| File name: | 4363463463464363463463463.bin |
| Full analysis: | https://app.any.run/tasks/e73221f4-aa64-4b38-86db-1ffe529d7e74 |
| Verdict: | Malicious activity |
| Threats: | A backdoor is a type of cybersecurity threat that allows attackers to secretly compromise a system and conduct malicious activities, such as stealing data and modifying files. Backdoors can be difficult to detect, as they often use legitimate system applications to evade defense mechanisms. Threat actors often utilize special malware, such as PlugX, to establish backdoors on target devices. |
| Analysis date: | May 19, 2025, 05:49:12 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections |
| MD5: | 2A94F3960C58C6E70826495F76D00B85 |
| SHA1: | E2A1A5641295F5EBF01A37AC1C170AC0814BB71A |
| SHA256: | 2FCAD226B17131DA4274E1B9F8F31359BDD325C9568665F08FD1F6C5D06A23CE |
| SSDEEP: | 192:2we8sGKE6MqyG7c20L7BIW12n/ePSmzkTInu8stYcFwVc03KY:9e8sGKfMqyGg20PKn/cRaInuptYcFwVY |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (82.9) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (7.4) |
| .exe | | | Win32 Executable (generic) (5.1) |
| .exe | | | Generic Win/DOS Executable (2.2) |
| .exe | | | DOS Executable Generic (2.2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2023:12:22 08:29:10+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32 |
| LinkerVersion: | 80 |
| CodeSize: | 5632 |
| InitializedDataSize: | 4608 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x3552 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows command line |
| FileVersionNumber: | 0.0.0.0 |
| ProductVersionNumber: | 0.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| FileDescription: | |
| FileVersion: | 0.0.0.0 |
| InternalName: | 4363463463464363463463463.exe |
| LegalCopyright: | |
| OriginalFileName: | 4363463463464363463463463.exe |
| ProductVersion: | 0.0.0.0 |
| AssemblyVersion: | 0.0.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 476 | "C:\Users\admin\AppData\Local\Temp\Files\btpc.exe" | C:\Users\admin\AppData\Local\Temp\Files\btpc.exe | — | 4363463463464363463463463.bin.exe | |||||||||||
User: admin Integrity Level: HIGH Modules
| |||||||||||||||
| 636 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | schtasks.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 684 | "C:\Program Files (x86)\Windows Media Player\uhssvc.exe" | C:\Program Files (x86)\Windows Media Player\uhssvc.exe | 1.exe | ||||||||||||
User: admin Integrity Level: HIGH Modules
| |||||||||||||||
| 860 | "C:\Users\admin\AppData\Local\Temp\Files\alexx111.exe" | C:\Users\admin\AppData\Local\Temp\Files\alexx111.exe | alexx111.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: Portals Version: 1.0.0.0 Modules
| |||||||||||||||
| 1180 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1232 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | 4363463463464363463463463.bin.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1352 | "C:\Users\admin\AppData\Local\Temp\Files\._cache_1.exe" 0 | C:\Users\admin\AppData\Local\Temp\Files\._cache_1.exe | — | 1.exe | |||||||||||
User: admin Integrity Level: HIGH Modules
| |||||||||||||||
| 1412 | "C:\Users\admin\AppData\Roaming\SubDir\Application Frame Host.exe" | C:\Users\admin\AppData\Roaming\SubDir\Application Frame Host.exe | Client-built.exe | ||||||||||||
User: admin Company: Microsoft Integrity Level: HIGH Description: Application Frame Host Version: 9.4.3.2 Modules
| |||||||||||||||
| 1832 | "C:\Users\admin\AppData\Local\Temp\4363463463464363463463463.bin.exe" | C:\Users\admin\AppData\Local\Temp\4363463463464363463463463.bin.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: Version: 0.0.0.0 Modules
| |||||||||||||||
| 1896 | "C:\Users\admin\AppData\Roaming\SubDir\Application Frame Host.exe" | C:\Users\admin\AppData\Roaming\SubDir\Application Frame Host.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Integrity Level: MEDIUM Description: Application Frame Host Exit code: 2 Version: 9.4.3.2 Modules
| |||||||||||||||
| (PID) Process: | (1832) 4363463463464363463463463.bin.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (1832) 4363463463464363463463463.bin.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (1832) 4363463463464363463463463.bin.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (1832) 4363463463464363463463463.bin.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (1832) 4363463463464363463463463.bin.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
| (PID) Process: | (1832) 4363463463464363463463463.bin.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (1832) 4363463463464363463463463.bin.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
| (PID) Process: | (1832) 4363463463464363463463463.bin.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\4363463463464363463463463_RASMANCS |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (1832) 4363463463464363463463463.bin.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\4363463463464363463463463_RASMANCS |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (1832) 4363463463464363463463463.bin.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\4363463463464363463463463_RASMANCS |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 5236 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_alexx111.exe_aaa74d3ae1b9b28a3afcc1255da29df794921afe_05fdc433_9eaca612-0c58-4f12-9b9b-9d4db3ff2eae\Report.wer | — | |
MD5:— | SHA256:— | |||
| 5236 | WerFault.exe | C:\Users\admin\AppData\Local\CrashDumps\alexx111.exe.4040.dmp | — | |
MD5:— | SHA256:— | |||
| 5236 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WER89A1.tmp.xml | xml | |
MD5:F5D8835F9902D9B5635C6AFD320C20AF | SHA256:31BFD3D649E7318B2BBA8A5E46DDB80C467E6270F9FA0594B5F4B8AD3279D7AF | |||
| 5236 | WerFault.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\21253908F3CB05D51B1C2DA8B681A785 | binary | |
MD5:5B63C0144C61100C949E65C9B4C7B790 | SHA256:51E7A9D4403161514027724D012C19E4717FD92CC87B31049944A37B40228B8E | |||
| 5236 | WerFault.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\21253908F3CB05D51B1C2DA8B681A785 | binary | |
MD5:243BADFC37FB249C058EE79A00C289FF | SHA256:E202E0A63B4EEEE64C26CC0BAF5FFDB0B4363E85159B1022E93F65758CCEF8BF | |||
| 4512 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_0v2e4zes.eix.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 1832 | 4363463463464363463463463.bin.exe | C:\Users\admin\AppData\Local\Temp\Files\02.08.2022.exe | binary | |
MD5:06F3BE5F7CBC32E4837E92EF1340F037 | SHA256:B1AD058F803553BBAC959BB0456B130A9D35FFF661E9217241586AA57EE0EE45 | |||
| 5236 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WER8971.tmp.WERInternalMetadata.xml | xml | |
MD5:4AF0027D0D302E9C4B73621ED6385239 | SHA256:5377E0D22CBF991F8C9D5D767763F574C517EBFFC8A2439B18636AA008E3EE5B | |||
| 1832 | 4363463463464363463463463.bin.exe | C:\Users\admin\AppData\Local\Temp\Files\TORRENTOLD-1.exe | executable | |
MD5:949102FCD293934060C6F3572ADC46FE | SHA256:796CE3E06BC10916427B847A1B6C2F1EAA9904F95DB66E35C28CEBEC34EFC9C5 | |||
| 1832 | 4363463463464363463463463.bin.exe | C:\Users\admin\AppData\Local\Temp\Files\CrazyCoach.exe | executable | |
MD5:E3A7B26B313C02619DFB0B1CCF334286 | SHA256:5AA34CB9D53824ADA537FF3AF09174938B000615FAD8BFDEB3E85DC6B76C1110 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 200 | 23.216.77.42:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
1832 | 4363463463464363463463463.bin.exe | GET | 200 | 8.140.239.162:81 | http://8.140.239.162:81/02.08.2022.exe | unknown | — | — | unknown |
5236 | WerFault.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
1832 | 4363463463464363463463463.bin.exe | GET | 200 | 87.121.84.254:80 | http://chillyhiss.update-checker-status.cc/1337/TORRENTOLD-1.exe | unknown | — | — | unknown |
6876 | svchost.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
1832 | 4363463463464363463463463.bin.exe | GET | 200 | 47.240.68.28:81 | http://coach.028csc.com:81/CrazyCoach.exe | unknown | — | — | malicious |
1832 | 4363463463464363463463463.bin.exe | GET | 301 | 140.82.121.3:80 | http://github.com/ValOfficial/Client-follower/raw/refs/heads/main/Client-built.exe | unknown | — | — | whitelisted |
2656 | XClient.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/line/?fields=hosting | unknown | — | — | whitelisted |
1832 | 4363463463464363463463463.bin.exe | GET | 301 | 140.82.121.3:80 | http://github.com/Mansure1337/fatality-loader/raw/refs/heads/main/1.exe | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 192.168.100.255:137 | — | — | — | whitelisted |
1268 | svchost.exe | 4.231.128.59:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 4.231.128.59:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1636 | RUXIMICS.exe | 4.231.128.59:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5944 | MoUsoCoreWorker.exe | 4.231.128.59:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 23.216.77.42:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
— | — | 23.35.229.160:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2336 | svchost.exe | 172.211.123.249:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
1832 | 4363463463464363463463463.bin.exe | 151.101.66.49:443 | urlhaus.abuse.ch | FASTLY | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
urlhaus.abuse.ch |
| whitelisted |
go.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
github.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
1832 | 4363463463464363463463463.bin.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
2200 | svchost.exe | Potentially Bad Traffic | ET DNS Query for .cc TLD |
2200 | svchost.exe | Not Suspicious Traffic | INFO [ANY.RUN] Attempting to access raw user content on GitHub |
1832 | 4363463463464363463463463.bin.exe | Potential Corporate Privacy Violation | ET INFO PE EXE or DLL Windows file download HTTP |
1832 | 4363463463464363463463463.bin.exe | Misc activity | ET INFO Packed Executable Download |
1832 | 4363463463464363463463463.bin.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
2200 | svchost.exe | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |
2200 | svchost.exe | A Network Trojan was detected | STEALER [ANY.RUN] Domain has been identified as part of Lumma Stealer's infrastructure (zfurrycomp .top) |
2200 | svchost.exe | Device Retrieving External IP Address Detected | INFO [ANY.RUN] External IP Check (ip-api .com) |
2656 | XClient.exe | Device Retrieving External IP Address Detected | POLICY [ANY.RUN] External Hosting Lookup by ip-api |
Process | Message |
|---|---|
4363463463464363463463463.bin.exe | The specified executable is not a valid application for this OS platform.
|