File name:

WOMicClientSetup6.1.exe

Full analysis: https://app.any.run/tasks/8cebf1d7-5d6b-4260-a224-4f16fab1784a
Verdict: Malicious activity
Analysis date: July 06, 2025, 04:44:50
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

880A67CBF94ED6D3C62045C1CF2D94A8

SHA1:

9BB67C0B515234A1452E2DCC48CBCC332A631F15

SHA256:

28F0C4F4EC7135700BDA47F306AD121BD48E866F16F8C74224FE4E0CF06A9C26

SSDEEP:

49152:8e3Mscof5Ch/NTpd94tc6dnsZMV9lN7XvpArIpnRR+eAkrh6YdBPdZCaZ7Yczu9L:8e8snmN1d94t5dMWBpAyRR+AF6YdEYzA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WOMicClientSetup6.1.exe (PID: 1944)
      • devcon.exe (PID: 304)
      • drvinst.exe (PID: 3648)
      • drvinst.exe (PID: 2124)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • WOMicClientSetup6.1.exe (PID: 1944)
    • There is functionality for taking screenshot (YARA)

      • WOMicClientSetup6.1.exe (PID: 1944)
    • The process creates files with name similar to system file names

      • WOMicClientSetup6.1.exe (PID: 1944)
    • Uses NETSH.EXE to add a firewall rule or allowed programs

      • WOMicClientSetup6.1.exe (PID: 1944)
    • Creates a software uninstall entry

      • WOMicClientSetup6.1.exe (PID: 1944)
    • Process drops legitimate windows executable

      • WOMicClientSetup6.1.exe (PID: 1944)
    • Drops a system driver (possible attempt to evade defenses)

      • WOMicClientSetup6.1.exe (PID: 1944)
      • drvinst.exe (PID: 3648)
      • devcon.exe (PID: 304)
      • drvinst.exe (PID: 2124)
    • Reads security settings of Internet Explorer

      • devcon.exe (PID: 304)
    • Creates files in the driver directory

      • drvinst.exe (PID: 3648)
      • drvinst.exe (PID: 2124)
    • Creates or modifies Windows services

      • drvinst.exe (PID: 2124)
    • The process executes via Task Scheduler

      • PLUGScheduler.exe (PID: 4116)
      • updater.exe (PID: 3556)
    • Application launched itself

      • updater.exe (PID: 3556)
  • INFO

    • Create files in a temporary directory

      • WOMicClientSetup6.1.exe (PID: 1944)
      • devcon.exe (PID: 304)
    • Checks supported languages

      • WOMicClientSetup6.1.exe (PID: 1944)
      • devcon.exe (PID: 304)
      • drvinst.exe (PID: 3648)
      • drvinst.exe (PID: 2124)
      • updater.exe (PID: 3556)
      • updater.exe (PID: 4984)
    • Creates files in the program directory

      • WOMicClientSetup6.1.exe (PID: 1944)
      • PLUGScheduler.exe (PID: 4116)
    • The sample compiled with english language support

      • WOMicClientSetup6.1.exe (PID: 1944)
      • devcon.exe (PID: 304)
      • drvinst.exe (PID: 3648)
      • drvinst.exe (PID: 2124)
    • Reads the computer name

      • WOMicClientSetup6.1.exe (PID: 1944)
      • devcon.exe (PID: 304)
      • drvinst.exe (PID: 3648)
      • drvinst.exe (PID: 2124)
      • PLUGScheduler.exe (PID: 4116)
      • updater.exe (PID: 3556)
    • Creates files or folders in the user directory

      • WOMicClientSetup6.1.exe (PID: 1944)
    • Reads the machine GUID from the registry

      • devcon.exe (PID: 304)
      • drvinst.exe (PID: 3648)
    • Reads the software policy settings

      • devcon.exe (PID: 304)
      • drvinst.exe (PID: 3648)
    • Process checks whether UAC notifications are on

      • updater.exe (PID: 3556)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2016:04:03 20:19:02+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 25600
InitializedDataSize: 186368
UninitializedDataSize: 2048
EntryPoint: 0x32a0
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
280
Monitored processes
17
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start womicclientsetup6.1.exe netsh.exe no specs conhost.exe no specs netsh.exe no specs conhost.exe no specs netsh.exe no specs conhost.exe no specs netsh.exe no specs conhost.exe no specs devcon.exe conhost.exe no specs drvinst.exe drvinst.exe updater.exe no specs plugscheduler.exe no specs updater.exe no specs womicclientsetup6.1.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
304devcon.exe install womic.inf Root\WOMicC:\Program Files (x86)\WOMic\driver\devcon.exe
WOMicClientSetup6.1.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Device Console
Exit code:
0
Version:
10.0.19041.685 (WinBuild.160101.0800)
Modules
Images
c:\program files (x86)\womic\driver\devcon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
684C:\WINDOWS\system32\netsh.exe advfirewall firewall add rule name="WOMic" profile=any dir=in action=allow program="C:\Program Files (x86)\WOMic\womicclient.exe" enable=yes protocol=TCPC:\Windows\SysWOW64\netsh.exeWOMicClientSetup6.1.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\netsh.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1132\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exenetsh.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1944"C:\Users\admin\Desktop\WOMicClientSetup6.1.exe" C:\Users\admin\Desktop\WOMicClientSetup6.1.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\womicclientsetup6.1.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
2124DrvInst.exe "2" "211" "ROOT\MEDIA\0000" "C:\WINDOWS\INF\oem1.inf" "oem1.inf:ed86ca11fdcda04c:InstallWOMic:2.1.0.0:root\womic," "46d27e6e7" "00000000000001D8"C:\Windows\System32\drvinst.exe
svchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\drvinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\devrtl.dll
c:\windows\system32\drvstore.dll
2800C:\WINDOWS\system32\netsh.exe advfirewall firewall add rule name="WOMic" profile=any dir=out action=allow program="C:\Program Files (x86)\WOMic\womicclient.exe" enable=yes protocol=UDPC:\Windows\SysWOW64\netsh.exeWOMicClientSetup6.1.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\netsh.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
3556"C:\Program Files (x86)\Google\GoogleUpdater\134.0.6985.0\updater.exe" --wake --systemC:\Program Files (x86)\Google\GoogleUpdater\134.0.6985.0\updater.exesvchost.exe
User:
SYSTEM
Company:
Google LLC
Integrity Level:
SYSTEM
Description:
Google Updater
Exit code:
0
Version:
134.0.6985.0
Modules
Images
c:\windows\syswow64\winhttp.dll
c:\windows\syswow64\winmm.dll
c:\windows\syswow64\uxtheme.dll
c:\windows\syswow64\version.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.3636_none_a863d714867441db\comctl32.dll
c:\windows\syswow64\sspicli.dll
c:\windows\syswow64\bcryptprimitives.dll
c:\windows\syswow64\shcore.dll
c:\windows\syswow64\windows.storage.dll
c:\windows\syswow64\wldp.dll
3648DrvInst.exe "4" "0" "C:\Users\admin\AppData\Local\Temp\{61ac0a3b-e23a-3247-8ca6-80a17822886c}\womic.inf" "9" "46d27e6e7" "00000000000001CC" "WinSta0\Default" "00000000000001DC" "208" "c:\program files (x86)\womic\driver"C:\Windows\System32\drvinst.exe
svchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\drvinst.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\devrtl.dll
c:\windows\system32\drvstore.dll
3688\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exedevcon.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4116"C:\Program Files\RUXIM\PLUGscheduler.exe"C:\Program Files\RUXIM\PLUGScheduler.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Update LifeCycle Component Scheduler
Exit code:
0
Version:
10.0.19041.3623 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\clbcatq.dll
c:\windows\system32\taskschd.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\xmllite.dll
Total events
9 442
Read events
8 798
Write events
637
Delete events
7

Modification events

(PID) Process:(1944) WOMicClientSetup6.1.exeKey:HKEY_CURRENT_USER\SOFTWARE\Wolicheng\WOMic
Operation:writeName:language
Value:
1033
(PID) Process:(1944) WOMicClientSetup6.1.exeKey:HKEY_CURRENT_USER\SOFTWARE\Wolicheng\WOMic
Operation:writeName:bluetoothDevice
Value:
00:00:00:00:00:00
(PID) Process:(1944) WOMicClientSetup6.1.exeKey:HKEY_CURRENT_USER\SOFTWARE\Wolicheng\WOMic
Operation:writeName:hotSpot
Value:
192.168.43.1
(PID) Process:(1944) WOMicClientSetup6.1.exeKey:HKEY_CURRENT_USER\SOFTWARE\Wolicheng\WOMic
Operation:writeName:wifiAddr
Value:
192.168.1.101
(PID) Process:(1944) WOMicClientSetup6.1.exeKey:HKEY_CURRENT_USER\SOFTWARE\Wolicheng\WOMic
Operation:writeName:transport
Value:
3
(PID) Process:(1944) WOMicClientSetup6.1.exeKey:HKEY_CURRENT_USER\SOFTWARE\Wolicheng\WOMic
Operation:writeName:bufferSize
Value:
5
(PID) Process:(1944) WOMicClientSetup6.1.exeKey:HKEY_CURRENT_USER\SOFTWARE\Wolicheng\WOMic
Operation:writeName:controlPort
Value:
8125
(PID) Process:(1944) WOMicClientSetup6.1.exeKey:HKEY_CURRENT_USER\SOFTWARE\Wolicheng\WOMic
Operation:writeName:mediaPort
Value:
60000
(PID) Process:(1944) WOMicClientSetup6.1.exeKey:HKEY_CURRENT_USER\SOFTWARE\Wolicheng\WOMic
Operation:writeName:x
Value:
500
(PID) Process:(1944) WOMicClientSetup6.1.exeKey:HKEY_CURRENT_USER\SOFTWARE\Wolicheng\WOMic
Operation:writeName:y
Value:
200
Executable files
21
Suspicious files
55
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
1944WOMicClientSetup6.1.exeC:\Users\admin\AppData\Local\Temp\nsb5E8C.tmp\System.dllexecutable
MD5:0FF2D70CFDC8095EA99CA2DABBEC3CD7
SHA256:982C5FB7ADA7D8C9BC3E419D1C35DA6F05BC5DD845940C179AF3A33D00A36A8B
1944WOMicClientSetup6.1.exeC:\Users\admin\AppData\Local\Temp\nsb5E8C.tmp\nsExec.dllexecutable
MD5:01E76FE9D2033606A48D4816BD9C2D9D
SHA256:EE052FD5141BF769B841846170AABF0D7C2BB922C74C623C3F109344534F7A70
1944WOMicClientSetup6.1.exeC:\Users\admin\AppData\Local\Temp\nsb5E8C.tmp\nsDialogs.dllexecutable
MD5:D6C3DD680C6467D07D730255D0EE5D87
SHA256:AEDB5122C12037BCF5C79C2197D1474E759CF47C67C37CDB21CF27428854A55B
1944WOMicClientSetup6.1.exeC:\Users\admin\AppData\Local\Temp\nsb5E8C.tmp\LangDLL.dllexecutable
MD5:174708997758321CF926B69318C6C3F5
SHA256:F577B66492E97C7B8BF515398D8DEB745ABAFD74F56FC03E67FCE248EBBEB873
1944WOMicClientSetup6.1.exeC:\Users\admin\AppData\Local\Temp\nsb5E8C.tmp\modern-wizard.bmpimage
MD5:CBE40FD2B1EC96DAEDC65DA172D90022
SHA256:3AD2DC318056D0A2024AF1804EA741146CFC18CC404649A44610CBF8B2056CF2
1944WOMicClientSetup6.1.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WO Mic Client\WO Mic Client.lnkbinary
MD5:6B099DD5F49DBF7B59AE5D6E8377266C
SHA256:E0F1A516DE5C82F41D2F5AD1B64FCD6D71ACA703B733B9FCFD66F3BB950492FC
1944WOMicClientSetup6.1.exeC:\Program Files (x86)\WOMic\adb.exeexecutable
MD5:884242FB6CBBEC1F7711B946EF669E0E
SHA256:65210CB4139672B53ACAA2222B1005D036B0B02C437AA47E0E7B616FAB0E2F6F
1944WOMicClientSetup6.1.exeC:\Program Files (x86)\WOMic\uninstall.exeexecutable
MD5:F548C566E4ACE1155B6DFE365173611F
SHA256:0F77E97EB9A54DB50C883532A020D4300597075556BF4ED933E9E6F598981810
1944WOMicClientSetup6.1.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\WO Mic Client\Uninstall.lnkbinary
MD5:E78DA7D7F03EF9087A89767CCE06D3FA
SHA256:24D83FC2BB6FCB269FBF883E7E62A8CE3169DDBB0E36363034DBD65B0153701D
1944WOMicClientSetup6.1.exeC:\Program Files (x86)\WOMic\AdbWinUsbApi.dllexecutable
MD5:0E24119DAF1909E398FA1850B6112077
SHA256:25207C506D29C4E8DCEB61B4BD50E8669BA26012988A43FBF26A890B1E60FC97
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
83
TCP/UDP connections
62
DNS requests
26
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5944
MoUsoCoreWorker.exe
GET
200
2.20.245.137:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
2.20.245.137:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
756
RUXIMICS.exe
GET
200
2.20.245.137:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1268
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
756
RUXIMICS.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
POST
200
40.126.31.0:443
https://login.live.com/RST2.srf
unknown
xml
1.24 Kb
whitelisted
POST
400
40.126.31.0:443
https://login.live.com/ppsecure/deviceaddcredential.srf
unknown
text
203 b
whitelisted
POST
400
40.126.31.67:443
https://login.live.com/ppsecure/deviceaddcredential.srf
unknown
text
203 b
whitelisted
POST
400
20.190.159.0:443
https://login.live.com/ppsecure/deviceaddcredential.srf
unknown
text
203 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5944
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:137
whitelisted
1268
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
756
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5944
MoUsoCoreWorker.exe
2.20.245.137:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
1268
svchost.exe
2.20.245.137:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
756
RUXIMICS.exe
2.20.245.137:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
5944
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
1268
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 20.73.194.208
whitelisted
google.com
  • 142.250.186.110
whitelisted
crl.microsoft.com
  • 2.20.245.137
  • 2.20.245.139
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
login.live.com
  • 40.126.31.129
  • 20.190.159.130
  • 40.126.31.71
  • 20.190.159.128
  • 40.126.31.3
  • 20.190.159.73
  • 40.126.31.0
  • 20.190.159.64
whitelisted
go.microsoft.com
  • 95.100.186.9
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
nexusrules.officeapps.live.com
  • 52.111.236.23
  • 52.111.227.11
whitelisted
watson.events.data.microsoft.com
  • 20.42.65.92
whitelisted
self.events.data.microsoft.com
  • 20.50.80.210
  • 20.189.173.2
whitelisted

Threats

No threats detected
No debug info