File name:

setupfreeping.exe

Full analysis: https://app.any.run/tasks/d2aa9b15-f712-416e-ae0e-47261c0df0c8
Verdict: Malicious activity
Analysis date: May 28, 2025, 07:20:24
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive, 4 sections
MD5:

494B564BAD6FDACCD9ADD357E34C1485

SHA1:

9B4FBE3A6C0789ED2F412750A84FEFFBCCCED804

SHA256:

4CF7B2C21D26B1480D1F991041448B6EC80DA717BD5DC178BCF1F99EFE7202A2

SSDEEP:

49152:oNYPzEvUrESIdZW3lzvIFbhtTDrXgzsisRdbD8wTSj89zp7CyW7ITk6vALFpCTqi:oNOAsrEBuzvIFdtTXsVsRdTTU89z9KIl

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • setupfreeping.exe (PID: 7624)
      • Setup.exe (PID: 7740)
      • IKernel.exe (PID: 7888)
    • Creates/Modifies COM task schedule object

      • IKernel.exe (PID: 7888)
    • There is functionality for taking screenshot (YARA)

      • Setup.exe (PID: 7740)
      • setupfreeping.exe (PID: 7624)
    • Application launched itself

      • IKernel.exe (PID: 7888)
  • INFO

    • Create files in a temporary directory

      • setupfreeping.exe (PID: 7624)
      • Setup.exe (PID: 7740)
      • IKernel.exe (PID: 7888)
    • The sample compiled with english language support

      • setupfreeping.exe (PID: 7624)
      • Setup.exe (PID: 7740)
      • IKernel.exe (PID: 7888)
    • Checks supported languages

      • setupfreeping.exe (PID: 7624)
      • Setup.exe (PID: 7740)
      • IKernel.exe (PID: 7840)
      • IKernel.exe (PID: 7888)
      • IKernel.exe (PID: 7940)
    • Reads the computer name

      • setupfreeping.exe (PID: 7624)
      • Setup.exe (PID: 7740)
      • IKernel.exe (PID: 7840)
      • IKernel.exe (PID: 7888)
      • IKernel.exe (PID: 7940)
    • Creates files in the program directory

      • Setup.exe (PID: 7740)
      • IKernel.exe (PID: 7888)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2000:06:16 18:00:04+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 69632
InitializedDataSize: 98304
UninitializedDataSize: -
EntryPoint: 0x84a7
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 2.11.15.0
ProductVersionNumber: 2.11.15.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
Comments: -
CompanyName: Tools4ever
FileDescription: -
FileVersion: 2.00.000
InternalName: stub32i.exe
LegalCopyright: -
OriginalFileName: stub32i.exe
ProductName: FREEping
ProductVersion: 2.00.000
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
138
Monitored processes
8
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start setupfreeping.exe setup.exe sppextcomobj.exe no specs slui.exe no specs ikernel.exe no specs ikernel.exe ikernel.exe no specs setupfreeping.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
7504"C:\Users\admin\AppData\Local\Temp\setupfreeping.exe" C:\Users\admin\AppData\Local\Temp\setupfreeping.exeexplorer.exe
User:
admin
Company:
Tools4ever
Integrity Level:
MEDIUM
Exit code:
3221226540
Version:
2.00.000
Modules
Images
c:\users\admin\appdata\local\temp\setupfreeping.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
7624"C:\Users\admin\AppData\Local\Temp\setupfreeping.exe" C:\Users\admin\AppData\Local\Temp\setupfreeping.exe
explorer.exe
User:
admin
Company:
Tools4ever
Integrity Level:
HIGH
Version:
2.00.000
Modules
Images
c:\users\admin\appdata\local\temp\setupfreeping.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acgenral.dll
7740"C:\Users\admin\AppData\Local\Temp\pftAA2E~tmp\Disk1\Setup.exe"C:\Users\admin\AppData\Local\Temp\pftAA2E~tmp\Disk1\Setup.exe
setupfreeping.exe
User:
admin
Company:
InstallShield Software Corporation
Integrity Level:
HIGH
Description:
InstallShield (R) Setup Launcher
Version:
6, 22, 100, 1441
Modules
Images
c:\users\admin\appdata\local\temp\pftaa2e~tmp\disk1\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acspecfc.dll
7752C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7800"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7840"C:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe" -RegServerC:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeSetup.exe
User:
admin
Company:
InstallShield Software Corporation
Integrity Level:
HIGH
Description:
InstallShield (R) Setup Engine
Exit code:
0
Version:
6, 30, 100, 1255
Modules
Images
c:\program files (x86)\common files\installshield\engine\6\intel 32\ikernel.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acspecfc.dll
7888C:\PROGRA~2\COMMON~1\INSTAL~1\Engine\6\INTEL3~1\IKernel.exe -EmbeddingC:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exe
svchost.exe
User:
admin
Company:
InstallShield Software Corporation
Integrity Level:
HIGH
Description:
InstallShield (R) Setup Engine
Version:
6, 30, 100, 1255
Modules
Images
c:\program files (x86)\common files\installshield\engine\6\intel 32\ikernel.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acspecfc.dll
7940"C:\Program Files (x86)\Common Files\InstallShield\engine\6\Intel 32\iKernel.exe" /REGSERVERC:\Program Files (x86)\Common Files\InstallShield\Engine\6\Intel 32\IKernel.exeIKernel.exe
User:
admin
Company:
InstallShield Software Corporation
Integrity Level:
HIGH
Description:
InstallShield (R) Setup Engine
Exit code:
0
Version:
6, 30, 100, 1255
Modules
Images
c:\program files (x86)\common files\installshield\engine\6\intel 32\ikernel.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\acspecfc.dll
Total events
905
Read events
756
Write events
149
Delete events
0

Modification events

(PID) Process:(7840) IKernel.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AA7E2068-CB55-11D2-8094-00104B1F9838}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(7840) IKernel.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{AA7E2068-CB55-11D2-8094-00104B1F9838}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(7840) IKernel.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{AA7E2066-CB55-11D2-8094-00104B1F9838}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(7840) IKernel.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{AA7E2066-CB55-11D2-8094-00104B1F9838}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(7840) IKernel.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CC096170-E2CB-11D2-80C8-00104B1F6CEA}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(7840) IKernel.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{CC096170-E2CB-11D2-80C8-00104B1F6CEA}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(7840) IKernel.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8C3C1B11-E59D-11D2-B40B-00A024B9DDDD}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(7840) IKernel.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{8C3C1B11-E59D-11D2-B40B-00A024B9DDDD}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(7840) IKernel.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8C3C1B13-E59D-11D2-B40B-00A024B9DDDD}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(7840) IKernel.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{8C3C1B13-E59D-11D2-B40B-00A024B9DDDD}\TypeLib
Operation:writeName:Version
Value:
1.0
Executable files
15
Suspicious files
6
Text files
10
Unknown types
6

Dropped files

PID
Process
Filename
Type
7624setupfreeping.exeC:\Users\admin\AppData\Local\Temp\extA9DF.tmpini
MD5:19A2283172165182D05BBD5745372F62
SHA256:379ADDFC2E4A0309EC0526507D564FC79EEB6635963C0E84F10CB8B103036C54
7624setupfreeping.exeC:\Users\admin\AppData\Local\Temp\pftAA2E~tmp\Disk1\data2.cabcompressed
MD5:48022AEA97C58D91CC48D451824CD395
SHA256:1FC7946AF3D09C8B134748763BD1FF191BE5486840E2562EE9CF6569769AC0BD
7624setupfreeping.exeC:\Users\admin\AppData\Local\Temp\pftAA2E~tmp\pftw1.pkgcompressed
MD5:23A6F6BE8FD19511997DAE8147163EE8
SHA256:5F051E21F6306D07B12B79C38C3850EA6CD0CE0FB5D40D6E8235766FDBC334E7
7624setupfreeping.exeC:\Users\admin\AppData\Local\Temp\pftAA2E~tmp\Disk1\Setup.bmpimage
MD5:648AD514725476ACB1D0DE275F86CB94
SHA256:5160BCA96AEC237EA1B9D1B3E8AFD7E3A1767F2AFE8CB1653B3302CB83216885
7624setupfreeping.exeC:\Users\admin\AppData\Local\Temp\pftAA2E~tmp\Disk1\data1.cabcompressed
MD5:1EC33F8D113BCE85E57FADA9146AA37C
SHA256:69A35E68DE835AE562874F900BE9E2EF34783648FB6E5D31F5C807C84354CF9D
7624setupfreeping.exeC:\Users\admin\AppData\Local\Temp\pftAA2E~tmp\Disk1\data1.hdrhdr
MD5:69F559BA6433F16A30C20408498D4240
SHA256:81AFCD20EF3DF4CFD8DA0D93BF7E73D6773867258E12ECE612C12423791DB75B
7624setupfreeping.exeC:\Users\admin\AppData\Local\Temp\pftAA2E~tmp\Disk1\layout.binbinary
MD5:B4B6DC0CB0837D2C8A4707E1551E19D7
SHA256:9B95B3E7431D7EF09B1EB31E483B4C83F2CFEC5DBBD13A0FA75F3D4339AB96B8
7624setupfreeping.exeC:\Users\admin\AppData\Local\Temp\pftAA2E~tmp\Disk1\ikernel.ex_ex_
MD5:62C19D304284382835F17F4974E78744
SHA256:230C8E005CC85E8E905B0D03206BD08F83D99B2BDCFD321C3D114E96AAC28112
7740Setup.exeC:\Users\admin\AppData\Local\Temp\IECB43E.tmpex_
MD5:62C19D304284382835F17F4974E78744
SHA256:230C8E005CC85E8E905B0D03206BD08F83D99B2BDCFD321C3D114E96AAC28112
7624setupfreeping.exeC:\Users\admin\AppData\Local\Temp\pftAA2E~tmp\Disk1\setup.inxinx
MD5:6C4F6033426AAB6325D379697937DF2E
SHA256:EFA31AEC25580AD6CA9BD3A81FBEEE041225ED4F9827B4D80BB9C23720CAF099
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
16
DNS requests
9
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
8144
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
8144
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
5496
MoUsoCoreWorker.exe
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
6112
RUXIMICS.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:138
whitelisted
5796
svchost.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
8144
SIHClient.exe
20.12.23.50:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
8144
SIHClient.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.206.78
whitelisted
crl.microsoft.com
  • 2.16.241.12
  • 2.16.241.19
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 2.23.246.101
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted

Threats

No threats detected
No debug info