| download: | /FMRS.exe |
| Full analysis: | https://app.any.run/tasks/58c5f6ec-0193-4853-98f0-6b4e940157e3 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | December 19, 2024, 08:13:14 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections |
| MD5: | 04F9C2B48B4369A3CCBC4D36DEA4745A |
| SHA1: | 24AE9FDC2A75EDFBB46ED2AE290FFCBA737D0063 |
| SHA256: | 0E704F2E222F7E18972D41D29802CE3EAA26B27CC0882309F11D0538FB7D7911 |
| SSDEEP: | 49152:2fiEC71DD7npYnsQWQOTjw+nqHMzPQyRfLPrPFPml+9uD0Hz4mJ0zr4n1m7GtKiy:2fiEG1DD7qnspQOTjw+naMzpRfLBPmYk |
| .exe | | | Generic Win/DOS Executable (50) |
|---|---|---|
| .exe | | | DOS Executable Generic (49.9) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2010:06:27 07:06:38+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 8 |
| CodeSize: | 70656 |
| InitializedDataSize: | 235520 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x11def |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 3.5.4.0 |
| ProductVersionNumber: | 3.5.4.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| CompanyName: | Furtivex |
| FileVersion: | 3.5.4 |
| InternalName: | FMRS.exe |
| OriginalFileName: | FMRS.exe |
| ProductName: | Furtivex Malware Removal Script |
| ProductVersion: | 3.5.4 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 68 | TASKKILL /F /IM "dasHost.exe" | C:\Windows\SysWOW64\taskkill.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Terminates Processes Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 188 | GREP -Pis "\<Command\>(auditpol|[w|c]script|certutil|mshta|netsh|powershell).*\\(System32|Roaming|Local(Low)?|AppData|WINDOWS|SysWOW64|Public|Program Files( \(x86\))?|Windows NT)\\[A-Z0-9_.-]{1,}\.(bat|com|cmd|jar|jse?|ps1|url|vb[e|s]).*\<\/Command\>f7f81a39-5f63-5b42-9efd-1f13b5431005quot; | C:\Windows\grep.exe | cmd.exe | ||||||||||||
User: admin Company: GnuWin32 <http://gnuwin32.sourceforge.net> Integrity Level: HIGH Description: Grep: print lines matching a pattern Exit code: 1 Version: 2.5.4.3331 Modules
| |||||||||||||||
| 308 | net user John | C:\Windows\SysWOW64\net.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Net Command Exit code: 2 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 308 | GREP -Pis "\<Command\>(auditpol|[w|c]script|certutil|mshta|netsh|powershell).*\\(System32|Roaming|Local(Low)?|AppData|WINDOWS|SysWOW64|Public|Program Files( \(x86\))?|Windows NT)\\[A-Z0-9_.-]{1,}\.(bat|com|cmd|jar|jse?|ps1|url|vb[e|s]).*\<\/Command\>f7f81a39-5f63-5b42-9efd-1f13b5431005quot; | C:\Windows\grep.exe | cmd.exe | ||||||||||||
User: admin Company: GnuWin32 <http://gnuwin32.sourceforge.net> Integrity Level: HIGH Description: Grep: print lines matching a pattern Exit code: 1 Version: 2.5.4.3331 Modules
| |||||||||||||||
| 372 | C:\WINDOWS\system32\DllHost.exe /Processid:{F32D97DF-E3E5-4CB9-9E3E-0EB5B4E49801} | C:\Windows\System32\dllhost.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: COM Surrogate Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 396 | GREP -Pis "\<Command\>(auditpol|[w|c]script|certutil|mshta|netsh|powershell).*\\(System32|Roaming|Local(Low)?|AppData|WINDOWS|SysWOW64|Public|Program Files( \(x86\))?|Windows NT)\\[A-Z0-9_.-]{1,}\.(bat|com|cmd|jar|jse?|ps1|url|vb[e|s]).*\<\/Command\>f7f81a39-5f63-5b42-9efd-1f13b5431005quot; | C:\Windows\grep.exe | cmd.exe | ||||||||||||
User: admin Company: GnuWin32 <http://gnuwin32.sourceforge.net> Integrity Level: HIGH Description: Grep: print lines matching a pattern Exit code: 1 Version: 2.5.4.3331 Modules
| |||||||||||||||
| 420 | POWERSHELL -command "Get-BitsTransfer -AllUsers | Where-Object { $_.JobState -CContains 'Error' } | Remove-BitsTransfer" | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 424 | GREP -Esi ".*\.(bat|cmd|dll|exe|jar|jse?|pif|ps1|scr|tmp|vb[e|s])f7f81a39-5f63-5b42-9efd-1f13b5431005quot; | C:\Windows\grep.exe | cmd.exe | ||||||||||||
User: admin Company: GnuWin32 <http://gnuwin32.sourceforge.net> Integrity Level: HIGH Description: Grep: print lines matching a pattern Exit code: 1 Version: 2.5.4.3331 Modules
| |||||||||||||||
| 436 | GREP -Pis "\<Command\>(auditpol|[w|c]script|certutil|mshta|netsh|powershell).*\\(System32|Roaming|Local(Low)?|AppData|WINDOWS|SysWOW64|Public|Program Files( \(x86\))?|Windows NT)\\[A-Z0-9_.-]{1,}\.(bat|com|cmd|jar|jse?|ps1|url|vb[e|s]).*\<\/Command\>f7f81a39-5f63-5b42-9efd-1f13b5431005quot; | C:\Windows\grep.exe | cmd.exe | ||||||||||||
User: admin Company: GnuWin32 <http://gnuwin32.sourceforge.net> Integrity Level: HIGH Description: Grep: print lines matching a pattern Exit code: 1 Version: 2.5.4.3331 Modules
| |||||||||||||||
| 436 | SCHTASKS /QUERY /TN "Microsoft\Windows\Task Manager\Interactive" /XML | C:\Windows\SysWOW64\schtasks.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (372) dllhost.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP |
| Operation: | write | Name: | SppGetSnapshots (Enter) |
Value: 48000000000000000D9D82E7ED51DB017401000008180000D20700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (372) dllhost.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP |
| Operation: | write | Name: | SppGetSnapshots (Leave) |
Value: 48000000000000007FFDC2E7ED51DB017401000008180000D20700000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (372) dllhost.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP |
| Operation: | write | Name: | SppEnumGroups (Enter) |
Value: 48000000000000007FFDC2E7ED51DB017401000008180000D10700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (372) dllhost.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP |
| Operation: | write | Name: | SppEnumGroups (Leave) |
Value: 4800000000000000A561C5E7ED51DB017401000008180000D10700000100000000000000010000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (372) dllhost.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP |
| Operation: | write | Name: | SppGetSnapshots (Leave) |
Value: 4800000000000000C6BAD3E7ED51DB0174010000DC180000D20700000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (372) dllhost.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP |
| Operation: | write | Name: | SppEnumGroups (Enter) |
Value: 4800000000000000C6BAD3E7ED51DB0174010000DC180000D10700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (372) dllhost.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP |
| Operation: | write | Name: | SppEnumGroups (Leave) |
Value: 4800000000000000C6BAD3E7ED51DB0174010000DC180000D10700000100000000000000010000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (372) dllhost.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP |
| Operation: | write | Name: | LastIndex |
Value: 11 | |||
| (PID) Process: | (4520) VSSVC.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer |
| Operation: | write | Name: | IDENTIFY (Enter) |
Value: 4800000000000000DC534DE8ED51DB01A81100009C180000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (4520) VSSVC.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer |
| Operation: | write | Name: | IDENTIFY (Enter) |
Value: 4800000000000000DC534DE8ED51DB01A8110000A8010000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6696 | FMRS.exe | C:\Users\admin\AppData\Local\Temp\APPX.6zgmq1xdye2kgbg3pznfurvxd\GNU License.url | binary | |
MD5:691BE400143F3097A6F20CD00897CCF9 | SHA256:2208A2417BFB72AF4395500C622BB1866B569B5394F0B59683A3EB10FD807F0A | |||
| 6696 | FMRS.exe | C:\Users\admin\AppData\Local\Temp\APPX.6zgmq1xdye2kgbg3pznfurvxd\dependencies\libiconv2.dll | executable | |
MD5:E0DC8C6BBC787B972A9A468648DBFD85 | SHA256:6DEEDAD652BFAB7B09EBD0E06045810390B6AC6CB5AA9EF41C9DAA5616181F22 | |||
| 6696 | FMRS.exe | C:\Users\admin\AppData\Local\Temp\APPX.6zgmq1xdye2kgbg3pznfurvxd\regbad.cfg | text | |
MD5:7CC11E0E36E74A5CBD4925D219C36306 | SHA256:A078E9E393D919ED5A0226E7909195AEC9C4C6408EB23C3894ABC9B54421F87B | |||
| 6696 | FMRS.exe | C:\Users\admin\AppData\Local\Temp\APPX.6zgmq1xdye2kgbg3pznfurvxd\I4ng.bat | text | |
MD5:E27BBC6ED3148F67B3BEC7ED31D2A1DB | SHA256:86E0D911BAFE97D55BA0C80C0258ED974AB9B508281FE891AEF4CF741FA2B5CF | |||
| 6696 | FMRS.exe | C:\Users\admin\AppData\Local\Temp\APPX.6zgmq1xdye2kgbg3pznfurvxd\R3570R3.bat | text | |
MD5:EB8670897FFD320C2C84389FE3A3316C | SHA256:468548E25CC89CC9A4B4D958FCD6F6734C383E9320E58AC6CA44A70E4C4FFB77 | |||
| 6696 | FMRS.exe | C:\Users\admin\AppData\Local\Temp\APPX.6zgmq1xdye2kgbg3pznfurvxd\pol.bat | text | |
MD5:06202C5A32B2530AEEE7E0695AF37D3C | SHA256:4D0BC7C07A2AC8F6B9FD94764CE5A08079CDFC7137A0D69C1C58594B398D35DE | |||
| 6696 | FMRS.exe | C:\Users\admin\AppData\Local\Temp\APPX.6zgmq1xdye2kgbg3pznfurvxd\FMRS.bat | text | |
MD5:AD88DEB343E505CD031E0643A3BA4285 | SHA256:7C9D6BC05D684198AC31087B28E8A3C6F5E1F020AACA458E5DEC2F75A8231548 | |||
| 6696 | FMRS.exe | C:\Users\admin\AppData\Local\Temp\APPX.6zgmq1xdye2kgbg3pznfurvxd\svc_stop_disable.cfg | text | |
MD5:ED82FD2B2B7BB0E2E277C4FB6EF92545 | SHA256:118F78FE35486F5F160590BD48E7113017CB8F005F2B5C5FAB003727679BCFD5 | |||
| 6696 | FMRS.exe | C:\Users\admin\AppData\Local\Temp\APPX.6zgmq1xdye2kgbg3pznfurvxd\svc_delete.cfg | text | |
MD5:D17642AA0FCA3E29A4CD7CCF131208ED | SHA256:F89EF970E245C8B862DFA381DF0D3E28E8815F78D2279122177000A18EA5E369 | |||
| 6696 | FMRS.exe | C:\Users\admin\AppData\Local\Temp\APPX.6zgmq1xdye2kgbg3pznfurvxd\NirCmd.chm | binary | |
MD5:DE1D4E1CAF466F6FA52F1EE518551C3E | SHA256:573AA5B8DB5F7B73CD0CB166514A197553E73659E881707C781691CBF2034516 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4712 | MoUsoCoreWorker.exe | GET | 200 | 23.48.23.156:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
1176 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
5064 | SearchApp.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D | unknown | — | — | whitelisted |
6636 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D | unknown | — | — | whitelisted |
3564 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
3564 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
4040 | SearchApp.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D | unknown | — | — | whitelisted |
5620 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
732 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4712 | MoUsoCoreWorker.exe | 23.48.23.156:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
4712 | MoUsoCoreWorker.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
5064 | SearchApp.exe | 104.126.37.146:443 | www.bing.com | Akamai International B.V. | DE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1176 | svchost.exe | 20.190.159.23:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1176 | svchost.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
1076 | svchost.exe | 23.218.210.69:443 | go.microsoft.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
www.bing.com |
| whitelisted |
login.live.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
arc.msn.com |
| whitelisted |
fd.api.iris.microsoft.com |
| whitelisted |
Process | Message |
|---|---|
grep.exe | Invalid parameter passed to C runtime function.
|
grep.exe | Invalid parameter passed to C runtime function.
|
grep.exe | Invalid parameter passed to C runtime function.
|
grep.exe | Invalid parameter passed to C runtime function.
|
grep.exe | Invalid parameter passed to C runtime function.
|
grep.exe | Invalid parameter passed to C runtime function.
|
grep.exe | Invalid parameter passed to C runtime function.
|
grep.exe | Invalid parameter passed to C runtime function.
|
grep.exe | Invalid parameter passed to C runtime function.
|
grep.exe | Invalid parameter passed to C runtime function.
|