File name:

WeMod R.E.P.O. Setup.exe

Full analysis: https://app.any.run/tasks/95da84fa-522c-4f38-9656-f42163b01f74
Verdict: Malicious activity
Analysis date: March 25, 2025, 03:25:02
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
nodejs
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

65CEA1D0C273CCA60E294A5E7B8E125D

SHA1:

46DD951C92B1837D99714B5D6855A0FFB1101BC0

SHA256:

FDDA6B5043F04BC12C2A6C9731E580DEF3AC092ACE0AFF07FD704C193534F7F4

SSDEEP:

1536:Q668Dtf9nk7RBog5KG6JkOiVPL+09ME5LBtJD64uQgCYO6+YFyHA7OqCkNRBog5m:w8DvE57miVj+J6pHdHg7OA57N/u

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads Microsoft Outlook installation path

      • WeMod R.E.P.O. Setup.exe (PID: 5112)
    • Reads security settings of Internet Explorer

      • WeMod R.E.P.O. Setup.exe (PID: 5112)
      • Update.exe (PID: 7568)
      • Update.exe (PID: 4756)
      • WeModAuxiliaryService.exe (PID: 4988)
      • ShellExperienceHost.exe (PID: 6184)
    • Executable content was dropped or overwritten

      • WeMod-Setup-638784699119640569.exe (PID: 7988)
      • Update.exe (PID: 7568)
    • Reads Internet Explorer settings

      • WeMod R.E.P.O. Setup.exe (PID: 5112)
    • Reads the date of Windows installation

      • Update.exe (PID: 7568)
      • WeMod R.E.P.O. Setup.exe (PID: 5112)
      • Update.exe (PID: 4756)
    • Process drops legitimate windows executable

      • Update.exe (PID: 7568)
    • Creates a software uninstall entry

      • Update.exe (PID: 7568)
    • Searches for installed software

      • Update.exe (PID: 7568)
    • Application launched itself

      • WeMod.exe (PID: 6656)
    • There is functionality for taking screenshot (YARA)

      • WeMod.exe (PID: 7652)
  • INFO

    • Reads the computer name

      • WeMod R.E.P.O. Setup.exe (PID: 5112)
      • squirrel.exe (PID: 7908)
      • Update.exe (PID: 7568)
      • Update.exe (PID: 4756)
      • Update.exe (PID: 6080)
      • WeMod.exe (PID: 6656)
      • WeMod.exe (PID: 7464)
      • WeMod.exe (PID: 7652)
      • Update.exe (PID: 7940)
      • WeModAuxiliaryService.exe (PID: 4988)
      • ShellExperienceHost.exe (PID: 6184)
      • WeMod.exe (PID: 4180)
    • Checks proxy server information

      • WeMod R.E.P.O. Setup.exe (PID: 5112)
      • BackgroundTransferHost.exe (PID: 5508)
      • Update.exe (PID: 7568)
      • WeModAuxiliaryService.exe (PID: 4988)
      • Update.exe (PID: 7940)
      • WeMod.exe (PID: 6656)
      • slui.exe (PID: 8188)
    • Reads the software policy settings

      • WeMod R.E.P.O. Setup.exe (PID: 5112)
      • BackgroundTransferHost.exe (PID: 5508)
      • Update.exe (PID: 7568)
      • slui.exe (PID: 7268)
      • Update.exe (PID: 7940)
      • WeModAuxiliaryService.exe (PID: 4988)
      • slui.exe (PID: 8188)
    • Reads the machine GUID from the registry

      • WeMod R.E.P.O. Setup.exe (PID: 5112)
      • squirrel.exe (PID: 7908)
      • Update.exe (PID: 4756)
      • Update.exe (PID: 6080)
      • Update.exe (PID: 7568)
      • WeMod.exe (PID: 6656)
      • Update.exe (PID: 7940)
      • WeModAuxiliaryService.exe (PID: 4988)
      • WeMod.exe (PID: 4180)
    • Checks supported languages

      • WeMod R.E.P.O. Setup.exe (PID: 5112)
      • WeMod-Setup-638784699119640569.exe (PID: 7988)
      • squirrel.exe (PID: 7908)
      • WeMod.exe (PID: 516)
      • Update.exe (PID: 7568)
      • Update.exe (PID: 6080)
      • WeMod.exe (PID: 7652)
      • WeMod.exe (PID: 7464)
      • WeMod.exe (PID: 6656)
      • Update.exe (PID: 4756)
      • Update.exe (PID: 7940)
      • WeModAuxiliaryService.exe (PID: 4988)
      • WeMod.exe (PID: 7672)
      • ShellExperienceHost.exe (PID: 6184)
      • WeMod.exe (PID: 4180)
    • Creates files or folders in the user directory

      • WeMod R.E.P.O. Setup.exe (PID: 5112)
      • WeMod-Setup-638784699119640569.exe (PID: 7988)
      • BackgroundTransferHost.exe (PID: 5508)
      • squirrel.exe (PID: 7908)
      • Update.exe (PID: 7568)
      • Update.exe (PID: 6080)
      • Update.exe (PID: 4756)
      • WeMod.exe (PID: 7464)
      • Update.exe (PID: 7940)
      • WeMod.exe (PID: 6656)
      • WeModAuxiliaryService.exe (PID: 4988)
      • WeMod.exe (PID: 4180)
    • Reads Environment values

      • WeMod R.E.P.O. Setup.exe (PID: 5112)
      • WeMod.exe (PID: 516)
      • Update.exe (PID: 7568)
      • WeMod.exe (PID: 6656)
      • Update.exe (PID: 7940)
    • Disables trace logs

      • WeMod R.E.P.O. Setup.exe (PID: 5112)
      • Update.exe (PID: 7568)
      • Update.exe (PID: 7940)
    • Create files in a temporary directory

      • WeMod R.E.P.O. Setup.exe (PID: 5112)
      • Update.exe (PID: 7568)
      • WeMod.exe (PID: 6656)
      • Update.exe (PID: 7940)
    • Reads security settings of Internet Explorer

      • BackgroundTransferHost.exe (PID: 8000)
      • BackgroundTransferHost.exe (PID: 7504)
      • BackgroundTransferHost.exe (PID: 3240)
      • BackgroundTransferHost.exe (PID: 7620)
      • BackgroundTransferHost.exe (PID: 5508)
    • Process checks computer location settings

      • Update.exe (PID: 7568)
      • WeMod R.E.P.O. Setup.exe (PID: 5112)
      • WeMod.exe (PID: 6656)
      • Update.exe (PID: 4756)
      • WeMod.exe (PID: 7672)
    • Reads product name

      • WeMod.exe (PID: 516)
      • WeMod.exe (PID: 6656)
    • The sample compiled with english language support

      • Update.exe (PID: 7568)
    • Reads CPU info

      • WeMod.exe (PID: 6656)
    • Node.js compiler has been detected

      • WeMod.exe (PID: 7652)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2076:12:06 19:29:50+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 105984
InitializedDataSize: 28160
UninitializedDataSize: -
EntryPoint: 0x1bcfe
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 8.0.0.0
ProductVersionNumber: 8.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: WeMod Setup
CompanyName: WeMod LLC
FileDescription: WeMod Setup
FileVersion: 8.0.0.0
InternalName: WeMod-Setup.exe
LegalCopyright: Copyright © WeMod LLC 2022
LegalTrademarks: -
OriginalFileName: WeMod-Setup.exe
ProductName: WeMod
ProductVersion: 8.0.0.0
AssemblyVersion: 8.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
164
Monitored processes
23
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
start wemod r.e.p.o. setup.exe sppextcomobj.exe no specs slui.exe backgroundtransferhost.exe no specs backgroundtransferhost.exe backgroundtransferhost.exe no specs backgroundtransferhost.exe no specs backgroundtransferhost.exe no specs wemod-setup-638784699119640569.exe update.exe squirrel.exe no specs wemod.exe no specs update.exe no specs update.exe no specs wemod.exe no specs wemod.exe no specs wemod.exe wemod.exe no specs update.exe wemodauxiliaryservice.exe slui.exe shellexperiencehost.exe no specs wemod.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
516"C:\Users\admin\AppData\Local\WeMod\app-10.9.0\WeMod.exe" --squirrel-install 10.9.0C:\Users\admin\AppData\Local\WeMod\app-10.9.0\WeMod.exeUpdate.exe
User:
admin
Company:
WeMod
Integrity Level:
MEDIUM
Description:
WeMod - The Ultimate Game Companion
Exit code:
0
Version:
10.9.0
Modules
Images
c:\users\admin\appdata\local\wemod\app-10.9.0\wemod.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\dbghelp.dll
3240"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1C:\Windows\System32\BackgroundTransferHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Download/Upload Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\backgroundtransferhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\bcryptprimitives.dll
4180"C:\Users\admin\AppData\Local\WeMod\app-10.9.0\WeMod.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.3636 --user-data-dir="C:\Users\admin\AppData\Roaming\WeMod" --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1248,i,7574697768602916072,3378548001952429726,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=4176 /prefetch:8C:\Users\admin\AppData\Local\WeMod\app-10.9.0\WeMod.exeWeMod.exe
User:
admin
Company:
WeMod
Integrity Level:
MEDIUM
Description:
WeMod - The Ultimate Game Companion
Exit code:
0
Version:
10.9.0
Modules
Images
c:\users\admin\appdata\local\wemod\app-10.9.0\wemod.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\users\admin\appdata\local\wemod\app-10.9.0\ffmpeg.dll
c:\windows\system32\combase.dll
4756"C:\Users\admin\AppData\Local\WeMod\Update.exe" --processStart "WeMod.exe" --process-start-args "wemod://titles/90930?_inst=zx7EWk5UOQumD2eE"C:\Users\admin\AppData\Local\WeMod\Update.exeWeMod R.E.P.O. Setup.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\wemod\update.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
4988C:\Users\admin\AppData\Local\WeMod\app-10.9.0\resources\app.asar.unpacked\static\unpacked\auxiliary\WeModAuxiliaryService.exe WeMod\Support_1742873160023_OutC:\Users\admin\AppData\Local\WeMod\app-10.9.0\resources\app.asar.unpacked\static\unpacked\auxiliary\WeModAuxiliaryService.exe
WeMod.exe
User:
admin
Company:
WeMod LLC
Integrity Level:
MEDIUM
Description:
WeMod
Version:
7.2.0.0
Modules
Images
c:\users\admin\appdata\local\wemod\app-10.9.0\resources\app.asar.unpacked\static\unpacked\auxiliary\wemodauxiliaryservice.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
5112"C:\Users\admin\AppData\Local\Temp\WeMod R.E.P.O. Setup.exe" C:\Users\admin\AppData\Local\Temp\WeMod R.E.P.O. Setup.exe
explorer.exe
User:
admin
Company:
WeMod LLC
Integrity Level:
MEDIUM
Description:
WeMod Setup
Exit code:
0
Version:
8.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\wemod r.e.p.o. setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
5508"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1C:\Windows\System32\BackgroundTransferHost.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Download/Upload Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\backgroundtransferhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\bcryptprimitives.dll
6080C:\Users\admin\AppData\Local\WeMod\Update.exe --createShortcut WeMod.exeC:\Users\admin\AppData\Local\WeMod\Update.exeWeMod.exe
User:
admin
Company:
GitHub
Integrity Level:
MEDIUM
Description:
Update
Exit code:
0
Version:
2.0.1.53
Modules
Images
c:\users\admin\appdata\local\wemod\update.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
6184"C:\WINDOWS\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mcaC:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Shell Experience Host
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\systemapps\shellexperiencehost_cw5n1h2txyewy\shellexperiencehost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\wincorlib.dll
6656"C:\Users\admin\AppData\Local\WeMod\app-10.9.0\WeMod.exe" wemod://titles/90930?_inst=zx7EWk5UOQumD2eEC:\Users\admin\AppData\Local\WeMod\app-10.9.0\WeMod.exeUpdate.exe
User:
admin
Company:
WeMod
Integrity Level:
MEDIUM
Description:
WeMod - The Ultimate Game Companion
Version:
10.9.0
Modules
Images
c:\users\admin\appdata\local\wemod\app-10.9.0\wemod.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\users\admin\appdata\local\wemod\app-10.9.0\ffmpeg.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\dbghelp.dll
Total events
14 501
Read events
14 417
Write events
64
Delete events
20

Modification events

(PID) Process:(5112) WeMod R.E.P.O. Setup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(5112) WeMod R.E.P.O. Setup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(5112) WeMod R.E.P.O. Setup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(5112) WeMod R.E.P.O. Setup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\wemod.com
Operation:writeName:NumberOfSubdomains
Value:
1
(PID) Process:(5112) WeMod R.E.P.O. Setup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\wemod.com
Operation:writeName:Total
Value:
35
(PID) Process:(5112) WeMod R.E.P.O. Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WeMod R_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(5112) WeMod R.E.P.O. Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WeMod R_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(5112) WeMod R.E.P.O. Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WeMod R_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(5112) WeMod R.E.P.O. Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WeMod R_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(5112) WeMod R.E.P.O. Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WeMod R_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
Executable files
26
Suspicious files
162
Text files
37
Unknown types
1

Dropped files

PID
Process
Filename
Type
5112WeMod R.E.P.O. Setup.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\Inter-Thin-0f080c40c6[1].woffbinary
MD5:0F080C40C639962E1CAD093AA58192DC
SHA256:E9DA5A64A6A8EB87A2C6D475327F072B5CA25731DF07119F576C10C50AA9554D
5112WeMod R.E.P.O. Setup.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\setup[1].htmhtml
MD5:6D65F05DABF151A968403887AA21062C
SHA256:14F0DF4055D24BE252EB036774EC7752219C50A3FD28D3343EE2951AC6D9451B
5112WeMod R.E.P.O. Setup.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B2B9A00839EED1DFDCCC3BFC2F5DF12binary
MD5:8733D1DB81206C9A7A9B4AC5938D48B9
SHA256:28EF60DBD55F34988B5FEAE0080E9E5D206A11C4DA4BE2747AEBDE4506DFB7A7
5112WeMod R.E.P.O. Setup.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\E4DJRUXW\Inter-Light-0f0118feb7[1].woffbinary
MD5:0F0118FEB71664927EA7FB8015778795
SHA256:CB671D0DBC9A61EC80BFC91D5879E8635A09B7F309F5EE57810D4C6B7A26EE0C
5508BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\f4a27947-9cda-4014-ba01-4b6eec04a0c4.down_data
MD5:
SHA256:
5112WeMod R.E.P.O. Setup.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8binary
MD5:971C514F84BBA0785F80AA1C23EDFD79
SHA256:F157ED17FCAF8837FA82F8B69973848C9B10A02636848F995698212A08F31895
5112WeMod R.E.P.O. Setup.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\Inter-Black-14a450a3d2[1].woffbinary
MD5:14A450A3D2FD191FCEFA23B273BAAF14
SHA256:95201F343A7EC66DBF5F9316A1E1A16AE65BEC02B4243F5B645CC6D484E42267
5112WeMod R.E.P.O. Setup.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9E62DD75009A293E0AF9565AE544F23E_A9793E7FECE9C91C446E58001501C2E1binary
MD5:7CFC95C885E0E9BBC60922DD74ACA484
SHA256:3116AB95EC3911105C52928B440E1690BB2291E2FFB1713E588D7BE37C47412C
5112WeMod R.E.P.O. Setup.exeC:\Users\admin\AppData\Local\Temp\WeMod-Setup-638784699119640569.exe
MD5:
SHA256:
5112WeMod R.E.P.O. Setup.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\5080DC7A65DB6A5960ECD874088F3328_6CBA2C06D5985DD95AE59AF8FC7C6220binary
MD5:78B0B39D273780010D53B182F362F242
SHA256:AFA0C1BEC3B01988E818B94D1C1C9A38C45473F2D537B9D9D29C181A3175A45F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
14
TCP/UDP connections
61
DNS requests
60
Threats
48

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5112
WeMod R.E.P.O. Setup.exe
GET
200
142.250.185.131:80
http://c.pki.goog/r/gsr1.crl
unknown
whitelisted
5112
WeMod R.E.P.O. Setup.exe
GET
200
142.250.185.131:80
http://c.pki.goog/r/r4.crl
unknown
whitelisted
5112
WeMod R.E.P.O. Setup.exe
GET
200
104.18.38.233:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBReAhtobFzTvhaRmVeJ38QUchY9AwQUu69%2BAj36pvE8hI6t7jiY7NkyMtQCECsuburZdTZsFIpu26N8jAc%3D
unknown
whitelisted
7564
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
5508
BackgroundTransferHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
5112
WeMod R.E.P.O. Setup.exe
GET
200
142.250.184.227:80
http://o.pki.goog/we2/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTuMJxAT2trYla0jia%2F5EUSmLrk3QQUdb7Ed66J9kQ3fc%2BxaB8dGuvcNFkCEFzOrQ8P6xBVChcpSVZ4nK4%3D
unknown
whitelisted
5112
WeMod R.E.P.O. Setup.exe
GET
200
104.18.38.233:80
http://ocsp.comodoca.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBR64T7ooMQqLLQoy%2BemBUYZQOKh6QQUkK9qOpRaC9iQ6hJWc99DtDoo2ucCEQCO1hzLqfF%2Fr9CBwEs60auM
unknown
whitelisted
8148
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4988
WeModAuxiliaryService.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSRXerF0eFeSWRripTgTkcJWMm7iQQUaDfg67Y7%2BF8Rhvv%2BYXsIiGX0TkICEA2LpfdFcSPbdVFa0X9jdfU%3D
unknown
whitelisted
4988
WeModAuxiliaryService.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxXWRM3y5nP%2Be6mK4cD08CEAitQLJg0pxMn17Nqb2Trtk%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
88.221.110.122:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5112
WeMod R.E.P.O. Setup.exe
172.67.25.118:443
api.wemod.com
CLOUDFLARENET
US
whitelisted
5112
WeMod R.E.P.O. Setup.exe
142.250.185.131:80
c.pki.goog
GOOGLE
US
whitelisted
5112
WeMod R.E.P.O. Setup.exe
172.217.18.14:443
www.google-analytics.com
GOOGLE
US
whitelisted
5112
WeMod R.E.P.O. Setup.exe
54.203.212.189:443
api2.amplitude.com
AMAZON-02
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 4.231.128.59
whitelisted
google.com
  • 142.250.181.238
whitelisted
crl.microsoft.com
  • 88.221.110.122
  • 88.221.110.114
whitelisted
api.wemod.com
  • 172.67.25.118
  • 104.22.42.75
  • 104.22.43.75
whitelisted
c.pki.goog
  • 142.250.185.131
whitelisted
www.google-analytics.com
  • 172.217.18.14
whitelisted
api2.amplitude.com
  • 54.203.212.189
  • 52.88.62.108
  • 52.24.184.75
  • 35.166.87.161
  • 44.225.113.135
  • 34.216.55.190
  • 52.32.14.60
  • 52.38.186.76
  • 54.189.142.166
  • 52.33.115.166
  • 52.24.219.235
  • 34.211.99.157
  • 44.225.85.202
  • 54.212.92.90
  • 52.34.225.134
  • 52.88.27.138
whitelisted
o.pki.goog
  • 142.250.184.227
whitelisted
ocsp.comodoca.com
  • 104.18.38.233
  • 172.64.149.23
whitelisted
storage-cdn.wemod.com
  • 104.22.42.75
  • 104.22.43.75
  • 172.67.25.118
whitelisted

Threats

PID
Process
Class
Message
7464
WeMod.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
7464
WeMod.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
7464
WeMod.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
7464
WeMod.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
7464
WeMod.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
7464
WeMod.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
7464
WeMod.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
7464
WeMod.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
7464
WeMod.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
7464
WeMod.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
No debug info