| File name: | Defender.Remover.exe |
| Full analysis: | https://app.any.run/tasks/0d46a467-a684-4508-8b37-d0da65f5d7e1 |
| Verdict: | Malicious activity |
| Threats: | Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying. |
| Analysis date: | August 12, 2022, 22:12:26 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 9F81F80FB2E104B46EBE891988342D43 |
| SHA1: | 41F1DEFEC86E0FDA43CD3FFF377ABE08D9A1F222 |
| SHA256: | 91ADA6A0EA3B4C323F6BBE008ECD047911F06C4477824324921A73173C94B84E |
| SSDEEP: | 49152:N1OshksfP6Kl9E4puapqAq8RiJzB8XMMiS9gl8v29S:N1OIksaKk4RjqbZB8pT9gGf |
| .exe | | | Win32 Executable MS Visual C++ (generic) (67.4) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (14.2) |
| .exe | | | Win32 Executable (generic) (9.7) |
| .exe | | | Generic Win/DOS Executable (4.3) |
| .exe | | | DOS Executable Generic (4.3) |
| ProductVersion: | 10.1 |
|---|---|
| ProductName: | Windows Defender Remover Script |
| OriginalFileName: | defender.mpm |
| LegalCopyright: | Gallery Inc |
| InternalName: | defender.mpm |
| FileVersion: | 10.1 |
| FileDescription: | Windows Defender Remover Script |
| CompanyName: | Gallery Inc |
| CharacterSet: | Unicode |
| LanguageCode: | English (U.S.) |
| FileSubtype: | - |
| ObjectFileType: | Executable application |
| FileOS: | Windows NT 32-bit |
| FileFlags: | (none) |
| FileFlagsMask: | 0x003f |
| ProductVersionNumber: | 10.1.0.0 |
| FileVersionNumber: | 10.1.0.0 |
| Subsystem: | Windows GUI |
| SubsystemVersion: | 4 |
| ImageVersion: | - |
| OSVersion: | 4 |
| EntryPoint: | 0x14b04 |
| UninitializedDataSize: | - |
| InitializedDataSize: | 314368 |
| CodeSize: | 104960 |
| LinkerVersion: | 6 |
| PEType: | PE32 |
| TimeStamp: | 2010:11:18 17:27:35+01:00 |
| MachineType: | Intel 386 or later, and compatibles |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 18-Nov-2010 16:27:35 |
| Detected languages: |
|
| CompanyName: | Gallery Inc |
| FileDescription: | Windows Defender Remover Script |
| FileVersion: | 10.1 |
| InternalName: | defender.mpm |
| LegalCopyright: | Gallery Inc |
| OriginalFilename: | defender.mpm |
| ProductName: | Windows Defender Remover Script |
| ProductVersion: | 10.1 |
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x000000E8 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 5 |
| Time date stamp: | 18-Nov-2010 16:27:35 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00001000 | 0x000199EA | 0x00019A00 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.60849 |
.rdata | 0x0001B000 | 0x00004494 | 0x00004600 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.36802 |
.data | 0x00020000 | 0x00005A48 | 0x00003200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 1.37054 |
.sxdata | 0x00026000 | 0x00000004 | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_LNK_INFO, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 0.0203931 |
.rsrc | 0x00027000 | 0x00042738 | 0x00042800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 5.10527 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
1 | 3.2986 | 756 | UNKNOWN | English - United States | RT_VERSION |
5 | 1.43775 | 52 | UNKNOWN | English - United States | RT_STRING |
500 | 3.09294 | 184 | UNKNOWN | English - United States | RT_DIALOG |
KERNEL32.dll |
OLEAUT32.dll |
SHELL32.dll |
USER32.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 280 | "C:\Windows\System32\dism.exe" /online /quiet /norestart /remove-package /packagename:"Microsoft-Windows-SecureStartup-Package~31bf3856ad364e35~x86~~6.1.7601.17514" | C:\Windows\System32\dism.exe | PkgMgr.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Dism Image Servicing Utility Exit code: 2148468741 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 280 | melody /o /c HyperV-Feature-ApplicationGuard /r | C:\Users\admin\AppData\Local\Temp\7zSDAB5.tmp\melody.exe | — | cmd.exe | |||||||||||
User: admin Company: Gallery Inc Integrity Level: HIGH Description: Melody Add-on for Package Remover Exit code: 0 Version: 12.01 Modules
| |||||||||||||||
| 304 | "C:\Windows\System32\dism.exe" /online /quiet /norestart /remove-package /packagename:"Microsoft-Windows-SecureStartup-Package~31bf3856ad364e35~x86~~6.1.7601.17514" | C:\Windows\System32\dism.exe | PkgMgr.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Dism Image Servicing Utility Exit code: 3010 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 372 | PowerShell -NoProfile -ExecutionPolicy Bypass -Command "& {Start-Process PowerShell -ArgumentList '-NoProfile -ExecutionPolicy Bypass -File ""C:\Users\admin\AppData\Local\Temp\7zSDAB5.tmp\.\exploit_removal.ps1""' -Verb RunAs}" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 0 Version: 10.0.14409.1005 (rs1_srvoob.161208-1155) Modules
| |||||||||||||||
| 404 | "C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20220812221240.log C:\Windows\Logs\CBS\CbsPersist_20220812221240.cab | C:\Windows\system32\makecab.exe | — | PkgMgr.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft® Cabinet Maker Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 672 | regedit.exe /s "registry\Windows Security Center.reg" | C:\Windows\regedit.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Registry Editor Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 676 | melody /o /c Microsoft-OneCore-VirtualizationBasedSecurity /r | C:\Users\admin\AppData\Local\Temp\7zSDAB5.tmp\melody.exe | — | cmd.exe | |||||||||||
User: admin Company: Gallery Inc Integrity Level: HIGH Description: Melody Add-on for Package Remover Exit code: 0 Version: 12.01 Modules
| |||||||||||||||
| 1044 | regedit.exe /s "registry\Firewall Contextual Menu Implementation.reg" | C:\Windows\regedit.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Registry Editor Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1100 | C:\Windows\system32\vssvc.exe | C:\Windows\system32\vssvc.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft® Volume Shadow Copy Service Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1128 | "C:\Windows\System32\dism.exe" /online /quiet /norestart /remove-package /packagename:"Microsoft-Windows-Killbits-Package~31bf3856ad364e35~x86~~8.0.7601.17514" | C:\Windows\System32\dism.exe | PkgMgr.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Dism Image Servicing Utility Exit code: 3010 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| (PID) Process: | (2976) OneClickFirewall-1.0.0.2.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\shell\Block Internet Access |
| Operation: | write | Name: | Icon |
Value: C:\Program Files\OneClickFirewall\block.ico | |||
| (PID) Process: | (2976) OneClickFirewall-1.0.0.2.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\shell\Block Internet Access\command |
| Operation: | write | Name: | (default) |
Value: C:\Program Files\OneClickFirewall\OneClickFirewall.exe block "%1" | |||
| (PID) Process: | (2976) OneClickFirewall-1.0.0.2.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\shell\Restore Internet Access |
| Operation: | write | Name: | Icon |
Value: C:\Program Files\OneClickFirewall\allow.ico | |||
| (PID) Process: | (2976) OneClickFirewall-1.0.0.2.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\shell\Restore Internet Access\command |
| Operation: | write | Name: | (default) |
Value: C:\Program Files\OneClickFirewall\OneClickFirewall.exe unblock "%1" | |||
| (PID) Process: | (2976) OneClickFirewall-1.0.0.2.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\OneClickFirewall |
| Operation: | write | Name: | DisplayName |
Value: OneClickFirewall | |||
| (PID) Process: | (2976) OneClickFirewall-1.0.0.2.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\OneClickFirewall |
| Operation: | write | Name: | Publisher |
Value: http://winaero.com | |||
| (PID) Process: | (2976) OneClickFirewall-1.0.0.2.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\OneClickFirewall |
| Operation: | write | Name: | HelpLink |
Value: http://winaero.com | |||
| (PID) Process: | (2976) OneClickFirewall-1.0.0.2.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\OneClickFirewall |
| Operation: | write | Name: | URLUpdateInfo |
Value: http://winaero.com | |||
| (PID) Process: | (2976) OneClickFirewall-1.0.0.2.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\OneClickFirewall |
| Operation: | write | Name: | URLInfoAbout |
Value: http://winaero.com | |||
| (PID) Process: | (2976) OneClickFirewall-1.0.0.2.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\OneClickFirewall |
| Operation: | write | Name: | Comments |
Value: Visit http://winaero.com | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2292 | Defender.Remover.exe | C:\Users\admin\AppData\Local\Temp\7zSDAB5.tmp\disabler\Antivirus_d.reg | text | |
MD5:— | SHA256:— | |||
| 2292 | Defender.Remover.exe | C:\Users\admin\AppData\Local\Temp\7zSDAB5.tmp\disabler\Defender Anti-Phishing_d.reg | text | |
MD5:801F2FF2D887445882EF7EE4D3A934DD | SHA256:644F42E4B0C8041B57647CEDE402775DBC664DD65E7BC3C3B6404E1F07BA8102 | |||
| 2292 | Defender.Remover.exe | C:\Users\admin\AppData\Local\Temp\7zSDAB5.tmp\registry\Defender Anti-Phishing.reg | text | |
MD5:— | SHA256:— | |||
| 2292 | Defender.Remover.exe | C:\Users\admin\AppData\Local\Temp\7zSDAB5.tmp\disabler\SmartScreen.reg | text | |
MD5:— | SHA256:— | |||
| 2292 | Defender.Remover.exe | C:\Users\admin\AppData\Local\Temp\7zSDAB5.tmp\disabler\Defender Anti-Phishing_e.reg | text | |
MD5:— | SHA256:— | |||
| 2292 | Defender.Remover.exe | C:\Users\admin\AppData\Local\Temp\7zSDAB5.tmp\disabler\Virtualization.reg | text | |
MD5:— | SHA256:— | |||
| 2292 | Defender.Remover.exe | C:\Users\admin\AppData\Local\Temp\7zSDAB5.tmp\disabler\Windows Security Center_e.reg | text | |
MD5:— | SHA256:— | |||
| 2292 | Defender.Remover.exe | C:\Users\admin\AppData\Local\Temp\7zSDAB5.tmp\disabler\Antivirus_e.reg | text | |
MD5:— | SHA256:— | |||
| 2292 | Defender.Remover.exe | C:\Users\admin\AppData\Local\Temp\7zSDAB5.tmp\disabler\Security Health_e.reg | text | |
MD5:— | SHA256:— | |||
| 2292 | Defender.Remover.exe | C:\Users\admin\AppData\Local\Temp\7zSDAB5.tmp\exploit_removal.ps1 | text | |
MD5:— | SHA256:— | |||
Process | Message |
|---|---|
dism.exe | PID=3256 Instantiating the Provider Store. - CDISMImageSession::get_ProviderStore |
dism.exe | PID=3256 Initializing a provider store for the LOCAL session type. - CDISMProviderStore::Final_OnConnect |
dism.exe | PID=3256 Attempting to initialize the logger from the Image Session. - CDISMProviderStore::Final_OnConnect |
dism.exe | PID=3256 Provider has not previously been encountered. Attempting to initialize the provider. - CDISMProviderStore::Internal_GetProvider |
dism.exe | PID=3256 Loading Provider from location C:\Windows\System32\Dism\LogProvider.dll - CDISMProviderStore::Internal_GetProvider |
dism.exe | PID=3256 Connecting to the provider located at C:\Windows\System32\Dism\LogProvider.dll. - CDISMProviderStore::Internal_LoadProvider |
dism.exe | PID=3256 Getting Provider OSServices - CDISMProviderStore::GetProvider |
dism.exe | PID=3256 The requested provider was not found in the Provider Store. - CDISMProviderStore::Internal_GetProvider(hr:0x80004005) |
dism.exe | PID=3256 Failed to get an OSServices provider. Must be running in local store. Falling back to checking alongside the log provider for wdscore.dll. - CDISMLogger::FindWdsCore(hr:0x80004005) |
dismhost.exe | PID=1440 Encountered a loaded provider DISMLogger. - CDISMProviderStore::Internal_DisconnectProvider |