File name:

SecHex-Spoofy V1.5.8 (testing).zip

Full analysis: https://app.any.run/tasks/c31938f1-ac3e-4105-89ab-66915ff0aecc
Verdict: Malicious activity
Analysis date: September 13, 2024, 18:49:17
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/zip
File info: Zip archive data, at least v1.0 to extract, compression method=store
MD5:

03FDA68C9939BA123C32CB6A131B7775

SHA1:

10DD5168E9D8B458BF24CFC0ACBF20232C7BAB36

SHA256:

EB7B4B35DC3CD49EB7DA39F066EC44ADDF499E5F396F1041B70473533B794A8F

SSDEEP:

98304:Bjwy2pSfYBYDYfi6/TgHaaUuEThUuKKCkOQuXnMJSQDhx2q8Hd7g4nQHqzafzlxY:Kfx0T

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • windowsdesktop-runtime-6.0.33-win-x64.exe (PID: 6332)
    • Changes powershell execution policy (Bypass)

      • SecHex-GUI.exe (PID: 7656)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 5372)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • SecHex-GUI.exe (PID: 7132)
      • ShellExperienceHost.exe (PID: 7640)
      • windowsdesktop-runtime-6.0.33-win-x64.exe (PID: 6128)
      • NSudoLG.exe (PID: 7552)
      • SecHex-GUI.exe (PID: 7656)
    • Searches for installed software

      • windowsdesktop-runtime-6.0.33-win-x64.exe (PID: 6128)
    • Executable content was dropped or overwritten

      • windowsdesktop-runtime-6.0.33-win-x64.exe (PID: 6316)
      • windowsdesktop-runtime-6.0.33-win-x64.exe (PID: 6128)
      • windowsdesktop-runtime-6.0.33-win-x64.exe (PID: 6332)
    • Starts a Microsoft application from unusual location

      • windowsdesktop-runtime-6.0.33-win-x64.exe (PID: 6128)
      • windowsdesktop-runtime-6.0.33-win-x64.exe (PID: 6332)
    • Starts itself from another location

      • windowsdesktop-runtime-6.0.33-win-x64.exe (PID: 6128)
    • Creates a software uninstall entry

      • windowsdesktop-runtime-6.0.33-win-x64.exe (PID: 6332)
    • Checks Windows Trust Settings

      • msiexec.exe (PID: 5548)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 5548)
    • Creates file in the systems drive root

      • explorer.exe (PID: 4552)
    • Starts CMD.EXE for commands execution

      • NSudoLG.exe (PID: 7552)
    • The process creates files with name similar to system file names

      • msiexec.exe (PID: 5548)
    • There is functionality for taking screenshot (YARA)

      • SecHex-GUI.exe (PID: 7656)
    • Reads the date of Windows installation

      • SecHex-GUI.exe (PID: 7656)
    • Starts POWERSHELL.EXE for commands execution

      • SecHex-GUI.exe (PID: 7656)
    • PowerShell delay command usage (probably sleep evasion)

      • powershell.exe (PID: 5760)
    • Process uses powershell cmdlet to discover network configuration

      • SecHex-GUI.exe (PID: 7656)
    • Detected use of alternative data streams (AltDS)

      • powershell.exe (PID: 5760)
    • Suspicious use of NETSH.EXE

      • SecHex-GUI.exe (PID: 7656)
    • Process uses IPCONFIG to clear DNS cache

      • SecHex-GUI.exe (PID: 7656)
    • Uses WEVTUTIL.EXE to get a list of log names

      • SecHex-GUI.exe (PID: 7656)
    • The process bypasses the loading of PowerShell profile settings

      • SecHex-GUI.exe (PID: 7656)
    • Starts SC.EXE for service management

      • SecHex-GUI.exe (PID: 7656)
    • Modifies existing scheduled task

      • schtasks.exe (PID: 5096)
      • schtasks.exe (PID: 7032)
  • INFO

    • The process uses the downloaded file

      • explorer.exe (PID: 4552)
      • WinRAR.exe (PID: 7164)
      • msedge.exe (PID: 7544)
      • windowsdesktop-runtime-6.0.33-win-x64.exe (PID: 6128)
      • SecHex-GUI.exe (PID: 7656)
      • powershell.exe (PID: 5760)
      • powershell.exe (PID: 5372)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 7164)
      • msedge.exe (PID: 6920)
      • msiexec.exe (PID: 5548)
      • msedge.exe (PID: 7264)
    • Reads security settings of Internet Explorer

      • explorer.exe (PID: 4552)
    • Checks supported languages

      • SecHex-GUI.exe (PID: 7132)
      • identity_helper.exe (PID: 7304)
      • identity_helper.exe (PID: 7232)
      • ShellExperienceHost.exe (PID: 7640)
      • windowsdesktop-runtime-6.0.33-win-x64.exe (PID: 6128)
      • windowsdesktop-runtime-6.0.33-win-x64.exe (PID: 6332)
      • msiexec.exe (PID: 5548)
      • msiexec.exe (PID: 5692)
      • msiexec.exe (PID: 5464)
      • msiexec.exe (PID: 5184)
      • msiexec.exe (PID: 5136)
      • NSudoLG.exe (PID: 7552)
      • SecHex-GUI.exe (PID: 7656)
      • windowsdesktop-runtime-6.0.33-win-x64.exe (PID: 6316)
    • Manual execution by a user

      • SecHex-GUI.exe (PID: 7028)
      • SecHex-GUI.exe (PID: 7132)
      • msedge.exe (PID: 6920)
    • Sends debugging messages

      • SecHex-GUI.exe (PID: 7132)
      • ShellExperienceHost.exe (PID: 7640)
      • SecHex-GUI.exe (PID: 7656)
    • Reads the computer name

      • SecHex-GUI.exe (PID: 7132)
      • identity_helper.exe (PID: 7304)
      • identity_helper.exe (PID: 7232)
      • ShellExperienceHost.exe (PID: 7640)
      • windowsdesktop-runtime-6.0.33-win-x64.exe (PID: 6128)
      • windowsdesktop-runtime-6.0.33-win-x64.exe (PID: 6332)
      • msiexec.exe (PID: 5548)
      • msiexec.exe (PID: 5692)
      • msiexec.exe (PID: 5184)
      • msiexec.exe (PID: 5136)
      • NSudoLG.exe (PID: 7552)
      • msiexec.exe (PID: 5464)
      • SecHex-GUI.exe (PID: 7656)
    • Application launched itself

      • msedge.exe (PID: 2028)
      • msedge.exe (PID: 6920)
      • msedge.exe (PID: 7720)
    • Reads Environment values

      • identity_helper.exe (PID: 7304)
      • identity_helper.exe (PID: 7232)
    • Reads the software policy settings

      • explorer.exe (PID: 4552)
      • msiexec.exe (PID: 5548)
      • slui.exe (PID: 8076)
      • slui.exe (PID: 7496)
    • Checks proxy server information

      • explorer.exe (PID: 4552)
      • slui.exe (PID: 7496)
    • Creates files or folders in the user directory

      • explorer.exe (PID: 4552)
    • Create files in a temporary directory

      • windowsdesktop-runtime-6.0.33-win-x64.exe (PID: 6316)
      • windowsdesktop-runtime-6.0.33-win-x64.exe (PID: 6128)
      • windowsdesktop-runtime-6.0.33-win-x64.exe (PID: 6332)
    • Process checks computer location settings

      • windowsdesktop-runtime-6.0.33-win-x64.exe (PID: 6128)
      • SecHex-GUI.exe (PID: 7656)
    • Creates files in the program directory

      • windowsdesktop-runtime-6.0.33-win-x64.exe (PID: 6332)
      • SecHex-GUI.exe (PID: 7656)
    • Reads the machine GUID from the registry

      • windowsdesktop-runtime-6.0.33-win-x64.exe (PID: 6332)
      • msiexec.exe (PID: 5548)
      • SecHex-GUI.exe (PID: 7656)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 5548)
    • Reads Windows Product ID

      • SecHex-GUI.exe (PID: 7656)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 5760)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 5760)
    • Disables trace logs

      • netsh.exe (PID: 6424)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 10
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2024:09:13 13:20:04
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: SecHex-Spoofy V1.5.8 (testing)/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
273
Monitored processes
129
Malicious processes
9
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe rundll32.exe no specs sechex-gui.exe no specs sechex-gui.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs sppextcomobj.exe no specs slui.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs shellexperiencehost.exe no specs rundll32.exe no specs explorer.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs windowsdesktop-runtime-6.0.33-win-x64.exe windowsdesktop-runtime-6.0.33-win-x64.exe windowsdesktop-runtime-6.0.33-win-x64.exe msiexec.exe msiexec.exe no specs slui.exe msiexec.exe no specs msiexec.exe no specs msiexec.exe no specs msedge.exe no specs nsudolg.exe no specs nsudolg.exe msedge.exe cmd.exe conhost.exe no specs THREAT sechex-gui.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs powershell.exe no specs conhost.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs ipconfig.exe no specs conhost.exe no specs wevtutil.exe no specs conhost.exe no specs msedge.exe no specs netsh.exe no specs conhost.exe no specs powershell.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs schtasks.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
236"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.59 --initial-client-data=0x314,0x318,0x31c,0x30c,0x308,0x7fffd32c5fd8,0x7fffd32c5fe4,0x7fffd32c5ff0C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
320"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5468 --field-trial-handle=2488,i,17636197737091817987,13646250574282416891,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
320"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=4180 --field-trial-handle=2372,i,7041296713676010224,8219347963635843941,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
448"sc" stop XboxGipSvcC:\Windows\System32\sc.exeSecHex-GUI.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Service Control Manager Configuration Tool
Exit code:
1062
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
964"C:\Users\admin\Desktop\SecHex-Spoofy V1.5.8 (testing)\NSudoLG.exe" C:\Users\admin\Desktop\SecHex-Spoofy V1.5.8 (testing)\NSudoLG.exeexplorer.exe
User:
admin
Company:
M2-Team
Integrity Level:
MEDIUM
Description:
NSudo Launcher
Exit code:
3221226540
Version:
8.2.0.0
Modules
Images
c:\users\admin\desktop\sechex-spoofy v1.5.8 (testing)\nsudolg.exe
c:\windows\system32\ntdll.dll
1084"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=5296 --field-trial-handle=2372,i,7041296713676010224,8219347963635843941,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1356"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=3852 --field-trial-handle=2488,i,17636197737091817987,13646250574282416891,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1448"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5704 --field-trial-handle=2488,i,17636197737091817987,13646250574282416891,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1496"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5332 --field-trial-handle=2488,i,17636197737091817987,13646250574282416891,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1496\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exesc.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
60 133
Read events
58 740
Write events
1 310
Delete events
83

Modification events

(PID) Process:(4552) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000A02EE
Operation:writeName:VirtualDesktop
Value:
1000000030304456033BCEE44DE41B4E8AEC331E84F566D2
(PID) Process:(7164) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip
(PID) Process:(7164) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\SecHex-Spoofy V1.5.8 (testing).zip
(PID) Process:(7164) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(7164) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(7164) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(7164) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(4552) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
Operation:writeName:IconLayouts
Value:
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
(PID) Process:(4552) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
Operation:writeName:IconNameVersion
Value:
1
(PID) Process:(4552) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
Operation:writeName:LastUpdate
Value:
3E89E46600000000
Executable files
536
Suspicious files
551
Text files
204
Unknown types
25

Dropped files

PID
Process
Filename
Type
7164WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7164.18316\SecHex-Spoofy V1.5.8 (testing)\Logs\2024-09-13_13-20-49.txttext
MD5:DC95E02F274EB5FD31091F78E6AF2309
SHA256:51975B17045AF756D8A93A122B1789F6A82AD3B62A8CD1E280DAB459D0859F3B
7164WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7164.18316\SecHex-Spoofy V1.5.8 (testing)\runtimes\win\lib\netcoreapp3.0\System.Runtime.WindowsRuntime.UI.Xaml.dllexecutable
MD5:7141C72E54FE9A7ED39EF89814DE67D9
SHA256:884442E44BCEF27D917E5DE5B69CBD4A297830E0B98B84495C7AB7486FA47332
7164WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7164.18316\SecHex-Spoofy V1.5.8 (testing)\runtimes\win\lib\net6.0\System.Diagnostics.EventLog.dllexecutable
MD5:62C63C04C6083330D020CF855C85002C
SHA256:FAC816CA0BD5D9C4A17693B37575A5ABA901D993133B61D7344B597472FA0C26
7164WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7164.18316\SecHex-Spoofy V1.5.8 (testing)\runtimes\win\lib\net6.0\System.Diagnostics.EventLog.Messages.dllexecutable
MD5:286F0A973CF2332FBDED81CF541FFF06
SHA256:3A2EA792755BBE4674F349D7870AEB917494AC39F96A9E5D9625D4AC68DC3EC5
7164WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7164.18316\SecHex-Spoofy V1.5.8 (testing)\NSudoLG.exeexecutable
MD5:7AACFD85B8DFF0AA6867BEDE82CFD147
SHA256:871E4F28FE39BCAD8D295AE46E148BE458778C0195ED660B7DB18EB595D00BD8
7164WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7164.18316\SecHex-Spoofy V1.5.8 (testing)\runtimes\win\lib\net6.0\System.ServiceProcess.ServiceController.dllexecutable
MD5:1C710EF8481E54352A4E1F66A8F7AD8C
SHA256:D11B97C114101961BCC7ACB0BB17E536708593C0321B6107942FBA20CB430C65
7164WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7164.18316\SecHex-Spoofy V1.5.8 (testing)\Logs\2024-09-13_13-24-17.txttext
MD5:ED06E3C3C87CCE1142EFB33325004CF7
SHA256:EFEEB2451D4D97CCFD26369D7E9D938A1573BB07939246A0CFDE8D037E5CA15D
7164WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7164.18316\SecHex-Spoofy V1.5.8 (testing)\runtimes\win\lib\netcoreapp3.0\System.Runtime.WindowsRuntime.dllexecutable
MD5:0198A79063C865ED21C95B7400DDD9FC
SHA256:BE26699765F700A29C3928E10F6D1E02A297DFF3BA6EB7AFB6EC41003CB3D665
7164WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7164.18316\SecHex-Spoofy V1.5.8 (testing)\SecHex-GUI.exeexecutable
MD5:C252A43B1D357D08308690545C617031
SHA256:B779B45849A4AB5BD8FF296E6C95638C5BE4DA18B67F1FD195B31795BC21CDFC
7164WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa7164.18316\SecHex-Spoofy V1.5.8 (testing)\SecHex-GUI.deps.jsonbinary
MD5:64AE126CF65A9096D5730E060B448293
SHA256:A4CADD5C4F3922A4ADA9E4BBC13E2BD779280A9B8CF537B66475FB3559BC7122
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
53
TCP/UDP connections
87
DNS requests
90
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6880
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7396
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
1280
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7396
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7888
svchost.exe
HEAD
200
152.199.19.161:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/8699fac5-cf38-4f97-a2f8-fb1e47f5e54e?P1=1726546771&P2=404&P3=2&P4=Gx6HwH6RHR%2bO9ZvOeRZxHOudEhuhxUAWH9CsE2DWk8ccdliakNZcaudALCOolqkSg5KzRmTjCF8TrsQd8YJYKA%3d%3d
unknown
whitelisted
4552
explorer.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl
unknown
whitelisted
7888
svchost.exe
GET
206
152.199.19.161:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/8699fac5-cf38-4f97-a2f8-fb1e47f5e54e?P1=1726546771&P2=404&P3=2&P4=Gx6HwH6RHR%2bO9ZvOeRZxHOudEhuhxUAWH9CsE2DWk8ccdliakNZcaudALCOolqkSg5KzRmTjCF8TrsQd8YJYKA%3d%3d
unknown
whitelisted
7888
svchost.exe
GET
206
152.199.19.161:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/8699fac5-cf38-4f97-a2f8-fb1e47f5e54e?P1=1726546771&P2=404&P3=2&P4=Gx6HwH6RHR%2bO9ZvOeRZxHOudEhuhxUAWH9CsE2DWk8ccdliakNZcaudALCOolqkSg5KzRmTjCF8TrsQd8YJYKA%3d%3d
unknown
whitelisted
7888
svchost.exe
GET
206
152.199.19.161:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/8699fac5-cf38-4f97-a2f8-fb1e47f5e54e?P1=1726546771&P2=404&P3=2&P4=Gx6HwH6RHR%2bO9ZvOeRZxHOudEhuhxUAWH9CsE2DWk8ccdliakNZcaudALCOolqkSg5KzRmTjCF8TrsQd8YJYKA%3d%3d
unknown
whitelisted
7888
svchost.exe
GET
206
152.199.19.161:80
http://msedge.b.tlu.dl.delivery.mp.microsoft.com/filestreamingservice/files/8699fac5-cf38-4f97-a2f8-fb1e47f5e54e?P1=1726546771&P2=404&P3=2&P4=Gx6HwH6RHR%2bO9ZvOeRZxHOudEhuhxUAWH9CsE2DWk8ccdliakNZcaudALCOolqkSg5KzRmTjCF8TrsQd8YJYKA%3d%3d
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
6880
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6232
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2120
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
6880
svchost.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3260
svchost.exe
40.113.103.199:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2120
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1280
svchost.exe
40.126.32.133:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1280
svchost.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.104.136.2
  • 4.231.128.59
whitelisted
google.com
  • 216.58.206.46
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
client.wns.windows.com
  • 40.113.103.199
  • 40.113.110.67
whitelisted
login.live.com
  • 40.126.32.133
  • 40.126.32.140
  • 40.126.32.138
  • 40.126.32.72
  • 40.126.32.76
  • 40.126.32.68
  • 40.126.32.136
  • 40.126.32.134
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
aka.ms
  • 104.119.110.121
whitelisted
edge.microsoft.com
  • 204.79.197.239
  • 13.107.21.239
whitelisted
api.edgeoffer.microsoft.com
  • 94.245.104.56
whitelisted

Threats

No threats detected
Process
Message
SecHex-GUI.exe
You must install .NET to run this application. App: C:\Users\admin\Desktop\SecHex-Spoofy V1.5.8 (testing)\SecHex-GUI.exe Architecture: x64 App host version: 6.0.16 .NET location: Not found Learn about runtime installation: https://aka.ms/dotnet/app-launch-failed Download the .NET runtime: https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=x64&rid=win10-x64&apphost_version=6.0.16
SecHex-GUI.exe
Profiler was prevented from loading notification profiler due to app settings. Process ID (decimal): 7656. Message ID: [0x2509].