File name:

PVA Creator 2.5.5 Crack Full Version._1111216037.exe

Full analysis: https://app.any.run/tasks/3de55aa6-91ca-4f46-b674-9f0dc8c8f607
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: September 14, 2024, 02:26:06
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
stealer
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

1B1DEAA1945A9CA86E26A9690990C1E5

SHA1:

BE45D03C8285642AC78FA49E3BF7352C08066580

SHA256:

689001565BCAA343EB2FD63475F7C9A5AE49E416EBD983BCFEA85A2F2FE011F6

SSDEEP:

98304:hWdjBnxNh9bK8rD6M1m0gFCWu9w0ovB3Oo32Qx2f+di2tvD1eNpcIIsuouN1ICmc:obVRhRg

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • PVA Creator 2.5.5 Crack Full Version._1111216037.exe (PID: 6004)
  • SUSPICIOUS

    • Application launched itself

      • PVA Creator 2.5.5 Crack Full Version._1111216037.exe (PID: 4644)
      • PVA Creator 2.5.5 Crack Full Version._1111216037.exe (PID: 6004)
    • Reads security settings of Internet Explorer

      • PVA Creator 2.5.5 Crack Full Version._1111216037.exe (PID: 4644)
      • PVA Creator 2.5.5 Crack Full Version._1111216037.exe (PID: 6004)
    • Executable content was dropped or overwritten

      • PVA Creator 2.5.5 Crack Full Version._1111216037.exe (PID: 6004)
    • Reads Microsoft Outlook installation path

      • PVA Creator 2.5.5 Crack Full Version._1111216037.exe (PID: 6004)
    • Reads Internet Explorer settings

      • PVA Creator 2.5.5 Crack Full Version._1111216037.exe (PID: 6004)
  • INFO

    • Reads the computer name

      • PVA Creator 2.5.5 Crack Full Version._1111216037.exe (PID: 4644)
      • PVA Creator 2.5.5 Crack Full Version._1111216037.exe (PID: 6004)
      • PVA Creator 2.5.5 Crack Full Version._1111216037.exe (PID: 5644)
    • Checks supported languages

      • PVA Creator 2.5.5 Crack Full Version._1111216037.exe (PID: 6004)
      • PVA Creator 2.5.5 Crack Full Version._1111216037.exe (PID: 4644)
      • PVA Creator 2.5.5 Crack Full Version._1111216037.exe (PID: 5644)
    • The process uses the downloaded file

      • PVA Creator 2.5.5 Crack Full Version._1111216037.exe (PID: 4644)
      • PVA Creator 2.5.5 Crack Full Version._1111216037.exe (PID: 6004)
    • Process checks computer location settings

      • PVA Creator 2.5.5 Crack Full Version._1111216037.exe (PID: 4644)
    • Create files in a temporary directory

      • PVA Creator 2.5.5 Crack Full Version._1111216037.exe (PID: 6004)
    • Checks proxy server information

      • PVA Creator 2.5.5 Crack Full Version._1111216037.exe (PID: 6004)
    • Reads the machine GUID from the registry

      • PVA Creator 2.5.5 Crack Full Version._1111216037.exe (PID: 6004)
    • Reads Environment values

      • PVA Creator 2.5.5 Crack Full Version._1111216037.exe (PID: 6004)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (71.1)
.exe | Win32 Executable Delphi generic (9.1)
.scr | Windows screen saver (8.4)
.dll | Win32 Dynamic Link Library (generic) (4.2)
.exe | Win32 Executable (generic) (2.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1992:06:19 22:22:17+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 40448
InitializedDataSize: 17920
UninitializedDataSize: -
EntryPoint: 0xa5f8
OSVersion: 1
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName: Gedohude
FileDescription: Geroko Setup
FileVersion:
LegalCopyright: Koro
ProductName: Geroko
ProductVersion: 5.4.5
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
122
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start pva creator 2.5.5 crack full version._1111216037.exe no specs pva creator 2.5.5 crack full version._1111216037.exe pva creator 2.5.5 crack full version._1111216037.exe no specs rundll32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4064C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
4644"C:\Users\admin\AppData\Local\Temp\PVA Creator 2.5.5 Crack Full Version._1111216037.exe" C:\Users\admin\AppData\Local\Temp\PVA Creator 2.5.5 Crack Full Version._1111216037.exeexplorer.exe
User:
admin
Company:
Gedohude
Integrity Level:
MEDIUM
Description:
Geroko Setup
Exit code:
0
Version:
Modules
Images
c:\users\admin\appdata\local\temp\pva creator 2.5.5 crack full version._1111216037.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
5644"C:\Users\admin\AppData\Local\Temp\PVA Creator 2.5.5 Crack Full Version._1111216037.exe" /VoNGX/h41A /dqBuIxiJ1g:YyhwYgxaFRAiP211FM5W /_ShowProgress /PrTxt:TG9hZGluZy4uLg== /mnlC:\Users\admin\AppData\Local\Temp\PVA Creator 2.5.5 Crack Full Version._1111216037.exePVA Creator 2.5.5 Crack Full Version._1111216037.exe
User:
admin
Company:
Gedohude
Integrity Level:
HIGH
Description:
Geroko Setup
Exit code:
259
Version:
Modules
Images
c:\users\admin\appdata\local\temp\pva creator 2.5.5 crack full version._1111216037.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6004"C:\Users\admin\AppData\Local\Temp\PVA Creator 2.5.5 Crack Full Version._1111216037.exe" /VoNGX/h41A /dqBuIxiJ1g:YyhwYgxaFRAiP211FM5W /mnlC:\Users\admin\AppData\Local\Temp\PVA Creator 2.5.5 Crack Full Version._1111216037.exe
PVA Creator 2.5.5 Crack Full Version._1111216037.exe
User:
admin
Company:
Gedohude
Integrity Level:
HIGH
Description:
Geroko Setup
Exit code:
4294967206
Version:
Modules
Images
c:\users\admin\appdata\local\temp\pva creator 2.5.5 crack full version._1111216037.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
1 503
Read events
1 498
Write events
3
Delete events
2

Modification events

(PID) Process:(6004) PVA Creator 2.5.5 Crack Full Version._1111216037.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6004) PVA Creator 2.5.5 Crack Full Version._1111216037.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6004) PVA Creator 2.5.5 Crack Full Version._1111216037.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(6004) PVA Creator 2.5.5 Crack Full Version._1111216037.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\LowRegistry
Operation:delete valueName:AddToFavoritesInitialSelection
Value:
(PID) Process:(6004) PVA Creator 2.5.5 Crack Full Version._1111216037.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\LowRegistry
Operation:delete valueName:AddToFeedsInitialSelection
Value:
Executable files
2
Suspicious files
3
Text files
76
Unknown types
0

Dropped files

PID
Process
Filename
Type
6004PVA Creator 2.5.5 Crack Full Version._1111216037.exeC:\Users\admin\AppData\Local\Temp\inH12264683417\css\main.csstext
MD5:B9FE0048E61ECC2ED850016AC6B52847
SHA256:AEF6A01DA275B87AAE2A23E268DE53561D7728A9B152DE7D3F379D0E73E65A05
6004PVA Creator 2.5.5 Crack Full Version._1111216037.exeC:\Users\admin\AppData\Local\Temp\inH12264683417\css\_variables.scsstext
MD5:07922410C30F0117CBC3C140F14AEA88
SHA256:AF1999B49C03F5DCBB19466466FAC2D8172C684C0FF18931B85A8D0A06332C73
6004PVA Creator 2.5.5 Crack Full Version._1111216037.exeC:\Users\admin\AppData\Local\Temp\0012B6E4.logtext
MD5:DE70CDA69C8DD623FAC0BFD123561852
SHA256:96DE3EF98A665E9558596015512BEDB0ECBB6F65CDC44FE50CEF061758F61CA1
6004PVA Creator 2.5.5 Crack Full Version._1111216037.exeC:\Users\admin\AppData\Local\Temp\inH12264683417\css\ie6_main.csstext
MD5:AD234E6A62580F62019C78B2A718DE00
SHA256:C4F2684F16C8E4553CC29C604A2F505399039638A34E652A7A1ACDEB157A0861
6004PVA Creator 2.5.5 Crack Full Version._1111216037.exeC:\Users\admin\AppData\Local\Temp\inH12264683417\form.bmp.Maskbinary
MD5:D2FC989F9C2043CD32332EC0FAD69C70
SHA256:27DD029405CBFB0C3BF8BAC517BE5DB9AA83E981B1DC2BD5C5D6C549FA514101
6004PVA Creator 2.5.5 Crack Full Version._1111216037.exeC:\Users\admin\AppData\Local\Temp\inH12264683417\css\helpers\_border-radius.scsstext
MD5:6BDF3FD89410E39D33F8137E04AD4A16
SHA256:2C6B98CB19C3E3A0E37472767C53DF213243AE92BC80EF9A7F5BAA17F7B6FA31
6004PVA Creator 2.5.5 Crack Full Version._1111216037.exeC:\Users\admin\AppData\Local\Temp\inH12264683417\css\_functions.scsstext
MD5:8F7259DE64F6DDF352BF461F44D34A81
SHA256:80EDC9D67172BC830D68D33F4547735FB072CADF3EF25AAB37A10B50DB87A069
6004PVA Creator 2.5.5 Crack Full Version._1111216037.exeC:\Users\admin\AppData\Local\Temp\inH12264683417\css\main.scsstext
MD5:5FF4E5B6D700C7941F5C0A31E1690C09
SHA256:D4745E8A6CB9451B6EA599DA869965643CBDD2AB267895DC2F3DADD1BFB612A8
6004PVA Creator 2.5.5 Crack Full Version._1111216037.exeC:\Users\admin\AppData\Local\Temp\inH12264683417\css\helpers\_border.scsstext
MD5:681FB7EB197E8E7EBD89F828D1181FD6
SHA256:51E8AFA69ED6D92EB82F71939B0B8FD34EF23FAECEE457698238E5A4F28DF984
6004PVA Creator 2.5.5 Crack Full Version._1111216037.exeC:\Users\admin\AppData\Local\Temp\inH12264683417\css\helpers\_clearfix.scsstext
MD5:ADD166BC071472DC105F4734D2DCF0E2
SHA256:75EBE8B4A4CBBAC0EB4DE35B60972452B4526C56EEFB5186DD40A92C70773377
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
26
DNS requests
29
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2028
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5532
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2120
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5532
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6164
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
2120
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3888
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3260
svchost.exe
40.113.103.199:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2028
svchost.exe
40.126.31.67:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2028
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 40.127.240.158
  • 51.124.78.146
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 95.101.149.131
whitelisted
google.com
  • 142.250.74.206
whitelisted
client.wns.windows.com
  • 40.113.103.199
whitelisted
lists.tonorotey.com
unknown
proxy.tonorotey.com
unknown
login.live.com
  • 40.126.31.67
  • 20.190.159.71
  • 20.190.159.0
  • 20.190.159.4
  • 20.190.159.75
  • 20.190.159.73
  • 20.190.159.2
  • 40.126.31.73
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
slscr.update.microsoft.com
  • 13.85.23.86
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted

Threats

No threats detected
No debug info