File name:

39cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4

Full analysis: https://app.any.run/tasks/5cbed43e-e8a3-41d3-8fab-1fb9ba4ae48c
Verdict: Malicious activity
Analysis date: April 08, 2025, 18:20:54
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
arch-doc
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

DFB4C34C623ABDF69291746050E17105

SHA1:

5469A508DBCD0FAC271C9A6363083B98FB0B4F88

SHA256:

39CF49EA66350706CB9FB8927C24B20BCB175574248BC9FEFDB6475628AF47C4

SSDEEP:

1572864:ABinBo9VzcASYOSd8gHgGgWaUp/T9oWoyQhi:AknBAVzpP7HgGgWaU3o8Ii

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Creates a software uninstall entry

      • 39cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exe (PID: 2504)
    • Process drops legitimate windows executable

      • 39cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exe (PID: 2504)
      • Installer.exe (PID: 7012)
    • Executable content was dropped or overwritten

      • 39cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exe (PID: 2504)
      • Installer.exe (PID: 7012)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • 39cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exe (PID: 2504)
    • The process creates files with name similar to system file names

      • 39cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exe (PID: 2504)
    • There is functionality for taking screenshot (YARA)

      • 39cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exe (PID: 2504)
    • Drops 7-zip archiver for unpacking

      • 39cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exe (PID: 2504)
    • Reads security settings of Internet Explorer

      • 39cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exe (PID: 2504)
      • Installer.exe (PID: 7012)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 4300)
      • cmd.exe (PID: 7604)
      • cmd.exe (PID: 4628)
      • cmd.exe (PID: 4228)
      • cmd.exe (PID: 5600)
      • cmd.exe (PID: 4172)
      • cmd.exe (PID: 8044)
      • cmd.exe (PID: 7544)
      • cmd.exe (PID: 8144)
      • cmd.exe (PID: 7352)
      • cmd.exe (PID: 6576)
      • cmd.exe (PID: 7480)
      • cmd.exe (PID: 7808)
      • cmd.exe (PID: 7984)
      • cmd.exe (PID: 7760)
      • cmd.exe (PID: 7336)
      • cmd.exe (PID: 1312)
      • cmd.exe (PID: 8104)
      • cmd.exe (PID: 7508)
      • cmd.exe (PID: 3192)
      • cmd.exe (PID: 7412)
      • cmd.exe (PID: 3032)
      • cmd.exe (PID: 4304)
      • cmd.exe (PID: 1600)
      • cmd.exe (PID: 8052)
      • cmd.exe (PID: 7852)
      • cmd.exe (PID: 7600)
      • cmd.exe (PID: 2316)
      • cmd.exe (PID: 1912)
      • cmd.exe (PID: 2108)
      • cmd.exe (PID: 4932)
      • cmd.exe (PID: 7344)
      • cmd.exe (PID: 6072)
      • cmd.exe (PID: 8076)
      • cmd.exe (PID: 8044)
      • cmd.exe (PID: 7744)
      • cmd.exe (PID: 7476)
      • cmd.exe (PID: 6048)
      • cmd.exe (PID: 7644)
      • cmd.exe (PID: 8092)
      • cmd.exe (PID: 3760)
      • cmd.exe (PID: 7828)
      • cmd.exe (PID: 1312)
      • cmd.exe (PID: 6584)
      • cmd.exe (PID: 7816)
      • cmd.exe (PID: 6808)
      • cmd.exe (PID: 7716)
      • cmd.exe (PID: 7340)
      • cmd.exe (PID: 7980)
      • cmd.exe (PID: 1660)
      • cmd.exe (PID: 7148)
      • cmd.exe (PID: 7472)
      • cmd.exe (PID: 7552)
    • Uses WMIC.EXE to obtain a list of video controllers

      • cmd.exe (PID: 2568)
      • cmd.exe (PID: 7616)
      • cmd.exe (PID: 7724)
      • cmd.exe (PID: 616)
      • cmd.exe (PID: 8132)
      • cmd.exe (PID: 2560)
      • cmd.exe (PID: 7704)
      • cmd.exe (PID: 2108)
      • cmd.exe (PID: 7536)
      • cmd.exe (PID: 3800)
      • cmd.exe (PID: 7616)
      • cmd.exe (PID: 3192)
      • cmd.exe (PID: 7712)
      • cmd.exe (PID: 8012)
      • cmd.exe (PID: 7484)
      • cmd.exe (PID: 4528)
      • cmd.exe (PID: 7716)
      • cmd.exe (PID: 3020)
    • Application launched itself

      • Installer.exe (PID: 7012)
      • Installer.exe (PID: 7536)
    • Process drops python dynamic module

      • Installer.exe (PID: 7012)
    • The process drops C-runtime libraries

      • Installer.exe (PID: 7012)
    • Reads the date of Windows installation

      • Installer.exe (PID: 7012)
    • Accesses video controller name via WMI (SCRIPT)

      • WMIC.exe (PID: 1348)
      • WMIC.exe (PID: 7724)
      • WMIC.exe (PID: 8100)
      • WMIC.exe (PID: 8008)
      • WMIC.exe (PID: 924)
      • WMIC.exe (PID: 3024)
      • WMIC.exe (PID: 2140)
      • WMIC.exe (PID: 7696)
      • WMIC.exe (PID: 6184)
      • WMIC.exe (PID: 6824)
      • WMIC.exe (PID: 7664)
      • WMIC.exe (PID: 7652)
      • WMIC.exe (PID: 7552)
      • WMIC.exe (PID: 8128)
      • WMIC.exe (PID: 5328)
      • WMIC.exe (PID: 7492)
      • WMIC.exe (PID: 7744)
      • WMIC.exe (PID: 132)
    • Starts CMD.EXE for commands execution

      • Installer.exe (PID: 7012)
      • Installer.exe (PID: 7536)
  • INFO

    • The sample compiled with english language support

      • 39cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exe (PID: 2504)
      • Installer.exe (PID: 7012)
    • Checks supported languages

      • 39cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exe (PID: 2504)
      • Installer.exe (PID: 7012)
      • Installer.exe (PID: 5260)
      • Installer.exe (PID: 5308)
      • Installer.exe (PID: 7360)
      • Installer.exe (PID: 7536)
      • Installer.exe (PID: 6676)
      • Installer.exe (PID: 7308)
      • Installer.exe (PID: 7780)
      • Installer.exe (PID: 7964)
      • Installer.exe (PID: 7992)
    • Creates files or folders in the user directory

      • 39cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exe (PID: 2504)
      • Installer.exe (PID: 7012)
      • Installer.exe (PID: 6676)
      • Installer.exe (PID: 7536)
      • Installer.exe (PID: 7964)
    • Manual execution by a user

      • Installer.exe (PID: 7012)
      • Installer.exe (PID: 1188)
      • cmd.exe (PID: 5304)
      • notepad.exe (PID: 900)
      • OpenWith.exe (PID: 6268)
      • OpenWith.exe (PID: 7796)
      • OpenWith.exe (PID: 7444)
      • OpenWith.exe (PID: 5772)
      • OpenWith.exe (PID: 2040)
      • OpenWith.exe (PID: 3796)
      • OpenWith.exe (PID: 7632)
      • OpenWith.exe (PID: 7640)
    • Reads the computer name

      • 39cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exe (PID: 2504)
      • Installer.exe (PID: 5260)
      • Installer.exe (PID: 7012)
      • Installer.exe (PID: 6676)
      • Installer.exe (PID: 7536)
      • Installer.exe (PID: 7780)
      • Installer.exe (PID: 7964)
    • Create files in a temporary directory

      • Installer.exe (PID: 7012)
      • 39cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exe (PID: 2504)
      • Installer.exe (PID: 7536)
    • Creates files in the program directory

      • 39cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exe (PID: 2504)
    • Reads Environment values

      • Installer.exe (PID: 7012)
      • Installer.exe (PID: 7536)
    • Reads product name

      • Installer.exe (PID: 7012)
      • Installer.exe (PID: 7536)
    • Reads CPU info

      • Installer.exe (PID: 7012)
      • Installer.exe (PID: 7536)
    • Reads security settings of Internet Explorer

      • WMIC.exe (PID: 1348)
      • WMIC.exe (PID: 7724)
      • WMIC.exe (PID: 8100)
      • WMIC.exe (PID: 8008)
      • WMIC.exe (PID: 924)
      • WMIC.exe (PID: 3024)
      • WMIC.exe (PID: 2140)
      • WMIC.exe (PID: 6184)
      • WMIC.exe (PID: 7552)
      • WMIC.exe (PID: 5328)
    • Process checks computer location settings

      • Installer.exe (PID: 7012)
      • Installer.exe (PID: 5308)
      • Installer.exe (PID: 7360)
      • Installer.exe (PID: 7308)
      • Installer.exe (PID: 7536)
      • Installer.exe (PID: 7992)
    • Reads the machine GUID from the registry

      • Installer.exe (PID: 7012)
      • Installer.exe (PID: 7536)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 4628)
      • powershell.exe (PID: 7736)
    • Checks proxy server information

      • Installer.exe (PID: 7012)
      • Installer.exe (PID: 7536)
      • slui.exe (PID: 7836)
    • Reads Windows Product ID

      • powershell.exe (PID: 7460)
      • powershell.exe (PID: 8188)
      • powershell.exe (PID: 4528)
      • powershell.exe (PID: 7832)
      • powershell.exe (PID: 4008)
      • powershell.exe (PID: 6264)
      • powershell.exe (PID: 2416)
      • powershell.exe (PID: 7884)
      • powershell.exe (PID: 4228)
      • powershell.exe (PID: 6752)
      • powershell.exe (PID: 7476)
      • powershell.exe (PID: 1348)
    • Reads Microsoft Office registry keys

      • OpenWith.exe (PID: 6268)
      • OpenWith.exe (PID: 7796)
      • OpenWith.exe (PID: 7444)
      • OpenWith.exe (PID: 3796)
      • OpenWith.exe (PID: 7640)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2018:12:15 22:26:14+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 26624
InitializedDataSize: 473088
UninitializedDataSize: 16384
EntryPoint: 0x338f
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 4.3.41.0
ProductVersionNumber: 4.3.41.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
FileDescription: This is an innovative application developed to the highest security standards.
FileVersion: 4.3.41
LegalCopyright: Copyright © 2025 Installer
ProductName: Installer
ProductVersion: 4.3.41
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
365
Monitored processes
239
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 39cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exe installer.exe no specs installer.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs wmic.exe no specs installer.exe no specs installer.exe installer.exe no specs installer.exe no specs installer.exe no specs installer.exe no specs installer.exe no specs cmd.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs wmic.exe no specs powershell.exe no specs installer.exe no specs installer.exe no specs installer.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs slui.exe cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs notepad.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs openwith.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs openwith.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs openwith.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs openwith.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs openwith.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs openwith.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs openwith.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs openwith.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs cmd.exe no specs conhost.exe no specs powershell.exe no specs 39cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
132wmic path win32_VideoController get nameC:\Windows\System32\wbem\WMIC.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\framedynos.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
300powershell.exe -Command "(Get-CimInstance Win32_ComputerSystemProduct).UUID"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\atl.dll
300powershell -Command "(Get-WmiObject Win32_OperatingSystem).Caption"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
540\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
616C:\WINDOWS\system32\cmd.exe /d /s /c "wmic path win32_VideoController get name"C:\Windows\System32\cmd.exeInstaller.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
732powershell -Command "Get-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion' | Select-Object -ExpandProperty InstallDate"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows PowerShell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\windowspowershell\v1.0\powershell.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
864\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
872\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
900"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\README.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
924wmic path win32_VideoController get nameC:\Windows\System32\wbem\WMIC.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\framedynos.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
Total events
242 156
Read events
242 084
Write events
18
Delete events
54

Modification events

(PID) Process:(2504) 39cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\f84a1f8f-4350-566d-aebc-bd056217375f
Operation:writeName:InstallLocation
Value:
C:\Program Files\Installer
(PID) Process:(2504) 39cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\f84a1f8f-4350-566d-aebc-bd056217375f
Operation:writeName:KeepShortcuts
Value:
true
(PID) Process:(2504) 39cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\f84a1f8f-4350-566d-aebc-bd056217375f
Operation:writeName:ShortcutName
Value:
Installer
(PID) Process:(2504) 39cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\f84a1f8f-4350-566d-aebc-bd056217375f
Operation:writeName:DisplayName
Value:
Installer 4.3.41
(PID) Process:(2504) 39cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\f84a1f8f-4350-566d-aebc-bd056217375f
Operation:writeName:UninstallString
Value:
"C:\Program Files\Installer\Uninstall Installer.exe" /allusers
(PID) Process:(2504) 39cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\f84a1f8f-4350-566d-aebc-bd056217375f
Operation:writeName:QuietUninstallString
Value:
"C:\Program Files\Installer\Uninstall Installer.exe" /allusers /S
(PID) Process:(2504) 39cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\f84a1f8f-4350-566d-aebc-bd056217375f
Operation:writeName:DisplayVersion
Value:
4.3.41
(PID) Process:(2504) 39cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\f84a1f8f-4350-566d-aebc-bd056217375f
Operation:writeName:DisplayIcon
Value:
C:\Program Files\Installer\Installer.exe,0
(PID) Process:(2504) 39cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\f84a1f8f-4350-566d-aebc-bd056217375f
Operation:writeName:NoModify
Value:
1
(PID) Process:(2504) 39cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\f84a1f8f-4350-566d-aebc-bd056217375f
Operation:writeName:NoRepair
Value:
1
Executable files
50
Suspicious files
348
Text files
221
Unknown types
0

Dropped files

PID
Process
Filename
Type
250439cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exeC:\Users\admin\AppData\Local\Temp\nslD1CA.tmp\app-64.7z
MD5:
SHA256:
250439cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exeC:\Users\admin\AppData\Local\Temp\nslD1CA.tmp\7z-out\icudtl.dat
MD5:
SHA256:
250439cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exeC:\Users\admin\AppData\Local\Temp\nslD1CA.tmp\7z-out\LICENSES.chromium.html
MD5:
SHA256:
250439cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exeC:\Users\admin\AppData\Local\Temp\nslD1CA.tmp\StdUtils.dllexecutable
MD5:C6A6E03F77C313B267498515488C5740
SHA256:B72E9013A6204E9F01076DC38DABBF30870D44DFC66962ADBF73619D4331601E
250439cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exeC:\Users\admin\AppData\Local\Temp\nslD1CA.tmp\7z-out\LICENSE.electron.txttext
MD5:4D42118D35941E0F664DDDBD83F633C5
SHA256:5154E165BD6C2CC0CFBCD8916498C7ABAB0497923BAFCD5CB07673FE8480087D
250439cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exeC:\Users\admin\AppData\Local\Temp\nslD1CA.tmp\SpiderBanner.dllexecutable
MD5:17309E33B596BA3A5693B4D3E85CF8D7
SHA256:996A259E53CA18B89EC36D038C40148957C978C0FD600A268497D4C92F882A93
250439cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exeC:\Users\admin\AppData\Local\Temp\nslD1CA.tmp\nsProcess.dllexecutable
MD5:F0438A894F3A7E01A4AAE8D1B5DD0289
SHA256:30C6C3DD3CC7FCEA6E6081CE821ADC7B2888542DAE30BF00E881C0A105EB4D11
250439cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exeC:\Users\admin\AppData\Local\Temp\nslD1CA.tmp\7z-out\chrome_200_percent.pakbinary
MD5:3C2498DA8019596DFD760412E71E019C
SHA256:0EC6C7CB89256736AE3BACB06C6B6E2B2EEE92F79D395BD76B372197FB4D07F4
250439cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exeC:\Users\admin\AppData\Local\Temp\nslD1CA.tmp\7z-out\chrome_100_percent.pakbinary
MD5:FACAE785097B1C688DA1DD683207B47E
SHA256:0ED41F76ACAEFBE6B2C1E79875D86A4FFE2875BC9040BC91C77E494F63A872CA
250439cf49ea66350706cb9fb8927c24b20bcb175574248bc9fefdb6475628af47c4.exeC:\Users\admin\AppData\Local\Temp\nslD1CA.tmp\System.dllexecutable
MD5:0D7AD4F45DC6F5AA87F606D0331C6901
SHA256:3EB38AE99653A7DBC724132EE240F6E5C4AF4BFE7C01D31D23FAF373F9F2EACA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
29
DNS requests
19
Threats
6

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
2.22.242.90:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.22.242.90:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2104
svchost.exe
GET
200
2.22.242.90:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1324
SIHClient.exe
GET
200
23.200.189.225:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1324
SIHClient.exe
GET
200
23.200.189.225:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
2.22.242.90:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2104
svchost.exe
2.22.242.90:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
2.22.242.90:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
1324
SIHClient.exe
4.245.163.56:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
1324
SIHClient.exe
23.200.189.225:80
www.microsoft.com
Moratelindo Internet Exchange Point
ID
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.142
whitelisted
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 2.22.242.90
  • 2.22.242.121
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
www.microsoft.com
  • 23.200.189.225
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted
trouveur.com
  • 172.67.215.196
  • 104.21.61.224
unknown
challenges.cloudflare.com
  • 104.18.95.41
  • 104.18.94.41
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

PID
Process
Class
Message
6676
Installer.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
6676
Installer.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
6676
Installer.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
6676
Installer.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
6676
Installer.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
6676
Installer.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
No debug info