| File name: | 59ed7a26c56a644bf3f5ba45459965be8a6e6b79dcf4f90a5c51f2bb12190bf9.exe |
| Full analysis: | https://app.any.run/tasks/f16e00ba-993a-4ce1-9b9a-2bfcb7b86354 |
| Verdict: | Malicious activity |
| Analysis date: | June 15, 2025, 23:26:04 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, RAR self-extracting archive, 5 sections |
| MD5: | D06F3948AEC51684A26A75DBE9DCD581 |
| SHA1: | AF72AF7676E74CC4C4B8E67C43F005C850E60267 |
| SHA256: | 59ED7A26C56A644BF3F5BA45459965BE8A6E6B79DCF4F90A5C51F2BB12190BF9 |
| SSDEEP: | 24576:eKhaZllT6XL9T/2lzhk2xv3lrP9bw/JRyYJ:eKha1T6XL9T/2lzhk2xv3xPRw/JRyYJ |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2012:02:17 14:55:21+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 9 |
| CodeSize: | 73216 |
| InitializedDataSize: | 113152 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xb583 |
| OSVersion: | 5 |
| ImageVersion: | - |
| SubsystemVersion: | 5 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 188 | "\ProgramData\local\aescrypter.exe" a "C:\Program Files\FileZilla FTP Client\resources\classic\16x16\download.png.aes" "C:\Program Files\FileZilla FTP Client\resources\classic\16x16\download.png" -ep2 -hp1a2vn57b348741t92451sst0a391ba72 -m0 -y | C:\ProgramData\local\aescrypter.exe | — | dcomcnfgui.exe | |||||||||||
User: SYSTEM Integrity Level: SYSTEM Exit code: 0 Modules
| |||||||||||||||
| 236 | C:\WINDOWS\SysWOW64\dcomcnfgui.exe | C:\Windows\SysWOW64\dcomcnfgui.exe | services.exe | ||||||||||||
User: SYSTEM Integrity Level: SYSTEM Modules
| |||||||||||||||
| 316 | "\ProgramData\local\aescrypter.exe" a "C:\Program Files\FileZilla FTP Client\resources\blukis\48x48\file.png.aes" "C:\Program Files\FileZilla FTP Client\resources\blukis\48x48\file.png" -ep2 -hp1a2vn57b348741t92451sst0a391ba72 -m0 -y | C:\ProgramData\local\aescrypter.exe | — | dcomcnfgui.exe | |||||||||||
User: SYSTEM Integrity Level: SYSTEM Exit code: 0 Modules
| |||||||||||||||
| 320 | "\ProgramData\local\aescrypter.exe" a "C:\Program Files\FileZilla FTP Client\resources\blukis\16x16\bookmarks.png.aes" "C:\Program Files\FileZilla FTP Client\resources\blukis\16x16\bookmarks.png" -ep2 -hp1a2vn57b348741t92451sst0a391ba72 -m0 -y | C:\ProgramData\local\aescrypter.exe | — | dcomcnfgui.exe | |||||||||||
User: SYSTEM Integrity Level: SYSTEM Exit code: 0 Modules
| |||||||||||||||
| 472 | "\ProgramData\local\aescrypter.exe" a "C:\Program Files\FileZilla FTP Client\resources\classic\16x16\upload.png.aes" "C:\Program Files\FileZilla FTP Client\resources\classic\16x16\upload.png" -ep2 -hp1a2vn57b348741t92451sst0a391ba72 -m0 -y | C:\ProgramData\local\aescrypter.exe | — | dcomcnfgui.exe | |||||||||||
User: SYSTEM Integrity Level: SYSTEM Exit code: 0 Modules
| |||||||||||||||
| 480 | "\ProgramData\local\aescrypter.exe" a "C:\Program Files\FileZilla FTP Client\resources\blukis\16x16\remotetreeview.png.aes" "C:\Program Files\FileZilla FTP Client\resources\blukis\16x16\remotetreeview.png" -ep2 -hp1a2vn57b348741t92451sst0a391ba72 -m0 -y | C:\ProgramData\local\aescrypter.exe | — | dcomcnfgui.exe | |||||||||||
User: SYSTEM Integrity Level: SYSTEM Exit code: 0 Modules
| |||||||||||||||
| 480 | "\ProgramData\local\aescrypter.exe" a "C:\Program Files\FileZilla FTP Client\resources\blukis\32x32\uploadadd.png.aes" "C:\Program Files\FileZilla FTP Client\resources\blukis\32x32\uploadadd.png" -ep2 -hp1a2vn57b348741t92451sst0a391ba72 -m0 -y | C:\ProgramData\local\aescrypter.exe | — | dcomcnfgui.exe | |||||||||||
User: SYSTEM Integrity Level: SYSTEM Exit code: 0 Modules
| |||||||||||||||
| 536 | "\ProgramData\local\aescrypter.exe" a "C:\Program Files\FileZilla FTP Client\resources\classic\16x16\downloadadd.png.aes" "C:\Program Files\FileZilla FTP Client\resources\classic\16x16\downloadadd.png" -ep2 -hp1a2vn57b348741t92451sst0a391ba72 -m0 -y | C:\ProgramData\local\aescrypter.exe | — | dcomcnfgui.exe | |||||||||||
User: SYSTEM Integrity Level: SYSTEM Exit code: 0 Modules
| |||||||||||||||
| 856 | "\ProgramData\local\aescrypter.exe" a "C:\Program Files\FileZilla FTP Client\resources\blukis\16x16\uploadadd.png.aes" "C:\Program Files\FileZilla FTP Client\resources\blukis\16x16\uploadadd.png" -ep2 -hp1a2vn57b348741t92451sst0a391ba72 -m0 -y | C:\ProgramData\local\aescrypter.exe | — | dcomcnfgui.exe | |||||||||||
User: SYSTEM Integrity Level: SYSTEM Exit code: 0 Modules
| |||||||||||||||
| 868 | "\ProgramData\local\aescrypter.exe" a "C:\Program Files\FileZilla FTP Client\resources\blukis\48x48\help.png.aes" "C:\Program Files\FileZilla FTP Client\resources\blukis\48x48\help.png" -ep2 -hp1a2vn57b348741t92451sst0a391ba72 -m0 -y | C:\ProgramData\local\aescrypter.exe | — | dcomcnfgui.exe | |||||||||||
User: SYSTEM Integrity Level: SYSTEM Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (2044) 59ed7a26c56a644bf3f5ba45459965be8a6e6b79dcf4f90a5c51f2bb12190bf9.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR SFX |
| Operation: | write | Name: | C%%WINDOWS%system32% |
Value: C:\WINDOWS\system32\ | |||
| (PID) Process: | (1028) reg.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | svchost |
Value: C:\ProgramData\local\svchost.exe | |||
| (PID) Process: | (4312) reg.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\CBDHSvc |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (4312) reg.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\iai2c.sys |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (4312) reg.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\Power |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (4312) reg.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ProfSvc |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (4312) reg.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\SerCx2.sys |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (4312) reg.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\UserManager |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (4312) reg.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\WinDefend |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (4312) reg.exe | Key: | HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Network\CBDHSvc |
| Operation: | delete key | Name: | (default) |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6128 | 59ed7a26c56a644bf3f5ba45459965be8a6e6b79dcf4f90a5c51f2bb12190bf9.exe | C:\Windows\SysWOW64\ucsvcsh.exe | executable | |
MD5:625BA9CF557DBB1FFAC001E2A0300D32 | SHA256:D80ADAFE8C367753DD7E6CB282EF55AF4257B6A9D06AC8AA1300F2CDA9ADE46C | |||
| 2972 | ucsvcsh.exe | C:\ProgramData\local\vpkswnhisp.dll | text | |
MD5:F2AE40AE7BCF6E72DC05A8BC4DE8D534 | SHA256:180738E1426936FCBE6EE8699066596C05401DD244C8F5C7D6B3FEF41621C438 | |||
| 6128 | 59ed7a26c56a644bf3f5ba45459965be8a6e6b79dcf4f90a5c51f2bb12190bf9.exe | C:\Windows\SysWOW64\dcomcnfgui.exe | executable | |
MD5:17FA49E023CB95CDFE365ABC0D7290D0 | SHA256:EC855BEFA1B088809F15CF08266AE576D1885CB8374F69FCB936094341AE7675 | |||
| 236 | dcomcnfgui.exe | C:\Windows\SysWOW64\wcmtstcsys.sss | text | |
MD5:D5CB8E4FA6F54BC38446FC8912BCEA50 | SHA256:CD83C7C6B3FF1250E744EAA3C35EF5B977B3AACCB6CDC9E1FF93AD05A719E354 | |||
| 6128 | 59ed7a26c56a644bf3f5ba45459965be8a6e6b79dcf4f90a5c51f2bb12190bf9.exe | C:\Windows\SysWOW64\tracerpts.exe | executable | |
MD5:53894890DC01BBCACE449F6590A1597B | SHA256:2F3F037B07737101076F50664EA3AF10F76970FEBDCBA4BD0E38D5A0ECA4F6DD | |||
| 236 | dcomcnfgui.exe | C:\ProgramData\local\svchost.exe | executable | |
MD5:6F36E46B83A61A5E251460AD825F425E | SHA256:35E03B690797208E0BEDAA29A6DECF78AC43236E89DD7F98F96962F8DF86037E | |||
| 236 | dcomcnfgui.exe | C:\decrypt\decrypt.exe | executable | |
MD5:9225773AA6641D29AC88CA5EB6BAECCF | SHA256:7AE63718B10429D82D5C510ED03AD855D7B997A32F74BBB3062C7DEA01EA7C0C | |||
| 236 | dcomcnfgui.exe | C:\ProgramData\local\aescrypter.exe | executable | |
MD5:53894890DC01BBCACE449F6590A1597B | SHA256:2F3F037B07737101076F50664EA3AF10F76970FEBDCBA4BD0E38D5A0ECA4F6DD | |||
| 4804 | aescrypter.exe | C:\Program Files\CCleaner\Data\StateHistory\DUState 24-02-06 12-40-53.dat.aes | compressed | |
MD5:C35DDE6F20F71C5DA2384C9BCA90822E | SHA256:19388281F25EC42C4487F5AE20A34F7FFEC3457989E77869C5EB37FCBE2616AE | |||
| 236 | dcomcnfgui.exe | C:\how to decrypt aes files.lnk | binary | |
MD5:7B9AC32B3D33E6459D0E01ADA73A19D2 | SHA256:8DBDC345BFE1FB72C2F532DD65DFF147AFB534838EB549AA71FC9864FBCD87F1 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1268 | svchost.exe | GET | 200 | 2.16.241.12:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
2976 | SIHClient.exe | GET | 200 | 2.23.181.156:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
2976 | SIHClient.exe | GET | 200 | 2.23.181.156:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
2940 | svchost.exe | GET | 200 | 23.209.209.135:80 | http://x1.c.lencr.org/ | unknown | — | — | whitelisted |
2288 | svchost.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1268 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4864 | RUXIMICS.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1268 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
1268 | svchost.exe | 2.16.241.12:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
1268 | svchost.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
2976 | SIHClient.exe | 20.109.210.53:443 | slscr.update.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
2976 | SIHClient.exe | 2.23.181.156:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |