.windowsupdate.com | FASTLY | US | unknown |
3972 | procexp.exe | 23.48.23.143:80 | crl.microsoft.com | Akamai International B.V. | DE | unknown |
3972 | procexp.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | unknown |
1088 | svchost.exe | 193.108.153.25:80 | ctldl.windowsupdate.com | Akamai International B.V. | DE | unknown |
Domain | IP | Reputation |
|---|---|---|
ctldl.windowsupdate.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |