File name:

WeMod_Pro_-_Unlocker_v3.0.1_mul0.zip

Full analysis: https://app.any.run/tasks/d73d2154-24eb-4a8d-8f01-56a7cd872353
Verdict: Malicious activity
Analysis date: June 21, 2025, 07:19:45
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-doc
upx
delphi
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

5C37F8E0120FA3C4D84AE3A567EFBC8C

SHA1:

35E221969743A0A7761690E2851CED8A15104893

SHA256:

A2C1B5CEE789D699352A25B4EC30EC52C55639D61E44FC770C76DEABD4E4032A

SSDEEP:

98304:BqQrjpYLfVoHvPNjOJCYGMe8ly1VjjQjIfbhbF86h1GbPf6qqj4KHoejWuIiKDQq:BB15Lyav7deVTrqu

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WeMod Unlocker [v3.0.1] {mul0}.exe (PID: 6776)
      • RegAsm.exe (PID: 6732)
      • Update.exe (PID: 6772)
      • WeModAuxiliaryService.exe (PID: 5560)
      • WeMod Unlocker [v3.0.1] {mul0}.exe (PID: 4580)
      • RegAsm.exe (PID: 7008)
      • WeModAuxiliaryService.exe (PID: 3832)
    • Generic archive extractor

      • WinRAR.exe (PID: 1604)
    • Reads the date of Windows installation

      • WeMod Unlocker [v3.0.1] {mul0}.exe (PID: 6776)
      • Update.exe (PID: 6772)
      • WeMod Unlocker [v3.0.1] {mul0}.exe (PID: 4580)
    • Creates/Modifies COM task schedule object

      • RegAsm.exe (PID: 6732)
      • RegAsm.exe (PID: 7008)
    • Executable content was dropped or overwritten

      • WeMod-10.19.1.exe (PID: 1136)
      • Update.exe (PID: 6772)
      • WeMod Unlocker [v3.0.1] {mul0}.exe (PID: 6776)
    • Application launched itself

      • WeMod.exe (PID: 760)
      • WeMod.exe (PID: 1180)
      • WeMod.exe (PID: 1332)
      • WeMod.exe (PID: 3400)
    • Process drops legitimate windows executable

      • Update.exe (PID: 6772)
    • Creates a software uninstall entry

      • Update.exe (PID: 6772)
    • Searches for installed software

      • Update.exe (PID: 6772)
    • The process checks if it is being run in the virtual environment

      • WeMod Unlocker [v3.0.1] {mul0}.exe (PID: 6776)
  • INFO

    • Reads Microsoft Office registry keys

      • WeMod Unlocker [v3.0.1] {mul0}.exe (PID: 6776)
      • WeMod Unlocker [v3.0.1] {mul0}.exe (PID: 4580)
    • Reads Environment values

      • WeMod Unlocker [v3.0.1] {mul0}.exe (PID: 6776)
      • WeMod.exe (PID: 760)
      • WeMod.exe (PID: 4968)
      • Update.exe (PID: 6772)
      • WeMod.exe (PID: 1180)
      • Update.exe (PID: 1660)
      • WeMod Unlocker [v3.0.1] {mul0}.exe (PID: 4580)
      • WeMod.exe (PID: 3400)
    • Checks supported languages

      • WeMod Unlocker [v3.0.1] {mul0}.exe (PID: 6776)
      • RegAsm.exe (PID: 6732)
      • WeMod-10.19.1.exe (PID: 6840)
      • WeMod-10.19.1.exe (PID: 1136)
      • Update.exe (PID: 6772)
      • WeMod.exe (PID: 1332)
      • Update.exe (PID: 3732)
      • WeMod.exe (PID: 4968)
      • WeMod.exe (PID: 760)
      • squirrel.exe (PID: 5012)
      • WeMod.exe (PID: 6980)
      • WeMod.exe (PID: 2148)
      • WeMod.exe (PID: 1080)
      • WeMod.exe (PID: 1180)
      • Update.exe (PID: 1660)
      • WeModAuxiliaryService.exe (PID: 5560)
      • SearchApp.exe (PID: 5328)
      • WeMod.exe (PID: 5612)
      • WeMod.exe (PID: 4172)
      • WeMod.exe (PID: 6336)
      • WeMod Unlocker [v3.0.1] {mul0}.exe (PID: 4580)
      • RegAsm.exe (PID: 7008)
      • WeMod.exe (PID: 7152)
      • WeMod.exe (PID: 3400)
      • WeMod.exe (PID: 3980)
      • WeMod.exe (PID: 5724)
      • WeModAuxiliaryService.exe (PID: 3832)
    • Manual execution by a user

      • WeMod Unlocker [v3.0.1] {mul0}.exe (PID: 6776)
      • WeMod Unlocker [v3.0.1] {mul0}.exe (PID: 3672)
      • WeMod-10.19.1.exe (PID: 1136)
      • WeMod.exe (PID: 5612)
      • WeMod.exe (PID: 4172)
      • WeMod Unlocker [v3.0.1] {mul0}.exe (PID: 856)
      • WeMod Unlocker [v3.0.1] {mul0}.exe (PID: 4580)
    • Creates files or folders in the user directory

      • WeMod Unlocker [v3.0.1] {mul0}.exe (PID: 6776)
      • WeMod-10.19.1.exe (PID: 1136)
      • squirrel.exe (PID: 5012)
      • Update.exe (PID: 3732)
      • Update.exe (PID: 6772)
      • WeMod.exe (PID: 1180)
      • WeMod.exe (PID: 2148)
      • Update.exe (PID: 1660)
      • WeModAuxiliaryService.exe (PID: 5560)
      • WeMod Unlocker [v3.0.1] {mul0}.exe (PID: 4580)
      • WeMod.exe (PID: 3400)
      • WeMod.exe (PID: 3980)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 1604)
      • Update.exe (PID: 6772)
      • WeMod Unlocker [v3.0.1] {mul0}.exe (PID: 6776)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 1604)
    • Reads the computer name

      • WeMod Unlocker [v3.0.1] {mul0}.exe (PID: 6776)
      • WeMod-10.19.1.exe (PID: 6840)
      • Update.exe (PID: 6772)
      • RegAsm.exe (PID: 6732)
      • Update.exe (PID: 3732)
      • squirrel.exe (PID: 5012)
      • WeMod.exe (PID: 1180)
      • WeMod.exe (PID: 6980)
      • Update.exe (PID: 1660)
      • WeModAuxiliaryService.exe (PID: 5560)
      • WeMod.exe (PID: 2148)
      • WeMod Unlocker [v3.0.1] {mul0}.exe (PID: 4580)
      • RegAsm.exe (PID: 7008)
      • WeMod.exe (PID: 3400)
      • WeMod.exe (PID: 3980)
      • WeModAuxiliaryService.exe (PID: 3832)
      • WeMod.exe (PID: 7152)
    • Create files in a temporary directory

      • WeMod Unlocker [v3.0.1] {mul0}.exe (PID: 6776)
      • Update.exe (PID: 6772)
      • WeMod.exe (PID: 1180)
      • Update.exe (PID: 1660)
      • WeMod Unlocker [v3.0.1] {mul0}.exe (PID: 4580)
      • WeMod.exe (PID: 3400)
    • Reads product name

      • WeMod Unlocker [v3.0.1] {mul0}.exe (PID: 6776)
      • WeMod.exe (PID: 4968)
      • WeMod.exe (PID: 760)
      • WeMod.exe (PID: 1180)
      • WeMod Unlocker [v3.0.1] {mul0}.exe (PID: 4580)
      • WeMod.exe (PID: 3400)
    • Checks proxy server information

      • WeMod Unlocker [v3.0.1] {mul0}.exe (PID: 6776)
      • WeMod.exe (PID: 1180)
      • Update.exe (PID: 6772)
      • Update.exe (PID: 1660)
      • WeModAuxiliaryService.exe (PID: 5560)
      • slui.exe (PID: 3800)
      • WeMod Unlocker [v3.0.1] {mul0}.exe (PID: 4580)
      • WeMod.exe (PID: 3400)
    • Reads the software policy settings

      • WeMod Unlocker [v3.0.1] {mul0}.exe (PID: 6776)
      • Update.exe (PID: 6772)
      • Update.exe (PID: 1660)
      • WeModAuxiliaryService.exe (PID: 5560)
      • SearchApp.exe (PID: 5328)
      • slui.exe (PID: 3800)
      • WeMod Unlocker [v3.0.1] {mul0}.exe (PID: 4580)
      • WeModAuxiliaryService.exe (PID: 3832)
    • Process checks computer location settings

      • WeMod Unlocker [v3.0.1] {mul0}.exe (PID: 6776)
      • Update.exe (PID: 6772)
      • WeMod.exe (PID: 1180)
      • WeMod.exe (PID: 1080)
      • SearchApp.exe (PID: 5328)
      • WeMod Unlocker [v3.0.1] {mul0}.exe (PID: 4580)
      • WeMod.exe (PID: 3400)
      • WeMod.exe (PID: 5724)
    • Compiled with Borland Delphi (YARA)

      • WeMod Unlocker [v3.0.1] {mul0}.exe (PID: 6776)
      • slui.exe (PID: 3800)
    • UPX packer has been detected

      • WeMod Unlocker [v3.0.1] {mul0}.exe (PID: 6776)
    • Reads the machine GUID from the registry

      • RegAsm.exe (PID: 6732)
      • Update.exe (PID: 6772)
      • squirrel.exe (PID: 5012)
      • Update.exe (PID: 3732)
      • WeMod.exe (PID: 1180)
      • Update.exe (PID: 1660)
      • WeModAuxiliaryService.exe (PID: 5560)
      • WeMod Unlocker [v3.0.1] {mul0}.exe (PID: 6776)
      • SearchApp.exe (PID: 5328)
      • RegAsm.exe (PID: 7008)
      • WeMod.exe (PID: 3400)
      • WeModAuxiliaryService.exe (PID: 3832)
    • Disables trace logs

      • Update.exe (PID: 6772)
      • Update.exe (PID: 1660)
    • Reads CPU info

      • WeMod.exe (PID: 1180)
      • WeMod.exe (PID: 3400)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0808
ZipCompression: Deflated
ZipModifyDate: 2025:06:21 08:40:26
ZipCRC: 0xb9d793cd
ZipCompressedSize: 14707
ZipUncompressedSize: 30208
ZipFileName: iAsar.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
179
Monitored processes
34
Malicious processes
6
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe wemod  unlocker [v3.0.1] {mul0}.exe no specs wemod  unlocker [v3.0.1] {mul0}.exe regasm.exe no specs conhost.exe no specs slui.exe wemod-10.19.1.exe no specs wemod-10.19.1.exe update.exe squirrel.exe no specs wemod.exe no specs update.exe no specs wemod.exe no specs wemod.exe no specs wemod.exe no specs wemod.exe no specs wemod.exe wemod.exe no specs update.exe wemodauxiliaryservice.exe rundll32.exe no specs wemod.exe no specs wemod.exe no specs wemod.exe no specs wemod  unlocker [v3.0.1] {mul0}.exe no specs wemod  unlocker [v3.0.1] {mul0}.exe regasm.exe no specs conhost.exe no specs wemod.exe no specs wemod.exe no specs wemod.exe wemod.exe no specs wemodauxiliaryservice.exe no specs searchapp.exe

Process information

PID
CMD
Path
Indicators
Parent process
760"C:\Users\admin\AppData\Local\WeMod\app-10.19.1\WeMod.exe" --squirrel-firstrunC:\Users\admin\AppData\Local\WeMod\app-10.19.1\WeMod.exeUpdate.exe
User:
admin
Company:
WeMod
Integrity Level:
MEDIUM
Description:
WeMod - The Ultimate Game Companion
Exit code:
0
Version:
10.19.1
Modules
Images
c:\users\admin\appdata\local\wemod\app-10.19.1\wemod.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\users\admin\appdata\local\wemod\app-10.19.1\ffmpeg.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
856"C:\Users\admin\Desktop\WeMod Unlocker [v3.0.1] {mul0}.exe" -run=wemod.exeC:\Users\admin\Desktop\WeMod Unlocker [v3.0.1] {mul0}.exeexplorer.exe
User:
admin
Company:
mul0
Integrity Level:
MEDIUM
Description:
WeMod : Unlocker [v3.0.1] {mul0}
Exit code:
3221226540
Version:
3.0.1.51
Modules
Images
c:\users\admin\desktop\wemod unlocker [v3.0.1] {mul0}.exe
c:\windows\system32\ntdll.dll
1068C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
1080"C:\Users\admin\AppData\Local\WeMod\app-10.19.1\WeMod.exe" --type=renderer --user-data-dir="C:\Users\admin\AppData\Roaming\WeMod" --app-user-model-id=com.squirrel.WeMod.WeMod --app-path="C:\Users\admin\AppData\Local\WeMod\app-10.19.1\resources\app.asar" --no-sandbox --no-zygote --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=4 --field-trial-handle=2532,i,2390660475506407798,11009775550871908919,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=2528 /prefetch:1C:\Users\admin\AppData\Local\WeMod\app-10.19.1\WeMod.exeWeMod.exe
User:
admin
Company:
WeMod
Integrity Level:
MEDIUM
Description:
WeMod - The Ultimate Game Companion
Exit code:
0
Version:
10.19.1
Modules
Images
c:\users\admin\appdata\local\wemod\app-10.19.1\wemod.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1136"C:\Users\admin\Desktop\WeMod-10.19.1.exe" --rerunningWithoutUACC:\Users\admin\Desktop\WeMod-10.19.1.exe
explorer.exe
User:
admin
Company:
WeMod
Integrity Level:
MEDIUM
Description:
WeMod - The Ultimate Gaming Companion
Exit code:
0
Version:
10.19.1
Modules
Images
c:\users\admin\desktop\wemod-10.19.1.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
1180"C:\Users\admin\AppData\Local\WeMod\app-10.19.1\WeMod.exe"C:\Users\admin\AppData\Local\WeMod\app-10.19.1\WeMod.exeWeMod.exe
User:
admin
Company:
WeMod
Integrity Level:
MEDIUM
Description:
WeMod - The Ultimate Game Companion
Exit code:
0
Version:
10.19.1
Modules
Images
c:\users\admin\appdata\local\wemod\app-10.19.1\wemod.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\users\admin\appdata\local\wemod\app-10.19.1\ffmpeg.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
1332"C:\Users\admin\AppData\Local\WeMod\app-10.19.1\WeMod.exe" --type=relauncher --no-sandbox --- "C:\Users\admin\AppData\Local\WeMod\app-10.19.1\WeMod.exe"C:\Users\admin\AppData\Local\WeMod\app-10.19.1\WeMod.exeWeMod.exe
User:
admin
Company:
WeMod
Integrity Level:
MEDIUM
Description:
WeMod - The Ultimate Game Companion
Exit code:
0
Version:
10.19.1
Modules
Images
c:\users\admin\appdata\local\wemod\app-10.19.1\wemod.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\users\admin\appdata\local\wemod\app-10.19.1\ffmpeg.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
1604"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\WeMod_Pro_-_Unlocker_v3.0.1_mul0.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
1660C:\Users\admin\AppData\Local\WeMod\Update.exe --checkForUpdate https://api.wemod.com/client/channels/stable?osVersion=10.0.19045C:\Users\admin\AppData\Local\WeMod\Update.exe
WeMod.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\wemod\update.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2148"C:\Users\admin\AppData\Local\WeMod\app-10.19.1\WeMod.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --force-ui-direction=ltr --user-data-dir="C:\Users\admin\AppData\Roaming\WeMod" --field-trial-handle=2292,i,2390660475506407798,11009775550871908919,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=2288 /prefetch:3C:\Users\admin\AppData\Local\WeMod\app-10.19.1\WeMod.exe
WeMod.exe
User:
admin
Company:
WeMod
Integrity Level:
MEDIUM
Description:
WeMod - The Ultimate Game Companion
Exit code:
0
Version:
10.19.1
Modules
Images
c:\users\admin\appdata\local\wemod\app-10.19.1\wemod.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
26 584
Read events
26 178
Write events
353
Delete events
53

Modification events

(PID) Process:(1604) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(1604) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(1604) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(1604) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\WeMod_Pro_-_Unlocker_v3.0.1_mul0.zip
(PID) Process:(1604) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1604) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1604) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1604) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1604) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:15
Value:
(PID) Process:(1604) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\DialogEditHistory\ExtrPath
Operation:delete valueName:14
Value:
Executable files
134
Suspicious files
510
Text files
299
Unknown types
0

Dropped files

PID
Process
Filename
Type
1136WeMod-10.19.1.exeC:\Users\admin\AppData\Local\SquirrelTemp\WeMod-10.19.1-full.nupkg
MD5:
SHA256:
6772Update.exeC:\Users\admin\AppData\Local\WeMod\packages\WeMod-10.19.1-full.nupkg
MD5:
SHA256:
6772Update.exeC:\Users\admin\AppData\Local\WeMod\app-10.19.1\icudtl.dat
MD5:
SHA256:
1604WinRAR.exeC:\Users\admin\Desktop\iAsar.dllexecutable
MD5:92CA3B4ED7126BD186183C48CE12DC0A
SHA256:DD6F7B371898DCD8A5B02633BBC13E18F2F76737BB446533812E776F42D2A116
1604WinRAR.exeC:\Users\admin\Desktop\Newtonsoft.Json.dllexecutable
MD5:195FFB7167DB3219B217C4FD439EEDD6
SHA256:E1E27AF7B07EEEDF5CE71A9255F0422816A6FC5849A483C6714E1B472044FA9D
1604WinRAR.exeC:\Users\admin\Desktop\WeMod - Unlocker [v3.0.1] {mul0} [1].jpgimage
MD5:917909A23EFCC2F1116FBE3E82EB5484
SHA256:318BA2F987704F7BB5CDB89B353571EB629AD51DBBB40C3D3D1105B13CEB5ADD
1604WinRAR.exeC:\Users\admin\Desktop\WeMod - Unlocker [v3.0.1] {mul0} [3].jpgimage
MD5:65856E0054DE9C1D5EDF08FE0E3A40FC
SHA256:86B3D1294E51BBA3BF996B612D2A3143E3529F5F47286D1A939EAB2AF4DE74F1
6772Update.exeC:\Users\admin\AppData\Local\WeMod\app-10.19.1\chrome_100_percent.pakbinary
MD5:001AA2A7D5DCAF2D0987804A37E21DB9
SHA256:0B84B7680630DD51CB36A2FCDD7CC3B031636FE6B91F81772822BE9E514132FE
6772Update.exeC:\Users\admin\AppData\Local\WeMod\app-10.19.1\libGLESv2.dllexecutable
MD5:75E7880AC63BACE29293301BB7983970
SHA256:B25953052B7421EB187E5F7D355806CB06FCC8B0698DC51B3D29DCAC70A1337E
1604WinRAR.exeC:\Users\admin\Desktop\WeMod Unlocker [v3.0.1] {mul0}.exeexecutable
MD5:04BD025FB88BA71194893BBB90666A76
SHA256:207A3C7A88C275729BFC164F69CDA5B9B6DC0EA8426B5665725BA3E359A5E734
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
52
DNS requests
34
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2864
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2864
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5560
WeModAuxiliaryService.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSRXerF0eFeSWRripTgTkcJWMm7iQQUaDfg67Y7%2BF8Rhvv%2BYXsIiGX0TkICEALWLoqHGp2y9P4x7Rdh11E%3D
unknown
whitelisted
5560
WeModAuxiliaryService.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT3xL4LQLXDRDM9P665TW442vrsUQQUReuir%2FSSy4IxLVGLp6chnfNtyA8CEA6bGI750C3n79tQ4ghAGFo%3D
unknown
whitelisted
5560
WeModAuxiliaryService.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxXWRM3y5nP%2Be6mK4cD08CEAitQLJg0pxMn17Nqb2Trtk%3D
unknown
whitelisted
2940
svchost.exe
GET
200
23.209.209.135:80
http://x1.c.lencr.org/
unknown
whitelisted
5328
SearchApp.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1816
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5944
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4648
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
1816
svchost.exe
20.190.160.67:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1816
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1268
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2336
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
1268
svchost.exe
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 20.73.194.208
  • 4.231.128.59
whitelisted
google.com
  • 142.250.184.206
whitelisted
login.live.com
  • 20.190.160.67
  • 20.190.160.128
  • 40.126.32.76
  • 40.126.32.133
  • 20.190.160.3
  • 40.126.32.138
  • 20.190.160.64
  • 20.190.160.22
  • 40.126.32.140
  • 20.190.160.2
  • 40.126.32.72
  • 20.190.160.17
  • 40.126.32.74
  • 20.190.160.5
  • 20.190.160.66
  • 20.190.160.65
whitelisted
ocsp.digicert.com
  • 2.17.190.73
  • 2.23.77.188
whitelisted
client.wns.windows.com
  • 172.211.123.248
  • 172.211.123.250
whitelisted
crl.microsoft.com
  • 23.53.40.178
  • 23.53.40.176
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
nexusrules.officeapps.live.com
  • 52.111.227.14
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted

Threats

No threats detected
No debug info