| File name: | spf.exe |
| Full analysis: | https://app.any.run/tasks/0d4197bc-912f-4c13-87f4-a709502969da |
| Verdict: | Malicious activity |
| Analysis date: | August 03, 2025, 20:33:32 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, 4 sections |
| MD5: | 17A5D05A72C3A9A578F3067075E6B84C |
| SHA1: | FF48E6F2C69BB3158E7FA8ABB6EFB574478E4301 |
| SHA256: | B6B9BBB573350E11D22089D22258125D6ECD0C86D22B1975729FC9125AA1F028 |
| SSDEEP: | 98304:wuYgToyMklCJdqYibNvRt7Jg7sj9QFF4wWN08w92z+xnhveCDOA5ekYSxCcsUJxb:vFvQFi9pfJqRAR1 |
| .exe | | | Win64 Executable (generic) (61.6) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (14.6) |
| .exe | | | Win32 Executable (generic) (10) |
| .exe | | | Win16/32 Executable Delphi generic (4.6) |
| .exe | | | Generic Win/DOS Executable (4.4) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 0000:00:00 00:00:00 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit, No debug |
| PEType: | PE32 |
| LinkerVersion: | 6 |
| CodeSize: | 2048 |
| InitializedDataSize: | 5183488 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x1475 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 436 | C:\WINDOWS\SysWow64\perfhost.exe | C:\Windows\SysWOW64\perfhost.exe | services.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: x86 Performance Counter Host Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 640 | "C:\Users\admin\AppData\Local\Temp\stb.exe" | C:\Users\admin\AppData\Local\Temp\stb.exe | spf.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 280539127 Modules
| |||||||||||||||
| 1100 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | spf.vmp.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1204 | "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc | C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft Edge Update Exit code: 2147748608 Version: 1.3.147.37 Modules
| |||||||||||||||
| 1212 | wmic csproduct get uuid | C:\Windows\System32\wbem\WMIC.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: WMI Commandline Utility Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1468 | "C:\WINDOWS\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" | C:\Windows\System32\SearchProtocolHost.exe | — | SearchIndexer.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft Windows Search Protocol Host Version: 7.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1636 | "C:\Program Files\Google\Chrome\Application\133.0.6943.127\elevation_service.exe" | C:\Program Files\Google\Chrome\Application\133.0.6943.127\elevation_service.exe | services.exe | ||||||||||||
User: SYSTEM Company: Google LLC Integrity Level: SYSTEM Description: Google Chrome Version: 133.0.6943.127 Modules
| |||||||||||||||
| 2028 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2200 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2216 | "C:\Users\admin\AppData\Local\Temp\spf.vmp.exe" | C:\Users\admin\AppData\Local\Temp\spf.vmp.exe | spf.exe | ||||||||||||
User: admin Integrity Level: HIGH Modules
| |||||||||||||||
| (PID) Process: | (4880) armsvc.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Adobe\Adobe ARM\1.0\ARM |
| Operation: | write | Name: | iLastSvcSuccess |
Value: 1632000 | |||
| (PID) Process: | (6304) FXSSVC.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fax\Receipts |
| Operation: | write | Name: | Password |
Value: 00 | |||
| (PID) Process: | (6304) FXSSVC.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fax\Receipts |
| Operation: | delete value | Name: | Password |
Value: | |||
| (PID) Process: | (6304) FXSSVC.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fax\Receipts |
| Operation: | write | Name: | Server |
Value: | |||
| (PID) Process: | (6304) FXSSVC.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fax\Receipts |
| Operation: | write | Name: | From |
Value: | |||
| (PID) Process: | (6304) FXSSVC.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fax\Receipts |
| Operation: | write | Name: | User |
Value: | |||
| (PID) Process: | (6304) FXSSVC.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fax |
| Operation: | write | Name: | RedirectionGuard |
Value: 1 | |||
| (PID) Process: | (7856) SearchIndexer.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Search\Tracing\EventThrottleState |
| Operation: | delete value | Name: | 000003eb |
Value: | |||
| (PID) Process: | (7856) SearchIndexer.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Search\Tracing\EventThrottleLastReported |
| Operation: | delete value | Name: | 000003eb |
Value: | |||
| (PID) Process: | (7856) SearchIndexer.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Search\Tracing\EventThrottleState |
| Operation: | delete value | Name: | 000003f5 |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2216 | spf.vmp.exe | C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | executable | |
MD5:E3EA3DE209209E8932C24FD7FB4EDFA5 | SHA256:B3B1C0E4917371098CE2E1261E1B4F713DCD970B2B5218C8F67072697C346A8D | |||
| 2216 | spf.vmp.exe | C:\Windows\System32\alg.exe | executable | |
MD5:687042F9E4EA55B9D0CEB0C02FD6365F | SHA256:07E4A0D90D67A501E28D505DEE32862A5B23074A5883BAB4585CE87EA07C845D | |||
| 2348 | spf.exe | C:\Users\admin\AppData\Local\Temp\spf.vmp.exe | executable | |
MD5:4032425007B9753FD4F5739270789F29 | SHA256:5B51BDFBF8A00B5B06731E1A5ABE4B0872F2924681FFE597AF59C01BF7100A84 | |||
| 4880 | armsvc.exe | C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\26b799fa89ba8c8f.bin | binary | |
MD5:FBE991102A03A2EE56AE0644ADFDFBB3 | SHA256:70C29124A54E68186CA1F6AF84EB78B07C679B62138E5EFD1C5D00162D30A91E | |||
| 2216 | spf.vmp.exe | C:\Users\admin\AppData\Roaming\26b799fa89ba8c8f.bin | binary | |
MD5:0EF962F1B2845E991059AEF9DCA8D617 | SHA256:3F21EA844AE01619D1F6BF6721639D2F12FE65364515F01BDCE700011976CC44 | |||
| 2348 | spf.exe | C:\Users\admin\AppData\Local\Temp\stb.exe | executable | |
MD5:F805640B07793D959B67A53DF7CF3954 | SHA256:00830A15E497A4A24CFBA9D5B9DC03F4363A7795ABE3038FFB2B1A6A23B3A116 | |||
| 2216 | spf.vmp.exe | C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.92\elevation_service.exe | executable | |
MD5:A1AF38F862619074A5D6A42DA72C5F5C | SHA256:E9688BD57F96D8E63F114E66B57E5E8E18DC599D59A37D52258A35A18D30C46E | |||
| 2216 | spf.vmp.exe | C:\Program Files\Google\Chrome\Application\133.0.6943.127\elevation_service.exe | executable | |
MD5:A339655F8099A2B03C9B9D72F0DF0BA9 | SHA256:D8AB8641DE1F3E4C5CC4CC54F81B28392DC99159B900D3C445D528AFFE39D909 | |||
| 2216 | spf.vmp.exe | C:\Program Files (x86)\Google\GoogleUpdater\134.0.6985.0\updater.exe | executable | |
MD5:3322B4493C026C4762EC1A4A41929BBF | SHA256:1A7E9D83F8F700F3AF35BA642FFE6E9C95F02C86BECA651DB31CF7D0BF10235E | |||
| 2216 | spf.vmp.exe | C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe | executable | |
MD5:FE6E0D1EC2CDD94020D3F63F90A835A5 | SHA256:3859B5FE6E0351A33B3036D44FA684BE1B42B3F67EF0F967E4ED00964514C198 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4160 | RUXIMICS.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
4880 | armsvc.exe | POST | 200 | 44.244.22.128:80 | http://pywolwnvd.biz/eltdssmxggy | unknown | — | — | malicious |
2216 | spf.vmp.exe | POST | 200 | 44.244.22.128:80 | http://pywolwnvd.biz/lvkfekgx | unknown | — | — | malicious |
2216 | spf.vmp.exe | POST | 200 | 50.16.27.236:80 | http://ssbzmoy.biz/uiwtefbqnf | unknown | — | — | unknown |
4880 | armsvc.exe | POST | 200 | 50.16.27.236:80 | http://ssbzmoy.biz/if | unknown | — | — | unknown |
2216 | spf.vmp.exe | POST | 200 | 44.244.22.128:80 | http://cvgrf.biz/ynwcuropodmmcgid | unknown | — | — | malicious |
4880 | armsvc.exe | POST | 200 | 44.244.22.128:80 | http://cvgrf.biz/eelrtmecr | unknown | — | — | malicious |
2216 | spf.vmp.exe | POST | 200 | 3.229.117.57:80 | http://npukfztj.biz/xvpuqcfhifop | unknown | — | — | malicious |
4880 | armsvc.exe | POST | 200 | 3.229.117.57:80 | http://npukfztj.biz/vgggeq | unknown | — | — | malicious |
2216 | spf.vmp.exe | POST | 200 | 172.237.146.25:80 | http://przvgke.biz/pdtnjava | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
5944 | MoUsoCoreWorker.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1268 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4160 | RUXIMICS.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1268 | svchost.exe | 23.216.77.15:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5944 | MoUsoCoreWorker.exe | 23.216.77.15:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
1268 | svchost.exe | 23.35.229.160:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
4160 | RUXIMICS.exe | 23.35.229.160:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
5944 | MoUsoCoreWorker.exe | 23.35.229.160:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
pywolwnvd.biz |
| malicious |
ssbzmoy.biz |
| unknown |
cvgrf.biz |
| malicious |
npukfztj.biz |
| malicious |
przvgke.biz |
| unknown |
zlenh.biz |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
2200 | svchost.exe | A Network Trojan was detected | ET MALWARE DNS Query to Expiro Related Domain (knjghuig .biz) |
2200 | svchost.exe | A Network Trojan was detected | ET MALWARE DNS Query to Expiro Related Domain (knjghuig .biz) |
2216 | spf.vmp.exe | Misc activity | ET INFO Namecheap URL Forward |
4880 | armsvc.exe | Misc activity | ET INFO Namecheap URL Forward |
2216 | spf.vmp.exe | Misc activity | ET INFO Namecheap URL Forward |
4880 | armsvc.exe | Misc activity | ET INFO Namecheap URL Forward |