| File name: | 6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe |
| Full analysis: | https://app.any.run/tasks/1feae871-476c-4736-8b5b-693b7d5cf699 |
| Verdict: | Malicious activity |
| Threats: | A backdoor is a type of cybersecurity threat that allows attackers to secretly compromise a system and conduct malicious activities, such as stealing data and modifying files. Backdoors can be difficult to detect, as they often use legitimate system applications to evade defense mechanisms. Threat actors often utilize special malware, such as PlugX, to establish backdoors on target devices. |
| Analysis date: | June 28, 2025, 10:14:37 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32+ executable (GUI) x86-64, for MS Windows, 7 sections |
| MD5: | 39A27D859ECA3100263E76888BFBF34D |
| SHA1: | 3B55F3C40FDD98ADE7E6736852410871F7D18327 |
| SHA256: | 6490A19D1B236722F4560E3C59722B16319FF3B4A425897B4C513F6AC8A7524C |
| SSDEEP: | 98304:2C3CpA11ybhbLylu/ZUmTv4O+kzK/7ueSnKHddLO0Aq+a2kY/wUGIjgC/TJLKTnw:DTdw/881mwLNuEmxZVjg |
| .exe | | | InstallShield setup (57.6) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (36.9) |
| .exe | | | Generic Win/DOS Executable (2.6) |
| .exe | | | DOS Executable Generic (2.6) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2025:06:23 00:37:42+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 14.43 |
| CodeSize: | 174592 |
| InitializedDataSize: | 157184 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xd0d0 |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 888 | C:\Windows\System32\MsiExec.exe -Embedding AADD53499ED4F03597C797147C0CA20E | C:\Windows\System32\msiexec.exe | msiexec.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows® installer Version: 5.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1984 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2076 | "C:\Users\admin\AppData\Local\Temp\6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe" | C:\Users\admin\AppData\Local\Temp\6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 2292 | C:\Windows\syswow64\MsiExec.exe -Embedding A5AE4739F5DC144D1782E9845679F496 | C:\Windows\SysWOW64\msiexec.exe | — | msiexec.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows® installer Version: 5.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2696 | C:\Windows\System32\colorcpl.exe | C:\Windows\System32\colorcpl.exe | ComputerDefaults.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft Color Control Panel Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3584 | C:\WINDOWS\system32\winver.exe | C:\Windows\System32\winver.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Version Reporter Applet Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3756 | msiexec /i C:\Users\admin\AppData\Local\Temp\tmpmtemjhtt\setup.msi /quiet /norestart | C:\Windows\System32\msiexec.exe | — | 6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows® installer Version: 5.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3872 | "C:\Users\admin\AppData\Local\Temp\6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe" | C:\Users\admin\AppData\Local\Temp\6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe | 6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 4772 | C:\WINDOWS\Explorer.EXE | C:\Windows\explorer.exe | — | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Explorer Version: 10.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5008 | C:\WINDOWS\system32\msiexec.exe /V | C:\Windows\System32\msiexec.exe | services.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows® installer Version: 5.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (5008) msiexec.exe | Key: | HKEY_USERS\S-1-5-21-1693682860-607145093-2874071422-1001\SOFTWARE\Microsoft\RestartManager\Session0000 |
| Operation: | write | Name: | Owner |
Value: 90130000A3D6137815E8DB01 | |||
| (PID) Process: | (5008) msiexec.exe | Key: | HKEY_USERS\S-1-5-21-1693682860-607145093-2874071422-1001\SOFTWARE\Microsoft\RestartManager\Session0000 |
| Operation: | write | Name: | SessionHash |
Value: 3250D8D4688BCF562CA42E928CFDDE6300B183D1A9528C559247F5ACF9B7B686 | |||
| (PID) Process: | (5008) msiexec.exe | Key: | HKEY_USERS\S-1-5-21-1693682860-607145093-2874071422-1001\SOFTWARE\Microsoft\RestartManager\Session0000 |
| Operation: | write | Name: | Sequence |
Value: 1 | |||
| (PID) Process: | (5008) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders |
| Operation: | write | Name: | C:\Config.Msi\ |
Value: | |||
| (PID) Process: | (5008) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts |
| Operation: | write | Name: | C:\Config.Msi\175536.rbs |
Value: 31189013 | |||
| (PID) Process: | (5008) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts |
| Operation: | write | Name: | C:\Config.Msi\175536.rbsLow |
Value: | |||
| (PID) Process: | (5008) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders |
| Operation: | write | Name: | C:\Users\admin\AppData\Roaming\Microsoft\Installer\ |
Value: | |||
| (PID) Process: | (5008) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-1693682860-607145093-2874071422-1001\Components\D70586E5B837E4E4F8B914511DDC9F75 |
| Operation: | write | Name: | C325EE30E79D5A844B73D05B2D9A5B46 |
Value: C:\Users\admin\AppData\Roaming\Setup\Setup\ | |||
| (PID) Process: | (5008) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-1693682860-607145093-2874071422-1001\Components\7A351B9CFFC2F034FA13676A66DA051E |
| Operation: | write | Name: | C325EE30E79D5A844B73D05B2D9A5B46 |
Value: 01:\Software\Setup\Setup\Version | |||
| (PID) Process: | (5008) msiexec.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-1693682860-607145093-2874071422-1001\Components\EDA8B2A7860E42A43ACAF6D60A467759 |
| Operation: | write | Name: | C325EE30E79D5A844B73D05B2D9A5B46 |
Value: C:\Users\admin\AppData\Roaming\Setup\Setup\gb.dll | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2076 | 6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe | C:\Users\admin\AppData\Local\Temp\_MEI20762\_bz2.pyd | executable | |
MD5:51CA0713F8FD5F142625A44DF7ED7100 | SHA256:8768315B1E0E81CCD0D96C3D6A863803F5DD1DE6AF849285C439D61ABD32B647 | |||
| 2076 | 6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe | C:\Users\admin\AppData\Local\Temp\_MEI20762\VCRUNTIME140.dll | executable | |
MD5:32DA96115C9D783A0769312C0482A62D | SHA256:8B10C53241726B0ACC9F513157E67FCB01C166FEC69E5E38CA6AADA8F9A3619F | |||
| 2076 | 6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe | C:\Users\admin\AppData\Local\Temp\_MEI20762\api-ms-win-core-file-l1-1-0.dll | executable | |
MD5:BCC620DCC9A3A9DFD38663A971B7044B | SHA256:F73000652CA7CA7468CA6134663C99CBAF7BD97740BDBDD5D1E1E23CCFD5DB75 | |||
| 2076 | 6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe | C:\Users\admin\AppData\Local\Temp\_MEI20762\api-ms-win-core-console-l1-1-0.dll | executable | |
MD5:1BEBD9B65ED18B680F7E39BEF09FE6CE | SHA256:E756F6970905657CF73ECB3F57BAE55A67BE29AFA75AE4D16046B0F7229708EB | |||
| 2076 | 6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe | C:\Users\admin\AppData\Local\Temp\_MEI20762\api-ms-win-core-file-l1-2-0.dll | executable | |
MD5:8AD4771E23185CB7672F71EC16C580CF | SHA256:B153FF5D667C8297776F21C5F440CFF28C3E3A5B1F748FD4700306E1FB283ED8 | |||
| 2076 | 6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe | C:\Users\admin\AppData\Local\Temp\_MEI20762\api-ms-win-core-errorhandling-l1-1-0.dll | executable | |
MD5:A538B281F8E84CECDAC507C73A43D744 | SHA256:45AFAF08D1CD7E43AC5DED47ED5FD708B86E835A9470C81E8130ED6955B84DB8 | |||
| 2076 | 6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe | C:\Users\admin\AppData\Local\Temp\_MEI20762\api-ms-win-core-libraryloader-l1-1-0.dll | executable | |
MD5:2A2E22F35B83AAB6DB3D7B27C5AF1953 | SHA256:425E4EBEE71347295E36776D415611D451E2A51B451DF57DA23ED8F8FB4664E8 | |||
| 2076 | 6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe | C:\Users\admin\AppData\Local\Temp\_MEI20762\api-ms-win-core-heap-l1-1-0.dll | executable | |
MD5:CDD1EF7807185EEEE2D5AC3BAE51BDD5 | SHA256:6D14B49E8E21DE08B9FA778F15C259DBD4FEB9B54EB628D69BD50E5C86AA65A5 | |||
| 2076 | 6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe | C:\Users\admin\AppData\Local\Temp\_MEI20762\api-ms-win-core-handle-l1-1-0.dll | executable | |
MD5:517B80A416198DCFC9A1572625819506 | SHA256:2783B85D98F4A92FAF67A94FC04E9C2F6786627949984828D14DEAB1682BBE3F | |||
| 2076 | 6490a19d1b236722f4560e3c59722b16319ff3b4a425897b4c513f6ac8a7524c.exe | C:\Users\admin\AppData\Local\Temp\_MEI20762\api-ms-win-core-fibers-l1-1-0.dll | executable | |
MD5:824A1932C5C58891152AE1DE02EEF652 | SHA256:3082B0E09DFAC27233B6DF097EE0C9A45D395ADEADC0026B157106424EA98389 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
888 | msiexec.exe | GET | 200 | 104.18.20.226:80 | http://ocsp2.globalsign.com/rootr3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBT1nGh%2FJBjWKnkPdZIzB1bqhelHBwQUj%2FBLf6guRSSuTVD6Y5qL3uLdG7wCEQCB5auY5G81uRwv%2BheHGMha | unknown | — | — | whitelisted |
888 | msiexec.exe | GET | 200 | 104.18.20.226:80 | http://ocsp.globalsign.com/rootr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCDQHuXxad%2F5c1K2Rl1mo%3D | unknown | — | — | whitelisted |
888 | msiexec.exe | GET | 200 | 104.18.20.226:80 | http://ocsp.globalsign.com/gsgccr3ovtlsca2024/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBT%2BeHEVW1om2JjNh%2BetTEbfp%2BiVWQQU2tOoCEgMNDdY7uWndS5Z%2FNbcPDgCDGqKmk54oRJv16NLcw%3D%3D | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 2.16.168.114:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
2552 | svchost.exe | GET | 200 | 2.23.77.188:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
4772 | explorer.exe | GET | 200 | 8.134.199.119:80 | http://8.134.199.119/dll.txt | unknown | — | — | malicious |
4772 | explorer.exe | GET | 200 | 8.134.199.119:80 | http://8.134.199.119/regname.txt | unknown | — | — | malicious |
4772 | explorer.exe | GET | 200 | 8.134.199.119:80 | http://8.134.199.119/wj/yjwjhr.zip | unknown | — | — | malicious |
4772 | explorer.exe | GET | 200 | 8.134.199.119:80 | http://8.134.199.119/wj/yjwj.exe | unknown | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
1268 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1520 | RUXIMICS.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5944 | MoUsoCoreWorker.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
888 | msiexec.exe | 8.138.53.61:443 | gbcode.oss-cn-guangzhou.aliyuncs.com | — | SG | unknown |
888 | msiexec.exe | 104.18.20.226:80 | ocsp.globalsign.com | CLOUDFLARENET | — | whitelisted |
4772 | explorer.exe | 47.238.152.36:7777 | gb.epkogtzxs.cn | — | US | malicious |
1268 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
1268 | svchost.exe | 2.16.168.114:80 | crl.microsoft.com | Akamai International B.V. | RU | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
gbcode.oss-cn-guangzhou.aliyuncs.com |
| unknown |
ocsp.globalsign.com |
| whitelisted |
ocsp2.globalsign.com |
| whitelisted |
gb.epkogtzxs.cn |
| unknown |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2200 | svchost.exe | Misc activity | ET INFO DNS Query to Alibaba Cloud CDN Domain (aliyuncs .com) |
888 | msiexec.exe | Misc activity | ET INFO Observed Alibaba Cloud CDN Domain (aliyuncs .com in TLS SNI) |
4772 | explorer.exe | A Network Trojan was detected | ET MALWARE Win32/ProcessKiller CnC Initialization M2 |
4772 | explorer.exe | Potentially Bad Traffic | PAYLOAD [ANY.RUN] XORed Windows executable has been loaded |
4772 | explorer.exe | Potentially Bad Traffic | PAYLOAD [ANY.RUN] XORed Windows executable has been loaded |
— | — | Unknown Traffic | ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW) |
4772 | explorer.exe | Malware Command and Control Activity Detected | ET MALWARE Winos4.0 Framework CnC Login Message |
4772 | explorer.exe | Malware Command and Control Activity Detected | BACKDOOR [ANY.RUN] SilverFox TCP Init Packet |
4772 | explorer.exe | Malware Command and Control Activity Detected | ET MALWARE Winos4.0 Framework CnC Login Message CnC Server Response |
4772 | explorer.exe | Malware Command and Control Activity Detected | BACKDOOR [ANY.RUN] SilverFox Encrypted Client Packet |