File name:

memreduct-3.5.2-setup.exe

Full analysis: https://app.any.run/tasks/0b661de6-fec7-4af0-a521-f6fb0da2fe6f
Verdict: Malicious activity
Analysis date: June 08, 2025, 17:36:23
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
github
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

11D30B4D55441D05D85B3B511FFFEEC9

SHA1:

2CF64758610E031A8157157BCAE0B1383E3A1BF2

SHA256:

025E5C06F7BECCF5C85CBE931BC058F53A4642CA83A00855A475026A5E6334C4

SSDEEP:

12288:sioEQO1/yC1VX0j2Mu0BOnVewbmE93Wb/3k+v:3oEQC/yC1p0jbu0BOnVlbl93Wbvk+v

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • The process creates files with name similar to system file names

      • memreduct-3.5.2-setup.exe (PID: 5772)
    • Executable content was dropped or overwritten

      • memreduct-3.5.2-setup.exe (PID: 5772)
    • Malware-specific behavior (creating "System.dll" in Temp)

      • memreduct-3.5.2-setup.exe (PID: 5772)
    • Creates a software uninstall entry

      • memreduct-3.5.2-setup.exe (PID: 5772)
    • There is functionality for taking screenshot (YARA)

      • memreduct-3.5.2-setup.exe (PID: 5772)
      • memreduct.exe (PID: 6840)
  • INFO

    • Checks supported languages

      • memreduct.exe (PID: 6840)
      • memreduct-3.5.2-setup.exe (PID: 5772)
    • The sample compiled with english language support

      • memreduct-3.5.2-setup.exe (PID: 5772)
    • Create files in a temporary directory

      • memreduct-3.5.2-setup.exe (PID: 5772)
    • Reads the computer name

      • memreduct-3.5.2-setup.exe (PID: 5772)
      • memreduct.exe (PID: 6840)
    • Creates files in the program directory

      • memreduct-3.5.2-setup.exe (PID: 5772)
    • Creates files or folders in the user directory

      • memreduct-3.5.2-setup.exe (PID: 5772)
      • memreduct.exe (PID: 6840)
    • Checks proxy server information

      • memreduct.exe (PID: 6840)
      • slui.exe (PID: 2660)
    • Reads the software policy settings

      • memreduct.exe (PID: 6840)
      • slui.exe (PID: 2660)
    • Reads the machine GUID from the registry

      • memreduct.exe (PID: 6840)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:03:08 23:05:20+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 26624
InitializedDataSize: 139776
UninitializedDataSize: 2048
EntryPoint: 0x369f
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 3.5.2.0
ProductVersionNumber: 3.5.2.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
Comments: https://github.com/henrypp
CompanyName: Henry++
FileDescription: Mem Reduct
FileVersion: 3.5.2
InternalName: memreduct
LegalCopyright: (c) Henry++. All rights reversed.
OriginalFileName: memreduct-3.5.2-setup.exe
ProductName: Mem Reduct
ProductVersion: 3.5.2
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
131
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start memreduct-3.5.2-setup.exe memreduct.exe slui.exe memreduct-3.5.2-setup.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2660C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5772"C:\Users\admin\Desktop\memreduct-3.5.2-setup.exe" C:\Users\admin\Desktop\memreduct-3.5.2-setup.exe
explorer.exe
User:
admin
Company:
Henry++
Integrity Level:
HIGH
Description:
Mem Reduct
Exit code:
0
Version:
3.5.2
Modules
Images
c:\users\admin\desktop\memreduct-3.5.2-setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
6840"C:\Program Files\Mem Reduct\memreduct.exe"C:\Program Files\Mem Reduct\memreduct.exe
memreduct-3.5.2-setup.exe
User:
admin
Company:
Henry++
Integrity Level:
HIGH
Description:
Mem Reduct
Version:
3.5.2
Modules
Images
c:\program files\mem reduct\memreduct.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
6940"C:\Users\admin\Desktop\memreduct-3.5.2-setup.exe" C:\Users\admin\Desktop\memreduct-3.5.2-setup.exeexplorer.exe
User:
admin
Company:
Henry++
Integrity Level:
MEDIUM
Description:
Mem Reduct
Exit code:
3221226540
Version:
3.5.2
Modules
Images
c:\users\admin\desktop\memreduct-3.5.2-setup.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
Total events
18 966
Read events
18 956
Write events
10
Delete events
0

Modification events

(PID) Process:(5772) memreduct-3.5.2-setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\memreduct
Operation:writeName:UninstallString
Value:
"C:\Program Files\Mem Reduct\uninstall.exe"
(PID) Process:(5772) memreduct-3.5.2-setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\memreduct
Operation:writeName:DisplayName
Value:
Mem Reduct
(PID) Process:(5772) memreduct-3.5.2-setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\memreduct
Operation:writeName:DisplayIcon
Value:
"C:\Program Files\Mem Reduct\memreduct.exe"
(PID) Process:(5772) memreduct-3.5.2-setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\memreduct
Operation:writeName:DisplayVersion
Value:
3.5.2
(PID) Process:(5772) memreduct-3.5.2-setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\memreduct
Operation:writeName:Publisher
Value:
Henry++
(PID) Process:(5772) memreduct-3.5.2-setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\memreduct
Operation:writeName:InstallLocation
Value:
"C:\Program Files\Mem Reduct"
(PID) Process:(5772) memreduct-3.5.2-setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\memreduct
Operation:writeName:URLInfoAbout
Value:
https://github.com/henrypp
(PID) Process:(5772) memreduct-3.5.2-setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\memreduct
Operation:writeName:Installed
Value:
1
(PID) Process:(5772) memreduct-3.5.2-setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\memreduct
Operation:writeName:NoModify
Value:
1
(PID) Process:(5772) memreduct-3.5.2-setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\memreduct
Operation:writeName:NoRepair
Value:
1
Executable files
4
Suspicious files
7
Text files
8
Unknown types
1

Dropped files

PID
Process
Filename
Type
5772memreduct-3.5.2-setup.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Mem Reduct\History.lnklnk
MD5:ECA15F8A69588BB38E0B73CFFC5E91AB
SHA256:B42DDD103090ECB8D9CFA441F7614C04A848CB7246FD2A701D185F53B8DE6C59
5772memreduct-3.5.2-setup.exeC:\Users\admin\Desktop\Mem Reduct.lnkbinary
MD5:D587CA2479622CC9B05C96B37E2F1CE9
SHA256:449B635AB6BBBABEF23A850A87D7BB91DA1E550D8460E3D7CE6805E163423A1B
5772memreduct-3.5.2-setup.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Mem Reduct\Readme.lnkbinary
MD5:EC05139C0BD528A5D90F95ED99CB86BA
SHA256:A803C76EBB12FAC6BB1827FDD017B94917CC45E28625FC43C98B8E3F66420116
5772memreduct-3.5.2-setup.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Mem Reduct\Mem Reduct.lnkbinary
MD5:502133BBA7718BE1BD3943FFD9311D7C
SHA256:B81CD33A9492B5AA9E5B7DE4F9A8997E9E225A181925E4E76D7D02D7FEDF4B7D
5772memreduct-3.5.2-setup.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Mem Reduct\Uninstall.lnkbinary
MD5:F4FB9EF062AE834B81753DC13B7C8C17
SHA256:660562C560B8C37D0A4C33128EBEDF9E5A79E1D2BC96E0C54DEC65D558B85C3E
5772memreduct-3.5.2-setup.exeC:\Users\admin\AppData\Local\Temp\nsl401.tmp\System.dllexecutable
MD5:9B38A1B07A0EBC5C7E59E63346ECC2DB
SHA256:C881253DAFCF1322A771139B1A429EC1E78C507CA81A218A20DC1A4B25ABBFE7
5772memreduct-3.5.2-setup.exeC:\Users\admin\AppData\Local\Temp\nsl401.tmp\nsDialogs.dllexecutable
MD5:8F0E7415F33843431DF308BB8E06AF81
SHA256:BB49F15FA83452370047A7801E39FC7F64E70C7545B8999BB85AA4749EAA048B
5772memreduct-3.5.2-setup.exeC:\Users\admin\AppData\Local\Temp\nsl401.tmp\modern-wizard.bmpimage
MD5:48992D90BF2B3360D2301802A0C25900
SHA256:411961864A8EDB7CC2BA384E702BBB787040EA47488D2CEFC2EF2C6F0A55A832
5772memreduct-3.5.2-setup.exeC:\Program Files\Mem Reduct\License.txttext
MD5:3C34AFDC3ADF82D2448F12715A255122
SHA256:0B383D5A63DA644F628D99C33976EA6487ED89AAA59F0B3257992DEAC1171E6B
5772memreduct-3.5.2-setup.exeC:\Users\admin\AppData\Local\Temp\nsl401.tmp\modern-header.bmpimage
MD5:D98F2159025CCD128B59B6BA715CEE46
SHA256:B74ED1397C5A50C22DDD4DA1C01CF1A36484FA38623051B4959BB6E01D657547
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
24
DNS requests
10
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
472
svchost.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
8008
RUXIMICS.exe
GET
200
2.16.241.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
472
svchost.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
140.82.121.3:443
https://raw.githubusercontent.com/henrypp/memreduct/master/VERSION
unknown
text
203 b
whitelisted
8008
RUXIMICS.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
140.82.121.3:443
https://raw.githubusercontent.com/henrypp/memreduct/master/bin/memreduct.lng
unknown
text
117 Kb
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
472
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
8008
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
472
svchost.exe
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
8008
RUXIMICS.exe
2.16.241.12:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
472
svchost.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
8008
RUXIMICS.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
472
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.124.78.146
  • 51.104.136.2
whitelisted
google.com
  • 142.250.74.206
whitelisted
crl.microsoft.com
  • 2.16.241.12
  • 2.16.241.19
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
raw.githubusercontent.com
  • 185.199.109.133
  • 185.199.108.133
  • 185.199.110.133
  • 185.199.111.133
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
self.events.data.microsoft.com
  • 40.79.197.35
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access raw user content on GitHub
No debug info