File name:

vhat.exe

Full analysis: https://app.any.run/tasks/e842ab4a-af9e-4e4a-ad85-67df5e6d3b62
Verdict: Malicious activity
Analysis date: April 19, 2025, 02:03:37
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (console) Intel 80386, for MS Windows, 4 sections
MD5:

5FF75CA5795235EC29125BC6E2E0FC03

SHA1:

9421B8F5F85596930FD2D1B13B1A5EF502AC1863

SHA256:

C9C4F06E5AFC509C4253345C323FC438C845ECAB0EF91BDDD52AF884E67F247E

SSDEEP:

768:SQAm3cTxyWUucgFwTj9lIUDokoY3Em+mT4mIt:KMGgWNcdbREU3Em7e

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Antivirus name has been found in the command line (generic signature)

      • sfc.exe (PID: 7824)
    • Registers / Runs the DLL via REGSVR32.EXE

      • vhat.exe (PID: 1272)
  • SUSPICIOUS

    • Executes as Windows Service

      • dllhost.exe (PID: 5800)
      • msdtc.exe (PID: 7508)
    • Windows service management via SC.EXE

      • sc.exe (PID: 5244)
      • sc.exe (PID: 1660)
    • Creates file in the systems drive root

      • vhat.exe (PID: 1272)
      • SndVol.exe (PID: 7472)
      • conhost.exe (PID: 7000)
      • compact.exe (PID: 9764)
      • perfmon.exe (PID: 10336)
      • Taskmgr.exe (PID: 10812)
      • perfmon.exe (PID: 9724)
      • RTLCPL.EXE (PID: 5596)
    • Searches and executes a command on selected files

      • forfiles.exe (PID: 1188)
      • forfiles.exe (PID: 9756)
    • Starts CMD.EXE for commands execution

      • forfiles.exe (PID: 1188)
      • forfiles.exe (PID: 9756)
    • Reads security settings of Internet Explorer

      • wmplayer.exe (PID: 7436)
      • GetHelp.exe (PID: 8252)
      • perfmon.exe (PID: 5136)
      • wmplayer.exe (PID: 10268)
      • perfmon.exe (PID: 11356)
      • FlashPlayerApp.exe (PID: 13300)
    • Uses ROUTE.EXE to obtain the routing table information

      • vhat.exe (PID: 1272)
    • Executes application which crashes

      • Windows.WARP.JITService.exe (PID: 7604)
      • Windows.WARP.JITService.exe (PID: 8760)
      • SystemSettings.exe (PID: 8048)
      • WWAHost.exe (PID: 11020)
      • PrintDialog.exe (PID: 5744)
      • WWAHost.exe (PID: 8584)
    • Reads the history of recent RDP connections

      • mstsc.exe (PID: 7596)
      • mstsc.exe (PID: 7616)
      • mstsc.exe (PID: 8052)
      • mstsc.exe (PID: 8356)
    • Process copies executable file

      • vhat.exe (PID: 1272)
    • Reads Microsoft Outlook installation path

      • IEChooser.exe (PID: 7248)
      • IEChooser.exe (PID: 12388)
      • mshta.exe (PID: 5132)
    • Suspicious use of NETSH.EXE

      • vhat.exe (PID: 1272)
    • SQL CE related mutex has been found

      • unregmp2.exe (PID: 7432)
    • Reads Internet Explorer settings

      • IEChooser.exe (PID: 7248)
      • IEChooser.exe (PID: 12388)
      • mshta.exe (PID: 5132)
    • Application launched itself

      • msdt.exe (PID: 8424)
      • OneDriveSetup.exe (PID: 2344)
    • Uses SYSTEMINFO.EXE to read the environment

      • stordiag.exe (PID: 8668)
      • vhat.exe (PID: 1272)
    • Query current time using 'w32tm.exe'

      • w32tm.exe (PID: 2800)
      • vhat.exe (PID: 1272)
      • w32tm.exe (PID: 11064)
    • Process uses IPCONFIG to get network configuration information

      • vhat.exe (PID: 1272)
    • Uses DRIVERQUERY.EXE to obtain a list of installed device drivers

      • vhat.exe (PID: 1272)
    • Uses ICACLS.EXE to modify access control lists

      • vhat.exe (PID: 1272)
    • Uses NSLOOKUP.EXE to check DNS info

      • vhat.exe (PID: 1272)
    • Uses TASKKILL.EXE to kill process

      • vhat.exe (PID: 1272)
    • Uses powercfg.exe to modify the power settings

      • vhat.exe (PID: 1272)
    • Get information on the list of running processes

      • vhat.exe (PID: 1272)
    • Using 'findstr.exe' to search for text patterns in files and output

      • vhat.exe (PID: 1272)
    • The system shut down or reboot

      • vhat.exe (PID: 1272)
    • The process checks if it is being run in the virtual environment

      • perfmon.exe (PID: 10336)
      • perfmon.exe (PID: 9724)
    • Starts another process probably with elevated privileges via RUNAS.EXE

      • runas.exe (PID: 4784)
      • runas.exe (PID: 11736)
    • Start notepad (likely ransomware note)

      • vhat.exe (PID: 1272)
    • Uses TIMEOUT.EXE to delay execution

      • vhat.exe (PID: 1272)
    • Uses ATTRIB.EXE to modify file attributes

      • vhat.exe (PID: 1272)
    • Sets XML DOM element text (SCRIPT)

      • splwow64.exe (PID: 9380)
    • Identifying current user with WHOAMI command

      • vhat.exe (PID: 1272)
    • Uses WMIC.EXE

      • vhat.exe (PID: 1272)
    • Uses WEVTUTIL.EXE to event management in Windows

      • vhat.exe (PID: 1272)
    • Executable content was dropped or overwritten

      • OneDriveSetup.exe (PID: 11648)
      • RTLCPL.EXE (PID: 5596)
    • The process creates files with name similar to system file names

      • OneDriveSetup.exe (PID: 11648)
    • The process drops C-runtime libraries

      • OneDriveSetup.exe (PID: 11648)
  • INFO

    • Checks supported languages

      • vhat.exe (PID: 1272)
      • Windows.WARP.JITService.exe (PID: 7604)
      • wmplayer.exe (PID: 7436)
      • setup_wm.exe (PID: 7884)
      • PresentationHost.exe (PID: 8048)
      • GetHelp.exe (PID: 8252)
      • extrac32.exe (PID: 8580)
      • agentactivationruntimestarter.exe (PID: 8128)
      • tar.exe (PID: 2040)
      • SystemSettings.exe (PID: 8048)
      • Windows.WARP.JITService.exe (PID: 8760)
      • SOUNDMAN.EXE (PID: 9316)
      • curl.exe (PID: 9896)
      • Alcrmv64.exe (PID: 10100)
      • extrac32.exe (PID: 10268)
      • BitLockerToGo.exe (PID: 10696)
      • PSEXESVC.exe (PID: 10396)
      • wordpad.exe (PID: 10564)
      • PrintDialog.exe (PID: 5744)
      • perfmon.exe (PID: 5136)
      • perfmon.exe (PID: 10336)
      • wmplayer.exe (PID: 10268)
      • curl.exe (PID: 9372)
      • setup_wm.exe (PID: 4152)
      • expand.exe (PID: 10068)
      • perfmon.exe (PID: 11356)
      • perfmon.exe (PID: 9724)
      • PresentationHost.exe (PID: 11728)
      • agentactivationruntimestarter.exe (PID: 11652)
      • TrustedInstaller.exe (PID: 11912)
      • RTLCPL.EXE (PID: 5596)
      • TpmTool.exe (PID: 12864)
      • FlashPlayerApp.exe (PID: 13300)
      • RTBK.EXE (PID: 12352)
      • CPLUtl64.exe (PID: 12408)
      • tar.exe (PID: 12924)
    • Creates files in the program directory

      • RMActivate_ssp.exe (PID: 5640)
      • wermgr.exe (PID: 8504)
    • Checks transactions between databases Windows and Oracle

      • dllhost.exe (PID: 5800)
      • msdtc.exe (PID: 7508)
    • Disables trace logs

      • cmmon32.exe (PID: 7248)
      • rasdial.exe (PID: 7576)
      • cmdl32.exe (PID: 7928)
      • rasphone.exe (PID: 10384)
      • cmstp.exe (PID: 7656)
    • Reads the computer name

      • setup_wm.exe (PID: 7884)
      • wmplayer.exe (PID: 7436)
      • GetHelp.exe (PID: 8252)
      • extrac32.exe (PID: 8580)
      • agentactivationruntimestarter.exe (PID: 8128)
      • SystemSettings.exe (PID: 8048)
      • PSEXESVC.exe (PID: 10396)
      • wordpad.exe (PID: 10564)
      • BitLockerToGo.exe (PID: 10696)
      • perfmon.exe (PID: 5136)
      • perfmon.exe (PID: 10336)
      • PrintDialog.exe (PID: 5744)
      • wmplayer.exe (PID: 10268)
      • setup_wm.exe (PID: 4152)
      • perfmon.exe (PID: 11356)
      • perfmon.exe (PID: 9724)
      • extrac32.exe (PID: 10268)
      • agentactivationruntimestarter.exe (PID: 11652)
      • TrustedInstaller.exe (PID: 11912)
      • FlashPlayerApp.exe (PID: 13300)
      • RTBK.EXE (PID: 12352)
      • RTLCPL.EXE (PID: 5596)
    • Process checks computer location settings

      • wmplayer.exe (PID: 7436)
      • setup_wm.exe (PID: 7884)
      • perfmon.exe (PID: 5136)
      • wmplayer.exe (PID: 10268)
      • perfmon.exe (PID: 11356)
    • Create files in a temporary directory

      • unregmp2.exe (PID: 7996)
      • msdt.exe (PID: 8424)
      • stordiag.exe (PID: 8668)
      • msdt.exe (PID: 8224)
      • OneDriveSetup.exe (PID: 2344)
      • ddodiag.exe (PID: 5596)
      • msdt.exe (PID: 11336)
      • OneDriveSetup.exe (PID: 11648)
      • OneDriveSetup.exe (PID: 12888)
      • RTLCPL.EXE (PID: 5596)
    • Reads security settings of Internet Explorer

      • unregmp2.exe (PID: 7996)
      • HelpPane.exe (PID: 8156)
      • mstsc.exe (PID: 7596)
      • IEChooser.exe (PID: 7248)
      • mstsc.exe (PID: 7616)
      • RdpSaProxy.exe (PID: 516)
      • msdt.exe (PID: 8424)
      • mstsc.exe (PID: 8356)
      • mstsc.exe (PID: 8052)
      • TsWpfWrp.exe (PID: 8476)
      • DpiScaling.exe (PID: 9652)
      • explorer.exe (PID: 9816)
      • RdpSaProxy.exe (PID: 8976)
      • TsWpfWrp.exe (PID: 9648)
      • cleanmgr.exe (PID: 11084)
      • unregmp2.exe (PID: 10432)
      • splwow64.exe (PID: 9380)
      • DpiScaling.exe (PID: 8480)
      • OneDriveSetup.exe (PID: 2344)
      • explorer.exe (PID: 9668)
      • explorer.exe (PID: 7708)
      • stordiag.exe (PID: 8668)
      • explorer.exe (PID: 9888)
      • resmon.exe (PID: 11324)
      • Taskmgr.exe (PID: 10812)
      • write.exe (PID: 11232)
      • OneDriveSetup.exe (PID: 11648)
      • resmon.exe (PID: 10604)
      • calc.exe (PID: 10536)
      • IEChooser.exe (PID: 12388)
      • certreq.exe (PID: 12048)
      • WMIC.exe (PID: 12780)
      • OpenWith.exe (PID: 9096)
      • WMIC.exe (PID: 12428)
      • mshta.exe (PID: 5132)
      • LaunchTM.exe (PID: 11164)
    • Creates files or folders in the user directory

      • wiaacmgr.exe (PID: 2420)
      • WerFault.exe (PID: 1228)
      • IEChooser.exe (PID: 7248)
      • unregmp2.exe (PID: 7432)
      • WerFault.exe (PID: 8536)
      • WerFault.exe (PID: 9452)
      • WerFault.exe (PID: 11028)
      • RMActivate.exe (PID: 11252)
      • OneDriveSetup.exe (PID: 2344)
      • WerFault.exe (PID: 11180)
      • WerFault.exe (PID: 10396)
      • OneDriveSetup.exe (PID: 11648)
      • Taskmgr.exe (PID: 10812)
      • OneDriveSetup.exe (PID: 12888)
      • IEChooser.exe (PID: 12388)
      • FlashPlayerApp.exe (PID: 13300)
    • Displays MAC addresses of computer network adapters

      • getmac.exe (PID: 7436)
    • Checks proxy server information

      • TsWpfWrp.exe (PID: 8476)
      • TsWpfWrp.exe (PID: 9648)
    • Reads the software policy settings

      • TsWpfWrp.exe (PID: 8476)
      • TsWpfWrp.exe (PID: 9648)
      • OneDriveSetup.exe (PID: 2344)
      • stordiag.exe (PID: 8668)
      • OneDriveSetup.exe (PID: 11648)
    • Failed to create an executable file in Windows directory

      • fixmapi.exe (PID: 9756)
      • fixmapi.exe (PID: 6736)
    • Execution of CURL command

      • vhat.exe (PID: 1272)
    • Modifies the entries in the local IP routing table

      • ROUTE.EXE (PID: 8124)
      • ROUTE.EXE (PID: 12932)
    • Uses BITSADMIN.EXE

      • vhat.exe (PID: 1272)
    • Reads Environment values

      • GetHelp.exe (PID: 8252)
    • Reads CPU info

      • perfmon.exe (PID: 10336)
      • perfmon.exe (PID: 9724)
    • Reads the time zone

      • perfmon.exe (PID: 10336)
      • runonce.exe (PID: 2152)
      • perfmon.exe (PID: 9724)
      • runonce.exe (PID: 12188)
    • The sample compiled with english language support

      • OneDriveSetup.exe (PID: 11648)
      • RTLCPL.EXE (PID: 5596)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win16/32 Executable Delphi generic (34.1)
.exe | Generic Win/DOS Executable (32.9)
.exe | DOS Executable Generic (32.9)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:04:19 01:55:20+00:00
ImageFileCharacteristics: Executable, Bytes reversed lo, 32-bit
PEType: PE32
LinkerVersion: 2.18
CodeSize: 29184
InitializedDataSize: 3584
UninitializedDataSize: -
EntryPoint: 0x16a0
OSVersion: 1.11
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows command line
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
711
Monitored processes
551
Malicious processes
5
Suspicious processes
9

Behavior graph

Click at the process to see the details
start vhat.exe no specs conhost.exe no specs sppextcomobj.exe no specs slui.exe no specs efsui.exe no specs tstheme.exe no specs netcfgnotifyobjecthost.exe no specs schtasks.exe no specs mtstocom.exe no specs sc.exe no specs wscadminui.exe no specs rmactivate_ssp.exe no specs hdwwiz.exe no specs pkgmgr.exe no specs user.exe no specs dllhost.exe no specs ieunatt.exe no specs sc.exe no specs mmgaserver.exe no specs cttunesvr.exe no specs forfiles.exe no specs fondue.exe no specs cmd.exe no specs fsutil.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs helppane.exe no specs rekeywiz.exe no specs rdpsaproxy.exe no specs proquota.exe no specs gpscript.exe no specs cmmon32.exe no specs bthudtask.exe no specs camerasettingsuihost.exe no specs raserver.exe no specs xwizard.exe no specs fontview.exe no specs dvdplay.exe no specs poqexec.exe no specs wmplayer.exe no specs svchost.exe no specs sndvol.exe no specs regini.exe no specs msdtc.exe no specs mmc.exe no specs mstsc.exe no specs windows.warp.jitservice.exe useraccountcontrolsettings.exe no specs upnpcont.exe no specs winrshost.exe no specs conhost.exe no specs takeown.exe no specs perfhost.exe no specs openwith.exe no specs searchprotocolhost.exe no specs setup_wm.exe no specs wscript.exe no specs tracerpt.exe no specs unregmp2.exe no specs presentationhost.exe no specs regedit.exe no specs route.exe no specs dpapimig.exe no specs mofcomp.exe no specs werfault.exe no specs wiaacmgr.exe no specs regini.exe no specs infdefaultinstall.exe no specs iscsicpl.exe no specs unregmp2.exe no specs tokenbrokercookies.exe no specs %systemroot%\System32\UserAccountControlSettings.dll no specs explorer.exe no specs wiaacmgr.exe no specs msiexec.exe no specs mofcomp.exe no specs sxstrace.exe no specs %systemroot%\System32\UserAccountControlSettings.dll no specs srdelayed.exe no specs winhlp32.exe no specs reagentc.exe no specs sfc.exe no specs tcmsetup.exe no specs certutil.exe no specs regedt32.exe no specs wecutil.exe no specs winver.exe no specs diskpart.exe no specs helppane.exe no specs systempropertiesperformance.exe no specs prevhost.exe no specs rpcping.exe no specs wiawow64.exe no specs atbroker.exe no specs _isdel.exe no specs pkgmgr.exe no specs xcopy.exe no specs cmdl32.exe no specs svchost.exe no specs reg.exe no specs cliconfg.exe no specs rdpsauachelper.exe no specs mmc.exe no specs regedt32.exe no specs thumbnailextractionhost.exe no specs dllhost.exe no specs net.exe no specs rasdial.exe no specs iechooser.exe no specs net1.exe no specs mstsc.exe no specs getmac.exe no specs net1.exe no specs wpdshextautoplay.exe no specs winrs.exe no specs mstsc.exe no specs winrtnetmuahostserver.exe no specs gethelp.exe no specs ehstorauthn.exe no specs mstsc.exe no specs credentialuibroker.exe no specs winver.exe no specs netsh.exe no specs msdt.exe no specs efsui.exe no specs tswpfwrp.exe no specs wermgr.exe no specs sdbinst.exe no specs relog.exe no specs stordiag.exe no specs computerdefaults.exe no specs wsmanhttpconfig.exe no specs tcpsvcs.exe no specs msinfo32.exe no specs rdpsa.exe no specs hostname.exe no specs rdpsaproxy.exe no specs choice.exe no specs setup16.exe no specs backgroundtransferhost.exe no specs rdpsa.exe wsmprovhost.exe no specs msdt.exe mavinject.exe no specs psr.exe no specs extrac32.exe no specs werfaultsecure.exe no specs systeminfo.exe no specs systempropertiesdataexecutionprevention.exe no specs agentactivationruntimestarter.exe no specs wscadminui.exe no specs packagedcwalauncher.exe no specs passwordonwakesettingflyout.exe no specs eventvwr.exe no specs rdrleakdiag.exe no specs charmap.exe no specs prevhost.exe no specs backgroundtaskhost.exe no specs dwwin.exe no specs robocopy.exe no specs fltmc.exe no specs regsvr32.exe no specs w32tm.exe no specs fsutil.exe no specs systempropertiesdataexecutionprevention.exe no specs clip.exe no specs w32tm.exe no specs logagent.exe no specs ipconfig.exe no specs tar.exe no specs rdpsa.exe no specs camerasettingsuihost.exe no specs taskmgr.exe no specs typeperf.exe no specs tapiunattend.exe no specs bfsvc.exe no specs systempropertiesadvanced.exe no specs net1.exe no specs systemsettings.exe dfrgui.exe no specs proquota.exe no specs windows.warp.jitservice.exe migregdb.exe no specs fsquirt.exe no specs easeofaccessdialog.exe no specs fltmc.exe no specs printui.exe no specs werfault.exe no specs driverquery.exe no specs soundman.exe no specs hh.exe no specs searchindexer.exe no specs splwow64.exe no specs ktmutil.exe no specs typeperf.exe no specs runlegacycplelevated.exe no specs werfault.exe no specs hdwwiz.exe no specs dpapimig.exe no specs cacls.exe no specs dpiscaling.exe no specs comp.exe no specs fixmapi.exe no specs explorer.exe no specs explorer.exe no specs curl.exe no specs windows.media.backgroundplayback.exe no specs ttdinject.exe no specs rdpsauachelper.exe no specs nslookup.exe rdpsa.exe no specs userinit.exe no specs credwiz.exe no specs rdpsa.exe powercfg.exe no specs explorer.exe no specs sethc.exe no specs filecoauth.exe no specs verifiergui.exe no specs tiworker.exe no specs werfaultsecure.exe no specs easeofaccessdialog.exe no specs tracert.exe no specs winmgmt.exe no specs taskkill.exe no specs settingsynchost.exe no specs computerdefaults.exe no specs alcrmv64.exe no specs tzutil.exe no specs upnpcont.exe no specs label.exe no specs compact.exe no specs iexpress.exe no specs netbtugc.exe no specs searchprotocolhost.exe no specs sndvol.exe no specs secedit.exe no specs wlanext.exe no specs mtstocom.exe no specs msfeedssync.exe no specs odbcconf.exe no specs gpupdate.exe no specs tasklist.exe no specs forfiles.exe no specs tswpfwrp.exe no specs dismhost.exe no specs cmd.exe no specs fc.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs netiougc.exe no specs infdefaultinstall.exe no specs xwizard.exe no specs poqexec.exe no specs tcpsvcs.exe no specs cmd.exe no specs diskpart.exe no specs wiaacmgr.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs wiaacmgr.exe no specs cmd.exe no specs wiawow64.exe no specs mfpmp.exe no specs wextract.exe no specs ehstorauthn.exe no specs gpresult.exe no specs recover.exe no specs bitsadmin.exe no specs edpnotify.exe no specs relog.exe no specs iscsicli.exe no specs cleanmgr.exe no specs werfault.exe no specs dllhst3g.exe no specs newdev.exe no specs write.exe no specs wmiadap.exe no specs netbtugc.exe no specs netstat.exe no specs utilman.exe no specs extrac32.exe no specs regedit.exe no specs autoconv.exe no specs werfault.exe no specs psexesvc.exe no specs netiougc.exe no specs find.exe no specs verclsid.exe no specs bytecodegenerator.exe no specs gamebarpresencewriter.exe no specs esentutl.exe no specs wordpad.exe no specs resmon.exe no specs systempropertiesremote.exe no specs wusa.exe no specs shrpubw.exe no specs comp.exe no specs eventcreate.exe no specs where.exe no specs control.exe no specs bitlockertogo.exe no specs edpnotify.exe no specs perfmon.exe no specs wwahost.exe srdelayed.exe no specs spatialaudiolicensesrv.exe no specs w32tm.exe no specs tasklist.exe no specs explorer.exe no specs w32tm.exe no specs launchwinapp.exe no specs printdialog.exe perfmon.exe searchfilterhost.exe no specs werfault.exe no specs rmactivate.exe no specs label.exe no specs tokenbrokercookies.exe no specs sort.exe no specs cliconfg.exe no specs eventcreate.exe no specs fltmc.exe no specs findstr.exe no specs newdev.exe no specs fltmc.exe no specs fltmc.exe no specs perfmon.exe no specs auditpol.exe no specs appidtel.exe no specs chkntfs.exe no specs cmdkey.exe no specs subst.exe no specs logagent.exe no specs werfault.exe no specs onedrivesetup.exe no specs inputswitchtoasthandler.exe no specs shutdown.exe no specs robocopy.exe no specs ntprint.exe no specs COpenControlPanel no specs systempropertiesperformance.exe no specs systray.exe no specs unregmp2.exe no specs ttdinject.exe no specs ping.exe no specs ktmutil.exe no specs unregmp2.exe no specs icacls.exe no specs migregdb.exe no specs rasphone.exe no specs odbcad32.exe no specs oposhost.exe no specs dxdiag.exe no specs cscript.exe no specs userinit.exe no specs explorer.exe no specs gamepanel.exe no specs perfmon.exe no specs dpiscaling.exe no specs wlanext.exe no specs systempropertiesremote.exe no specs cttune.exe no specs icsunattend.exe no specs dccw.exe no specs pickerhost.exe no specs eventvwr.exe no specs dvdplay.exe no specs fixmapi.exe no specs wmplayer.exe no specs explorer.exe no specs comrepl.exe no specs curl.exe no specs synchost.exe no specs ieunatt.exe no specs explorer.exe no specs setup_wm.exe no specs dcomcnfg.exe no specs rmactivate_ssp_isv.exe no specs secinit.exe no specs cttune.exe no specs winrtnetmuahostserver.exe no specs wwahost.exe recover.exe no specs waitfor.exe no specs tpminit.exe no specs packagedcwalauncher.exe no specs perfhost.exe no specs grpconv.exe no specs werfault.exe no specs gpresult.exe no specs ddodiag.exe no specs psr.exe no specs icsunattend.exe no specs devicepairingwizard.exe no specs rundll32.exe no specs mavinject.exe no specs dwwin.exe no specs expand.exe no specs launchtm.exe no specs msinfo32.exe no specs runas.exe no specs dllhost.exe no specs thumbnailextractionhost.exe no specs taskmgr.exe no specs autofmt.exe no specs ctfmon.exe no specs runonce.exe no specs windows.media.backgroundplayback.exe no specs odbcconf.exe no specs notepad.exe no specs tzutil.exe no specs ndadmin.exe no specs taskmgr.exe checknetisolation.exe no specs timeout.exe no specs hh.exe no specs pickerhost.exe no specs fondue.exe no specs ftp.exe no specs resmon.exe no specs msdt.exe no specs searchfilterhost.exe no specs autoconv.exe no specs mobsync.exe no specs attrib.exe no specs mobsync.exe no specs cleanmgr.exe no specs perfmon.exe no specs mobsync.exe no specs fc.exe no specs presentationhost.exe no specs runas.exe no specs pcaui.exe no specs wowreg32.exe no specs pcaui.exe no specs netstat.exe no specs wscript.exe no specs choice.exe no specs spatialaudiolicensesrv.exe no specs wowreg32.exe no specs whoami.exe no specs certreq.exe no specs notepad.exe no specs quickassist.exe no specs COpenControlPanel no specs COpenControlPanel no specs perfmon.exe perfmon.exe no specs provlaunch.exe no specs agentactivationruntimestarter.exe no specs atbroker.exe no specs pathping.exe no specs trustedinstaller.exe no specs sort.exe no specs tpminit.exe no specs mspaint.exe no specs quickassist.exe no specs shrpubw.exe no specs rmactivate_ssp.exe no specs instnm.exe no specs cmstp.exe no specs dccw.exe no specs onedrivesetup.exe rtlcpl.exe perfmon.exe no specs nslookup.exe systempropertieshardware.exe no specs sdchange.exe no specs systeminfo.exe no specs systemuwplauncher.exe no specs calc.exe no specs wevtutil.exe no specs openwith.exe no specs cipher.exe no specs regedit.exe no specs timeout.exe no specs bytecodegenerator.exe no specs help.exe no specs iechooser.exe no specs rmactivate.exe no specs tracerpt.exe no specs winrshost.exe no specs ipconfig.exe no specs conhost.exe no specs eudcedit.exe no specs where.exe no specs useraccountbroker.exe no specs cacls.exe no specs hostname.exe no specs convert.exe no specs wmic.exe no specs tttracer.exe no specs iexpress.exe no specs tpmtool.exe no specs onedrivesetup.exe no specs setx.exe no specs tar.exe no specs route.exe no specs waitfor.exe no specs setup16.exe no specs print.exe no specs credwiz.exe no specs openfiles.exe no specs rmactivate_ssp_isv.exe no specs flashplayerapp.exe no specs rtbk.exe no specs cplutl64.exe no specs wmic.exe no specs runonce.exe no specs clip.exe no specs dllhst3g.exe no specs mshta.exe no specs certutil.exe no specs mrinfo.exe no specs findstr.exe no specs wusa.exe no specs replace.exe no specs taskkill.exe no specs at.exe no specs setup.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
516".\Windows\SysWOW64\RdpSaProxy.exe"C:\Windows\SysWOW64\RdpSaProxy.exevhat.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
RDP Session Agent Proxy
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\rdpsaproxy.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
516".\Windows\System32\clip.exe"C:\Windows\SysWOW64\clip.exevhat.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Clip - copies the data into clipboard
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\clip.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
536".\Windows\System32\schtasks.exe"C:\Windows\SysWOW64\schtasks.exevhat.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
536".\Windows\HelpPane.exe"C:\Windows\HelpPane.exevhat.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Help and Support
Exit code:
4294967295
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\helppane.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
536".\Windows\System32\RpcPing.exe"C:\Windows\SysWOW64\RpcPing.exevhat.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
RPC Ping Utility
Exit code:
5
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\rpcping.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
684".\Windows\System32\SyncHost.exe"C:\Windows\SysWOW64\SyncHost.exevhat.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Host Process for Windows Sync
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\synchost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
872".\Windows\SysWOW64\perfmon.exe"C:\Windows\SysWOW64\perfmon.exevhat.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Resource and Performance Monitor
Exit code:
3221226540
Version:
10.00
Modules
Images
c:\windows\syswow64\perfmon.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
960".\Windows\System32\w32tm.exe"C:\Windows\System32\w32tm.exew32tm.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Time Service Diagnostic Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\w32tm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\advapi32.dll
968".\Windows\System32\netbtugc.exe"C:\Windows\SysWOW64\netbtugc.exevhat.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
NetBT Unattend Generic Command
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\netbtugc.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
1004C:\WINDOWS\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.3989_none_7ddb45627cb30e03\TiWorker.exe -EmbeddingC:\Windows\WinSxS\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.3989_none_7ddb45627cb30e03\TiWorker.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Modules Installer Worker
Version:
10.0.19041.3989 (WinBuild.160101.0800)
Modules
Images
c:\windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.3989_none_7ddb45627cb30e03\tiworker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
Total events
87 891
Read events
87 557
Write events
275
Delete events
59

Modification events

(PID) Process:(5800) dllhost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Ole\Instrumentation
Operation:writeName:InstrumentationLogFileDir
Value:
C:\WINDOWS\system32\com
(PID) Process:(7248) cmmon32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CMMON32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(7248) cmmon32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CMMON32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(7248) cmmon32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CMMON32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(7248) cmmon32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CMMON32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(7248) cmmon32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CMMON32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(7248) cmmon32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CMMON32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(7248) cmmon32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CMMON32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(7884) setup_wm.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
Operation:delete valueName:UsageTracking
Value:
(PID) Process:(7884) setup_wm.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\MediaPlayer\Preferences
Operation:delete valueName:ForceUsageTracking
Value:
Executable files
98
Suspicious files
37
Text files
70
Unknown types
0

Dropped files

PID
Process
Filename
Type
1228WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Windows.WARP.JIT_7f62154bdac86d6e50d9d95360b25359a157d2f_2f81cf5c_1ae02f15-d4c5-40fb-b516-80f491f8bad6\Report.wer
MD5:
SHA256:
8536WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Windows.WARP.JIT_7f62154bdac86d6e50d9d95360b25359a157d2f_2f81cf5c_7234155f-6cd3-4471-b4d5-13e1c11eb6db\Report.wer
MD5:
SHA256:
1228WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERED41.tmp.WERInternalMetadata.xmlbinary
MD5:2D55266CF8A435D983DB17A1EA0FA329
SHA256:E0590211B347DB8E8D2D547E6450D5953BD4DE77DF695BEFA1D2FACC5588724D
5640RMActivate_ssp.exeC:\ProgramData\Microsoft\DRM\Server\S-1-5-21-1693682860-607145093-2874071422-1001\CERT-Machine.drmbinary
MD5:6B271CF4E71028D2B0AAB01574AC29CF
SHA256:9671F565369DB1B10706042A0B8498BCF7477FAEBF7B92041757489620362DA8
5640RMActivate_ssp.exeC:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\07f8ec5c7dc978e8826fb97d28402ef0_bb926e54-e3ca-40fd-ae90-2764341e7792binary
MD5:3A1A9923C4225254154E297B092E93F5
SHA256:D9ED1121DD214D004AC2D20817BB4AB40F11498368277CE74E83185B042D385A
5640RMActivate_ssp.exeC:\ProgramData\Microsoft\DRM\Server\S-1-5-21-1693682860-607145093-2874071422-1001\CERT-Machine-2048.drmbinary
MD5:727EFB3E87F7105E2648B7217BF45C3C
SHA256:C7E47DA8E01E1568B69043488A3981FD08BFDBC182F201EEEBE94B8EA233EA7E
5800dllhost.exeC:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{8A5722A3-207F-4F9E-9393-10E46600F2F9}.crmlogbinary
MD5:306A5E959D38BC962C6D24E5952B18F3
SHA256:FA46832D1B9F12416FC3216A81BF5E251134137BBF65F3E8513A3C8E5FD4F0B0
7432unregmp2.exeC:\Users\admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNSD.XMLtext
MD5:A9B5DA9AEC61657B32393D96217165F0
SHA256:9F4611369CF65B33D886489B2486FCA7B1E83E0DC998D35B15B3AA4C8478A28D
9452WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SystemSettings.e_7b9fad3f749d9ab87e3cdc494a240af197021a_e3591d10_df64cd30-dafb-4b86-b9a3-427889d1bafc\Report.wer
MD5:
SHA256:
7432unregmp2.exeC:\Users\admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML.baktext
MD5:7050D5AE8ACFBE560FA11073FEF8185D
SHA256:CB87767C4A384C24E4A0F88455F59101B1AE7B4FB8DE8A5ADB4136C5F7EE545B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
37
DNS requests
29
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2104
svchost.exe
GET
200
95.101.142.9:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
95.101.142.9:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
95.101.142.9:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2104
svchost.exe
95.101.142.9:80
crl.microsoft.com
Akamai International B.V.
SE
whitelisted
5496
MoUsoCoreWorker.exe
95.101.142.9:80
crl.microsoft.com
Akamai International B.V.
SE
whitelisted
95.101.142.9:80
crl.microsoft.com
Akamai International B.V.
SE
whitelisted
4
System
192.168.100.255:138
whitelisted
5496
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3812
svchost.exe
239.255.255.250:1900
whitelisted
2196
svchost.exe
224.0.0.252:5355
whitelisted
3012
dasHost.exe
239.255.255.250:3702
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
google.com
  • 142.250.74.110
whitelisted
crl.microsoft.com
  • 95.101.142.9
whitelisted
2.100.168.192.in-addr.arpa
whitelisted
158.240.127.40.in-addr.arpa
unknown
9.142.101.95.in-addr.arpa
unknown
250.255.255.239.in-addr.arpa
unknown
252.0.0.224.in-addr.arpa
unknown
3.0.0.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.f.f.ip6.arpa
unknown
b.f.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.f.f.ip6.arpa
unknown

Threats

No threats detected
No debug info