Windows Analysis Report
sc_setup_x64.exe

Overview

General Information

Sample name: sc_setup_x64.exe
Analysis ID: 1428621
MD5: 615cfd6d3775cb9135777d3a384d384e
SHA1: 52e7041945bdb2fa9a700af968a05a4795aa3605
SHA256: 29553153308344c8f4daae0fc16a06a988ce005ed46dd09aa46921372b3b4ffe
Infos:

Detection

Score: 5
Range: 0 - 100
Whitelisted: false
Confidence: 60%

Signatures

AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to dynamically determine API calls
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found large amount of non-executed APIs
One or more processes crash
Sample file is different than original file name gathered from version info

Classification

Source: sc_setup_x64.exe Static PE information: certificate valid
Source: sc_setup_x64.exe String found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: sc_setup_x64.exe String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: sc_setup_x64.exe String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: sc_setup_x64.exe String found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: sc_setup_x64.exe String found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: sc_setup_x64.exe String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: sc_setup_x64.exe String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: sc_setup_x64.exe String found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: sc_setup_x64.exe String found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: sc_setup_x64.exe String found in binary or memory: http://ocsp.digicert.com0
Source: sc_setup_x64.exe String found in binary or memory: http://ocsp.digicert.com0A
Source: sc_setup_x64.exe String found in binary or memory: http://ocsp.digicert.com0C
Source: sc_setup_x64.exe String found in binary or memory: http://ocsp.digicert.com0X
Source: Amcache.hve.4.dr String found in binary or memory: http://upx.sf.net
Source: sc_setup_x64.exe String found in binary or memory: http://www.digicert.com/CPS0
Source: C:\Users\user\Desktop\sc_setup_x64.exe Code function: 0_2_000000014001C010 0_2_000000014001C010
Source: C:\Users\user\Desktop\sc_setup_x64.exe Code function: 0_2_000000014001C226 0_2_000000014001C226
Source: C:\Users\user\Desktop\sc_setup_x64.exe Code function: 0_2_0000000140010290 0_2_0000000140010290
Source: C:\Users\user\Desktop\sc_setup_x64.exe Code function: 0_2_00000001400112E0 0_2_00000001400112E0
Source: C:\Users\user\Desktop\sc_setup_x64.exe Code function: 0_2_000000014001C668 0_2_000000014001C668
Source: C:\Users\user\Desktop\sc_setup_x64.exe Code function: 0_2_0000000140017880 0_2_0000000140017880
Source: C:\Users\user\Desktop\sc_setup_x64.exe Code function: 0_2_000000014001C8E8 0_2_000000014001C8E8
Source: C:\Users\user\Desktop\sc_setup_x64.exe Code function: 0_2_000000014000CC20 0_2_000000014000CC20
Source: C:\Users\user\Desktop\sc_setup_x64.exe Code function: 0_2_000000014000DDA0 0_2_000000014000DDA0
Source: C:\Users\user\Desktop\sc_setup_x64.exe Code function: 0_2_0000000140006DEC 0_2_0000000140006DEC
Source: C:\Users\user\Desktop\sc_setup_x64.exe Code function: 0_2_0000000140019E40 0_2_0000000140019E40
Source: C:\Users\user\Desktop\sc_setup_x64.exe Code function: 0_2_0000000140007F70 0_2_0000000140007F70
Source: C:\Users\user\Desktop\sc_setup_x64.exe Process created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7048 -s 464
Source: sc_setup_x64.exe, 00000000.00000002.2127048666.0000000140047000.00000002.00000001.01000000.00000003.sdmp Binary or memory string: OriginalFilenamesc_setup.EXEJ vs sc_setup_x64.exe
Source: sc_setup_x64.exe Binary or memory string: OriginalFilenamesc_setup.EXEJ vs sc_setup_x64.exe
Source: classification engine Classification label: clean5.winEXE@2/5@0/0
Source: C:\Users\user\Desktop\sc_setup_x64.exe Code function: 0_2_0000000140006230 #1641,CreateFileW,#316,#4656,#1641,MessageBoxW,#1034,_ftime64,_localtime64,#316,#1641,#306,#1641,#306,#4658,#1034,#1034,WriteFile,memset,GetStdHandle,#280,#4947,#1641,CreateProcessW,GetLastError,FormatMessageW,#286,LocalFree,#316,#4656,#1641,MessageBoxW,CloseHandle,#1034,#1034,WaitForSingleObject,GetExitCodeProcess,CloseHandle,CloseHandle,CloseHandle,#1034,#1034, 0_2_0000000140006230
Source: C:\Users\user\Desktop\sc_setup_x64.exe Code function: 0_2_0000000140006050 CoCreateInstance, 0_2_0000000140006050
Source: C:\Users\user\Desktop\sc_setup_x64.exe Code function: 0_2_0000000140015BA0 #10163,#2212,FindResourceW,#2212,LoadResource,LockResource,#286,#4656,#1034,#14128, 0_2_0000000140015BA0
Source: C:\Windows\System32\WerFault.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7048
Source: C:\Windows\System32\WerFault.exe File created: C:\ProgramData\Microsoft\Windows\WER\Temp\3d0d1cc2-52ad-4333-b40e-36035397c7e4 Jump to behavior
Source: sc_setup_x64.exe Static PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\sc_setup_x64.exe Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\sc_setup_x64.exe "C:\Users\user\Desktop\sc_setup_x64.exe"
Source: C:\Users\user\Desktop\sc_setup_x64.exe Process created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7048 -s 464
Source: C:\Users\user\Desktop\sc_setup_x64.exe Section loaded: apphelp.dll Jump to behavior
Source: C:\Users\user\Desktop\sc_setup_x64.exe Section loaded: version.dll Jump to behavior
Source: C:\Users\user\Desktop\sc_setup_x64.exe Section loaded: mfc140u.dll Jump to behavior
Source: C:\Users\user\Desktop\sc_setup_x64.exe Section loaded: msvcp140.dll Jump to behavior
Source: C:\Users\user\Desktop\sc_setup_x64.exe Section loaded: vcruntime140.dll Jump to behavior
Source: C:\Users\user\Desktop\sc_setup_x64.exe Section loaded: vcruntime140_1.dll Jump to behavior
Source: C:\Users\user\Desktop\sc_setup_x64.exe Section loaded: uxtheme.dll Jump to behavior
Source: C:\Users\user\Desktop\sc_setup_x64.exe Section loaded: kernel.appcore.dll Jump to behavior
Source: C:\Users\user\Desktop\sc_setup_x64.exe Section loaded: sc_kernel_basic_x64.dll Jump to behavior
Source: sc_setup_x64.exe Static PE information: certificate valid
Source: sc_setup_x64.exe Static PE information: Image base 0x140000000 > 0x60000000
Source: sc_setup_x64.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: C:\Users\user\Desktop\sc_setup_x64.exe Code function: 0_2_0000000140011E10 #286,#1034,#286,#1034,RegisterWindowMessageW,InitCommonControlsEx,FindWindowW,MessageBoxW,#13199,FindWindowW,#4726,CoInitializeEx,#2270,free,_wcsdup,#2212,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,#13545,#11709,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#316,#316,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#150 0_2_0000000140011E10
Source: C:\Users\user\Desktop\sc_setup_x64.exe Code function: 0_2_0000000140011E10 #286,#1034,#286,#1034,RegisterWindowMessageW,InitCommonControlsEx,FindWindowW,MessageBoxW,#13199,FindWindowW,#4726,CoInitializeEx,#2270,free,_wcsdup,#2212,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,#13545,#11709,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#316,#316,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#150 0_2_0000000140011E10
Source: C:\Users\user\Desktop\sc_setup_x64.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\sc_setup_x64.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\sc_setup_x64.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Windows\System32\WerFault.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\sc_setup_x64.exe API coverage: 1.0 %
Source: Amcache.hve.4.dr Binary or memory string: VMware
Source: Amcache.hve.4.dr Binary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.4.dr Binary or memory string: vmci.syshbin
Source: Amcache.hve.4.dr Binary or memory string: VMware, Inc.
Source: Amcache.hve.4.dr Binary or memory string: VMware20,1hbin@
Source: Amcache.hve.4.dr Binary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.4.dr Binary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.dr Binary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.dr Binary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
Source: Amcache.hve.4.dr Binary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.dr Binary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.4.dr Binary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.dr Binary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.dr Binary or memory string: vmci.sys
Source: Amcache.hve.4.dr Binary or memory string: vmci.syshbin`
Source: Amcache.hve.4.dr Binary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.4.dr Binary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.dr Binary or memory string: VMware20,1
Source: Amcache.hve.4.dr Binary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.4.dr Binary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.4.dr Binary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.4.dr Binary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.4.dr Binary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.4.dr Binary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.4.dr Binary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.4.dr Binary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.4.dr Binary or memory string: VMware Virtual RAM
Source: Amcache.hve.4.dr Binary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.4.dr Binary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\sc_setup_x64.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\Desktop\sc_setup_x64.exe Process queried: DebugPort Jump to behavior
Source: C:\Users\user\Desktop\sc_setup_x64.exe Code function: 0_2_000000014001F7DC GetLastError,IsDebuggerPresent,OutputDebugStringW, 0_2_000000014001F7DC
Source: C:\Users\user\Desktop\sc_setup_x64.exe Code function: 0_2_000000014001F7DC GetLastError,IsDebuggerPresent,OutputDebugStringW, 0_2_000000014001F7DC
Source: C:\Users\user\Desktop\sc_setup_x64.exe Code function: 0_2_0000000140011E10 #286,#1034,#286,#1034,RegisterWindowMessageW,InitCommonControlsEx,FindWindowW,MessageBoxW,#13199,FindWindowW,#4726,CoInitializeEx,#2270,free,_wcsdup,#2212,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,#13545,#11709,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#290,#1034,#316,#316,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#1504,#150 0_2_0000000140011E10
Source: C:\Users\user\Desktop\sc_setup_x64.exe Code function: 0_2_000000014001EA6C IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter, 0_2_000000014001EA6C
Source: C:\Users\user\Desktop\sc_setup_x64.exe Code function: 0_2_000000014001EC44 SetUnhandledExceptionFilter, 0_2_000000014001EC44
Source: C:\Users\user\Desktop\sc_setup_x64.exe Code function: 0_2_000000014001DFA0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess, 0_2_000000014001DFA0
Source: C:\Users\user\Desktop\sc_setup_x64.exe Code function: 0_2_0000000140011130 AllocateAndInitializeSid,GetNamedSecurityInfoW,SetEntriesInAclW,SetNamedSecurityInfoW,LocalFree,LocalFree,FreeSid, 0_2_0000000140011130
Source: C:\Users\user\Desktop\sc_setup_x64.exe Code function: 0_2_000000014001E974 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter, 0_2_000000014001E974
Source: Amcache.hve.4.dr Binary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.4.dr Binary or memory string: msmpeng.exe
Source: Amcache.hve.4.dr Binary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.4.dr Binary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.4.dr Binary or memory string: MsMpEng.exe
No contacted IP infos