File name:

SecuriteInfo.com.Win32.Malware-gen.21214.12020

Full analysis: https://app.any.run/tasks/896acca6-284d-4c6c-9927-df9e170bc121
Verdict: Malicious activity
Analysis date: June 07, 2025, 22:48:45
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
xor-url
generic
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

33B2C10781736AFC9E2593A2D31A30AF

SHA1:

3882BD76493F68C8BF68409A6C2B9EA00B0414F7

SHA256:

B9A984DFE108A6CB2DC4D728216112BC84B93407449AE790B7DE3DE457D88170

SSDEEP:

49152:sIh9yO6PRcFmoLBEW25rxeS/zaVlUF/+8IwiWLwsoWVmMJSMFaQQgxhSlEb:VFmoLBE3eyWVl/3wpwsrFaQQgXyEb

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • XORed URL has been found (YARA)

      • SecuriteInfo.com.Win32.Malware-gen.21214.12020.exe (PID: 2084)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • SecuriteInfo.com.Win32.Malware-gen.21214.12020.exe (PID: 2084)
    • There is functionality for taking screenshot (YARA)

      • SecuriteInfo.com.Win32.Malware-gen.21214.12020.exe (PID: 2084)
  • INFO

    • Checks supported languages

      • SecuriteInfo.com.Win32.Malware-gen.21214.12020.exe (PID: 2084)
    • The sample compiled with english language support

      • SecuriteInfo.com.Win32.Malware-gen.21214.12020.exe (PID: 2084)
    • Create files in a temporary directory

      • SecuriteInfo.com.Win32.Malware-gen.21214.12020.exe (PID: 2084)
    • Reads the computer name

      • SecuriteInfo.com.Win32.Malware-gen.21214.12020.exe (PID: 2084)
    • Checks proxy server information

      • SecuriteInfo.com.Win32.Malware-gen.21214.12020.exe (PID: 2084)
    • Reads the software policy settings

      • slui.exe (PID: 5972)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

xor-url

(PID) Process(2084) SecuriteInfo.com.Win32.Malware-gen.21214.12020.exe
Decrypted-URLs (2)https://autohotkey.com
https://autohotkey.comIIIIIIIIIICould
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (52.5)
.scr | Windows screen saver (22)
.dll | Win32 Dynamic Link Library (generic) (11)
.exe | Win32 Executable (generic) (7.5)
.exe | Generic Win/DOS Executable (3.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2020:05:30 06:52:22+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 10
CodeSize: 865280
InitializedDataSize: 315904
UninitializedDataSize: -
EntryPoint: 0xbe298
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 1.1.32.0
ProductVersionNumber: 1.1.32.0
FileFlagsMask: 0x0017
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileDescription: -
FileVersion: 1.1.32.00
InternalName: -
LegalCopyright: -
OriginalFileName: -
ProductName: -
ProductVersion: 1.1.32.00
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
131
Monitored processes
4
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #XOR-URL securiteinfo.com.win32.malware-gen.21214.12020.exe sppextcomobj.exe no specs slui.exe slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2084"C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Malware-gen.21214.12020.exe" C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Malware-gen.21214.12020.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Version:
1.1.32.00
Modules
Images
c:\users\admin\appdata\local\temp\securiteinfo.com.win32.malware-gen.21214.12020.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\psapi.dll
xor-url
(PID) Process(2084) SecuriteInfo.com.Win32.Malware-gen.21214.12020.exe
Decrypted-URLs (2)https://autohotkey.com
https://autohotkey.comIIIIIIIIIICould
5972"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exe
SppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7048C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7508C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
990
Read events
987
Write events
3
Delete events
0

Modification events

(PID) Process:(2084) SecuriteInfo.com.Win32.Malware-gen.21214.12020.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2084) SecuriteInfo.com.Win32.Malware-gen.21214.12020.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2084) SecuriteInfo.com.Win32.Malware-gen.21214.12020.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
0
Suspicious files
0
Text files
15
Unknown types
0

Dropped files

PID
Process
Filename
Type
2084SecuriteInfo.com.Win32.Malware-gen.21214.12020.exeC:\Users\admin\AppData\Local\Temp\ver.txttext
MD5:5B068A95442C7D5505B4166A77357EA5
SHA256:35EFC6DED4E13F29A8D86E4F33294BE0F59FCAAF3A56B538F9E34E60E3AE4F44
2084SecuriteInfo.com.Win32.Malware-gen.21214.12020.exeC:\Users\admin\AppData\Local\Temp\logindir\1.pngimage
MD5:5C1D4A87E10DEADCF5D46B564FC38EA3
SHA256:7CD6E2C0BF0E76206AEF92E1F22A3D350E0B23A39E8029FEECA843C8099D2B46
2084SecuriteInfo.com.Win32.Malware-gen.21214.12020.exeC:\Users\admin\AppData\Local\Temp\logindir\2.pngimage
MD5:6892D04E18E2973D06DE093A45C2C7B1
SHA256:5EB70F6501FFDCC511815A1E0DD1578DAF8A102C31D7DED8C856149253665458
2084SecuriteInfo.com.Win32.Malware-gen.21214.12020.exeC:\Users\admin\AppData\Local\Temp\logindir\6.pngimage
MD5:A22A82240BAC464F6B9532BC295E2645
SHA256:253D7CBC1E3450B048FF6CD52E6C679AB026766B452A2336A9E69727A7E5114E
2084SecuriteInfo.com.Win32.Malware-gen.21214.12020.exeC:\Users\admin\AppData\Local\Temp\logindir\4.pngimage
MD5:EBA8D6A07C6BB1BAE8B9B36A63ACE821
SHA256:778F4DE10FBF993E00D86A95CA7B1486A2A00EA2D5963A4CB22F6A4BC515135A
2084SecuriteInfo.com.Win32.Malware-gen.21214.12020.exeC:\Users\admin\AppData\Local\Temp\logindir\7.pngimage
MD5:FDECFF49F84AFBC8B9173B6292056B3D
SHA256:AECE702A968E4B50F80C4E3D55EB8044530C675AA3395D1DBA8E8BD26F0EA77B
2084SecuriteInfo.com.Win32.Malware-gen.21214.12020.exeC:\Users\admin\AppData\Local\Temp\logindir\Event1.txttext
MD5:BF63754235859A40C5B1312F05A40DD4
SHA256:D6DB1BDCD717FBB7CE6C5264C532AF4258B40B6B49C43109260E94C42533FD21
2084SecuriteInfo.com.Win32.Malware-gen.21214.12020.exeC:\Users\admin\AppData\Local\Temp\logindir\8.pngimage
MD5:F664D0E13EC81A40EEDD42BD4DB08749
SHA256:6FD7CCE72C1B8F896432A78D8A86D50FF0282DE1AA48AACA75480CF445BEFDDC
2084SecuriteInfo.com.Win32.Malware-gen.21214.12020.exeC:\Users\admin\AppData\Local\Temp\logindir\Notice.txttext
MD5:70581F91CEFFADD4ADA0460ED522B1FF
SHA256:8DBFF85ADC4E8D28710DAD19715B44EDBC24187286F85EE2B5A6DDB65EE6548F
2084SecuriteInfo.com.Win32.Malware-gen.21214.12020.exeC:\Users\admin\AppData\Local\Temp\logindir\9.pngimage
MD5:341EF8DD66315D68E1262D0C714CEAF4
SHA256:E67BAA0F75A14038B69AC34CEF86F8C64FF9A617ACEE1049E7B6F253380B4220
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
22
TCP/UDP connections
34
DNS requests
14
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2084
SecuriteInfo.com.Win32.Malware-gen.21214.12020.exe
GET
200
223.26.138.8:80
http://class1004.dothome.co.kr/rhdwltkgkd.txt
unknown
malicious
2084
SecuriteInfo.com.Win32.Malware-gen.21214.12020.exe
GET
200
223.26.138.8:80
http://class1004.dothome.co.kr/ver.txt
unknown
malicious
2084
SecuriteInfo.com.Win32.Malware-gen.21214.12020.exe
GET
200
223.26.138.8:80
http://class1004.dothome.co.kr/dlqpsxm1.txt
unknown
unknown
2084
SecuriteInfo.com.Win32.Malware-gen.21214.12020.exe
GET
200
223.26.138.8:80
http://class1004.dothome.co.kr/dlqpsxm2.txt
unknown
unknown
2084
SecuriteInfo.com.Win32.Malware-gen.21214.12020.exe
GET
404
223.26.138.8:80
http://class1004.dothome.co.kr/login/.txt
unknown
unknown
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
2084
SecuriteInfo.com.Win32.Malware-gen.21214.12020.exe
GET
404
223.26.138.8:80
http://class1004.dothome.co.kr/login/.txt
unknown
unknown
2084
SecuriteInfo.com.Win32.Malware-gen.21214.12020.exe
GET
404
223.26.138.8:80
http://class1004.dothome.co.kr/login/.txt
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
7560
svchost.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
2516
RUXIMICS.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
2.16.168.114:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
5496
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
2112
svchost.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2084
SecuriteInfo.com.Win32.Malware-gen.21214.12020.exe
223.26.138.8:80
class1004.dothome.co.kr
HyosungITX
KR
malicious
4
System
192.168.100.255:138
whitelisted
7560
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.78
whitelisted
crl.microsoft.com
  • 2.16.168.114
  • 2.16.168.124
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 184.30.21.171
whitelisted
class1004.dothome.co.kr
  • 223.26.138.8
malicious
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
login.live.com
  • 20.190.160.3
  • 20.190.160.17
  • 20.190.160.132
  • 20.190.160.128
  • 40.126.32.72
  • 40.126.32.76
  • 20.190.160.4
  • 20.190.160.130
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted

Threats

PID
Process
Class
Message
2084
SecuriteInfo.com.Win32.Malware-gen.21214.12020.exe
A Network Trojan was detected
ET USER_AGENTS Suspicious User-Agent (AutoHotkey)
2084
SecuriteInfo.com.Win32.Malware-gen.21214.12020.exe
A Network Trojan was detected
ET USER_AGENTS Suspicious User-Agent (AutoHotkey)
No debug info