File name:

WeMod R.E.P.O. Setup.exe

Full analysis: https://app.any.run/tasks/95da84fa-522c-4f38-9656-f42163b01f74
Verdict: Malicious activity
Analysis date: March 25, 2025, 03:25:02
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
nodejs
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

65CEA1D0C273CCA60E294A5E7B8E125D

SHA1:

46DD951C92B1837D99714B5D6855A0FFB1101BC0

SHA256:

FDDA6B5043F04BC12C2A6C9731E580DEF3AC092ACE0AFF07FD704C193534F7F4

SSDEEP:

1536:Q668Dtf9nk7RBog5KG6JkOiVPL+09ME5LBtJD64uQgCYO6+YFyHA7OqCkNRBog5m:w8DvE57miVj+J6pHdHg7OA57N/u

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WeMod R.E.P.O. Setup.exe (PID: 5112)
      • Update.exe (PID: 7568)
      • Update.exe (PID: 4756)
      • WeModAuxiliaryService.exe (PID: 4988)
      • ShellExperienceHost.exe (PID: 6184)
    • Reads Microsoft Outlook installation path

      • WeMod R.E.P.O. Setup.exe (PID: 5112)
    • Reads Internet Explorer settings

      • WeMod R.E.P.O. Setup.exe (PID: 5112)
    • Process drops legitimate windows executable

      • Update.exe (PID: 7568)
    • Executable content was dropped or overwritten

      • Update.exe (PID: 7568)
      • WeMod-Setup-638784699119640569.exe (PID: 7988)
    • Reads the date of Windows installation

      • Update.exe (PID: 7568)
      • WeMod R.E.P.O. Setup.exe (PID: 5112)
      • Update.exe (PID: 4756)
    • Creates a software uninstall entry

      • Update.exe (PID: 7568)
    • Searches for installed software

      • Update.exe (PID: 7568)
    • Application launched itself

      • WeMod.exe (PID: 6656)
    • There is functionality for taking screenshot (YARA)

      • WeMod.exe (PID: 7652)
  • INFO

    • Checks supported languages

      • WeMod R.E.P.O. Setup.exe (PID: 5112)
      • Update.exe (PID: 7568)
      • squirrel.exe (PID: 7908)
      • WeMod-Setup-638784699119640569.exe (PID: 7988)
      • Update.exe (PID: 6080)
      • WeMod.exe (PID: 516)
      • Update.exe (PID: 4756)
      • WeMod.exe (PID: 7464)
      • WeMod.exe (PID: 6656)
      • WeMod.exe (PID: 7652)
      • WeMod.exe (PID: 7672)
      • Update.exe (PID: 7940)
      • WeModAuxiliaryService.exe (PID: 4988)
      • ShellExperienceHost.exe (PID: 6184)
      • WeMod.exe (PID: 4180)
    • Checks proxy server information

      • WeMod R.E.P.O. Setup.exe (PID: 5112)
      • BackgroundTransferHost.exe (PID: 5508)
      • Update.exe (PID: 7568)
      • Update.exe (PID: 7940)
      • slui.exe (PID: 8188)
      • WeMod.exe (PID: 6656)
      • WeModAuxiliaryService.exe (PID: 4988)
    • Reads the computer name

      • WeMod R.E.P.O. Setup.exe (PID: 5112)
      • Update.exe (PID: 7568)
      • squirrel.exe (PID: 7908)
      • Update.exe (PID: 6080)
      • Update.exe (PID: 4756)
      • WeMod.exe (PID: 7464)
      • WeMod.exe (PID: 6656)
      • WeMod.exe (PID: 7652)
      • Update.exe (PID: 7940)
      • WeModAuxiliaryService.exe (PID: 4988)
      • ShellExperienceHost.exe (PID: 6184)
      • WeMod.exe (PID: 4180)
    • Reads the machine GUID from the registry

      • WeMod R.E.P.O. Setup.exe (PID: 5112)
      • squirrel.exe (PID: 7908)
      • Update.exe (PID: 6080)
      • Update.exe (PID: 7568)
      • WeMod.exe (PID: 6656)
      • Update.exe (PID: 4756)
      • WeModAuxiliaryService.exe (PID: 4988)
      • Update.exe (PID: 7940)
      • WeMod.exe (PID: 4180)
    • Creates files or folders in the user directory

      • WeMod R.E.P.O. Setup.exe (PID: 5112)
      • BackgroundTransferHost.exe (PID: 5508)
      • WeMod-Setup-638784699119640569.exe (PID: 7988)
      • Update.exe (PID: 7568)
      • squirrel.exe (PID: 7908)
      • Update.exe (PID: 6080)
      • Update.exe (PID: 4756)
      • WeMod.exe (PID: 7464)
      • WeMod.exe (PID: 6656)
      • Update.exe (PID: 7940)
      • WeModAuxiliaryService.exe (PID: 4988)
      • WeMod.exe (PID: 4180)
    • Reads the software policy settings

      • WeMod R.E.P.O. Setup.exe (PID: 5112)
      • BackgroundTransferHost.exe (PID: 5508)
      • Update.exe (PID: 7568)
      • Update.exe (PID: 7940)
      • WeModAuxiliaryService.exe (PID: 4988)
      • slui.exe (PID: 7268)
      • slui.exe (PID: 8188)
    • Reads Environment values

      • WeMod R.E.P.O. Setup.exe (PID: 5112)
      • Update.exe (PID: 7568)
      • WeMod.exe (PID: 516)
      • WeMod.exe (PID: 6656)
      • Update.exe (PID: 7940)
    • Disables trace logs

      • WeMod R.E.P.O. Setup.exe (PID: 5112)
      • Update.exe (PID: 7568)
      • Update.exe (PID: 7940)
    • Create files in a temporary directory

      • WeMod R.E.P.O. Setup.exe (PID: 5112)
      • Update.exe (PID: 7568)
      • WeMod.exe (PID: 6656)
      • Update.exe (PID: 7940)
    • Reads security settings of Internet Explorer

      • BackgroundTransferHost.exe (PID: 8000)
      • BackgroundTransferHost.exe (PID: 5508)
      • BackgroundTransferHost.exe (PID: 3240)
      • BackgroundTransferHost.exe (PID: 7620)
      • BackgroundTransferHost.exe (PID: 7504)
    • The sample compiled with english language support

      • Update.exe (PID: 7568)
    • Process checks computer location settings

      • Update.exe (PID: 7568)
      • WeMod R.E.P.O. Setup.exe (PID: 5112)
      • Update.exe (PID: 4756)
      • WeMod.exe (PID: 6656)
      • WeMod.exe (PID: 7672)
    • Reads product name

      • WeMod.exe (PID: 516)
      • WeMod.exe (PID: 6656)
    • Reads CPU info

      • WeMod.exe (PID: 6656)
    • Node.js compiler has been detected

      • WeMod.exe (PID: 7652)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2076:12:06 19:29:50+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 105984
InitializedDataSize: 28160
UninitializedDataSize: -
EntryPoint: 0x1bcfe
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 8.0.0.0
ProductVersionNumber: 8.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: WeMod Setup
CompanyName: WeMod LLC
FileDescription: WeMod Setup
FileVersion: 8.0.0.0
InternalName: WeMod-Setup.exe
LegalCopyright: Copyright © WeMod LLC 2022
LegalTrademarks: -
OriginalFileName: WeMod-Setup.exe
ProductName: WeMod
ProductVersion: 8.0.0.0
AssemblyVersion: 8.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
164
Monitored processes
23
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
start wemod r.e.p.o. setup.exe sppextcomobj.exe no specs slui.exe backgroundtransferhost.exe no specs backgroundtransferhost.exe backgroundtransferhost.exe no specs backgroundtransferhost.exe no specs backgroundtransferhost.exe no specs wemod-setup-638784699119640569.exe update.exe squirrel.exe no specs wemod.exe no specs update.exe no specs update.exe no specs wemod.exe no specs wemod.exe no specs wemod.exe wemod.exe no specs update.exe wemodauxiliaryservice.exe slui.exe shellexperiencehost.exe no specs wemod.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
516"C:\Users\admin\AppData\Local\WeMod\app-10.9.0\WeMod.exe" --squirrel-install 10.9.0C:\Users\admin\AppData\Local\WeMod\app-10.9.0\WeMod.exeUpdate.exe
User:
admin
Company:
WeMod
Integrity Level:
MEDIUM
Description:
WeMod - The Ultimate Game Companion
Exit code:
0
Version:
10.9.0
Modules
Images
c:\users\admin\appdata\local\wemod\app-10.9.0\wemod.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\dbghelp.dll
3240"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1C:\Windows\System32\BackgroundTransferHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Download/Upload Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\backgroundtransferhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\bcryptprimitives.dll
4180"C:\Users\admin\AppData\Local\WeMod\app-10.9.0\WeMod.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.3636 --user-data-dir="C:\Users\admin\AppData\Roaming\WeMod" --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1248,i,7574697768602916072,3378548001952429726,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand --variations-seed-version --mojo-platform-channel-handle=4176 /prefetch:8C:\Users\admin\AppData\Local\WeMod\app-10.9.0\WeMod.exeWeMod.exe
User:
admin
Company:
WeMod
Integrity Level:
MEDIUM
Description:
WeMod - The Ultimate Game Companion
Exit code:
0
Version:
10.9.0
Modules
Images
c:\users\admin\appdata\local\wemod\app-10.9.0\wemod.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\users\admin\appdata\local\wemod\app-10.9.0\ffmpeg.dll
c:\windows\system32\combase.dll
4756"C:\Users\admin\AppData\Local\WeMod\Update.exe" --processStart "WeMod.exe" --process-start-args "wemod://titles/90930?_inst=zx7EWk5UOQumD2eE"C:\Users\admin\AppData\Local\WeMod\Update.exeWeMod R.E.P.O. Setup.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\wemod\update.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
4988C:\Users\admin\AppData\Local\WeMod\app-10.9.0\resources\app.asar.unpacked\static\unpacked\auxiliary\WeModAuxiliaryService.exe WeMod\Support_1742873160023_OutC:\Users\admin\AppData\Local\WeMod\app-10.9.0\resources\app.asar.unpacked\static\unpacked\auxiliary\WeModAuxiliaryService.exe
WeMod.exe
User:
admin
Company:
WeMod LLC
Integrity Level:
MEDIUM
Description:
WeMod
Version:
7.2.0.0
Modules
Images
c:\users\admin\appdata\local\wemod\app-10.9.0\resources\app.asar.unpacked\static\unpacked\auxiliary\wemodauxiliaryservice.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
5112"C:\Users\admin\AppData\Local\Temp\WeMod R.E.P.O. Setup.exe" C:\Users\admin\AppData\Local\Temp\WeMod R.E.P.O. Setup.exe
explorer.exe
User:
admin
Company:
WeMod LLC
Integrity Level:
MEDIUM
Description:
WeMod Setup
Exit code:
0
Version:
8.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\wemod r.e.p.o. setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
5508"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1C:\Windows\System32\BackgroundTransferHost.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Download/Upload Host
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\backgroundtransferhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\bcryptprimitives.dll
6080C:\Users\admin\AppData\Local\WeMod\Update.exe --createShortcut WeMod.exeC:\Users\admin\AppData\Local\WeMod\Update.exeWeMod.exe
User:
admin
Company:
GitHub
Integrity Level:
MEDIUM
Description:
Update
Exit code:
0
Version:
2.0.1.53
Modules
Images
c:\users\admin\appdata\local\wemod\update.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
6184"C:\WINDOWS\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mcaC:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Shell Experience Host
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\systemapps\shellexperiencehost_cw5n1h2txyewy\shellexperiencehost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\wincorlib.dll
6656"C:\Users\admin\AppData\Local\WeMod\app-10.9.0\WeMod.exe" wemod://titles/90930?_inst=zx7EWk5UOQumD2eEC:\Users\admin\AppData\Local\WeMod\app-10.9.0\WeMod.exeUpdate.exe
User:
admin
Company:
WeMod
Integrity Level:
MEDIUM
Description:
WeMod - The Ultimate Game Companion
Version:
10.9.0
Modules
Images
c:\users\admin\appdata\local\wemod\app-10.9.0\wemod.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\users\admin\appdata\local\wemod\app-10.9.0\ffmpeg.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\dbghelp.dll
Total events
14 501
Read events
14 417
Write events
64
Delete events
20

Modification events

(PID) Process:(5112) WeMod R.E.P.O. Setup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(5112) WeMod R.E.P.O. Setup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(5112) WeMod R.E.P.O. Setup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(5112) WeMod R.E.P.O. Setup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\wemod.com
Operation:writeName:NumberOfSubdomains
Value:
1
(PID) Process:(5112) WeMod R.E.P.O. Setup.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\DOMStorage\wemod.com
Operation:writeName:Total
Value:
35
(PID) Process:(5112) WeMod R.E.P.O. Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WeMod R_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(5112) WeMod R.E.P.O. Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WeMod R_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(5112) WeMod R.E.P.O. Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WeMod R_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(5112) WeMod R.E.P.O. Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WeMod R_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(5112) WeMod R.E.P.O. Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\WeMod R_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
Executable files
26
Suspicious files
162
Text files
37
Unknown types
1

Dropped files

PID
Process
Filename
Type
5112WeMod R.E.P.O. Setup.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12binary
MD5:C9BE626E9715952E9B70F92F912B9787
SHA256:C13E8D22800C200915F87F71C31185053E4E60CA25DE2E41E160E09CD2D815D4
5112WeMod R.E.P.O. Setup.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\setup[1].htmhtml
MD5:6D65F05DABF151A968403887AA21062C
SHA256:14F0DF4055D24BE252EB036774EC7752219C50A3FD28D3343EE2951AC6D9451B
5112WeMod R.E.P.O. Setup.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8binary
MD5:57DCD046CBB963F1EBD3BEC6D1EAD947
SHA256:C21070382BF5197C3BAFF3AEC6D535D96F73BCB511057877DA3A625E662500E9
5112WeMod R.E.P.O. Setup.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\AH8CR9J5\Inter-SemiBold-1d5bb5c64d[1].woffbinary
MD5:1D5BB5C64DC15405BDB04145DAB7B436
SHA256:807D56B95FCC04CD1C26FCA043DDF19E300C8AE156747458BD025A2B21CF54B4
5508BackgroundTransferHost.exeC:\Users\admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\f4a27947-9cda-4014-ba01-4b6eec04a0c4.down_data
MD5:
SHA256:
5112WeMod R.E.P.O. Setup.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8binary
MD5:971C514F84BBA0785F80AA1C23EDFD79
SHA256:F157ED17FCAF8837FA82F8B69973848C9B10A02636848F995698212A08F31895
5112WeMod R.E.P.O. Setup.exeC:\Users\admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\VQLVPMWG\api.wemod[1].xmltext
MD5:C1DDEA3EF6BBEF3E7060A1A9AD89E4C5
SHA256:B71E4D17274636B97179BA2D97C742735B6510EB54F22893D3A2DAFF2CEB28DB
5112WeMod R.E.P.O. Setup.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\E4DJRUXW\Inter-Light-0f0118feb7[1].woffbinary
MD5:0F0118FEB71664927EA7FB8015778795
SHA256:CB671D0DBC9A61EC80BFC91D5879E8635A09B7F309F5EE57810D4C6B7A26EE0C
5112WeMod R.E.P.O. Setup.exeC:\Users\admin\AppData\Local\Temp\WeMod-Setup-638784699119640569.exe
MD5:
SHA256:
5112WeMod R.E.P.O. Setup.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\Inter-Regular-14d1275c67[1].woffbinary
MD5:14D1275C67676CC5D911232D0C890D97
SHA256:3710E2CE073EC0EB39274DECC63768B52091A27E35F5C28D6ABB7A5FCEF0B7FC
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
14
TCP/UDP connections
61
DNS requests
60
Threats
48

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5112
WeMod R.E.P.O. Setup.exe
GET
200
142.250.185.131:80
http://c.pki.goog/r/gsr1.crl
unknown
whitelisted
5112
WeMod R.E.P.O. Setup.exe
GET
200
142.250.185.131:80
http://c.pki.goog/r/r4.crl
unknown
whitelisted
5112
WeMod R.E.P.O. Setup.exe
GET
200
142.250.184.227:80
http://o.pki.goog/we2/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTuMJxAT2trYla0jia%2F5EUSmLrk3QQUdb7Ed66J9kQ3fc%2BxaB8dGuvcNFkCEFzOrQ8P6xBVChcpSVZ4nK4%3D
unknown
whitelisted
5112
WeMod R.E.P.O. Setup.exe
GET
200
104.18.38.233:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBReAhtobFzTvhaRmVeJ38QUchY9AwQUu69%2BAj36pvE8hI6t7jiY7NkyMtQCECsuburZdTZsFIpu26N8jAc%3D
unknown
whitelisted
5112
WeMod R.E.P.O. Setup.exe
GET
200
104.18.38.233:80
http://ocsp.comodoca.com/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBR64T7ooMQqLLQoy%2BemBUYZQOKh6QQUkK9qOpRaC9iQ6hJWc99DtDoo2ucCEQCO1hzLqfF%2Fr9CBwEs60auM
unknown
whitelisted
GET
200
88.221.110.122:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7564
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
5508
BackgroundTransferHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
8148
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
88.221.110.122:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5112
WeMod R.E.P.O. Setup.exe
172.67.25.118:443
api.wemod.com
CLOUDFLARENET
US
whitelisted
5112
WeMod R.E.P.O. Setup.exe
142.250.185.131:80
c.pki.goog
GOOGLE
US
whitelisted
5112
WeMod R.E.P.O. Setup.exe
172.217.18.14:443
www.google-analytics.com
GOOGLE
US
whitelisted
5112
WeMod R.E.P.O. Setup.exe
54.203.212.189:443
api2.amplitude.com
AMAZON-02
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 4.231.128.59
whitelisted
google.com
  • 142.250.181.238
whitelisted
crl.microsoft.com
  • 88.221.110.122
  • 88.221.110.114
whitelisted
api.wemod.com
  • 172.67.25.118
  • 104.22.42.75
  • 104.22.43.75
whitelisted
c.pki.goog
  • 142.250.185.131
whitelisted
www.google-analytics.com
  • 172.217.18.14
whitelisted
api2.amplitude.com
  • 54.203.212.189
  • 52.88.62.108
  • 52.24.184.75
  • 35.166.87.161
  • 44.225.113.135
  • 34.216.55.190
  • 52.32.14.60
  • 52.38.186.76
  • 54.189.142.166
  • 52.33.115.166
  • 52.24.219.235
  • 34.211.99.157
  • 44.225.85.202
  • 54.212.92.90
  • 52.34.225.134
  • 52.88.27.138
whitelisted
o.pki.goog
  • 142.250.184.227
whitelisted
ocsp.comodoca.com
  • 104.18.38.233
  • 172.64.149.23
whitelisted
storage-cdn.wemod.com
  • 104.22.42.75
  • 104.22.43.75
  • 172.67.25.118
whitelisted

Threats

PID
Process
Class
Message
7464
WeMod.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
7464
WeMod.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
7464
WeMod.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
7464
WeMod.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
7464
WeMod.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
7464
WeMod.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
7464
WeMod.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
7464
WeMod.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
7464
WeMod.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
7464
WeMod.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
No debug info