File name:

0782a6b387a57d698f7f5e91e8a217906dd5ced8a8f6d389094de2992ef5d183

Full analysis: https://app.any.run/tasks/288973f7-2306-4942-88bf-561b9d9c5eb8
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: May 17, 2025, 12:00:06
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
smoke
loader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (console) Intel 80386, for MS Windows, 4 sections
MD5:

01220CB838E7591704945B43757C0A67

SHA1:

75582854941F2E33EEBDB8D402246F6E501C3E7F

SHA256:

0782A6B387A57D698F7F5E91E8A217906DD5CED8A8F6D389094DE2992EF5D183

SSDEEP:

6144:OPk1B1QF/UPyGAYeqDVgYS70KA9i0ijUSg8YGeafP:OPkP12UKGAYPDaYitg3ijUWYGFfP

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • 0782a6b387a57d698f7f5e91e8a217906dd5ced8a8f6d389094de2992ef5d183.exe (PID: 3300)
    • Application was injected by another process

      • explorer.exe (PID: 5492)
    • SMOKE mutex has been found

      • explorer.exe (PID: 5492)
    • Runs injected code in another process

      • AppLaunch.exe (PID: 5380)
  • SUSPICIOUS

    • Executes application which crashes

      • 0782a6b387a57d698f7f5e91e8a217906dd5ced8a8f6d389094de2992ef5d183.exe (PID: 3300)
    • Process drops legitimate windows executable

      • explorer.exe (PID: 5492)
    • Executable content was dropped or overwritten

      • explorer.exe (PID: 5492)
    • Deletes system .NET executable

      • explorer.exe (PID: 5492)
  • INFO

    • Checks supported languages

      • AppLaunch.exe (PID: 5380)
      • 0782a6b387a57d698f7f5e91e8a217906dd5ced8a8f6d389094de2992ef5d183.exe (PID: 3300)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 7196)
      • explorer.exe (PID: 5492)
    • The sample compiled with english language support

      • explorer.exe (PID: 5492)
    • Checks proxy server information

      • explorer.exe (PID: 5492)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:10:07 16:02:20+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.34
CodeSize: 154624
InitializedDataSize: 112640
UninitializedDataSize: -
EntryPoint: 0x9e78
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
135
Monitored processes
7
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start 0782a6b387a57d698f7f5e91e8a217906dd5ced8a8f6d389094de2992ef5d183.exe conhost.exe no specs applaunch.exe no specs werfault.exe no specs sppextcomobj.exe no specs slui.exe no specs #SMOKE explorer.exe

Process information

PID
CMD
Path
Indicators
Parent process
1852\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exe0782a6b387a57d698f7f5e91e8a217906dd5ced8a8f6d389094de2992ef5d183.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3300"C:\Users\admin\AppData\Local\Temp\0782a6b387a57d698f7f5e91e8a217906dd5ced8a8f6d389094de2992ef5d183.exe" C:\Users\admin\AppData\Local\Temp\0782a6b387a57d698f7f5e91e8a217906dd5ced8a8f6d389094de2992ef5d183.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226505
Modules
Images
c:\users\admin\appdata\local\temp\0782a6b387a57d698f7f5e91e8a217906dd5ced8a8f6d389094de2992ef5d183.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
5380"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe0782a6b387a57d698f7f5e91e8a217906dd5ced8a8f6d389094de2992ef5d183.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET ClickOnce Launch Utility
Exit code:
0
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\applaunch.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
5492C:\WINDOWS\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\shcore.dll
7196C:\WINDOWS\SysWOW64\WerFault.exe -u -p 3300 -s 152C:\Windows\SysWOW64\WerFault.exe0782a6b387a57d698f7f5e91e8a217906dd5ced8a8f6d389094de2992ef5d183.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
7232C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7272"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
2 211
Read events
2 208
Write events
2
Delete events
1

Modification events

(PID) Process:(5492) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\5\ApplicationViewManagement\W32:000000000005030E
Operation:writeName:VirtualDesktop
Value:
1000000030304456BFA0DB55E4278845B426357D5B5F97B3
(PID) Process:(5492) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\5\ApplicationViewManagement\W32:000000000005030E
Operation:delete keyName:(default)
Value:
(PID) Process:(5492) explorer.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
Operation:writeName:CheckSetting
Value:
23004100430042006C006F00620000000000000000000000010000000000000000000000
Executable files
1
Suspicious files
4
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
7196WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_0782a6b387a57d69_979bd3a885ca05f9c41de3b8db5ef8bc6b7f036_271e59c5_0cdcf354-1e88-404a-b7ff-57c77fd41760\Report.wer
MD5:
SHA256:
7196WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERCA47.tmp.dmpbinary
MD5:1122E571873534F28ACC5E8453356D76
SHA256:1883A66CFEBBE2756D8AFD414FFA0C67479A01E368F602199144D91D9C1EA81B
5492explorer.exeC:\Users\admin\AppData\Roaming\tfcgshjexecutable
MD5:1CEE14BA4BA5B627536821A38E218F24
SHA256:D025C880EB10592541846301A8B8500CFCD00A12B72D15443724E2B26C905F3D
7196WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\0782a6b387a57d698f7f5e91e8a217906dd5ced8a8f6d389094de2992ef5d183.exe.3300.dmpbinary
MD5:668B8C68A9B7F9CF77BDDC002657EE28
SHA256:B47CC391ED2CF95C75D473AAF213DA58B1FD9C47DA681068D6C24BF873E6E48D
5492explorer.exeC:\Users\admin\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.datbinary
MD5:E49C56350AEDF784BFE00E444B879672
SHA256:A8BD235303668981563DFB5AAE338CB802817C4060E2C199B7C84901D57B7E1E
7196WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERCB32.tmp.WERInternalMetadata.xmlbinary
MD5:27DC558DB91C0400CD0AA74DA53B1471
SHA256:4DBBF07A5E5510FD73E7DE0E5631B425648E608FF5DD11C38E87C78948A0EBE2
7196WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERCBC0.tmp.xmlxml
MD5:12527482ADE0B063271A61BF28FE2561
SHA256:296E3AAB878A38A8B0680ADAFABA67397799DB966A45D7A2555492D068259EDF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
28
DNS requests
11
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.48.23.169:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7848
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7848
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
23.48.23.169:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.4:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5492
explorer.exe
77.91.68.29:80
Foton Telecom CJSC
RU
malicious
4
System
192.168.100.255:137
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.48.23.169
  • 23.48.23.143
  • 23.48.23.158
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
google.com
  • 142.250.186.110
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 20.190.159.4
  • 40.126.31.129
  • 20.190.159.131
  • 40.126.31.1
  • 20.190.159.2
  • 40.126.31.128
  • 40.126.31.67
  • 20.190.159.64
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted

Threats

No threats detected
No debug info