File name:

foxit-reader-2024.3.0.26795-installer_nwY-yf1.exe

Full analysis: https://app.any.run/tasks/6de7bf94-cc39-4a4c-8899-907a95425512
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: December 29, 2024, 16:13:00
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
stealer
arch-html
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 10 sections
MD5:

CC283B3BBA350E1CC68A5E18C178B14D

SHA1:

DC8BCFBC477F04DC9BB88330669643486EE385FD

SHA256:

1D45B23DBC6584D7FA0A08627DC3009C34250B5498BA569820C8D6BF2798E12B

SSDEEP:

49152:t7HecD4dnbibBlQVRpjf8iDpeh4cEACI7dH/D0lCb99JrrfEVaX6wIFJDIq/Z0du:t+cD4dn9pj8iDgBE87dH/Db53rr8VC6Z

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • UnifiedStub-installer.exe (PID: 2632)
      • servicehost.exe (PID: 5652)
      • uihost.exe (PID: 6544)
      • rsEngineSvc.exe (PID: 2736)
    • Changes the autorun value in the registry

      • rundll32.exe (PID: 5936)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • foxit-reader-2024.3.0.26795-installer_nwY-yf1.exe (PID: 6168)
      • foxit-reader-2024.3.0.26795-installer_nwY-yf1.exe (PID: 6488)
      • foxit-reader-2024.3.0.26795-installer_nwY-yf1.tmp (PID: 6516)
      • component1.exe (PID: 7096)
      • z2cjhcxw.exe (PID: 2512)
      • UnifiedStub-installer.exe (PID: 2632)
      • saBSI.exe (PID: 7060)
      • installer.exe (PID: 6920)
      • installer.exe (PID: 6928)
    • Reads security settings of Internet Explorer

      • foxit-reader-2024.3.0.26795-installer_nwY-yf1.tmp (PID: 6296)
      • foxit-reader-2024.3.0.26795-installer_nwY-yf1.tmp (PID: 6516)
      • saBSI.exe (PID: 7060)
      • component1.exe (PID: 7096)
      • installer.exe (PID: 6928)
      • uihost.exe (PID: 6544)
      • UnifiedStub-installer.exe (PID: 2632)
      • rsWSC.exe (PID: 7084)
      • rsEngineSvc.exe (PID: 4604)
      • rsEDRSvc.exe (PID: 3640)
    • Reads the Windows owner or organization settings

      • foxit-reader-2024.3.0.26795-installer_nwY-yf1.tmp (PID: 6516)
    • Checks Windows Trust Settings

      • saBSI.exe (PID: 7060)
      • installer.exe (PID: 6928)
      • servicehost.exe (PID: 5652)
      • uihost.exe (PID: 6544)
      • UnifiedStub-installer.exe (PID: 2632)
      • rsWSC.exe (PID: 7084)
      • updater.exe (PID: 7064)
      • rsWSC.exe (PID: 6200)
      • rsEDRSvc.exe (PID: 3640)
      • rsEDRSvc.exe (PID: 2976)
    • The process verifies whether the antivirus software is installed

      • saBSI.exe (PID: 7060)
      • installer.exe (PID: 6920)
      • installer.exe (PID: 6928)
      • uihost.exe (PID: 6544)
      • servicehost.exe (PID: 5652)
      • updater.exe (PID: 7064)
      • cmd.exe (PID: 3464)
      • cmd.exe (PID: 6756)
      • rsEngineSvc.exe (PID: 2736)
      • cmd.exe (PID: 4012)
    • Reads the date of Windows installation

      • component1.exe (PID: 7096)
      • rsEDRSvc.exe (PID: 2976)
    • Creates a software uninstall entry

      • UnifiedStub-installer.exe (PID: 2632)
      • installer.exe (PID: 6928)
      • servicehost.exe (PID: 5652)
    • Searches for installed software

      • UnifiedStub-installer.exe (PID: 2632)
      • updater.exe (PID: 7064)
    • Executes as Windows Service

      • rsSyncSvc.exe (PID: 3364)
      • servicehost.exe (PID: 5652)
      • rsWSC.exe (PID: 6200)
      • rsClientSvc.exe (PID: 4528)
      • rsEngineSvc.exe (PID: 2736)
      • rsEDRSvc.exe (PID: 2976)
    • Executes application which crashes

      • foxit-reader-2024.3.0.26795-installer_nwY-yf1.tmp (PID: 6516)
    • Adds/modifies Windows certificates

      • saBSI.exe (PID: 7060)
      • servicehost.exe (PID: 5652)
    • The process creates files with name similar to system file names

      • installer.exe (PID: 6928)
      • UnifiedStub-installer.exe (PID: 2632)
      • servicehost.exe (PID: 5652)
    • Creates/Modifies COM task schedule object

      • installer.exe (PID: 6928)
    • Process drops legitimate windows executable

      • installer.exe (PID: 6928)
      • UnifiedStub-installer.exe (PID: 2632)
      • z2cjhcxw.exe (PID: 2512)
    • Drops a system driver (possible attempt to evade defenses)

      • UnifiedStub-installer.exe (PID: 2632)
    • Drops 7-zip archiver for unpacking

      • UnifiedStub-installer.exe (PID: 2632)
    • The process drops C-runtime libraries

      • UnifiedStub-installer.exe (PID: 2632)
    • Reads Mozilla Firefox installation path

      • servicehost.exe (PID: 5652)
      • uihost.exe (PID: 6544)
    • Creates or modifies Windows services

      • UnifiedStub-installer.exe (PID: 2632)
      • rundll32.exe (PID: 5936)
    • Creates files in the driver directory

      • UnifiedStub-installer.exe (PID: 2632)
    • Uses RUNDLL32.EXE to load library

      • UnifiedStub-installer.exe (PID: 2632)
    • Uses WEVTUTIL.EXE to install publishers and event logs from the manifest

      • UnifiedStub-installer.exe (PID: 2632)
    • Starts CMD.EXE for commands execution

      • servicehost.exe (PID: 5652)
      • updater.exe (PID: 7064)
    • Hides command output

      • cmd.exe (PID: 3464)
    • Process checks is Powershell's Script Block Logging on

      • rsEDRSvc.exe (PID: 2976)
    • Application launched itself

      • rsAppUI.exe (PID: 6188)
    • Reads the BIOS version

      • rsEDRSvc.exe (PID: 2976)
  • INFO

    • Checks supported languages

      • foxit-reader-2024.3.0.26795-installer_nwY-yf1.exe (PID: 6168)
      • foxit-reader-2024.3.0.26795-installer_nwY-yf1.tmp (PID: 6296)
      • foxit-reader-2024.3.0.26795-installer_nwY-yf1.tmp (PID: 6516)
      • foxit-reader-2024.3.0.26795-installer_nwY-yf1.exe (PID: 6488)
      • component1.exe (PID: 7096)
      • saBSI.exe (PID: 7060)
      • z2cjhcxw.exe (PID: 2512)
      • UnifiedStub-installer.exe (PID: 2632)
      • rsSyncSvc.exe (PID: 4132)
      • rsSyncSvc.exe (PID: 3364)
      • installer.exe (PID: 6920)
      • installer.exe (PID: 6928)
      • uihost.exe (PID: 6544)
      • servicehost.exe (PID: 5652)
      • rsWSC.exe (PID: 6200)
      • rsClientSvc.exe (PID: 5780)
      • rsClientSvc.exe (PID: 4528)
      • rsWSC.exe (PID: 7084)
      • rsEngineSvc.exe (PID: 2736)
      • updater.exe (PID: 7064)
      • rsEDRSvc.exe (PID: 3640)
      • rsEDRSvc.exe (PID: 2976)
      • EPP.exe (PID: 7084)
      • rsHelper.exe (PID: 5208)
      • rsAppUI.exe (PID: 6764)
      • rsAppUI.exe (PID: 6188)
      • rsAppUI.exe (PID: 7112)
      • rsAppUI.exe (PID: 7208)
      • rsEngineSvc.exe (PID: 4604)
    • Create files in a temporary directory

      • foxit-reader-2024.3.0.26795-installer_nwY-yf1.exe (PID: 6168)
      • foxit-reader-2024.3.0.26795-installer_nwY-yf1.exe (PID: 6488)
      • foxit-reader-2024.3.0.26795-installer_nwY-yf1.tmp (PID: 6516)
      • component1.exe (PID: 7096)
      • saBSI.exe (PID: 7060)
      • z2cjhcxw.exe (PID: 2512)
      • installer.exe (PID: 6928)
      • UnifiedStub-installer.exe (PID: 2632)
      • rsAppUI.exe (PID: 6188)
    • Reads the computer name

      • foxit-reader-2024.3.0.26795-installer_nwY-yf1.tmp (PID: 6296)
      • foxit-reader-2024.3.0.26795-installer_nwY-yf1.tmp (PID: 6516)
      • saBSI.exe (PID: 7060)
      • component1.exe (PID: 7096)
      • UnifiedStub-installer.exe (PID: 2632)
      • rsSyncSvc.exe (PID: 4132)
      • rsSyncSvc.exe (PID: 3364)
      • installer.exe (PID: 6928)
      • servicehost.exe (PID: 5652)
      • uihost.exe (PID: 6544)
      • rsWSC.exe (PID: 6200)
      • rsClientSvc.exe (PID: 5780)
      • rsWSC.exe (PID: 7084)
      • rsEngineSvc.exe (PID: 4604)
      • updater.exe (PID: 7064)
      • rsHelper.exe (PID: 5208)
      • rsEDRSvc.exe (PID: 2976)
      • rsAppUI.exe (PID: 7112)
      • rsClientSvc.exe (PID: 4528)
    • Process checks computer location settings

      • foxit-reader-2024.3.0.26795-installer_nwY-yf1.tmp (PID: 6296)
      • foxit-reader-2024.3.0.26795-installer_nwY-yf1.tmp (PID: 6516)
      • component1.exe (PID: 7096)
      • uihost.exe (PID: 6544)
      • rsAppUI.exe (PID: 7208)
    • Reads the software policy settings

      • foxit-reader-2024.3.0.26795-installer_nwY-yf1.tmp (PID: 6516)
      • saBSI.exe (PID: 7060)
      • component1.exe (PID: 7096)
      • WerFault.exe (PID: 5472)
      • UnifiedStub-installer.exe (PID: 2632)
      • WerFault.exe (PID: 1488)
      • installer.exe (PID: 6928)
      • servicehost.exe (PID: 5652)
      • uihost.exe (PID: 6544)
      • rsWSC.exe (PID: 7084)
      • rsEngineSvc.exe (PID: 4604)
      • updater.exe (PID: 7064)
      • rsEngineSvc.exe (PID: 2736)
      • rsWSC.exe (PID: 6200)
      • rsEDRSvc.exe (PID: 2976)
    • Reads the machine GUID from the registry

      • foxit-reader-2024.3.0.26795-installer_nwY-yf1.tmp (PID: 6516)
      • component1.exe (PID: 7096)
      • saBSI.exe (PID: 7060)
      • UnifiedStub-installer.exe (PID: 2632)
      • installer.exe (PID: 6928)
      • servicehost.exe (PID: 5652)
      • uihost.exe (PID: 6544)
      • rsWSC.exe (PID: 7084)
      • rsEngineSvc.exe (PID: 4604)
      • rsEngineSvc.exe (PID: 2736)
      • updater.exe (PID: 7064)
      • rsWSC.exe (PID: 6200)
      • rsHelper.exe (PID: 5208)
      • rsEDRSvc.exe (PID: 3640)
      • rsEDRSvc.exe (PID: 2976)
      • rsAppUI.exe (PID: 6188)
    • Checks proxy server information

      • foxit-reader-2024.3.0.26795-installer_nwY-yf1.tmp (PID: 6516)
      • component1.exe (PID: 7096)
      • saBSI.exe (PID: 7060)
      • UnifiedStub-installer.exe (PID: 2632)
      • WerFault.exe (PID: 5472)
      • WerFault.exe (PID: 1488)
      • rsWSC.exe (PID: 7084)
    • The sample compiled with english language support

      • foxit-reader-2024.3.0.26795-installer_nwY-yf1.tmp (PID: 6516)
      • component1.exe (PID: 7096)
      • z2cjhcxw.exe (PID: 2512)
      • UnifiedStub-installer.exe (PID: 2632)
      • installer.exe (PID: 6920)
      • installer.exe (PID: 6928)
      • saBSI.exe (PID: 7060)
    • Creates files in the program directory

      • saBSI.exe (PID: 7060)
      • UnifiedStub-installer.exe (PID: 2632)
      • installer.exe (PID: 6920)
      • installer.exe (PID: 6928)
      • uihost.exe (PID: 6544)
      • servicehost.exe (PID: 5652)
      • rsWSC.exe (PID: 7084)
      • rsEngineSvc.exe (PID: 2736)
      • rsEDRSvc.exe (PID: 3640)
      • rsEngineSvc.exe (PID: 4604)
    • Reads Environment values

      • component1.exe (PID: 7096)
      • UnifiedStub-installer.exe (PID: 2632)
      • rsEngineSvc.exe (PID: 2736)
      • rsEDRSvc.exe (PID: 2976)
    • Disables trace logs

      • component1.exe (PID: 7096)
      • UnifiedStub-installer.exe (PID: 2632)
      • rsEngineSvc.exe (PID: 2736)
      • rsEDRSvc.exe (PID: 2976)
    • Sends debugging messages

      • saBSI.exe (PID: 7060)
      • installer.exe (PID: 6928)
      • rsEngineSvc.exe (PID: 2736)
      • rsEDRSvc.exe (PID: 2976)
    • The process uses the downloaded file

      • foxit-reader-2024.3.0.26795-installer_nwY-yf1.tmp (PID: 6516)
      • component1.exe (PID: 7096)
      • UnifiedStub-installer.exe (PID: 2632)
      • runonce.exe (PID: 6704)
      • rsWSC.exe (PID: 7084)
      • rsEngineSvc.exe (PID: 4604)
      • rsEDRSvc.exe (PID: 3640)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 5472)
      • WerFault.exe (PID: 1488)
      • UnifiedStub-installer.exe (PID: 2632)
      • rsWSC.exe (PID: 7084)
      • rsEngineSvc.exe (PID: 2736)
      • rsAppUI.exe (PID: 6188)
    • SQLite executable

      • UnifiedStub-installer.exe (PID: 2632)
    • Reads the time zone

      • runonce.exe (PID: 6704)
      • rsEDRSvc.exe (PID: 2976)
    • Reads security settings of Internet Explorer

      • runonce.exe (PID: 6704)
    • Reads product name

      • rsEDRSvc.exe (PID: 2976)
    • Reads CPU info

      • rsEDRSvc.exe (PID: 2976)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (53.5)
.exe | InstallShield setup (21)
.exe | Win32 EXE PECompact compressed (generic) (20.2)
.exe | Win32 Executable (generic) (2.1)
.exe | Win16/32 Executable Delphi generic (1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:02:15 14:54:16+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 741888
InitializedDataSize: 89600
UninitializedDataSize: -
EntryPoint: 0xb5eec
OSVersion: 6.1
ImageVersion: 6
SubsystemVersion: 6.1
Subsystem: Windows GUI
FileVersionNumber: 12.11.2371.8174
ProductVersionNumber: 12.11.2371.8174
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName:
FileDescription: FH Manager
FileVersion: 12.11.2371.8174
LegalCopyright: ©2023 FH Manager
OriginalFileName:
ProductName: FH Manager
ProductVersion: 12.11.2371.8174
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
181
Monitored processes
49
Malicious processes
15
Suspicious processes
3

Behavior graph

Click at the process to see the details
start foxit-reader-2024.3.0.26795-installer_nwy-yf1.exe foxit-reader-2024.3.0.26795-installer_nwy-yf1.tmp no specs foxit-reader-2024.3.0.26795-installer_nwy-yf1.exe foxit-reader-2024.3.0.26795-installer_nwy-yf1.tmp sabsi.exe component1.exe z2cjhcxw.exe unifiedstub-installer.exe rssyncsvc.exe no specs conhost.exe no specs rssyncsvc.exe no specs werfault.exe werfault.exe installer.exe installer.exe rundll32.exe no specs servicehost.exe uihost.exe rundll32.exe runonce.exe no specs grpconv.exe no specs wevtutil.exe no specs conhost.exe no specs fltmc.exe no specs conhost.exe no specs wevtutil.exe no specs conhost.exe no specs rswsc.exe rswsc.exe no specs rsclientsvc.exe no specs conhost.exe no specs rsclientsvc.exe no specs rsenginesvc.exe no specs rsenginesvc.exe updater.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs rshelper.exe no specs rsedrsvc.exe no specs rsedrsvc.exe epp.exe no specs rsappui.exe no specs rsappui.exe no specs rsappui.exe no specs rsappui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1488C:\WINDOWS\SysWOW64\WerFault.exe -u -p 6516 -s 2532C:\Windows\SysWOW64\WerFault.exe
foxit-reader-2024.3.0.26795-installer_nwY-yf1.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
1572"C:\WINDOWS\system32\wevtutil.exe" im C:\Program Files\ReasonLabs\EPP\x64\elam\evntdrv.xmlC:\Windows\System32\wevtutil.exeUnifiedStub-installer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Eventing Command Line Utility
Exit code:
87
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\wevtutil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\combase.dll
1856\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exersClientSvc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2212\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exersSyncSvc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2512"C:\Users\admin\AppData\Local\Temp\z2cjhcxw.exe" /silentC:\Users\admin\AppData\Local\Temp\z2cjhcxw.exe
component1.exe
User:
admin
Company:
ReasonLabs
Integrity Level:
HIGH
Description:
ReasonLabs-setup-wizard.exe
Exit code:
0
Version:
6.2.1
Modules
Images
c:\users\admin\appdata\local\temp\z2cjhcxw.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
2632.\UnifiedStub-installer.exe /silentC:\Users\admin\AppData\Local\Temp\7zS0D9E9FA3\UnifiedStub-installer.exe
z2cjhcxw.exe
User:
admin
Company:
Reason Software Company Inc.
Integrity Level:
HIGH
Description:
UnifiedStub
Exit code:
0
Version:
6.2.1
Modules
Images
c:\users\admin\appdata\local\temp\7zs0d9e9fa3\unifiedstub-installer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2736\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exefltMC.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2736"C:\Program Files\ReasonLabs\EPP\rsEngineSvc.exe"C:\Program Files\ReasonLabs\EPP\rsEngineSvc.exe
services.exe
User:
SYSTEM
Company:
Reason Software Company Inc.
Integrity Level:
SYSTEM
Description:
rsEngineSvc
Version:
3.2.0.0
Modules
Images
c:\program files\reasonlabs\epp\rsenginesvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
2844\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2976"C:\Program Files\ReasonLabs\EDR\rsEDRSvc.exe"C:\Program Files\ReasonLabs\EDR\rsEDRSvc.exe
services.exe
User:
SYSTEM
Company:
Reason Cybersecurity Ltd.
Integrity Level:
SYSTEM
Description:
Reason EDR Service
Version:
2.2.1
Modules
Images
c:\program files\reasonlabs\edr\rsedrsvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
63 868
Read events
63 419
Write events
375
Delete events
74

Modification events

(PID) Process:(6516) foxit-reader-2024.3.0.26795-installer_nwY-yf1.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Operation:writeName:Implementing
Value:
1C00000001000000E8070C0000001D0010000D0018009602010000001E768127E028094199FEB9D127C57AFE
(PID) Process:(6516) foxit-reader-2024.3.0.26795-installer_nwY-yf1.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
Operation:writeName:{2781761E-28E0-4109-99FE-B9D127C57AFE} {56FFCC30-D398-11D0-B2AE-00A0C908FA49} 0xFFFF
Value:
0100000000000000383361960C5ADB01
(PID) Process:(7060) saBSI.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\McAfee\WebAdvisor
Operation:writeName:UUID
Value:
{EA515A12-D4F7-4531-A5A3-6408AC9561F4}
(PID) Process:(7060) saBSI.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\McAfee\WebAdvisor
Operation:writeName:InstallerFlags
Value:
1
(PID) Process:(7096) component1.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\component1_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(7096) component1.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\component1_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(7096) component1.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\component1_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(7096) component1.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\component1_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(7096) component1.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\component1_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(7096) component1.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\component1_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
Executable files
538
Suspicious files
351
Text files
863
Unknown types
13

Dropped files

PID
Process
Filename
Type
6168foxit-reader-2024.3.0.26795-installer_nwY-yf1.exeC:\Users\admin\AppData\Local\Temp\is-R8N6C.tmp\foxit-reader-2024.3.0.26795-installer_nwY-yf1.tmpexecutable
MD5:C1267CB65DF5A7CA64E761E740BF173B
SHA256:645EB0E9B9B8E7AE14BD0B2BC32A22BB4D42430B36DBBBE516B595B645A7D8CB
6488foxit-reader-2024.3.0.26795-installer_nwY-yf1.exeC:\Users\admin\AppData\Local\Temp\is-D41SV.tmp\foxit-reader-2024.3.0.26795-installer_nwY-yf1.tmpexecutable
MD5:C1267CB65DF5A7CA64E761E740BF173B
SHA256:645EB0E9B9B8E7AE14BD0B2BC32A22BB4D42430B36DBBBE516B595B645A7D8CB
6516foxit-reader-2024.3.0.26795-installer_nwY-yf1.tmpC:\Users\admin\AppData\Local\Temp\is-F25TJ.tmp\_isetup\_setup64.tmpexecutable
MD5:E4211D6D009757C078A9FAC7FF4F03D4
SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
6516foxit-reader-2024.3.0.26795-installer_nwY-yf1.tmpC:\Users\admin\AppData\Local\Temp\is-F25TJ.tmp\RAV_Cross.pngimage
MD5:4167C79312B27C8002CBEEA023FE8CB5
SHA256:C3BF350627B842BED55E6A72AB53DA15719B4F33C267A6A132CB99FF6AFE3CD8
6516foxit-reader-2024.3.0.26795-installer_nwY-yf1.tmpC:\Users\admin\AppData\Local\Temp\is-F25TJ.tmp\WebAdvisor.pngimage
MD5:5FD73821F3F097D177009D88DFD33605
SHA256:A6ECCE54116936CA27D4BE9797E32BF2F3CFC7E41519A23032992970FBD9D3BA
6516foxit-reader-2024.3.0.26795-installer_nwY-yf1.tmpC:\Users\admin\AppData\Local\Temp\is-F25TJ.tmp\is-EE51V.tmpimage
MD5:4167C79312B27C8002CBEEA023FE8CB5
SHA256:C3BF350627B842BED55E6A72AB53DA15719B4F33C267A6A132CB99FF6AFE3CD8
6516foxit-reader-2024.3.0.26795-installer_nwY-yf1.tmpC:\Users\admin\AppData\Local\Temp\is-F25TJ.tmp\is-MI810.tmpimage
MD5:5FD73821F3F097D177009D88DFD33605
SHA256:A6ECCE54116936CA27D4BE9797E32BF2F3CFC7E41519A23032992970FBD9D3BA
6516foxit-reader-2024.3.0.26795-installer_nwY-yf1.tmpC:\Users\admin\AppData\Local\Temp\is-F25TJ.tmp\yes.pngimage
MD5:900AB589F15125687B8540514EBB03F2
SHA256:7AF227F0C6BD37B9866F76A54D3FDD315B16037152849446A2FFD810A1B6C3D0
6516foxit-reader-2024.3.0.26795-installer_nwY-yf1.tmpC:\Users\admin\AppData\Local\Temp\is-F25TJ.tmp\is-AIV0Q.tmpimage
MD5:09706EFCD33A6F1F86044AB9307C4D0A
SHA256:F5CF3B8CB810A1E298ECE06341ABC0F0D878D423E1487ACB66483BB607DD93BB
6516foxit-reader-2024.3.0.26795-installer_nwY-yf1.tmpC:\Users\admin\AppData\Local\Temp\is-F25TJ.tmp\foxit-reader-2024.3.0.26795-installer.exehtml
MD5:EF3B0E46BC161D3D7185D81DF7B9147D
SHA256:CE98F052420BA475C8E43DE1F749C38A0302E0EEE9D64D67E36E069C3C73E92B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
21
TCP/UDP connections
80
DNS requests
39
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
2.16.164.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1468
svchost.exe
GET
200
2.16.164.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1468
svchost.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6240
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
5472
WerFault.exe
GET
200
23.48.23.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5472
WerFault.exe
GET
200
2.19.217.218:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4672
SIHClient.exe
GET
200
2.19.217.218:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4712
MoUsoCoreWorker.exe
2.16.164.120:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
1468
svchost.exe
2.16.164.120:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
1468
svchost.exe
88.221.169.152:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5064
SearchApp.exe
2.23.209.176:443
www.bing.com
Akamai International B.V.
GB
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4
System
192.168.100.255:138
whitelisted
1176
svchost.exe
20.190.159.2:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 2.16.164.120
  • 2.16.164.49
  • 23.48.23.176
  • 23.48.23.145
  • 23.48.23.167
  • 23.48.23.166
  • 23.48.23.164
  • 23.48.23.158
  • 23.48.23.156
  • 23.48.23.169
  • 23.48.23.162
whitelisted
www.microsoft.com
  • 88.221.169.152
  • 2.19.217.218
whitelisted
google.com
  • 172.217.23.110
whitelisted
www.bing.com
  • 2.23.209.176
  • 2.23.209.177
  • 2.23.209.158
  • 2.23.209.149
  • 2.23.209.179
  • 2.23.209.183
  • 2.23.209.182
  • 2.23.209.160
  • 2.23.209.181
whitelisted
ocsp.digicert.com
  • 192.229.221.95
unknown
login.live.com
  • 20.190.159.2
  • 40.126.31.67
  • 20.190.159.0
  • 20.190.159.71
  • 40.126.31.71
  • 20.190.159.68
  • 20.190.159.75
  • 20.190.159.64
whitelisted
go.microsoft.com
  • 184.28.89.167
whitelisted
d3419h2vl8o3m4.cloudfront.net
  • 18.66.137.202
  • 18.66.137.114
  • 18.66.137.214
  • 18.66.137.3
whitelisted
sc.filehippo.net
  • 151.101.1.91
  • 151.101.65.91
  • 151.101.129.91
  • 151.101.193.91
unknown

Threats

No threats detected
Process
Message
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in current directory
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in EXE directory
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in EXE directory
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in EXE directory
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in EXE directory
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in EXE directory
saBSI.exe
NotComDllGetInterface: C:\Users\admin\AppData\Local\Temp\is-F25TJ.tmp\component0_extract\saBSI.exe loading C:\Users\admin\AppData\Local\Temp\is-F25TJ.tmp\component0_extract\mfeaaca.dll, WinVerifyTrust failed with 80092003
saBSI.exe
NotComDllGetInterface: C:\Users\admin\AppData\Local\Temp\is-F25TJ.tmp\component0_extract\saBSI.exe loading C:\Users\admin\AppData\Local\Temp\is-F25TJ.tmp\component0_extract\mfeaaca.dll, WinVerifyTrust failed with 80092003
saBSI.exe
NCPrivateLoadAndValidateMPTDll: Looking in current directory
saBSI.exe
NotComDllGetInterface: C:\Users\admin\AppData\Local\Temp\is-F25TJ.tmp\component0_extract\saBSI.exe loading C:\Users\admin\AppData\Local\Temp\is-F25TJ.tmp\component0_extract\mfeaaca.dll, WinVerifyTrust failed with 80092003