File name:

codw.exe

Full analysis: https://app.any.run/tasks/7ee44522-e7a2-4ba4-af8f-9a898c6cf75d
Verdict: Malicious activity
Analysis date: January 29, 2025, 16:23:29
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 6 sections
MD5:

72AE2FF5F2F1DBBA9FDAE39432CF1354

SHA1:

10DC9772F1A0A0588B9A55F67D0F34B42B77ADFF

SHA256:

56F6A9BC151053784C8F830352FC9A5E732691367B93E6626C18FDFCE1777D54

SSDEEP:

98304:cNlQR/7o5ZIOFwBdADF97fPCpRTTlOObxmdHP4YnS8SS2H763x3gZZQM0nBgrJh7:EYd0dp5Zo

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads the BIOS version

      • codw.exe (PID: 6556)
      • Call of Duty WWII Trainer.exe (PID: 6748)
    • Executable content was dropped or overwritten

      • codw.exe (PID: 6556)
      • Call of Duty WWII Trainer.exe (PID: 6748)
    • Reads security settings of Internet Explorer

      • codw.exe (PID: 6556)
      • Call of Duty WWII Trainer.exe (PID: 6748)
    • Reads the date of Windows installation

      • codw.exe (PID: 6556)
    • Reads Microsoft Outlook installation path

      • Call of Duty WWII Trainer.exe (PID: 6748)
    • Reads Internet Explorer settings

      • Call of Duty WWII Trainer.exe (PID: 6748)
  • INFO

    • Reads the computer name

      • codw.exe (PID: 6556)
      • Call of Duty WWII Trainer.exe (PID: 6748)
    • Reads the machine GUID from the registry

      • codw.exe (PID: 6556)
      • Call of Duty WWII Trainer.exe (PID: 6748)
    • Checks supported languages

      • codw.exe (PID: 6556)
      • Call of Duty WWII Trainer.exe (PID: 6748)
    • Process checks computer location settings

      • codw.exe (PID: 6556)
    • Checks proxy server information

      • Call of Duty WWII Trainer.exe (PID: 6748)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2017:11:08 08:45:51+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Large address aware
PEType: PE32+
LinkerVersion: 11
CodeSize: 3246080
InitializedDataSize: 3262464
UninitializedDataSize: -
EntryPoint: 0x6a8000
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.3.0.15989
ProductVersionNumber: 1.3.0.15989
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: FutureXGame.com
CompanyName: Call of Duty WWII (v1.3.0.15989)
FileDescription: Call of Duty WWII v1.3.0.15989 Trainer
FileVersion: 1.3.0.15989
InternalName: FutureXGame.exe
LegalCopyright: Copyright © 2017 {BrUj£}
OriginalFileName: FutureXGame.exe
ProductName: FutureXGame.com
ProductVersion: 1.3.0.15989
AssemblyVersion: 1.3.0.15989
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start codw.exe call of duty wwii trainer.exe codw.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
6424"C:\Users\admin\Desktop\codw.exe" C:\Users\admin\Desktop\codw.exeexplorer.exe
User:
admin
Company:
Call of Duty WWII (v1.3.0.15989)
Integrity Level:
MEDIUM
Description:
Call of Duty WWII v1.3.0.15989 Trainer
Exit code:
3221226540
Version:
1.3.0.15989
Modules
Images
c:\users\admin\desktop\codw.exe
c:\windows\system32\ntdll.dll
6556"C:\Users\admin\Desktop\codw.exe" C:\Users\admin\Desktop\codw.exe
explorer.exe
User:
admin
Company:
Call of Duty WWII (v1.3.0.15989)
Integrity Level:
HIGH
Description:
Call of Duty WWII v1.3.0.15989 Trainer
Exit code:
4294967295
Version:
1.3.0.15989
Modules
Images
c:\users\admin\desktop\codw.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
6748"C:\Users\admin\FutureXGame\Call of Duty WWII Trainer.exe" C:\Users\admin\FutureXGame\Call of Duty WWII Trainer.exe
codw.exe
User:
admin
Company:
Call of Duty WWII (v1.3.0.15989)
Integrity Level:
HIGH
Description:
Call of Duty WWII Trainer
Version:
1.3.0.15989
Modules
Images
c:\users\admin\futurexgame\call of duty wwii trainer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
Total events
944
Read events
941
Write events
3
Delete events
0

Modification events

(PID) Process:(6748) Call of Duty WWII Trainer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6748) Call of Duty WWII Trainer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6748) Call of Duty WWII Trainer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
3
Suspicious files
0
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
6748Call of Duty WWII Trainer.exeC:\Users\admin\Desktop\codw_.exeexecutable
MD5:72AE2FF5F2F1DBBA9FDAE39432CF1354
SHA256:56F6A9BC151053784C8F830352FC9A5E732691367B93E6626C18FDFCE1777D54
6556codw.exeC:\Users\admin\FutureXGame\Call of Duty WWII Trainer.exeexecutable
MD5:B41151D95EAEF8D8BA8A532778AD5895
SHA256:91C05183DD63EA4AE314CC58D073D0F67D1C18EA0387BD080E226F8E39702695
6748Call of Duty WWII Trainer.exeC:\Users\admin\Desktop\codw.exeexecutable
MD5:2E313D85794DA2B4FEB64620CD7B10A4
SHA256:
6556codw.exeC:\Users\admin\FutureXGame\settings.txttext
MD5:A214ACA92D0BDC1D05C439B8D1E729F0
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
33
DNS requests
18
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6308
backgroundTaskHost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
5992
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5992
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
1176
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
4
System
192.168.100.255:137
unknown
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
unknown
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1016
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
unknown
5064
SearchApp.exe
2.21.65.154:443
www.bing.com
Akamai International B.V.
NL
unknown
5064
SearchApp.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1076
svchost.exe
184.28.89.167:443
go.microsoft.com
AKAMAI-AS
US
unknown

DNS requests

Domain
IP
Reputation
crl.microsoft.com
  • 2.16.241.12
  • 2.16.241.19
unknown
www.microsoft.com
  • 95.101.149.131
whitelisted
www.bing.com
  • 2.21.65.154
  • 2.21.65.153
  • 2.21.65.132
unknown
ocsp.digicert.com
  • 2.23.77.188
unknown
go.microsoft.com
  • 184.28.89.167
unknown
login.live.com
  • 40.126.31.67
  • 40.126.31.71
  • 20.190.159.2
  • 20.190.159.75
  • 20.190.159.4
  • 20.190.159.23
  • 20.190.159.0
  • 20.190.159.68
unknown
settings-win.data.microsoft.com
  • 51.124.78.146
  • 4.231.128.59
  • 40.127.240.158
unknown
arc.msn.com
  • 20.223.35.26
unknown
fd.api.iris.microsoft.com
  • 20.223.36.55
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted

Threats

No threats detected
No debug info