| File name: | gay.exe |
| Full analysis: | https://app.any.run/tasks/601dbad7-e5a7-4beb-882e-17a3a226544b |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | June 21, 2025, 10:57:43 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows, 2 sections |
| MD5: | E2D123853B190265C36D16CF78F40B69 |
| SHA1: | BA3C0A6C8DA60CB14A32D17564F03C7B54ACF1D0 |
| SHA256: | 4112C94DD0FAB5E17529313038159C0784F671710B0518E5442604035AE22E22 |
| SSDEEP: | 98304:mlkP1Unva5OKSbAmTorzntGdMyk+AtBmkFyHqc6Xphr6j+P2TfgrHiQc6rlW8bHH:JFJ/ |
| .exe | | | Generic Win/DOS Executable (50) |
|---|---|---|
| .exe | | | DOS Executable Generic (49.9) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2080:02:20 09:36:36+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 48 |
| CodeSize: | 4305920 |
| InitializedDataSize: | 1536 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x0000 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 4.3.4.4 |
| ProductVersionNumber: | 4.3.4.4 |
| FileFlagsMask: | 0x0000 |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Unicode |
| FileDescription: | aazko8pfeqwto |
| ProductName: | aazko8pfeqwto |
| ProductVersion: | 4.3.4.4 |
| LegalCopyright: | aazko8pfeqwto |
| OriginalFileName: | aazko8pfeqwto.exe |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 728 | "schtasks" /create /tn "RasAcd" /tr "C:\Users\admin\ufxsynopsys\VerifierExt\DoSvc.exe" /sc MINUTE /mo 15 /ru "SYSTEM" /rl HIGHEST | C:\Windows\System32\schtasks.exe | — | gay.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Task Scheduler Configuration Tool Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2120 | "schtasks" /create /tn "vwifibus" /tr "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ws2ifsl\NcaSvc\ndfltr.exe" /sc MINUTE /mo 15 /ru "SYSTEM" /rl HIGHEST | C:\Windows\System32\schtasks.exe | — | gay.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Task Scheduler Configuration Tool Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2200 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2760 | "schtasks" /create /tn "Sense" /tr "C:\Users\Public\Documents\intelpmax\ProfSvc\TieringEngineService\hidi2c.exe" /sc MINUTE /mo 15 /ru "SYSTEM" /rl HIGHEST | C:\Windows\System32\schtasks.exe | — | gay.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Task Scheduler Configuration Tool Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3924 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | tmpCAE1.tmp.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5008 | "C:\Users\admin\AppData\Local\Temp\kokipopi.exe" | C:\Users\admin\AppData\Local\Temp\kokipopi.exe | gay.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: RasAgileVpn Exit code: 0 Modules
| |||||||||||||||
| 5244 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5372 | "C:\Users\admin\AppData\Local\Temp\tmpCAE1.tmp.exe" | C:\Users\admin\AppData\Local\Temp\tmpCAE1.tmp.exe | kokipopi.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: WlanSvc Exit code: 0 Modules
| |||||||||||||||
| 5496 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | schtasks.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5720 | C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\8ce041b6-54db-49ef-a93a-54ceb06cfd02.bat" " | C:\Windows\SysWOW64\cmd.exe | — | kokipopi.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (6652) gay.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | usbccgp |
Value: "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Printer Shortcuts\MSPCLOCK\cht4vbd\WFPLWFS\i8042prt.exe" | |||
| (PID) Process: | (6652) gay.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | NDKPing |
Value: "C:\Users\admin\Documents\UrsSynopsys\EFS\luafv.exe" | |||
| (PID) Process: | (6652) gay.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | Winmgmt |
Value: "C:\Users\admin\Videos\UdeCx\MsSecWfp\HdAudAddService.exe" | |||
| (PID) Process: | (6652) gay.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\F8129A35CB0B2583252ADC9C82B26740 |
| Operation: | write | Name: | 7ACC172CD44DDC99962B58A669E06C2C |
Value: 4OuI6Qwk7jgMaeWhuw1a0Ww/gk3Mdx5ojSjQXQlv2Oc= | |||
| (PID) Process: | (6652) gay.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\F8129A35CB0B2583252ADC9C82B26740 |
| Operation: | write | Name: | F21A208E2E98FFCA3EA4217D6E0F78EE |
Value: F7lyg3uYPPrf50IdBvTJwEP7MOeGUuiXzOCZ/ijkQlKFjHy3xIwZ5DXuScX3iVYHVWVVgt0ekuEZRKuKzhvz9w== | |||
| (PID) Process: | (6652) gay.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\gay_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (6652) gay.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\gay_RASAPI32 |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (6652) gay.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\gay_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (6652) gay.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\gay_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (6652) gay.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\gay_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6652 | gay.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Printer Shortcuts\MSPCLOCK\cht4vbd\WFPLWFS\RCX6021.tmp | executable | |
MD5:32BEB204A97D7BB5628DE56CC1C0463B | SHA256:8A4DF899F0C5310B6E121A916629164C534010ACF1DEC3A3F96AD84F9546168C | |||
| 6652 | gay.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Printer Shortcuts\MSPCLOCK\cht4vbd\WFPLWFS\i8042prt.exe | executable | |
MD5:E2D123853B190265C36D16CF78F40B69 | SHA256:4112C94DD0FAB5E17529313038159C0784F671710B0518E5442604035AE22E22 | |||
| 6652 | gay.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Burn\Burn\DispBrokerDesktopSvc\storflt\AcpiPmi\amdsata.exe | executable | |
MD5:E2D123853B190265C36D16CF78F40B69 | SHA256:4112C94DD0FAB5E17529313038159C0784F671710B0518E5442604035AE22E22 | |||
| 6652 | gay.exe | C:\Users\admin\Videos\UdeCx\MsSecWfp\RCX6C97.tmp | executable | |
MD5:FE23292871F6A43F5571600E58BFBFB6 | SHA256:733A802D24E4F4DA3695EB87CFBCD1774FC249FEE8343EE0C8815FF4AE93AA55 | |||
| 6652 | gay.exe | C:\Users\admin\Pictures\percsas3i\AppID\UrsChipidea\RCX8531.tmp | executable | |
MD5:6BDAB84D890B578179765B91B2BDF939 | SHA256:1DD9C64D036417C356E7AC94DF0922309E5878EE6AF43C70FB008896393DB7A0 | |||
| 6652 | gay.exe | C:\Users\admin\Documents\UrsSynopsys\EFS\luafv.exe | executable | |
MD5:E2D123853B190265C36D16CF78F40B69 | SHA256:4112C94DD0FAB5E17529313038159C0784F671710B0518E5442604035AE22E22 | |||
| 6652 | gay.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\diagnosticshub.standardcollector.service.lnk | binary | |
MD5:999F15C7C413D1F4FC7BF5AE37B120B8 | SHA256:B1A464A79F2475AF9CDBC2AECCE11AE3626DF18F205F5D9472C83BA10EB561F5 | |||
| 6652 | gay.exe | C:\Users\admin\Videos\UdeCx\MsSecWfp\HdAudAddService.exe | executable | |
MD5:E2D123853B190265C36D16CF78F40B69 | SHA256:4112C94DD0FAB5E17529313038159C0784F671710B0518E5442604035AE22E22 | |||
| 6652 | gay.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Burn\Burn\DispBrokerDesktopSvc\storflt\AcpiPmi\RCX7FA3.tmp | executable | |
MD5:EF8CFE3D4D0B0BC8D3F52C477D4C5862 | SHA256:02F8E2EEF94E93A9F5C4869FFC614921FC95A10DD6800BE536492AD8FEAE291A | |||
| 6652 | gay.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\ws2ifsl\NcaSvc\ndfltr.exe | executable | |
MD5:E2D123853B190265C36D16CF78F40B69 | SHA256:4112C94DD0FAB5E17529313038159C0784F671710B0518E5442604035AE22E22 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
6652 | gay.exe | GET | — | 89.23.98.243:80 | http://hamster-exchange.top/1.exe | unknown | — | — | malicious |
4168 | svchost.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
2808 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
5372 | tmpCAE1.tmp.exe | POST | 200 | 89.23.98.243:8080 | http://89.23.98.243:8080/74db120f0a8e5646ef5a30154e9f6deb | unknown | — | — | unknown |
5372 | tmpCAE1.tmp.exe | GET | 200 | 89.23.98.243:8080 | http://89.23.98.243:8080/632c9594449737188c71ee1c8534f893 | unknown | — | — | unknown |
2940 | svchost.exe | GET | 200 | 23.209.209.135:80 | http://x1.c.lencr.org/ | unknown | — | — | whitelisted |
5372 | tmpCAE1.tmp.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/json/ | unknown | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
2808 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | GET | 200 | 184.24.77.31:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
1268 | svchost.exe | 40.127.240.158:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | 40.127.240.158:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
3876 | RUXIMICS.exe | 40.127.240.158:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2336 | svchost.exe | 172.211.123.248:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
4168 | svchost.exe | 20.190.159.71:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4168 | svchost.exe | 2.17.190.73:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
6652 | gay.exe | 89.23.98.243:32 | hamster-exchange.top | LLC Smart Ape | RU | unknown |
5944 | MoUsoCoreWorker.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
nexusrules.officeapps.live.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
hamster-exchange.top |
| malicious |
slscr.update.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2200 | svchost.exe | Potentially Bad Traffic | ET DNS Query to a *.top domain - Likely Hostile |
6652 | gay.exe | A Network Trojan was detected | ET HUNTING SUSPICIOUS Firesale gTLD EXE DL with no Referer June 13 2016 |
6652 | gay.exe | A Network Trojan was detected | ET MALWARE Single char EXE direct download likely trojan (multiple families) |
6652 | gay.exe | Potentially Bad Traffic | ET INFO HTTP Request to a *.top domain |
6652 | gay.exe | Potentially Bad Traffic | ET HUNTING Request to .TOP Domain with Minimal Headers |
6652 | gay.exe | Potential Corporate Privacy Violation | ET INFO PE EXE or DLL Windows file download HTTP |
6652 | gay.exe | Misc activity | ET HUNTING Possible EXE Download From Suspicious TLD |
6652 | gay.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
5372 | tmpCAE1.tmp.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup ip-api.com |
2200 | svchost.exe | Device Retrieving External IP Address Detected | INFO [ANY.RUN] External IP Check (ip-api .com) |