download:

/DREV1H/FiveM-External-Cheat-KeyAuth-System/main/Loader.exe

Full analysis: https://app.any.run/tasks/1345550c-71bd-478e-9aa0-f383a53299a1
Verdict: Malicious activity
Analysis date: March 24, 2025, 13:12:49
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
github
susp-powershell
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

F6E195D0B763235A06093D8013B1D5DC

SHA1:

014EE46292E7A949A21AA29BA11318E099EC1D50

SHA256:

03D95D9AE7B1908F95FEC4C2932A36C9E662530CC09B91C870886DDA3DEEAB9B

SSDEEP:

768:KqeJWZdFE2ECEL8JRLg23zX/PLXos9punqfaSYxnoXbOfC11kFp5e2h:Rg2ECELcLBzXbXos9puBfabO/FpH

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Downloads the requested resource (POWERSHELL)

      • powershell.exe (PID: 7568)
    • Script downloads file (POWERSHELL)

      • powershell.exe (PID: 7568)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • Loader.exe (PID: 7360)
    • Starts POWERSHELL.EXE for commands execution

      • Loader.exe (PID: 7360)
      • powershell.exe (PID: 7568)
    • Application launched itself

      • powershell.exe (PID: 7568)
    • BASE64 encoded PowerShell command has been detected

      • Loader.exe (PID: 7360)
    • Base64-obfuscated command line is found

      • Loader.exe (PID: 7360)
    • Executable content was dropped or overwritten

      • powershell.exe (PID: 7568)
    • Executes application which crashes

      • asprioig.ppf0.exe (PID: 644)
  • INFO

    • Found Base64 encoded access to Windows Defender via PowerShell (YARA)

      • Loader.exe (PID: 7360)
    • Reads the machine GUID from the registry

      • Loader.exe (PID: 7360)
    • Create files in a temporary directory

      • Loader.exe (PID: 7360)
      • powershell.exe (PID: 7980)
    • Reads the computer name

      • Loader.exe (PID: 7360)
    • Checks supported languages

      • Loader.exe (PID: 7360)
      • asprioig.ppf0.exe (PID: 644)
    • Reads Environment values

      • Loader.exe (PID: 7360)
    • Found Base64 encoded reflection usage via PowerShell (YARA)

      • Loader.exe (PID: 7360)
    • Found Base64 encoded file access via PowerShell (YARA)

      • Loader.exe (PID: 7360)
    • Reads the software policy settings

      • powershell.exe (PID: 7980)
      • slui.exe (PID: 5400)
      • slui.exe (PID: 7772)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 7568)
    • Disables trace logs

      • powershell.exe (PID: 7568)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 7568)
    • Reads security settings of Internet Explorer

      • powershell.exe (PID: 7980)
    • Checks proxy server information

      • powershell.exe (PID: 7568)
    • Gets data length (POWERSHELL)

      • powershell.exe (PID: 7568)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 4628)
    • The executable file from the user directory is run by the Powershell process

      • asprioig.ppf0.exe (PID: 644)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (55.8)
.exe | Win64 Executable (generic) (21)
.scr | Windows screen saver (9.9)
.dll | Win32 Dynamic Link Library (generic) (5)
.exe | Win32 Executable (generic) (3.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:03:20 14:43:11+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 11
CodeSize: 33792
InitializedDataSize: 2048
UninitializedDataSize: -
EntryPoint: 0xa36e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 0.0.0.0
ProductVersionNumber: 0.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
FileDescription:
FileVersion: 0.0.0.0
InternalName: script.exe
LegalCopyright:
OriginalFileName: script.exe
ProductVersion: 0.0.0.0
AssemblyVersion: 0.0.0.0
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
166
Monitored processes
16
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start loader.exe no specs conhost.exe no specs powershell.exe sppextcomobj.exe no specs slui.exe powershell.exe no specs conhost.exe no specs asprioig.ppf0.exe conhost.exe no specs msbuild.exe no specs werfault.exe no specs slui.exe ucpdmgr.exe no specs conhost.exe no specs ucpdmgr.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
644"C:\Users\admin\AppData\Roaming\asprioig.ppf0.exe" C:\Users\admin\AppData\Roaming\asprioig.ppf0.exe
powershell.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226505
Modules
Images
c:\users\admin\appdata\roaming\asprioig.ppf0.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
680\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeasprioig.ppf0.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1812"C:\WINDOWS\system32\UCPDMgr.exe"C:\Windows\System32\UCPDMgr.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
User Choice Protection Manager
Exit code:
0
Version:
1.0.0.414301
Modules
Images
c:\windows\system32\ucpdmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
3192"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeasprioig.ppf0.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
MSBuild.exe
Exit code:
0
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\msbuild.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
4628C:\WINDOWS\system32\WerFault.exe -u -p 644 -s 260C:\Windows\System32\WerFault.exeasprioig.ppf0.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
5400C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5984\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeUCPDMgr.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6736\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeUCPDMgr.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7360"C:\Users\admin\Desktop\Loader.exe" C:\Users\admin\Desktop\Loader.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Version:
0.0.0.0
Modules
Images
c:\users\admin\desktop\loader.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
7404"C:\WINDOWS\system32\UCPDMgr.exe"C:\Windows\System32\UCPDMgr.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
User Choice Protection Manager
Exit code:
0
Version:
1.0.0.414301
Modules
Images
c:\windows\system32\ucpdmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
14 475
Read events
14 475
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
4
Text files
7
Unknown types
0

Dropped files

PID
Process
Filename
Type
4628WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_asprioig.ppf0.ex_7117fc3876dfaf3bce43a92445f49cda57e49da_fad6c99d_febac685-d495-4e3a-9b5d-03dbb38d1074\Report.wer
MD5:
SHA256:
7568powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_wgm2hhj0.j4w.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
7360Loader.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_aujxczbe.y2g.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
7360Loader.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_bpb0pu3p.vdn.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
7568powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:2FE70C8557DF52131D80064E881A0E21
SHA256:3C860966001B512FF5B3FD8617FC594056B9302A238632E904422CF679C30DAB
4628WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER66A6.tmp.dmpbinary
MD5:819F70393D5DE952AE5FAEC32F877C1E
SHA256:84B5278340DA40C804673A0284EAE06CDC4AAECAFA32D45412E9053D0DE08D77
4628WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER6753.tmp.WERInternalMetadata.xmlbinary
MD5:A8BA5F64653DC0B542432D19B13B7A72
SHA256:673A874DBD67CA56F4C2D607162D4543CF58404F7E782DB2E200C6B59637B5F1
4628WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER682F.tmp.xmlxml
MD5:4CD9EA9B42B7A4953C9730FF434F6168
SHA256:97B2BA6FF1811368E63A64EB40BCCB2F2782CAC0F3B43E72E8749F579E418CAB
7980powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_iwo24pc2.wa4.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
7980powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_zkzniy54.ixu.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
50
DNS requests
29
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2104
svchost.exe
GET
200
2.16.164.32:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7428
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7428
SIHClient.exe
GET
200
2.16.253.202:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
4988
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
2516
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/canonical.html
unknown
whitelisted
2516
firefox.exe
GET
200
34.107.221.82:80
http://detectportal.firefox.com/success.txt?ipv4
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
2.16.164.32:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
6544
svchost.exe
20.190.159.129:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
20.190.159.129:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
3216
svchost.exe
20.197.71.89:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
SG
whitelisted
5496
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5544
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4988
backgroundTaskHost.exe
20.223.35.26:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 20.73.194.208
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 2.16.164.32
  • 2.16.164.34
  • 2.16.164.9
  • 2.16.164.40
  • 2.16.164.107
whitelisted
google.com
  • 172.217.18.14
whitelisted
login.live.com
  • 20.190.159.129
  • 40.126.31.129
  • 20.190.159.0
  • 20.190.159.71
  • 20.190.159.130
  • 40.126.31.130
  • 20.190.159.68
  • 20.190.159.2
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
client.wns.windows.com
  • 20.197.71.89
  • 40.113.103.199
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
www.microsoft.com
  • 2.16.253.202
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted

Threats

PID
Process
Class
Message
2196
svchost.exe
Not Suspicious Traffic
INFO [ANY.RUN] Attempting to access raw user content on GitHub
No debug info