File name:

vcredist_244.dll

Full analysis: https://app.any.run/tasks/b898a5c2-bba5-4ab8-b09d-51a6db2e652b
Verdict: Malicious activity
Analysis date: April 03, 2025, 11:18:56
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (DLL) (GUI) x86-64, for MS Windows, 7 sections
MD5:

720DF84A9E3BCB416F71694E43B50869

SHA1:

834F16352AA51E4845219128E72A997BACA84854

SHA256:

0D2F2FE9BC73E5FF8EE67FBC953BF9A4518AD13D444BECB392A0DAA19F15D504

SSDEEP:

49152:stI4F3uUV4x24KhZpO5xUPC+1Lv6mu9UU1x3aBbADlApphCOYz5n/k1m5Q94av0z:siS4IZpO5jUU1x38Z4HSvk

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • rundll32.exe (PID: 6488)
      • MusNotifyIcon.exe (PID: 4208)
      • slui.exe (PID: 2384)
      • WaaSMedicAgent.exe (PID: 5800)
      • MusNotificationUx.exe (PID: 1628)
      • WmiPrvSE.exe (PID: 5756)
      • SIHClient.exe (PID: 2240)
      • svchost.exe (PID: 2112)
      • conhost.exe (PID: 4988)
      • SppExtComObj.Exe (PID: 720)
      • svchost.exe (PID: 4040)
      • svchost.exe (PID: 6272)
      • slui.exe (PID: 1764)
  • SUSPICIOUS

    • The process creates files with name similar to system file names

      • rundll32.exe (PID: 6488)
    • Executable content was dropped or overwritten

      • rundll32.exe (PID: 6488)
  • INFO

    • Reads the time zone

      • MusNotificationUx.exe (PID: 1628)
      • WmiPrvSE.exe (PID: 5756)
      • MusNotifyIcon.exe (PID: 4208)
    • The sample compiled with english language support

      • rundll32.exe (PID: 6488)
    • Loads dropped or rewritten executable

      • firefox.exe (PID: 5776)
    • Reads the software policy settings

      • WaaSMedicAgent.exe (PID: 5800)
      • SIHClient.exe (PID: 2240)
      • slui.exe (PID: 2384)
    • Creates files in the program directory

      • MusNotificationUx.exe (PID: 1628)
      • MusNotifyIcon.exe (PID: 4208)
    • The sample compiled with chinese language support

      • rundll32.exe (PID: 6488)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | InstallShield setup (57.6)
.exe | Win64 Executable (generic) (36.9)
.exe | Generic Win/DOS Executable (2.6)
.exe | DOS Executable Generic (2.6)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:04:03 05:01:32+00:00
ImageFileCharacteristics: Executable, Large address aware, DLL
PEType: PE32+
LinkerVersion: 14.36
CodeSize: 1113600
InitializedDataSize: 603648
UninitializedDataSize: -
EntryPoint: 0x10b230
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 5.52.823.11
ProductVersionNumber: 5.52.823.11
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
CompanyName: Epebunewisavid
ProductName: Edekiyironoxozof
FileDescription: Ihovayohax Otigegutasusenarut Upokemocacobisuja Ivenecuzovaneqaz.
FileVersion: 5.52.823.11
ProductVersion: 5.52.823.11
OriginalFileName: Ufomumov
InternalName: Udumexuwena
LegalCopyright: © 2025 Epebunewisavid
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
132
Monitored processes
15
Malicious processes
5
Suspicious processes
5

Behavior graph

Click at the process to see the details
start rundll32.exe musnotificationux.exe no specs sppextcomobj.exe no specs slui.exe conhost.exe no specs svchost.exe no specs firefox.exe no specs musnotifyicon.exe no specs waasmedicagent.exe no specs svchost.exe no specs sihclient.exe wmiprvse.exe no specs slui.exe no specs svchost.exe no specs svchost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
720C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
1628%systemroot%\system32\MusNotificationUx.exe ClearActiveNotificationsC:\Windows\System32\MusNotificationUx.exeMusNotification.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
MusNotificationUx.exe
Exit code:
0
Version:
10.0.19041.3693 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\wosc.dll
c:\windows\system32\windows.web.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\policymanager.dll
c:\windows\system32\msvcp110_win.dll
c:\windows\system32\usoapi.dll
c:\windows\system32\onecorecommonproxystub.dll
1764C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2112C:\WINDOWS\system32\svchost.exe -k netsvcs -p -s UsoSvcC:\Windows\System32\svchost.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2240C:\WINDOWS\System32\sihclient.exe /cv cGJpzRAN5U+2CWH+RsqL3A.0.2C:\Windows\System32\SIHClient.exe
upfc.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
SIH Client
Exit code:
2379777
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sihclient.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\combase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\oleaut32.dll
2384"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4040C:\WINDOWS\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvcC:\Windows\System32\svchost.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
4208%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13C:\Windows\System32\MusNotifyIcon.exeMusNotification.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
MusNotifyIcon.exe
Exit code:
2149884437
Version:
10.0.19041.3693 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\musnotifyicon.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4988\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeWaaSMedicAgent.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5756C:\WINDOWS\system32\wbem\wmiprvse.exe -secured -EmbeddingC:\Windows\System32\wbem\WmiPrvSE.exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
WMI Provider Host
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\wbem\wmiprvse.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ncobjapi.dll
c:\windows\system32\wbemcomn.dll
c:\windows\system32\wbem\fastprox.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
Total events
13 051
Read events
12 982
Write events
52
Delete events
17

Modification events

(PID) Process:(2112) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsUpdate\UX\StateVariables
Operation:delete valueName:ScheduledRebootTime
Value:
(PID) Process:(2112) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsUpdate\UX\StateVariables
Operation:delete valueName:RebootScheduledByUser
Value:
(PID) Process:(2112) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsUpdate\UX\StateVariables
Operation:delete valueName:RebootConfirmedByUser
Value:
(PID) Process:(2112) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsUpdate\UX\StateVariables
Operation:delete valueName:RebootScheduledBySmartScheduler
Value:
(PID) Process:(2112) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsUpdate\UX\StateVariables
Operation:delete valueName:AutoAcceptShownToUser
Value:
(PID) Process:(2112) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsUpdate\UX\StateVariables
Operation:delete valueName:LastAttemptedRebootTime
Value:
﹀瓖珅Ǜ
(PID) Process:(2112) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsUpdate\UX\StateVariables
Operation:delete valueName:AutoScheduledRebootFailed
Value:
(PID) Process:(2112) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsUpdate\UX\StateVariables
Operation:delete valueName:ScheduledRebootFailed
Value:
(PID) Process:(2112) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsUpdate\UX\StateVariables
Operation:delete valueName:RebootDeferredReason
Value:
(PID) Process:(2112) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsUpdate\UX\StateVariables
Operation:delete valueName:FairWarningLastDismissTime
Value:
Executable files
1 798
Suspicious files
149
Text files
75
Unknown types
0

Dropped files

PID
Process
Filename
Type
6488rundll32.exeC:\Users\admin\SystemRootDoc\@AdvancedKeySettingsNotification.pngimage
MD5:C652A5EA6545C98CE71684018E0640E7
SHA256:AA24A85644ECCCAD7098327899A3C827A6BE2AE1474C7958C1500DCD55EE66D8
6488rundll32.exeC:\Users\admin\SystemRootDoc\@AppHelpToast.pngimage
MD5:D6F8DD9F561B8A67FFAC2BAD7E989770
SHA256:89EC548C14582B2BDC7739BC0FA007EA5FD648E1690564638FDC6264103098A7
6488rundll32.exeC:\Users\admin\SystemRootDoc\@BackgroundAccessToastIcon.pngimage
MD5:8E4B25CC8E98F63DBD54176DFAB539E0
SHA256:66071DBDE879F56F5B4D8EE204FDA2AADCF7E759E3A3C812F33FE3F0B37FB74C
6488rundll32.exeC:\Users\admin\SystemRootDoc\@WindowsHelloFaceToastIcon.pngimage
MD5:13EF2C8D799F7B6E9D8E3D6BACB9C779
SHA256:769B5F5FE87DA6A5F8535079E7A6A0EA65520D83800087513ADC0DBF86AEF62D
6488rundll32.exeC:\Users\admin\SystemRootDoc\@VpnToastIcon.pngimage
MD5:1622DE67156496C78D6B7BE9B471645B
SHA256:22FFCF7B1AA6E0F1DAA4CED8A08FBB8EECE12C3D5E2681EC2C57539A8900C186
6488rundll32.exeC:\Users\admin\SystemRootDoc\69fe178f-26e7-43a9-aa7d-2b616b672dde_eventlogservice.dllexecutable
MD5:AA22ACA4AF887A2C3859F19B037D044C
SHA256:F1A674EF9154775BF524C41D3364C867FEBA50162791DCA851597147D92D172D
6488rundll32.exeC:\Users\admin\SystemRootDoc\@language_notification_icon.pngimage
MD5:C2A332DE50FE519DA21AFB8BD6E134F4
SHA256:C08B1B157991539AABAF7936F8BB618A6C5CEA0E2CFAFD7B0723BC7E9461E091
6488rundll32.exeC:\Users\admin\SystemRootDoc\@WindowsUpdateToastIcon.contrast-white.pngimage
MD5:DAD405CBDE259DE527EBF71BCC28099C
SHA256:F1B6853C221615EEC4946B4763A509D011C4EB0844E403B5FD266E14A07E6A6A
6488rundll32.exeC:\Users\admin\SystemRootDoc\@WindowsUpdateToastIcon.contrast-black.pngimage
MD5:F553B252FEC3134D4F5303D9B25298B3
SHA256:190D9EC69DB44981A46E0ADA2F9F73A5278E5C1696A22462CEE0EAF26A322D46
6488rundll32.exeC:\Users\admin\SystemRootDoc\6bea57fb-8dfb-4177-9ae8-42e8b3529933_RuntimeDeviceInstall.dllexecutable
MD5:8FC840B45813CC5C2A07E3630B62DB34
SHA256:C407A7D3920DFAC893F61A6205B910DBBF1AA2A013FDDE8137E5614CFB14803C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
19
DNS requests
14
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.216.77.25:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2240
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
2240
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
23.216.77.25:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.172.255.218:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6544
svchost.exe
20.190.159.130:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2240
SIHClient.exe
4.175.87.197:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2240
SIHClient.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 172.217.16.206
whitelisted
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.216.77.25
  • 23.216.77.23
  • 23.216.77.10
whitelisted
client.wns.windows.com
  • 172.172.255.218
whitelisted
login.live.com
  • 20.190.159.130
  • 40.126.31.73
  • 40.126.31.129
  • 20.190.159.68
  • 40.126.31.3
  • 20.190.159.0
  • 40.126.31.71
  • 40.126.31.128
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
www.microsoft.com
  • 2.23.246.101
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted
nexusrules.officeapps.live.com
  • 52.111.229.19
whitelisted

Threats

No threats detected
No debug info