| File name: | 617d1e7cecc25bc69660f0deb2415a867122e878d67d0bf9ece4d10076f14d0f |
| Full analysis: | https://app.any.run/tasks/6a945ccc-7088-4b02-a466-d5f6c024a849 |
| Verdict: | Malicious activity |
| Analysis date: | June 21, 2025, 04:16:52 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, 5 sections |
| MD5: | 02814608ADEA73064ECB75DC325CEF1F |
| SHA1: | A33F79FB739C721B2190621666994B6F92654DA0 |
| SHA256: | 617D1E7CECC25BC69660F0DEB2415A867122E878D67D0BF9ECE4D10076F14D0F |
| SSDEEP: | 1536:UjVABc9F8xi59F8xi/LGLJdQjVABc9F8xi59F8xi/LGLJdR:UaCLGLYaCLGLp |
| .exe | | | Win32 Executable (generic) (42.4) |
|---|---|---|
| .exe | | | Win16/32 Executable Delphi generic (19.5) |
| .exe | | | Generic Win/DOS Executable (18.8) |
| .exe | | | DOS Executable Generic (18.8) |
| .vxd | | | VXD Driver (0.2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 0000:00:00 00:00:00 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit, No debug |
| PEType: | PE32 |
| LinkerVersion: | - |
| CodeSize: | - |
| InitializedDataSize: | - |
| UninitializedDataSize: | - |
| EntryPoint: | 0x6000 |
| OSVersion: | 1 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1324 | "C:\Users\admin\Desktop\617d1e7cecc25bc69660f0deb2415a867122e878d67d0bf9ece4d10076f14d0f.exe" | C:\Users\admin\Desktop\617d1e7cecc25bc69660f0deb2415a867122e878d67d0bf9ece4d10076f14d0f.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 2148 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1324 | 617d1e7cecc25bc69660f0deb2415a867122e878d67d0bf9ece4d10076f14d0f.exe | — | ||
MD5:— | SHA256:— | |||
| 1324 | 617d1e7cecc25bc69660f0deb2415a867122e878d67d0bf9ece4d10076f14d0f.exe | C:\Users\admin\AppData\Local\VirtualStore\BOOTNXT.tmp | executable | |
MD5:6144971C8E029EE6A738750AC0ECBD0B | SHA256:7190675A4149117BEF2871D055D95A7810EC5C76DA33BF01949254428BE48FF3 | |||
| 1324 | 617d1e7cecc25bc69660f0deb2415a867122e878d67d0bf9ece4d10076f14d0f.exe | C:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\desktop.ini.tmp | executable | |
MD5:55F74CD2C44B5E60DA1B8865B4972AC2 | SHA256:C6DC42A0A5C7F4ACBFD6AB907CF8FABE74B8A2A018FF2DAE2DE86DE4F42D5788 | |||
| 1324 | 617d1e7cecc25bc69660f0deb2415a867122e878d67d0bf9ece4d10076f14d0f.exe | C:\Users\admin\AppData\Local\VirtualStore\bootmgr.tmp | executable | |
MD5:07E79F6B7D739FA46C3A724D72FA0CD8 | SHA256:33BBF873C7BD7998FAB23333BC0485146233D64C76DD145460DE644567DC9407 | |||
| 1324 | 617d1e7cecc25bc69660f0deb2415a867122e878d67d0bf9ece4d10076f14d0f.exe | C:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\desktop.ini.exe | executable | |
MD5:55F74CD2C44B5E60DA1B8865B4972AC2 | SHA256:C6DC42A0A5C7F4ACBFD6AB907CF8FABE74B8A2A018FF2DAE2DE86DE4F42D5788 | |||
| 1324 | 617d1e7cecc25bc69660f0deb2415a867122e878d67d0bf9ece4d10076f14d0f.exe | C:\Users\admin\AppData\Local\VirtualStore\bootTel.dat.tmp | executable | |
MD5:E257061B0B71CFAAFAF425F86DAE2259 | SHA256:D146BDEE099AA1126A4695AE9044AD4A2C8AC0836D233F6902E79CF1FC11738B | |||
| 1324 | 617d1e7cecc25bc69660f0deb2415a867122e878d67d0bf9ece4d10076f14d0f.exe | C:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\acrobat_reader_appicon_16.png.tmp | executable | |
MD5:E7C7EDAF57FA7F36EB876693082DDA0F | SHA256:B35C48A08B5274A0AE9FD58F29BC443D5F9E4CD14A1CAF062B447B671DEBAA1A | |||
| 1324 | 617d1e7cecc25bc69660f0deb2415a867122e878d67d0bf9ece4d10076f14d0f.exe | C:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\acrobat_sl.exe.tmp | executable | |
MD5:A314E8940A238C20D386818D9D5736F1 | SHA256:32C97F1F1CEC8C811E5A051B13EF62E9D5209C678899B7FE8DA4E43DBE6E854D | |||
| 1324 | 617d1e7cecc25bc69660f0deb2415a867122e878d67d0bf9ece4d10076f14d0f.exe | C:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\AcroCEF\cef.pak.tmp | executable | |
MD5:5092B739D5DBCC13464685E102F82D28 | SHA256:47830A54A7994AA50240D5517686F359814CDF58A5D16C9FF67DA8FE59B4EAE0 | |||
| 1324 | 617d1e7cecc25bc69660f0deb2415a867122e878d67d0bf9ece4d10076f14d0f.exe | C:\Users\admin\AppData\Local\VirtualStore\Program Files\Adobe\Acrobat DC\Acrobat\AcroCEF\cef_100_percent.pak.tmp | executable | |
MD5:B5DE5384A365535F77D4E75F1F29412D | SHA256:8F1704E85059A184593BB08253BCBFEDE20842ADDF86C4D70FDF13FF0F1A2BD2 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5944 | MoUsoCoreWorker.exe | GET | 200 | 184.24.77.37:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 184.24.77.37:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
4156 | RUXIMICS.exe | GET | 200 | 184.24.77.37:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | POST | 500 | 40.91.76.224:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | whitelisted |
4156 | RUXIMICS.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | POST | 500 | 40.91.76.224:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
5944 | MoUsoCoreWorker.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1268 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4156 | RUXIMICS.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | 184.24.77.37:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
1268 | svchost.exe | 184.24.77.37:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
4156 | RUXIMICS.exe | 184.24.77.37:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5944 | MoUsoCoreWorker.exe | 23.35.229.160:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
1268 | svchost.exe | 23.35.229.160:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |