File name:

iMesh_setup.exe_

Full analysis: https://app.any.run/tasks/0c60efd5-14ec-4237-a7fc-daab20f26c42
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: May 10, 2025, 18:05:49
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
stealer
delphi
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

918EE135AB0D302D282F54D3E0320549

SHA1:

490A2A3011762E7B6548F89DA96240B054438850

SHA256:

7111DBB07C431AB7E3F65E18FD00CC9FCC4897C6E23E56B88C55C1719E112904

SSDEEP:

98304:RxL5qjskQM8ljBgf0JZ3KS43P0k0g+23+Uv3R/7TqVnqSI+VLlvCObjWsoC9KV5J:WKK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • iMesh_setup.exe_.exe (PID: 6972)
      • iMesh_setup.exe_.exe (PID: 3020)
    • Actions looks like stealing of personal data

      • iMesh_V11_en_Setup.exe (PID: 3300)
  • SUSPICIOUS

    • Drops 7-zip archiver for unpacking

      • iMesh_setup.exe_.exe (PID: 3020)
    • The process creates files with name similar to system file names

      • iMesh_setup.exe_.exe (PID: 3020)
      • iMesh_V11_en_Setup.exe (PID: 3300)
    • Executable content was dropped or overwritten

      • iMesh_setup.exe_.exe (PID: 3020)
      • iMesh_V11_en_Setup.exe (PID: 3300)
  • INFO

    • The sample compiled with english language support

      • iMesh_setup.exe_.exe (PID: 3020)
      • iMesh_V11_en_Setup.exe (PID: 3300)
    • Checks supported languages

      • iMesh_setup.exe_.exe (PID: 3020)
      • iMesh_V11_en_Setup.exe (PID: 3300)
    • Create files in a temporary directory

      • iMesh_setup.exe_.exe (PID: 3020)
      • iMesh_V11_en_Setup.exe (PID: 3300)
    • Reads the computer name

      • iMesh_V11_en_Setup.exe (PID: 3300)
      • iMesh_setup.exe_.exe (PID: 3020)
    • Reads CPU info

      • iMesh_V11_en_Setup.exe (PID: 3300)
    • Compiled with Borland Delphi (YARA)

      • iMesh_V11_en_Setup.exe (PID: 3300)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2009:04:15 20:43:49+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 7.1
CodeSize: 98816
InitializedDataSize: 185856
UninitializedDataSize: -
EntryPoint: 0x12a70
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 11.0.950.47630
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
Comments: This installation was built with InstallAware: http://www.installaware.com
CompanyName: iMesh Inc.
FileDescription: iMesh
FileVersion: 11.0.0.127583
LegalCopyright: Copyright (c) 2012
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
5
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start imesh_setup.exe_.exe imesh_v11_en_setup.exe sppextcomobj.exe no specs slui.exe no specs imesh_setup.exe_.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3020"C:\Users\admin\AppData\Local\Temp\iMesh_setup.exe_.exe" C:\Users\admin\AppData\Local\Temp\iMesh_setup.exe_.exe
explorer.exe
User:
admin
Company:
iMesh Inc.
Integrity Level:
HIGH
Description:
iMesh
Version:
11.0.0.127583
Modules
Images
c:\users\admin\appdata\local\temp\imesh_setup.exe_.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
3300.\iMesh_V11_en_Setup.exe /m="C:\Users\admin\AppData\Local\Temp\IMESH_~1.EXE" /k=""C:\Users\admin\AppData\Local\Temp\miaB8A3.tmp\iMesh_V11_en_Setup.exe
iMesh_setup.exe_.exe
User:
admin
Company:
iMesh Inc.
Integrity Level:
HIGH
Description:
iMesh
Version:
11.0.0.127583
Modules
Images
c:\users\admin\appdata\local\temp\miab8a3.tmp\imesh_v11_en_setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
4040C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
5588"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6972"C:\Users\admin\AppData\Local\Temp\iMesh_setup.exe_.exe" C:\Users\admin\AppData\Local\Temp\iMesh_setup.exe_.exeexplorer.exe
User:
admin
Company:
iMesh Inc.
Integrity Level:
MEDIUM
Description:
iMesh
Exit code:
3221226540
Version:
11.0.0.127583
Modules
Images
c:\users\admin\appdata\local\temp\imesh_setup.exe_.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
Total events
357
Read events
352
Write events
2
Delete events
3

Modification events

(PID) Process:(3020) iMesh_setup.exe_.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Applications\iMesh_setup.exe_.exe
Operation:writeName:IsHostApp
Value:
(PID) Process:(3300) iMesh_V11_en_Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Applications\iMesh_V11_en_Setup.exe
Operation:writeName:IsHostApp
Value:
(PID) Process:(3300) iMesh_V11_en_Setup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
Operation:delete valueName:8FB495A1
Value:
(PID) Process:(3300) iMesh_V11_en_Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
Operation:delete valueName:8FB495A1
Value:
(PID) Process:(3300) iMesh_V11_en_Setup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:delete valueName:iMeshInstall
Value:
Executable files
14
Suspicious files
13
Text files
47
Unknown types
0

Dropped files

PID
Process
Filename
Type
3020iMesh_setup.exe_.exeC:\Users\admin\AppData\Local\Temp\miaB8A3.tmp\iMesh_V11_en_Setup.res
MD5:
SHA256:
3020iMesh_setup.exe_.exeC:\Users\admin\AppData\Local\Temp\miaB8A3.tmp\iMesh_V11_en_Setup.exeexecutable
MD5:DAC0E4A831A21A9DD3A4241FC888D635
SHA256:7638DE78D69AE57DCDE3ECC5F6F04763977A19EC4E3C84F88419F5030AA89B50
3020iMesh_setup.exe_.exeC:\Users\admin\AppData\Local\Temp\miaB8A3.tmp\OFFLINE\mMSI.dll\mMSIExec.dllexecutable
MD5:5D8F3068EED59622FCBB6154A4E79300
SHA256:CFEE120644EC5CD44552CB218AB8BF53E01EE074EA6F3CF15718FABDBBC6DD3F
3300iMesh_V11_en_Setup.exeC:\Users\admin\AppData\Local\Temp\lang.loctext
MD5:92E9EF9EEE03426DBDAB6CC57D8EA5FD
SHA256:144E84DE063A4114B350E41B09B96A7E25967E7A7AEC6B2B38EE3C12F7E3A1BF
3020iMesh_setup.exe_.exeC:\Users\admin\AppData\Local\Temp\miaB8A3.tmp\OFFLINE\mDown.dll\mDownExec.dllexecutable
MD5:B7F0D95E4E97D518496FD9D90A4E0786
SHA256:51512BA85758FB12CFD9A1850C9BEB9151FD41C5997F07F74D174CC4C787C876
3020iMesh_setup.exe_.exeC:\Users\admin\AppData\Local\Temp\miaB8A3.tmp\iMesh_V11_en_Setup.msibinary
MD5:339C101C2F19CF6D97F838D847878FA4
SHA256:ECD0910B72580898797A4ACAE73B52FDBDDDE50E6CCC53A6A6D8870306D28478
3300iMesh_V11_en_Setup.exeC:\Users\admin\AppData\Local\Temp\mia1\index3.htmhtml
MD5:8A261C200557CE855272767A0FF24325
SHA256:600FD1C8D40D3C16882D1FD43B7D6280EBEEDE71724EA5F952661497D02AD200
3020iMesh_setup.exe_.exeC:\Users\admin\AppData\Local\Temp\miaB8A3.tmp\mia.libexecutable
MD5:6A9B4E9C5DC1B4E40AF2185667C32BF9
SHA256:AB4267F8077C7012FF7E545A619ED1CA7A0B5E9469AA07B621EABC737DFAA753
3300iMesh_V11_en_Setup.exeC:\Users\admin\AppData\Local\Temp\mia1\index1.htmhtml
MD5:78DFA48A4543763D74BEBD1B68CEAD8F
SHA256:F5C56EAC5CCB41137EA3588E8F7D42E3DB921353FFC0081A637AD49A1841600D
3300iMesh_V11_en_Setup.exeC:\Users\admin\AppData\Local\Temp\mia1\index5.htmhtml
MD5:326A7F619454B9473CF12A79F625B2F1
SHA256:FF5F8528FCD4A1900088E9C93C5DB22A97DE2B8424DDF95A23B5EEEC705A671A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
21
DNS requests
14
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
304
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
2.16.168.124:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1228
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
1228
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
2.16.168.124:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
5496
MoUsoCoreWorker.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.68:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 2.16.168.124
  • 2.16.168.114
whitelisted
www.microsoft.com
  • 2.23.246.101
  • 95.101.149.131
whitelisted
google.com
  • 142.250.186.174
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 20.190.159.68
  • 20.190.159.23
  • 20.190.159.131
  • 40.126.31.0
  • 40.126.31.131
  • 20.190.159.75
  • 40.126.31.129
  • 40.126.31.69
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted

Threats

No threats detected
No debug info