File name:

SUPERAntiSpyware.exe

Full analysis: https://app.any.run/tasks/cfcf69a1-6d73-4e58-a576-21b52e90e8c4
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: May 20, 2025, 00:50:01
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
superantispyware
tool
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, 3 sections
MD5:

976276DED474292E23FAD0BC86780AAC

SHA1:

2B9A684760284B57B8E1815155505A823DDDE0C3

SHA256:

A2816EDAA8C09326BD654016D32FC6FE09864FD596757297D934E10B8628B760

SSDEEP:

98304:26LXkp3DNibGYcp1AQebEVeX126UXxnceSm42nywZSm9OwHLqjeGRuRR4Pv7q:MP

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • SUPERAntiSpyware.exe (PID: 7300)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • SUPERAntiSpyware.exe (PID: 7300)
    • Executable content was dropped or overwritten

      • SUPERAntiSpyware.exe (PID: 7300)
  • INFO

    • Reads the computer name

      • SUPERAntiSpyware.exe (PID: 7300)
      • ielowutil.exe (PID: 7768)
    • Checks supported languages

      • SUPERAntiSpyware.exe (PID: 7300)
      • ielowutil.exe (PID: 7768)
    • The sample compiled with english language support

      • SUPERAntiSpyware.exe (PID: 7300)
    • Creates files or folders in the user directory

      • SUPERAntiSpyware.exe (PID: 7300)
    • Checks proxy server information

      • SUPERAntiSpyware.exe (PID: 7300)
    • Reads the software policy settings

      • SUPERAntiSpyware.exe (PID: 7300)
    • Creates files in the program directory

      • SUPERAntiSpyware.exe (PID: 7300)
    • SUPERANTISPYWARE mutex has been found

      • SUPERAntiSpyware.exe (PID: 7300)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:03:31 21:13:59+00:00
ImageFileCharacteristics: No relocs, Executable, Large address aware, No debug
PEType: PE32+
LinkerVersion: 14.29
CodeSize: 3434496
InitializedDataSize: 8908288
UninitializedDataSize: -
EntryPoint: 0xbca627
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 10.0.0.1274
ProductVersionNumber: 10.0.0.1274
FileFlagsMask: 0x0017
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: SUPERAntiSpyware
FileDescription: SUPERAntiSpyware Application
FileVersion: 10, 0, 0, 1274
InternalName: SUPERAntiSpyware Application
LegalCopyright: Copyright (C) 2005-2025 RealDefense LLC
LegalTrademarks: SUPERAntiSpyware (tm)
OriginalFileName: SUPERAntiSpyware.exe
ProductName: SUPERAntiSpyware
ProductVersion: 10, 0, 0, 1274
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
133
Monitored processes
6
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start superantispyware.exe sppextcomobj.exe no specs slui.exe no specs ielowutil.exe no specs iexplore.exe iexplore.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
7300"C:\Users\admin\AppData\Local\Temp\SUPERAntiSpyware.exe" C:\Users\admin\AppData\Local\Temp\SUPERAntiSpyware.exe
explorer.exe
User:
admin
Company:
SUPERAntiSpyware
Integrity Level:
MEDIUM
Description:
SUPERAntiSpyware Application
Version:
10, 0, 0, 1274
Modules
Images
c:\users\admin\appdata\local\temp\superantispyware.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7356C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7388"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7768"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -EmbeddingC:\Program Files (x86)\Internet Explorer\ielowutil.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Low-Mic Utility Tool
Version:
11.00.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\program files (x86)\internet explorer\ielowutil.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
7800"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -EmbeddingC:\Program Files\Internet Explorer\iexplore.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7860"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:7800 CREDAT:9474 /prefetch:2C:\Program Files (x86)\Internet Explorer\iexplore.exeiexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\program files (x86)\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
4 365
Read events
4 317
Write events
44
Delete events
4

Modification events

(PID) Process:(7800) iexplore.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(7800) iexplore.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(7800) iexplore.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(7800) iexplore.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch
Operation:writeName:Version
Value:
WS not running
(PID) Process:(7800) iexplore.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones
Operation:writeName:SecuritySafe
Value:
1
(PID) Process:(7800) iexplore.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(7800) iexplore.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Recovery\Active
Operation:writeName:{63DC89B5-3514-11F0-B4ED-18F7786F96EE}
Value:
0
(PID) Process:(7800) iexplore.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main
Operation:writeName:FullScreen
Value:
no
(PID) Process:(7800) iexplore.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main
Operation:writeName:DisableFirstRunCustomize
Value:
1
(PID) Process:(7800) iexplore.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery
Operation:writeName:Active
Value:
0
Executable files
13
Suspicious files
28
Text files
7
Unknown types
0

Dropped files

PID
Process
Filename
Type
7300SUPERAntiSpyware.exeC:\Users\admin\AppData\Roaming\SUPERAntiSpyware.com\SUPERAntiSpyware\SAS_CURRENTUSER.DB3-journalbinary
MD5:A16D41FA09810FB79788559D715C5E95
SHA256:F30CBD4DF3ACA165CA75EB772A0B2EDE4BF6346824989E62885792F11D8E60C5
7300SUPERAntiSpyware.exeC:\ProgramData\SUPERAntiSpyware.com\SUPERAntiSpyware\sas-data.tmptext
MD5:2DB46C628CFB3BD1545D3B5A14B4A9C5
SHA256:A9D35AE9C3C32B5E42DDAEFC88D026BF2ECF55EC56396FF0BDC6CE37F3886A18
7300SUPERAntiSpyware.exeC:\ProgramData\SUPERAntiSpyware.com\SUPERAntiSpyware\SAS_ALLUSER.DB3-journalbinary
MD5:65E4570BECC7FE2562F5780FEC5E9350
SHA256:DD5FAC88810D1CF7D31F80A796E49DE95FC38F6D412407E81522842328161A87
7300SUPERAntiSpyware.exeC:\ProgramData\SUPERAntiSpyware.com\SUPERAntiSpyware\Update\B8899B6975581C59C9257D0BA571B6E3executable
MD5:B8899B6975581C59C9257D0BA571B6E3
SHA256:31890E1879423779AD0C3063A5E632941C3E4B869E9FB388BA61AD05E571B2AB
7300SUPERAntiSpyware.exeC:\ProgramData\SUPERAntiSpyware.com\SUPERAntiSpyware\SAS_ALLUSER.DB3binary
MD5:42A9A97EBD0FB9917CB1340DADCD86E5
SHA256:A5F82288F4A2848686DA1DA800D286561A4F10793B12E6163C06B6957863DDAF
7300SUPERAntiSpyware.exeC:\ProgramData\SUPERAntiSpyware.com\SUPERAntiSpyware\Update\A48BBF8AA311F6FBCA3D36E2FFFC88E2binary
MD5:A48BBF8AA311F6FBCA3D36E2FFFC88E2
SHA256:E76700B5C8CBABDEFCA606D90862CDB5263C1B7A4E0545F218104C2818ECCFC7
7300SUPERAntiSpyware.exeC:\ProgramData\SUPERAntiSpyware.com\SUPERAntiSpyware\Update\3ECA58C9FD3DFDEE1596FC2CD4A9CFDCexecutable
MD5:3ECA58C9FD3DFDEE1596FC2CD4A9CFDC
SHA256:F7B7224885E9E79D38736D41ECFA08992291707B2BE22130F4D3553A7FCB943E
7300SUPERAntiSpyware.exeC:\ProgramData\SUPERAntiSpyware.com\SUPERAntiSpyware\Update\EFC9EA7AA080142234062F49C1ED2AA0binary
MD5:EFC9EA7AA080142234062F49C1ED2AA0
SHA256:87F7DD02E06983DC362923F74FE880367F0AB59D9BA288099A2C538982ABFA96
7300SUPERAntiSpyware.exeC:\ProgramData\SUPERAntiSpyware.com\SUPERAntiSpyware\Update\0BB6248FFFB450BF8F9A1AB20226F491executable
MD5:0BB6248FFFB450BF8F9A1AB20226F491
SHA256:EDD908EA018A694E431AF47424F74B2F4C3ACE5F27E7DEC0D375A33535FC4EE4
7300SUPERAntiSpyware.exeC:\ProgramData\SUPERAntiSpyware.com\SUPERAntiSpyware\Update\E284907472A538B478B39B9CFE8F9542executable
MD5:E284907472A538B478B39B9CFE8F9542
SHA256:9541D9D0D84FC562795BB0F1F22EFF74A611C47B7EFD561F9111C19F0D0A40CE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
38
DNS requests
22
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7800
iexplore.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
whitelisted
7800
iexplore.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1244
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
1244
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7800
iexplore.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
7800
iexplore.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
2112
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
7300
SUPERAntiSpyware.exe
52.11.38.215:443
www.superantispyware.com
AMAZON-02
US
suspicious
7300
SUPERAntiSpyware.exe
20.9.155.148:443
westus2-2.in.applicationinsights.azure.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 23.216.77.28
  • 23.216.77.6
  • 23.216.77.42
whitelisted
google.com
  • 172.217.18.14
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
www.superantispyware.com
  • 52.11.38.215
  • 52.27.199.191
unknown
westus2-2.in.applicationinsights.azure.com
  • 20.9.155.148
whitelisted
secure.superantispyware.com
  • 169.150.247.34
unknown
login.live.com
  • 40.126.31.71
  • 40.126.31.131
  • 20.190.159.130
  • 40.126.31.129
  • 20.190.159.71
  • 20.190.159.68
  • 20.190.159.128
  • 20.190.159.129
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted

Threats

No threats detected
No debug info