File name:

Value.exe

Full analysis: https://app.any.run/tasks/84dcee0a-6df1-4185-ab1c-381a944b82b4
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: April 29, 2025, 12:38:45
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
purecrypter
pureminer
netreactor
loader
phishing
lumma
stealer
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows, 2 sections
MD5:

417BF30B5ED2A1D679A93028F13A1CA3

SHA1:

06F1DB8F79AB5AB289188108763FA774A49ADA77

SHA256:

A7A42D99330E45B4D7560B145137A191FEC68C09173E6BEC6120761142129478

SSDEEP:

24576:6bVJjwKEojvgvdLbEm8ZzPkMKPfoeaXw78lzkB38VrGDp2bxn9TZnzDCGNsd/BL:6PjwKEojvgvdLbEm8ZzPAPfoeaXw78ly

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Run PowerShell with an invisible window

      • powershell.exe (PID: 5800)
      • powershell.exe (PID: 5744)
      • powershell.exe (PID: 5008)
    • Bypass execution policy to execute commands

      • powershell.exe (PID: 5800)
      • powershell.exe (PID: 5744)
      • powershell.exe (PID: 5008)
    • PUREMINER has been detected (YARA)

      • Value.exe (PID: 6964)
      • AddInUtil.exe (PID: 1096)
      • VC_redist.x86.exe (PID: 2800)
    • PURECRYPTER has been detected (SURICATA)

      • AddInUtil.exe (PID: 1096)
      • MSBuild.exe (PID: 6228)
    • PHISHING has been detected (SURICATA)

      • svchost.exe (PID: 2196)
    • LUMMA has been detected (SURICATA)

      • chrome.exe (PID: 6820)
    • Stealers network behavior

      • chrome.exe (PID: 6820)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • Value.exe (PID: 5892)
      • rhhoxrbqy.exe (PID: 976)
    • Starts CMD.EXE for commands execution

      • Value.exe (PID: 5892)
    • Reads the date of Windows installation

      • Value.exe (PID: 5892)
    • Executable content was dropped or overwritten

      • Value.exe (PID: 6964)
      • AddInUtil.exe (PID: 1096)
      • rhhoxrbqy.exe (PID: 976)
      • dotNetFx46_Full_setup.exe (PID: 5304)
    • Connects to unusual port

      • AddInUtil.exe (PID: 1096)
      • MSBuild.exe (PID: 6228)
    • Contacting a server suspected of hosting an CnC

      • AddInUtil.exe (PID: 1096)
      • chrome.exe (PID: 6820)
      • MSBuild.exe (PID: 6228)
    • There is functionality for taking screenshot (YARA)

      • rhhoxrbqy.exe (PID: 976)
    • The process executes via Task Scheduler

      • powershell.exe (PID: 5800)
      • CanReuseTransform.exe (PID: 6424)
      • Value.exe (PID: 6676)
      • powershell.exe (PID: 5008)
      • powershell.exe (PID: 5744)
  • INFO

    • Checks supported languages

      • Value.exe (PID: 5892)
      • Value.exe (PID: 6964)
      • Value.exe (PID: 6676)
      • AddInUtil.exe (PID: 1096)
      • rhhoxrbqy.exe (PID: 976)
      • info.exe (PID: 900)
      • VC_redist.x86.exe (PID: 2800)
      • dotNetFx46_Full_setup.exe (PID: 5304)
      • CanReuseTransform.exe (PID: 6424)
      • MSBuild.exe (PID: 6228)
    • Reads the machine GUID from the registry

      • Value.exe (PID: 5892)
      • Value.exe (PID: 6964)
      • Value.exe (PID: 6676)
      • AddInUtil.exe (PID: 1096)
      • VC_redist.x86.exe (PID: 2800)
      • dotNetFx46_Full_setup.exe (PID: 5304)
      • CanReuseTransform.exe (PID: 6424)
      • MSBuild.exe (PID: 6228)
    • Process checks computer location settings

      • Value.exe (PID: 5892)
      • rhhoxrbqy.exe (PID: 976)
    • Reads the computer name

      • Value.exe (PID: 5892)
      • Value.exe (PID: 6964)
      • AddInUtil.exe (PID: 1096)
      • Value.exe (PID: 6676)
      • rhhoxrbqy.exe (PID: 976)
      • info.exe (PID: 900)
      • VC_redist.x86.exe (PID: 2800)
      • dotNetFx46_Full_setup.exe (PID: 5304)
      • CanReuseTransform.exe (PID: 6424)
      • MSBuild.exe (PID: 6228)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 5800)
      • powershell.exe (PID: 5008)
      • powershell.exe (PID: 5744)
    • Reads Environment values

      • Value.exe (PID: 6676)
      • AddInUtil.exe (PID: 1096)
      • CanReuseTransform.exe (PID: 6424)
    • Disables trace logs

      • AddInUtil.exe (PID: 1096)
    • Checks proxy server information

      • AddInUtil.exe (PID: 1096)
      • slui.exe (PID: 6044)
    • Reads the software policy settings

      • AddInUtil.exe (PID: 1096)
      • slui.exe (PID: 6044)
    • .NET Reactor protector has been detected

      • AddInUtil.exe (PID: 1096)
      • VC_redist.x86.exe (PID: 2800)
      • Value.exe (PID: 6964)
    • Create files in a temporary directory

      • AddInUtil.exe (PID: 1096)
      • rhhoxrbqy.exe (PID: 976)
    • Creates files or folders in the user directory

      • dotNetFx46_Full_setup.exe (PID: 5304)
      • Value.exe (PID: 6964)
    • Checks if a key exists in the options dictionary (POWERSHELL)

      • powershell.exe (PID: 5744)
      • powershell.exe (PID: 5800)
      • powershell.exe (PID: 5008)
    • Application launched itself

      • chrome.exe (PID: 644)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win16/32 Executable Delphi generic (34.1)
.exe | Generic Win/DOS Executable (32.9)
.exe | DOS Executable Generic (32.9)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2042:06:01 06:22:44+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Large address aware
PEType: PE32+
LinkerVersion: 48
CodeSize: 677888
InitializedDataSize: 1536
UninitializedDataSize: -
EntryPoint: 0x0000
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: -
FileVersion: 1.0.0.0
InternalName: Oclzxdkj.exe
LegalCopyright: -
LegalTrademarks: -
OriginalFileName: Oclzxdkj.exe
ProductName: -
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
189
Monitored processes
62
Malicious processes
12
Suspicious processes
3

Behavior graph

Click at the process to see the details
start value.exe no specs cmd.exe conhost.exe no specs #PUREMINER value.exe powershell.exe no specs conhost.exe no specs value.exe no specs #PURECRYPTER addinutil.exe rhhoxrbqy.exe info.exe conhost.exe no specs #PHISHING svchost.exe #PUREMINER vc_redist.x86.exe no specs slui.exe dotnetfx46_full_setup.exe powershell.exe no specs conhost.exe no specs canreusetransform.exe no specs #PURECRYPTER msbuild.exe chrome.exe powershell.exe no specs conhost.exe no specs chrome.exe no specs #LUMMA chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
536\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exepowershell.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
536"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --use-angle=swiftshader-webgl --use-gl=angle --mute-audio --user-data-dir="C:\Users\admin\AppData\Local\Google\Chrome\xdtcj" --no-appcompat-clear --mojo-platform-channel-handle=6824 --field-trial-handle=2584,i,8286985423039347829,9518109969372805311,262144 --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
644"C:\Program Files\Google\Chrome\Application\chrome.exe" "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\xdtcj" --no-default-browser-check --no-first-run --new-window "https://enyaa.shop/?p=120&d=204&title=" --mute-audio --autoplay-policy=no-user-gesture-required --gpu --gpu-launcher --in-process-gpuC:\Program Files\Google\Chrome\Application\chrome.exe
MSBuild.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
736"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --use-angle=swiftshader-webgl --use-gl=angle --mute-audio --user-data-dir="C:\Users\admin\AppData\Local\Google\Chrome\xdtcj" --no-appcompat-clear --mojo-platform-channel-handle=6488 --field-trial-handle=2584,i,8286985423039347829,9518109969372805311,262144 --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
736"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --use-angle=swiftshader-webgl --use-gl=angle --mute-audio --user-data-dir="C:\Users\admin\AppData\Local\Google\Chrome\xdtcj" --no-appcompat-clear --mojo-platform-channel-handle=4132 --field-trial-handle=2584,i,8286985423039347829,9518109969372805311,262144 --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
900"C:\Users\admin\AppData\Local\Temp\RarSFX0\info.exe" C:\Users\admin\AppData\Local\Temp\RarSFX0\info.exe
rhhoxrbqy.exe
User:
admin
Integrity Level:
HIGH
Exit code:
2
Modules
Images
c:\users\admin\appdata\local\temp\rarsfx0\info.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\umpdc.dll
976"C:\Users\admin\AppData\Local\Temp\rhhoxrbqy.exe"C:\Users\admin\AppData\Local\Temp\rhhoxrbqy.exe
AddInUtil.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\rhhoxrbqy.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\oleaut32.dll
c:\windows\syswow64\msvcp_win.dll
1096C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe
Value.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
AddInUtil.exe
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework64\v4.0.30319\addinutil.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1312"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --use-angle=swiftshader-webgl --use-gl=angle --mute-audio --user-data-dir="C:\Users\admin\AppData\Local\Google\Chrome\xdtcj" --no-appcompat-clear --mojo-platform-channel-handle=5280 --field-trial-handle=2584,i,8286985423039347829,9518109969372805311,262144 --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1312"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --use-angle=swiftshader-webgl --use-gl=angle --mute-audio --user-data-dir="C:\Users\admin\AppData\Local\Google\Chrome\xdtcj" --no-appcompat-clear --mojo-platform-channel-handle=4000 --field-trial-handle=2584,i,8286985423039347829,9518109969372805311,262144 --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
Total events
38 255
Read events
38 227
Write events
27
Delete events
1

Modification events

(PID) Process:(1096) AddInUtil.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AddInUtil_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(1096) AddInUtil.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AddInUtil_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(1096) AddInUtil.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AddInUtil_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(1096) AddInUtil.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AddInUtil_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(1096) AddInUtil.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AddInUtil_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(1096) AddInUtil.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AddInUtil_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(1096) AddInUtil.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AddInUtil_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(1096) AddInUtil.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AddInUtil_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(1096) AddInUtil.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AddInUtil_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(1096) AddInUtil.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AddInUtil_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
8
Suspicious files
368
Text files
100
Unknown types
10

Dropped files

PID
Process
Filename
Type
5800powershell.exeC:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractivebinary
MD5:59012A1197CA9557BDC1F21A2B43CCE0
SHA256:26612276A38AFC8A9E623C87D93DA6C8CA1BFDE17E1C9AAD3F7E2618DB497A3A
5800powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_oiyvl532.g3g.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
5744powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_rsvxk5dv.f1q.psm1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
1096AddInUtil.exeC:\Users\admin\AppData\Local\Temp\rhhoxrbqy.exeexecutable
MD5:F31717EAAA7DF978792A8A9344568FDD
SHA256:E4F6682204CE8CA3A7C7D5B26FA08A367DEA4F33969013F3B840F8AAF3E3ED34
6964Value.exeC:\Users\admin\AppData\Roaming\SafeWaitHandle\Value.exeexecutable
MD5:417BF30B5ED2A1D679A93028F13A1CA3
SHA256:A7A42D99330E45B4D7560B145137A191FEC68C09173E6BEC6120761142129478
5008powershell.exeC:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_4k1vz33s.v1w.ps1text
MD5:D17FE0A3F47BE24A6453E9EF58C94641
SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
644chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\xdtcj\Default\History-journal
MD5:
SHA256:
976rhhoxrbqy.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\VC_redist.x86.exeexecutable
MD5:417BF30B5ED2A1D679A93028F13A1CA3
SHA256:A7A42D99330E45B4D7560B145137A191FEC68C09173E6BEC6120761142129478
976rhhoxrbqy.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\dotNetFx46_Full_setup.exeexecutable
MD5:5563FD5EF0892C459D7F2EB3244664A9
SHA256:57E591BBF0E70A8E8BAAB10F640261247D0C50451EE9CE8818C5B1A118BC8869
5304dotNetFx46_Full_setup.exeC:\Users\admin\AppData\Local\Position\ilcsbz\CanReuseTransform.exeexecutable
MD5:5563FD5EF0892C459D7F2EB3244664A9
SHA256:57E591BBF0E70A8E8BAAB10F640261247D0C50451EE9CE8818C5B1A118BC8869
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
41
TCP/UDP connections
76
DNS requests
58
Threats
18

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4628
RUXIMICS.exe
GET
200
23.48.23.132:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
304
4.175.87.197:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
4628
RUXIMICS.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6712
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
6712
SIHClient.exe
GET
200
23.48.23.183:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
whitelisted
6712
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6712
SIHClient.exe
GET
200
23.48.23.183:80
http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl
unknown
whitelisted
6712
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
6712
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
GET
200
52.165.164.15:443
https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4628
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
4628
RUXIMICS.exe
23.48.23.132:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4628
RUXIMICS.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
6712
SIHClient.exe
4.175.87.197:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6712
SIHClient.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
6712
SIHClient.exe
23.48.23.183:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
google.com
  • 142.250.186.110
whitelisted
client.wns.windows.com
  • 172.211.123.249
  • 172.211.123.250
whitelisted
crl.microsoft.com
  • 23.48.23.132
  • 23.48.23.156
  • 23.48.23.190
  • 23.48.23.191
  • 23.48.23.175
  • 23.48.23.141
  • 23.48.23.169
  • 23.48.23.189
  • 23.48.23.135
  • 23.48.23.183
  • 23.48.23.173
  • 23.48.23.143
  • 23.48.23.162
  • 23.48.23.194
  • 23.48.23.158
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted
loadingfreedlophr.com.de
  • 213.209.150.69
unknown
lofhr.com
  • 20.190.159.128
  • 20.190.159.73
  • 40.126.31.67
  • 20.190.159.68
  • 20.190.159.23
  • 20.190.159.2
  • 40.126.31.130
  • 20.190.159.131
unknown
loadingfreelofhr.net
  • 185.208.156.66
unknown

Threats

PID
Process
Class
Message
1096
AddInUtil.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 56
1096
AddInUtil.exe
Malware Command and Control Activity Detected
LOADER [ANY.RUN] PureLoader Download Attempt (LOAD)
1096
AddInUtil.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 33
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
2196
svchost.exe
Potentially Bad Traffic
ET DYN_DNS DYNAMIC_DNS Query to a *.crabdance .com Domain
2196
svchost.exe
Possible Social Engineering Attempted
PHISHING [ANY.RUN] Suspected Phishing Domain ( .crabdance .com)
900
info.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 8
900
info.exe
Potentially Bad Traffic
ET DYN_DNS DYNAMIC_DNS HTTP Request to a *.crabdance .com Domain
900
info.exe
Misc activity
ET INFO Go-http-client User-Agent Observed Outbound
No debug info