File name:

WeMod-Setup.exe

Full analysis: https://app.any.run/tasks/f0321bef-47bf-4d3a-b24e-facd5693c058
Verdict: Malicious activity
Analysis date: April 11, 2025, 17:31:50
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
arch-scr
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

C4DF4804B83E9E89A40CD9CC0EF0B2E7

SHA1:

95B22D2E6D68283AC773488C8ED44FEA595F1AB5

SHA256:

1C1058F1361F2A1E5E346BC150ACCE1D1EF8F4E3E622EB374E5ED97126437A53

SSDEEP:

1536:Q668Dtf9nk7RBog5KG6JkOiVPL+09ME5LBtJD64uQgCYO6+YFyHA7OqCkNRBog5m:w8DvE57miVj+J6pHdHg7OA57N/u

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WeMod-Setup.exe (PID: 5512)
      • Update.exe (PID: 1012)
      • Update.exe (PID: 6264)
      • WeModAuxiliaryService.exe (PID: 6808)
    • Reads Microsoft Outlook installation path

      • WeMod-Setup.exe (PID: 5512)
    • Reads Internet Explorer settings

      • WeMod-Setup.exe (PID: 5512)
    • Drops 7-zip archiver for unpacking

      • WinRAR.exe (PID: 516)
    • Executable content was dropped or overwritten

      • WeMod-Setup-638799895226598193.exe (PID: 1328)
      • Update.exe (PID: 1012)
    • Process drops legitimate windows executable

      • Update.exe (PID: 1012)
    • Reads the date of Windows installation

      • Update.exe (PID: 1012)
      • WeMod-Setup.exe (PID: 5512)
      • Update.exe (PID: 6264)
    • Searches for installed software

      • Update.exe (PID: 1012)
    • Creates a software uninstall entry

      • Update.exe (PID: 1012)
    • Application launched itself

      • WeMod.exe (PID: 1912)
  • INFO

    • Reads the computer name

      • WeMod-Setup.exe (PID: 5512)
      • Update.exe (PID: 1012)
      • Update.exe (PID: 6660)
      • Update.exe (PID: 6264)
      • WeMod.exe (PID: 1676)
      • Update.exe (PID: 5868)
      • WeMod.exe (PID: 1912)
    • Reads the machine GUID from the registry

      • WeMod-Setup.exe (PID: 5512)
      • Update.exe (PID: 1012)
      • squirrel.exe (PID: 516)
      • Update.exe (PID: 6660)
      • WeMod.exe (PID: 1912)
      • Update.exe (PID: 5868)
      • WeModAuxiliaryService.exe (PID: 6808)
    • Checks supported languages

      • WeMod-Setup.exe (PID: 5512)
      • WeMod-Setup-638799895226598193.exe (PID: 1328)
      • Update.exe (PID: 1012)
      • squirrel.exe (PID: 516)
      • WeMod.exe (PID: 5680)
      • Update.exe (PID: 6264)
      • WeMod.exe (PID: 1912)
      • Update.exe (PID: 6660)
      • WeMod.exe (PID: 2340)
      • WeMod.exe (PID: 6712)
      • Update.exe (PID: 5868)
      • WeModAuxiliaryService.exe (PID: 6808)
      • WeMod.exe (PID: 1676)
    • Creates files or folders in the user directory

      • WeMod-Setup.exe (PID: 5512)
      • WeMod-Setup-638799895226598193.exe (PID: 1328)
      • Update.exe (PID: 1012)
      • Update.exe (PID: 6660)
      • squirrel.exe (PID: 516)
      • Update.exe (PID: 6264)
      • WeMod.exe (PID: 2340)
      • WeMod.exe (PID: 1912)
      • Update.exe (PID: 5868)
      • WeModAuxiliaryService.exe (PID: 6808)
    • Reads the software policy settings

      • WeMod-Setup.exe (PID: 5512)
      • WeModAuxiliaryService.exe (PID: 6808)
    • Disables trace logs

      • WeMod-Setup.exe (PID: 5512)
      • Update.exe (PID: 1012)
      • Update.exe (PID: 5868)
    • Checks proxy server information

      • WeMod-Setup.exe (PID: 5512)
      • Update.exe (PID: 1012)
      • WeMod.exe (PID: 1912)
      • Update.exe (PID: 5868)
      • WeModAuxiliaryService.exe (PID: 6808)
    • Reads Environment values

      • WeMod-Setup.exe (PID: 5512)
      • WeMod.exe (PID: 5680)
      • WeMod.exe (PID: 1912)
      • Update.exe (PID: 1012)
      • Update.exe (PID: 5868)
    • Create files in a temporary directory

      • WeMod-Setup.exe (PID: 5512)
      • Update.exe (PID: 1012)
      • WeMod.exe (PID: 1912)
      • Update.exe (PID: 5868)
    • Manual execution by a user

      • WinRAR.exe (PID: 516)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 516)
      • Update.exe (PID: 1012)
    • Process checks computer location settings

      • Update.exe (PID: 1012)
      • WeMod-Setup.exe (PID: 5512)
      • Update.exe (PID: 6264)
      • WeMod.exe (PID: 1912)
      • WeMod.exe (PID: 6712)
    • Reads product name

      • WeMod.exe (PID: 5680)
      • WeMod.exe (PID: 1912)
    • Reads CPU info

      • WeMod.exe (PID: 1912)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2076:12:06 19:29:50+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 105984
InitializedDataSize: 28160
UninitializedDataSize: -
EntryPoint: 0x1bcfe
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 8.0.0.0
ProductVersionNumber: 8.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: WeMod Setup
CompanyName: WeMod LLC
FileDescription: WeMod Setup
FileVersion: 8.0.0.0
InternalName: WeMod-Setup.exe
LegalCopyright: Copyright © WeMod LLC 2022
LegalTrademarks: -
OriginalFileName: WeMod-Setup.exe
ProductName: WeMod
ProductVersion: 8.0.0.0
AssemblyVersion: 8.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
146
Monitored processes
17
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start wemod-setup.exe sppextcomobj.exe no specs slui.exe no specs winrar.exe no specs wemod-setup-638799895226598193.exe rundll32.exe no specs update.exe squirrel.exe no specs wemod.exe no specs update.exe no specs update.exe no specs wemod.exe no specs wemod.exe no specs wemod.exe wemod.exe no specs update.exe wemodauxiliaryservice.exe

Process information

PID
CMD
Path
Indicators
Parent process
516"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\lol.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
516"C:\Users\admin\AppData\Local\WeMod\app-10.10.4\Squirrel.exe" --updateSelf=C:\Users\admin\AppData\Local\SquirrelTemp\Update.exeC:\Users\admin\AppData\Local\WeMod\app-10.10.4\squirrel.exeUpdate.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\wemod\app-10.10.4\squirrel.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1012"C:\Users\admin\AppData\Local\SquirrelTemp\Update.exe" --install . --silentC:\Users\admin\AppData\Local\SquirrelTemp\Update.exe
WeMod-Setup-638799895226598193.exe
User:
admin
Company:
GitHub
Integrity Level:
MEDIUM
Description:
Update
Exit code:
0
Version:
2.0.1.53
Modules
Images
c:\users\admin\appdata\local\squirreltemp\update.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1280"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
1328"C:\Users\admin\AppData\Local\Temp\WeMod-Setup-638799895226598193.exe" --silentC:\Users\admin\AppData\Local\Temp\WeMod-Setup-638799895226598193.exe
WeMod-Setup.exe
User:
admin
Company:
WeMod
Integrity Level:
MEDIUM
Description:
WeMod - The Ultimate Gaming Companion
Exit code:
0
Version:
10.10.4
Modules
Images
c:\users\admin\appdata\local\temp\wemod-setup-638799895226598193.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
1676"C:\Users\admin\AppData\Local\WeMod\app-10.10.4\WeMod.exe" --type=gpu-process --user-data-dir="C:\Users\admin\AppData\Roaming\WeMod" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1832,i,10913362036995479496,5622223209562033158,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=1824 /prefetch:2C:\Users\admin\AppData\Local\WeMod\app-10.10.4\WeMod.exeWeMod.exe
User:
admin
Company:
WeMod
Integrity Level:
LOW
Description:
WeMod - The Ultimate Game Companion
Version:
10.10.4
Modules
Images
c:\users\admin\appdata\local\wemod\app-10.10.4\wemod.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1912"C:\Users\admin\AppData\Local\WeMod\app-10.10.4\WeMod.exe" wemod://?_inst=UcYGwgEbyMHw9agNC:\Users\admin\AppData\Local\WeMod\app-10.10.4\WeMod.exeUpdate.exe
User:
admin
Company:
WeMod
Integrity Level:
MEDIUM
Description:
WeMod - The Ultimate Game Companion
Version:
10.10.4
Modules
Images
c:\users\admin\appdata\local\wemod\app-10.10.4\wemod.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2340"C:\Users\admin\AppData\Local\WeMod\app-10.10.4\WeMod.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --force-ui-direction=ltr --user-data-dir="C:\Users\admin\AppData\Roaming\WeMod" --field-trial-handle=2172,i,10913362036995479496,5622223209562033158,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=2168 /prefetch:3C:\Users\admin\AppData\Local\WeMod\app-10.10.4\WeMod.exe
WeMod.exe
User:
admin
Company:
WeMod
Integrity Level:
MEDIUM
Description:
WeMod - The Ultimate Game Companion
Version:
10.10.4
Modules
Images
c:\users\admin\appdata\local\wemod\app-10.10.4\wemod.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5512"C:\Users\admin\Downloads\WeMod-Setup.exe" C:\Users\admin\Downloads\WeMod-Setup.exe
explorer.exe
User:
admin
Company:
WeMod LLC
Integrity Level:
MEDIUM
Description:
WeMod Setup
Exit code:
0
Version:
8.0.0.0
Modules
Images
c:\users\admin\downloads\wemod-setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
5680"C:\Users\admin\AppData\Local\WeMod\app-10.10.4\WeMod.exe" --squirrel-install 10.10.4C:\Users\admin\AppData\Local\WeMod\app-10.10.4\WeMod.exeUpdate.exe
User:
admin
Company:
WeMod
Integrity Level:
MEDIUM
Description:
WeMod - The Ultimate Game Companion
Exit code:
0
Version:
10.10.4
Modules
Images
c:\users\admin\appdata\local\wemod\app-10.10.4\wemod.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
11 995
Read events
11 895
Write events
67
Delete events
33

Modification events

(PID) Process:(5512) WeMod-Setup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(5512) WeMod-Setup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(5512) WeMod-Setup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(5512) WeMod-Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WeMod-Setup_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(5512) WeMod-Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WeMod-Setup_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(5512) WeMod-Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WeMod-Setup_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(5512) WeMod-Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WeMod-Setup_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(5512) WeMod-Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WeMod-Setup_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(5512) WeMod-Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WeMod-Setup_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(5512) WeMod-Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WeMod-Setup_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
Executable files
26
Suspicious files
128
Text files
45
Unknown types
0

Dropped files

PID
Process
Filename
Type
5512WeMod-Setup.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\AH8CR9J5\Inter-Medium-5ce3e4db96[1].woffbinary
MD5:5CE3E4DB9634913232403F166B2447DE
SHA256:68D52E74E8171DDB2C94CA60A2596DC8A46407320449881FD09369DBC317624C
5512WeMod-Setup.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12binary
MD5:A151DFA9564E56A9F136FC735B33CE4E
SHA256:641EFEC7DD9DA6768CA5B876E65DAEF29BDDE698CFD505E4AB5006250595922F
5512WeMod-Setup.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8binary
MD5:1FBB37F79B317A9A248E7C4CE4F5BAC5
SHA256:9BF639C595FE335B6F694EE35990BEFD2123F5E07FD1973FF619E3FC88F5F49F
5512WeMod-Setup.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\Inter-ExtraBold-45ce9384f5[1].woffbinary
MD5:45CE9384F5D829596586A3B2FA1224A4
SHA256:91F9BF5099A041220C21B5A089D54449ED4F04D7792A532BA17A8A5BFB9E5A61
5512WeMod-Setup.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8binary
MD5:9A38345506770025D4B580DC29460767
SHA256:79F2A21DA7541248516600FDF6AF286CFC1F6AAB63CD5403E668AD8C36484A12
5512WeMod-Setup.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\setup[1].htmhtml
MD5:5D484CF7C6F8ED357425DBF75EF0697A
SHA256:4C55CB634E81BA33CC9C1FC40EFEDFAF226CB3E8440B1400F6D4AF4EE7483994
5512WeMod-Setup.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\Inter-Regular-14d1275c67[1].woffbinary
MD5:14D1275C67676CC5D911232D0C890D97
SHA256:3710E2CE073EC0EB39274DECC63768B52091A27E35F5C28D6ABB7A5FCEF0B7FC
5512WeMod-Setup.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\E4DJRUXW\Inter-Thin-0f080c40c6[1].woffbinary
MD5:0F080C40C639962E1CAD093AA58192DC
SHA256:E9DA5A64A6A8EB87A2C6D475327F072B5CA25731DF07119F576C10C50AA9554D
5512WeMod-Setup.exeC:\Users\admin\AppData\Local\Temp\WeMod-Setup-638799895226598193.exe
MD5:
SHA256:
5512WeMod-Setup.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\AH8CR9J5\Inter-SemiBold-1d5bb5c64d[1].woffbinary
MD5:1D5BB5C64DC15405BDB04145DAB7B436
SHA256:807D56B95FCC04CD1C26FCA043DDF19E300C8AE156747458BD025A2B21CF54B4
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
37
DNS requests
26
Threats
18

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.18.121.147:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5512
WeMod-Setup.exe
GET
200
142.250.186.131:80
http://c.pki.goog/r/gsr1.crl
unknown
whitelisted
5512
WeMod-Setup.exe
GET
200
142.250.186.131:80
http://c.pki.goog/r/r4.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1164
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1164
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
2924
SearchApp.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6808
WeModAuxiliaryService.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT3xL4LQLXDRDM9P665TW442vrsUQQUReuir%2FSSy4IxLVGLp6chnfNtyA8CEA6bGI750C3n79tQ4ghAGFo%3D
unknown
whitelisted
6808
WeModAuxiliaryService.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxXWRM3y5nP%2Be6mK4cD08CEAitQLJg0pxMn17Nqb2Trtk%3D
unknown
whitelisted
6808
WeModAuxiliaryService.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSRXerF0eFeSWRripTgTkcJWMm7iQQUaDfg67Y7%2BF8Rhvv%2BYXsIiGX0TkICEA2LpfdFcSPbdVFa0X9jdfU%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.18.121.147:80
crl.microsoft.com
AKAMAI-AS
FR
whitelisted
4
System
192.168.100.255:138
whitelisted
5512
WeMod-Setup.exe
104.22.43.75:443
api.wemod.com
CLOUDFLARENET
whitelisted
5512
WeMod-Setup.exe
142.250.186.131:80
c.pki.goog
GOOGLE
US
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.32.68:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
5512
WeMod-Setup.exe
104.22.42.75:443
api.wemod.com
CLOUDFLARENET
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 2.18.121.147
  • 2.18.121.139
whitelisted
google.com
  • 142.250.184.238
whitelisted
api.wemod.com
  • 104.22.43.75
  • 172.67.25.118
  • 104.22.42.75
whitelisted
c.pki.goog
  • 142.250.186.131
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 40.126.32.68
  • 20.190.160.14
  • 20.190.160.65
  • 40.126.32.133
  • 20.190.160.64
  • 40.126.32.134
  • 40.126.32.76
  • 40.126.32.136
whitelisted
ocsp.digicert.com
  • 2.17.190.73
  • 2.23.77.188
whitelisted
storage-cdn.wemod.com
  • 104.22.42.75
  • 172.67.25.118
  • 104.22.43.75
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted

Threats

PID
Process
Class
Message
2340
WeMod.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
2340
WeMod.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
2340
WeMod.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
2340
WeMod.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
2340
WeMod.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
2340
WeMod.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
2340
WeMod.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
2340
WeMod.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
2340
WeMod.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
2340
WeMod.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
No debug info