File name:

ComIntRep_6518_Setup.exe

Full analysis: https://app.any.run/tasks/2db13ead-18e3-4a1c-a88b-10c1f7240023
Verdict: Malicious activity
Analysis date: December 15, 2024, 21:50:30
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
autoit
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 11 sections
MD5:

1C3B8C73419896B6A50D56DAAC3F513E

SHA1:

0389ABC2AB7A253F16997CB58E674CB4A0D510E9

SHA256:

3933C60AAD3122E8FA91F5F8A8BEFF70028FED530CF6BC839265F8FBBB7C1629

SSDEEP:

98304:drq3BdwL+SKeusQ6Rdx34TqFSUzU6s+SVQ8jq+aWQRoKcuWNug/y+BFpVArd48OG:1Iq/0QFMw

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • ComIntRep_6518_Setup.tmp (PID: 4668)
      • ComIntRep.exe (PID: 204)
    • Executable content was dropped or overwritten

      • ComIntRep_6518_Setup.exe (PID: 5576)
    • Checks Windows Trust Settings

      • ComIntRep.exe (PID: 204)
  • INFO

    • Checks supported languages

      • ComIntRep_6518_Setup.exe (PID: 5576)
      • ComIntRep_6518_Setup.tmp (PID: 4668)
      • ComIntRep.exe (PID: 204)
    • Create files in a temporary directory

      • ComIntRep_6518_Setup.exe (PID: 5576)
      • ComIntRep.exe (PID: 204)
    • Reads the computer name

      • ComIntRep_6518_Setup.tmp (PID: 4668)
      • ComIntRep.exe (PID: 204)
    • Process checks computer location settings

      • ComIntRep_6518_Setup.tmp (PID: 4668)
    • Reads mouse settings

      • ComIntRep.exe (PID: 204)
    • Manual execution by a user

      • ComIntRep.exe (PID: 1616)
      • ComIntRep.exe (PID: 204)
    • Creates files or folders in the user directory

      • ComIntRep.exe (PID: 204)
    • Reads the machine GUID from the registry

      • ComIntRep.exe (PID: 204)
    • Reads the software policy settings

      • ComIntRep.exe (PID: 204)
    • Checks proxy server information

      • ComIntRep.exe (PID: 204)
    • The process uses AutoIt

      • ComIntRep.exe (PID: 204)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (53.5)
.exe | InstallShield setup (21)
.exe | Win32 EXE PECompact compressed (generic) (20.2)
.exe | Win32 Executable (generic) (2.1)
.exe | Win16/32 Executable Delphi generic (1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:07:12 07:26:53+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 2.25
CodeSize: 685056
InitializedDataSize: 159744
UninitializedDataSize: -
EntryPoint: 0xa83bc
OSVersion: 6.1
ImageVersion: -
SubsystemVersion: 6.1
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName: Rizonesoft
FileDescription: Complete Internet Repair Setup
FileVersion:
LegalCopyright: Copyright © 2024 Rizonesoft
OriginalFileName:
ProductName: Complete Internet Repair
ProductVersion:
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
136
Monitored processes
5
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start comintrep_6518_setup.exe comintrep_6518_setup.tmp no specs comintrep_6518_setup.exe comintrep.exe no specs comintrep.exe

Process information

PID
CMD
Path
Indicators
Parent process
204"C:\Program Files\Rizonesoft\Complete Internet Repair\ComIntRep.exe" C:\Program Files\Rizonesoft\Complete Internet Repair\ComIntRep.exe
explorer.exe
User:
admin
Company:
Rizonesoft
Integrity Level:
HIGH
Description:
Complete Internet Repair
Version:
11.1.3.6518
Modules
Images
c:\program files\rizonesoft\complete internet repair\comintrep.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\psapi.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
1616"C:\Program Files\Rizonesoft\Complete Internet Repair\ComIntRep.exe" C:\Program Files\Rizonesoft\Complete Internet Repair\ComIntRep.exeexplorer.exe
User:
admin
Company:
Rizonesoft
Integrity Level:
MEDIUM
Description:
Complete Internet Repair
Exit code:
3221226540
Version:
11.1.3.6518
Modules
Images
c:\program files\rizonesoft\complete internet repair\comintrep.exe
c:\windows\system32\ntdll.dll
4668"C:\Users\admin\AppData\Local\Temp\is-RQNAI.tmp\ComIntRep_6518_Setup.tmp" /SL5="$602D2,3657937,845824,C:\Users\admin\AppData\Local\Temp\ComIntRep_6518_Setup.exe" C:\Users\admin\AppData\Local\Temp\is-RQNAI.tmp\ComIntRep_6518_Setup.tmpComIntRep_6518_Setup.exe
User:
admin
Company:
Rizonesoft
Integrity Level:
MEDIUM
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-rqnai.tmp\comintrep_6518_setup.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comdlg32.dll
5032"C:\Users\admin\AppData\Local\Temp\ComIntRep_6518_Setup.exe" /SPAWNWND=$302DE /NOTIFYWND=$602D2 C:\Users\admin\AppData\Local\Temp\ComIntRep_6518_Setup.exe
ComIntRep_6518_Setup.tmp
User:
admin
Company:
Rizonesoft
Integrity Level:
HIGH
Description:
Complete Internet Repair Setup
Exit code:
0
Version:
5576"C:\Users\admin\AppData\Local\Temp\ComIntRep_6518_Setup.exe" C:\Users\admin\AppData\Local\Temp\ComIntRep_6518_Setup.exe
explorer.exe
User:
admin
Company:
Rizonesoft
Integrity Level:
MEDIUM
Description:
Complete Internet Repair Setup
Exit code:
0
Version:
Modules
Images
c:\users\admin\appdata\local\temp\comintrep_6518_setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comctl32.dll
Total events
1 068
Read events
1 065
Write events
3
Delete events
0

Modification events

(PID) Process:(204) ComIntRep.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(204) ComIntRep.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(204) ComIntRep.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
Executable files
1
Suspicious files
3
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
204ComIntRep.exeC:\Users\admin\AppData\Roaming\Rizonesoft\ComIntRep\Logging\ComIntRep\ComIntRep.logtext
MD5:0D74BF090E533D4AFE2FDA2E1370F2E7
SHA256:61EB8EEB007F6843A77BE5B6B27F38EC6FF02C4DC45DA1BC62E2DD63F13C3FA6
5576ComIntRep_6518_Setup.exeC:\Users\admin\AppData\Local\Temp\is-RQNAI.tmp\ComIntRep_6518_Setup.tmpexecutable
MD5:CDEDB6EF16616D3A6DDFC8764C991461
SHA256:FA83116E69D573C8B00317A30168F7CA893B3794B06633FEC886D8EB108D1863
204ComIntRep.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB56B07DDAC33E06E223D8B832D28715binary
MD5:C42994FE9A061F81941900337350BC6E
SHA256:B6A43C1B4C0620CA3651373EBF00358B264E56FCF81CA47965B2ECE90BBF0920
204ComIntRep.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751binary
MD5:3DFCA46E00FFA4795C72A41375F159D3
SHA256:DCBA1A505396539BAC40A7253C9F5DCCF06CBB79957E21D56305E1FC3AF5F40E
204ComIntRep.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB56B07DDAC33E06E223D8B832D28715binary
MD5:5008E9F8B38B01878BE7846BBBCBEB86
SHA256:65F60704F73AD7C2593AB4688CE1DBBE896B39595D0BE991C5588FA8C402B268
204ComIntRep.exeC:\Users\admin\AppData\Local\Temp\u_6A22.tmptext
MD5:2C69256115D76A4A3B0B259C40935F33
SHA256:343F1A26B5BE8D2C808FA24BEEEB03C750043403B28B143E289980E6CD7A90C6
204ComIntRep.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\ComIntRep[1].rutext
MD5:2C69256115D76A4A3B0B259C40935F33
SHA256:343F1A26B5BE8D2C808FA24BEEEB03C750043403B28B143E289980E6CD7A90C6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
40
DNS requests
26
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
184.24.77.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4536
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4536
svchost.exe
GET
200
184.24.77.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
640
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
640
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
3436
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
3436
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4804
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
192.168.100.255:138
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4536
svchost.exe
184.24.77.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.24.77.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4536
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4712
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5064
SearchApp.exe
104.126.37.170:443
www.bing.com
Akamai International B.V.
DE
whitelisted
5064
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
1176
svchost.exe
40.126.32.72:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 184.24.77.12
  • 184.24.77.37
  • 184.24.77.35
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
google.com
  • 172.217.18.14
whitelisted
www.bing.com
  • 104.126.37.170
  • 104.126.37.145
  • 104.126.37.161
  • 104.126.37.153
  • 104.126.37.146
  • 104.126.37.171
  • 104.126.37.177
  • 104.126.37.162
  • 104.126.37.185
  • 104.126.37.160
  • 104.126.37.130
  • 104.126.37.186
  • 104.126.37.152
  • 104.126.37.137
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
login.live.com
  • 40.126.32.72
  • 40.126.32.76
  • 20.190.160.17
  • 40.126.32.134
  • 40.126.32.74
  • 40.126.32.138
  • 40.126.32.136
  • 20.190.160.22
whitelisted
go.microsoft.com
  • 23.218.210.69
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted

Threats

No threats detected
No debug info