File name:

HousecallLauncher64.exe

Full analysis: https://app.any.run/tasks/9e4e3bea-6828-45ce-9292-5caa474d7bff
Verdict: Malicious activity
Analysis date: June 04, 2025, 09:12:40
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
exploit
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

1AEF0C3744DF974A5BD4AFC86FB5559B

SHA1:

3355AA72E9A4CFCD9F35D880E718E1EC84B269BE

SHA256:

B1A29C465A85169B3A888B1A644C21E4B9D3F3C9D5AA56BEF343E5D42B859AA1

SSDEEP:

98304:xeU69y3++14cqKaRRDw5em/a15+m8tWnRcbS8CXDH3dCfQvx0rSxLyldIfwIfU71:m02XJSJH

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • EXPLOIT has been detected (SURICATA)

      • Setup.exe (PID: 7376)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • HousecallLauncher64.exe (PID: 6040)
      • Setup.exe (PID: 7376)
      • hcpackage64.exe.tmp (PID: 3140)
      • patch64.exe (PID: 7252)
    • The process verifies whether the antivirus software is installed

      • HousecallLauncher64.exe (PID: 6040)
      • Setup.exe (PID: 7376)
      • hcpackage64.exe.tmp (PID: 3140)
      • conhost.exe (PID: 2868)
      • conhost.exe (PID: 8076)
      • patch64.exe (PID: 7252)
    • Reads security settings of Internet Explorer

      • Setup.exe (PID: 7376)
    • Starts application with an unusual extension

      • Setup.exe (PID: 7376)
    • Process drops legitimate windows executable

      • hcpackage64.exe.tmp (PID: 3140)
    • Drops a system driver (possible attempt to evade defenses)

      • hcpackage64.exe.tmp (PID: 3140)
  • INFO

    • The sample compiled with english language support

      • HousecallLauncher64.exe (PID: 6040)
      • hcpackage64.exe.tmp (PID: 3140)
      • Setup.exe (PID: 7376)
      • patch64.exe (PID: 7252)
    • Checks supported languages

      • HousecallLauncher64.exe (PID: 6040)
      • Setup.exe (PID: 7376)
      • hcpackage64.exe.tmp (PID: 3140)
      • patch64.exe (PID: 7252)
    • Creates files in the program directory

      • HousecallLauncher64.exe (PID: 6040)
      • Setup.exe (PID: 7376)
      • hcpackage64.exe.tmp (PID: 3140)
      • patch64.exe (PID: 7252)
    • Reads the computer name

      • Setup.exe (PID: 7376)
    • Reads the machine GUID from the registry

      • Setup.exe (PID: 7376)
    • Checks proxy server information

      • Setup.exe (PID: 7376)
    • Creates files or folders in the user directory

      • Setup.exe (PID: 7376)
    • Reads the software policy settings

      • Setup.exe (PID: 7376)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2024:11:12 07:12:04+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.28
CodeSize: 483840
InitializedDataSize: 323072
UninitializedDataSize: -
EntryPoint: 0x27c34
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.62.1.1180
ProductVersionNumber: 1.62.1.1180
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Trend Micro Inc.
CoverageBuild: None
CompileOption: None
BuildType: Rel
FileDescription: Trend Micro Application Launcher
FileVersion: 1.62.1.1180
InternalName: AppLauncher.exe
LegalCopyright: Copyright (C) 2024 Trend Micro Incorporated. All rights reserved.
LegalTrademarks: Copyright (C) Trend Micro Inc.
OriginalFileName: 7zsfx.exe
ProductName: Trend Micro HouseCall
ProductVersion: 1.62
SpecialBuild: 1180
PrivateBuild: Build 1180 - None
Comments: -
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
8
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start housecalllauncher64.exe #EXPLOIT setup.exe hcpackage64.exe.tmp conhost.exe no specs patch64.exe conhost.exe no specs slui.exe no specs housecalllauncher64.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2236"C:\Users\admin\AppData\Local\Temp\HousecallLauncher64.exe" C:\Users\admin\AppData\Local\Temp\HousecallLauncher64.exeexplorer.exe
User:
admin
Company:
Trend Micro Inc.
Integrity Level:
MEDIUM
Description:
Trend Micro Application Launcher
Exit code:
3221226540
Version:
1.62.1.1180
Modules
Images
c:\users\admin\appdata\local\temp\housecalllauncher64.exe
c:\windows\system32\ntdll.dll
2868\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exehcpackage64.exe.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3140exe.exe -yC:\Program Files\Trend Micro\HCBackup\hcpackage64.exe.tmp
Setup.exe
User:
admin
Company:
trend_company_name
Integrity Level:
HIGH
Description:
Trend Micro HouseCall
Exit code:
0
Version:
1.62.1.1180
Modules
Images
c:\program files\trend micro\hcbackup\hcpackage64.exe.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
6040"C:\Users\admin\AppData\Local\Temp\HousecallLauncher64.exe" C:\Users\admin\AppData\Local\Temp\HousecallLauncher64.exe
explorer.exe
User:
admin
Company:
Trend Micro Inc.
Integrity Level:
HIGH
Description:
Trend Micro Application Launcher
Version:
1.62.1.1180
Modules
Images
c:\users\admin\appdata\local\temp\housecalllauncher64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7184C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7252"C:\Program Files\Trend Micro\7zS8974FB52\AU\patch64.exe" "C:\Program Files\Trend Micro\7zS8974FB52\AU\AU_Data\AU_Temp\7376_6300" 0C:\Program Files\Trend Micro\7zS8974FB52\AU\patch64.exe
Setup.exe
User:
admin
Company:
Trend Micro Inc.
Integrity Level:
HIGH
Description:
patch program
Exit code:
0
Version:
2.89.0.1055
Modules
Images
c:\program files\trend micro\7zs8974fb52\au\patch64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\kernel.appcore.dll
7376.\setup.exeC:\Program Files\Trend Micro\7zS8974FB52\Setup.exe
HousecallLauncher64.exe
User:
admin
Company:
Trend Micro Inc.
Integrity Level:
HIGH
Description:
Trend Micro HouseCall Launcher
Version:
1.62.1.1180
Modules
Images
c:\program files\trend micro\7zs8974fb52\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\winhttp.dll
c:\windows\system32\gdi32full.dll
8076\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepatch64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
4 134
Read events
4 133
Write events
1
Delete events
0

Modification events

(PID) Process:(7376) Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\TrendMicro\HouseCall
Operation:writeName:VID
Value:
HC202410
Executable files
52
Suspicious files
90
Text files
230
Unknown types
34

Dropped files

PID
Process
Filename
Type
6040HousecallLauncher64.exeC:\Program Files\Trend Micro\7zS8974FB52\AU\au.dbbinary
MD5:819F4E8DEAEB5AC05799CF24513AA321
SHA256:E34768E56F82BF755E9E2DB1ABC2D64C7B20F82913EDBBEBEE10C55ED54BAC6D
6040HousecallLauncher64.exeC:\Program Files\Trend Micro\7zS8974FB52\AU\aucfg.inibinary
MD5:B8994884773962713DB9181A52396B87
SHA256:4C3E192E58A42249C96432828155CA0A54A3D669287444DE655B7564D0C0429E
6040HousecallLauncher64.exeC:\Program Files\Trend Micro\7zS8974FB52\HouseCall_downloader.bmpimage
MD5:8E6E50CF326A4704AC34E518BFFAE9DA
SHA256:A22AF87CA743498627C1E3DD15709E41F3AB488D4B358F9BAFB5AFD5E842EEE2
6040HousecallLauncher64.exeC:\Program Files\Trend Micro\7zS8974FB52\DLConfig.xmltext
MD5:2B4A6799C0D14E9CE75B40702B93EA6D
SHA256:A3EFF19AF84B0588FB51CDDF9902DA561AC189F89EC5F6C98FC21348459667E7
6040HousecallLauncher64.exeC:\Program Files\Trend Micro\7zS8974FB52\curl-ca-bundle.crttext
MD5:C658D9F253217D3C010B830D05973BB7
SHA256:193A35B6DE7EE049FF512599DD4E8290DC30C2F47F9A3818CA8F273FFCA683DB
6040HousecallLauncher64.exeC:\Program Files\Trend Micro\7zS8974FB52\AU\x500_std.dbbinary
MD5:4A5254761F92EB0FB968421DB26BBB0B
SHA256:48335D3E1165FD3C504845E0BD279436302D9B90DC99C4B6A070302D555D5EAF
6040HousecallLauncher64.exeC:\Program Files\Trend Micro\7zS8974FB52\AU\cert5_std.dbbinary
MD5:A693B8CD8EC6F1ABF4D824661D6E50CE
SHA256:2E2016B9247EC27A7C0B11F4E28D00BA452B4A64C5218AC1FF3E165842A922DE
6040HousecallLauncher64.exeC:\Program Files\Trend Micro\7zS8974FB52\dlstr.xmlxml
MD5:976BA471421A8EAA9013C591A452FD9D
SHA256:3CD7CED197B7AAD0B94E9029AA7057CA8AE13F63FEFA212C6D744DDF569D5F71
6040HousecallLauncher64.exeC:\Program Files\Trend Micro\7zS8974FB52\AU\ciussi64.dllexecutable
MD5:A32BCF865C1D39D306D9B552C48A9A6F
SHA256:D59AFADF3515DBA5BF2B469CB9C9A0187902A3A9E9E612BBA3FE70A8394A2761
6040HousecallLauncher64.exeC:\Program Files\Trend Micro\7zS8974FB52\AU\Build64.exeexecutable
MD5:C6FCFA160487FBA72DC2DB84AC9EEF3A
SHA256:824ABB1E7DA6BBEF6512FFA9D71AF647718425C604308AC1348374E45644845C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
19
TCP/UDP connections
32
DNS requests
18
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7376
Setup.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRm%2FrYSaqNr0YBIv29H4pMHhv2XmQQUl0gD6xUIa7myWCPMlC7xxmXSZI4CEA6g%2Fk37dMxkvDIUMQPCfIs%3D
unknown
whitelisted
7376
Setup.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEALE0eWKSmgMVo2jBH5%2BTV8%3D
unknown
whitelisted
2392
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7376
Setup.exe
HEAD
200
184.24.77.60:80
http://housecall8-ctp-p.activeupdate.trendmicro.co.jp:80/activeupdate/japan/ini_xml.zip
unknown
unknown
7376
Setup.exe
GET
200
184.24.77.60:80
http://housecall8-ctp-p.activeupdate.trendmicro.co.jp:80/activeupdate/japan/pattern/icrc/ioth2024300.zip
unknown
unknown
7376
Setup.exe
GET
200
2.19.126.152:80
http://housecall8-ctp-p.activeupdate.trendmicro.co.jp:80/activeupdate/japan/pattern/tmwlchk_205500.zip
unknown
unknown
7376
Setup.exe
GET
200
184.24.77.60:80
http://housecall8-ctp-p.activeupdate.trendmicro.co.jp:80/activeupdate/japan/engine/dce-dll-mssign-x64-v75-1035.zip
unknown
unknown
7376
Setup.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSRXerF0eFeSWRripTgTkcJWMm7iQQUaDfg67Y7%2BF8Rhvv%2BYXsIiGX0TkICEAMoAohqwi3Iey%2BznBTYouQ%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
2.16.241.19:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
7636
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.219.150.101:80
www.microsoft.com
AKAMAI-AS
CL
whitelisted
4452
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
7376
Setup.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
7376
Setup.exe
2.23.245.87:443
go.trendmicro.com
Ooredoo Q.S.C.
QA
whitelisted
6544
svchost.exe
20.190.159.68:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.78
whitelisted
crl.microsoft.com
  • 2.16.241.19
  • 2.16.241.12
whitelisted
www.microsoft.com
  • 23.219.150.101
  • 23.35.229.160
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
go.trendmicro.com
  • 2.23.245.87
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
login.live.com
  • 20.190.159.68
  • 40.126.31.1
  • 20.190.159.4
  • 20.190.159.75
  • 40.126.31.130
  • 20.190.159.0
  • 20.190.159.71
  • 40.126.31.67
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted

Threats

PID
Process
Class
Message
7376
Setup.exe
Attempted Administrator Privilege Gain
AV EXPLOIT Potential ZIP file exploiting CVE-2023-36413
7376
Setup.exe
Attempted Administrator Privilege Gain
AV EXPLOIT Potential ZIP file exploiting CVE-2023-36413
No debug info