| File name: | tf.exe |
| Full analysis: | https://app.any.run/tasks/46705aa8-046c-4f69-831f-db8e7e022026 |
| Verdict: | Malicious activity |
| Analysis date: | April 19, 2025, 01:14:17 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (console) Intel 80386, for MS Windows, 4 sections |
| MD5: | 1453B76FAECEDA78A408287799CA5C40 |
| SHA1: | A8E815A62389523216639CDE22148F919E782727 |
| SHA256: | D28CD43A927F71D058B752703416C42B4C7C5A1D35E6BF99D9A53EACE2D1563C |
| SSDEEP: | 768:LB1TVTxyxEMlpSQq3aoUWckZYM6RE+HRmzPm9Fz:dlVgxDlguxWckuRE+6Kz |
| .exe | | | Win16/32 Executable Delphi generic (34.1) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (32.9) |
| .exe | | | DOS Executable Generic (32.9) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2025:04:19 01:12:53+00:00 |
| ImageFileCharacteristics: | Executable, Bytes reversed lo, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 2.18 |
| CodeSize: | 28672 |
| InitializedDataSize: | 3584 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x1898 |
| OSVersion: | 1.11 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows command line |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 132 | .\System32\secinit.exe | C:\Windows\SysWOW64\secinit.exe | — | tf.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Security Init Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 132 | .\SysWOW64\rasphone.exe | C:\Windows\SysWOW64\rasphone.exe | — | tf.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Remote Access Phonebook Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 540 | /c echo "Vss" | C:\Windows\SysWOW64\cmd.exe | — | forfiles.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 616 | .\regedit.exe | C:\Windows\SysWOW64\regedit.exe | — | tf.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Registry Editor Exit code: 3221226540 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 616 | .\System32\xcopy.exe | C:\Windows\SysWOW64\xcopy.exe | — | tf.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Extended Copy Utility Exit code: 4 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 632 | .\SysWOW64\PackagedCWALauncher.exe | C:\Windows\SysWOW64\PackagedCWALauncher.exe | — | tf.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Packaged CWA Launcher Exit code: 2147942487 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 660 | .\System32\isoburn.exe | C:\Windows\SysWOW64\isoburn.exe | — | tf.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Disc Image Burning Tool Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 664 | .\System32\WerFaultSecure.exe | C:\Windows\SysWOW64\WerFaultSecure.exe | — | tf.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Fault Reporting Exit code: 1 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 672 | .\System32\SearchProtocolHost.exe | C:\Windows\SysWOW64\SearchProtocolHost.exe | — | tf.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Windows Search Protocol Host Exit code: 0 Version: 7.0.19041.3758 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 680 | .\System32\Macromed\Flash\FlashUtil32_32_0_0_465_pepper.exe | C:\Windows\SysWOW64\Macromed\Flash\FlashUtil32_32_0_0_465_pepper.exe | — | tf.exe | |||||||||||
User: admin Company: Adobe Integrity Level: MEDIUM Description: Adobe® Flash® Player Installer/Uninstaller 32.0 r0 Exit code: 1039 Version: 32,0,0,465 Modules
| |||||||||||||||
| (PID) Process: | (2516) RTBK.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Realtek\RTBK |
| Operation: | write | Name: | guidDXsoundW |
Value: {9A7A2494-D921-4B91-8899-38D44CD79857} | |||
| (PID) Process: | (2516) RTBK.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Realtek\RTBK |
| Operation: | write | Name: | APO |
Value: 01 | |||
| (PID) Process: | (2516) RTBK.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Realtek\RTBK |
| Operation: | write | Name: | VoiceCancel |
Value: 00 | |||
| (PID) Process: | (2516) RTBK.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Realtek\RTBK |
| Operation: | write | Name: | KeyValue |
Value: 0 | |||
| (PID) Process: | (2516) RTBK.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Realtek\RTBK |
| Operation: | write | Name: | EQEnable |
Value: 0 | |||
| (PID) Process: | (2516) RTBK.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Realtek\RTBK |
| Operation: | write | Name: | EQGain0 |
Value: 3997797 | |||
| (PID) Process: | (2516) RTBK.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Realtek\RTBK |
| Operation: | write | Name: | EQGain1 |
Value: 3801155 | |||
| (PID) Process: | (2516) RTBK.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Realtek\RTBK |
| Operation: | write | Name: | EQGain2 |
Value: 5439488 | |||
| (PID) Process: | (2516) RTBK.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Realtek\RTBK |
| Operation: | write | Name: | EQGain3 |
Value: 7536761 | |||
| (PID) Process: | (2516) RTBK.EXE | Key: | HKEY_CURRENT_USER\SOFTWARE\Realtek\RTBK |
| Operation: | write | Name: | EQGain4 |
Value: 6619252 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 4336 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_CHXSmartScreen.e_c5bda8729b4e8fabe3e5eb81f2d3493db3d727e_8ca06682_7d1e5853-92d6-42fc-9afa-84f790a9c617\Report.wer | — | |
MD5:— | SHA256:— | |||
| 5280 | FileCoAuth.exe | C:\Users\admin\AppData\Local\Microsoft\OneDrive\logs\Common\FileCoAuth-2025-04-19.0114.5280.1.odl | binary | |
MD5:F7259D1FF2E1652A71BAE54D0505815B | SHA256:973F824FC254DDB6DEC3CD87E1FD6D4791ED86BE45006F89389C367C3CAECE5F | |||
| 4336 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WER99A.tmp.xml | xml | |
MD5:CE96577D5F8883B2BF8DC8DDD7A7FBF1 | SHA256:017A6B612780627656FEB9E01B5A345FD45E0BF12059763F9531F0D1C7566B8B | |||
| 6872 | RTLCPL.EXE | C:\Users\admin\AppData\Local\Temp\Lang\Japanese.bin | text | |
MD5:FD5BD8E4A72DB1BD80F2C75D45AC28A3 | SHA256:1F083E06DFAF8ED238C4C1809BD66E6C39C0D410465B6780E14E335133AAEA2F | |||
| 4336 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\Temp\WER97A.tmp.WERInternalMetadata.xml | binary | |
MD5:8030C74D71F08458EFBFE20EC5F5175E | SHA256:41BED4A9112957EF6B9A238CE0868077049758310CC3E6CFC1BADD58F78A9E45 | |||
| 4336 | WerFault.exe | C:\Users\admin\AppData\Local\CrashDumps\CHXSmartScreen.exe.5428.dmp | binary | |
MD5:B358920DE7AB511BA0AE3B1DC296C6C1 | SHA256:C9A8793318A9A00BA82CFB83C795ADF56010BC57F15BDBEF012ACDB494AD0EBA | |||
| 6872 | RTLCPL.EXE | C:\Users\admin\AppData\Local\Temp\Lang\TradChin.bin | text | |
MD5:A878AFFA93DD2E66EE05003CEDF384CF | SHA256:F13FDF7E5F2C0A644F14FD2D7816082D582D3244954FDFA9416B9E51F0BA22C7 | |||
| 6872 | RTLCPL.EXE | C:\Users\admin\AppData\Local\Temp\Lang\Korean.bin | text | |
MD5:60B93C3EA239D60F719921663FB72CBF | SHA256:8654073B06C7CA62408EA06C99B34E7EA81A8C06F217F52AAAF396A41038418B | |||
| 5280 | FileCoAuth.exe | C:\Users\admin\AppData\Local\Microsoft\OneDrive\logs\Common\FileCoAuth-2025-04-19.0114.5280.1.aodl | binary | |
MD5:28DCA2FF4B34B5A52A2E59DF202A6ED3 | SHA256:33BACCB7296F1ED1F995FC77A23049F261CF391AC0388F9E8DD161F8C17B7F94 | |||
| 6872 | RTLCPL.EXE | C:\Users\admin\AppData\Local\Temp\Lang\Danish.bin | text | |
MD5:3F71814FC561461F999DC589F6B18574 | SHA256:2B7B5DE4D68C60889F57F79B1ABD9AE7508BA5F76C5CC88FE697536A95E826CC | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
976 | RUXIMICS.exe | GET | 200 | 2.21.245.142:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | GET | 200 | 2.21.245.142:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
2104 | svchost.exe | GET | 200 | 2.21.245.142:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5112 | SIHClient.exe | GET | 200 | 23.222.86.92:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
6544 | svchost.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
5112 | SIHClient.exe | GET | 200 | 23.222.86.92:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
5984 | dw20.exe | GET | 200 | 2.21.245.142:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5984 | dw20.exe | GET | 200 | 23.222.86.92:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
7812 | ComSvcConfig.exe | GET | 200 | 23.222.86.92:80 | http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
976 | RUXIMICS.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
5496 | MoUsoCoreWorker.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
2104 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
976 | RUXIMICS.exe | 2.21.245.142:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | 2.21.245.142:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
2104 | svchost.exe | 2.21.245.142:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
3216 | svchost.exe | 172.211.123.250:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
6544 | svchost.exe | 20.190.160.2:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |