File name:

d6cb6875d5f777dea91f695019b44aad3ae4e841afb9a1dd14d8118983003b64

Full analysis: https://app.any.run/tasks/225c39bc-af02-45cc-b5c6-6ea3b73701d0
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: May 18, 2025, 11:42:27
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
loader
smokeloader
smoke
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 3 sections
MD5:

B0CF1936A3951483240C97759103F13D

SHA1:

1BB0681CBD4DA08585B17646BA2649E39EA9A583

SHA256:

D6CB6875D5F777DEA91F695019B44AAD3AE4E841AFB9A1DD14D8118983003B64

SSDEEP:

6144:kQ6+O/6TOp1yELIczI0HnICe3ihxUT1v3vMYr4/LJFj24TFu:F01p1yEMcznnqE653a24TFu

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Runs injected code in another process

      • d6cb6875d5f777dea91f695019b44aad3ae4e841afb9a1dd14d8118983003b64.exe (PID: 7656)
    • Application was injected by another process

      • explorer.exe (PID: 5492)
    • SMOKE mutex has been found

      • explorer.exe (PID: 5492)
    • SMOKE has been detected (SURICATA)

      • explorer.exe (PID: 5492)
  • SUSPICIOUS

    • Executes application which crashes

      • d6cb6875d5f777dea91f695019b44aad3ae4e841afb9a1dd14d8118983003b64.exe (PID: 7656)
    • Application launched itself

      • d6cb6875d5f777dea91f695019b44aad3ae4e841afb9a1dd14d8118983003b64.exe (PID: 7332)
    • Executable content was dropped or overwritten

      • explorer.exe (PID: 5492)
  • INFO

    • Checks supported languages

      • d6cb6875d5f777dea91f695019b44aad3ae4e841afb9a1dd14d8118983003b64.exe (PID: 7332)
      • d6cb6875d5f777dea91f695019b44aad3ae4e841afb9a1dd14d8118983003b64.exe (PID: 7656)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 7972)
      • explorer.exe (PID: 5492)
    • Checks proxy server information

      • explorer.exe (PID: 5492)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:01:11 11:14:30+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 10
CodeSize: 180736
InitializedDataSize: 3822080
UninitializedDataSize: -
EntryPoint: 0x7e85
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 8.0.0.0
ProductVersionNumber: 36.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Unknown (0371)
CharacterSet: Unknown (65B1)
FileDescriptions: Butts
InternalName: Buckiyarn.exe
LegalTrademark1: Gurumess
LegalTrademarks2: Gunshutting
OriginalFileName: Buskebaser.exe
ProductVersion: 76.47.92.28
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
135
Monitored processes
6
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start d6cb6875d5f777dea91f695019b44aad3ae4e841afb9a1dd14d8118983003b64.exe no specs sppextcomobj.exe no specs slui.exe no specs d6cb6875d5f777dea91f695019b44aad3ae4e841afb9a1dd14d8118983003b64.exe werfault.exe no specs #SMOKE explorer.exe

Process information

PID
CMD
Path
Indicators
Parent process
5492C:\WINDOWS\Explorer.EXEC:\Windows\explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\shcore.dll
7332"C:\Users\admin\AppData\Local\Temp\d6cb6875d5f777dea91f695019b44aad3ae4e841afb9a1dd14d8118983003b64.exe" C:\Users\admin\AppData\Local\Temp\d6cb6875d5f777dea91f695019b44aad3ae4e841afb9a1dd14d8118983003b64.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\d6cb6875d5f777dea91f695019b44aad3ae4e841afb9a1dd14d8118983003b64.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
7376C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7408"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7656"C:\Users\admin\AppData\Local\Temp\d6cb6875d5f777dea91f695019b44aad3ae4e841afb9a1dd14d8118983003b64.exe" C:\Users\admin\AppData\Local\Temp\d6cb6875d5f777dea91f695019b44aad3ae4e841afb9a1dd14d8118983003b64.exe
d6cb6875d5f777dea91f695019b44aad3ae4e841afb9a1dd14d8118983003b64.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\appdata\local\temp\d6cb6875d5f777dea91f695019b44aad3ae4e841afb9a1dd14d8118983003b64.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
7972C:\WINDOWS\SysWOW64\WerFault.exe -u -p 7656 -s 400C:\Windows\SysWOW64\WerFault.exed6cb6875d5f777dea91f695019b44aad3ae4e841afb9a1dd14d8118983003b64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
Total events
2 253
Read events
2 253
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
3
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
7972WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_d6cb6875d5f777de_f08fd38c86a4171a8bc66ddd4f765d267221dc_a9828671_9caedc33-71f0-4121-9fc9-c79c4ff31f9c\Report.wer
MD5:
SHA256:
7972WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERDD90.tmp.dmpbinary
MD5:A7F52F7F9EFCE71940C75C271180EE7B
SHA256:515E99CEBF3BA2CB1D65F6DF7B779285FFFA3A671AD090803B2C1B32F8FC8E57
7972WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERDE4E.tmp.xmlxml
MD5:32892FF3D77320A89897DADC84A34BB3
SHA256:F2AA3493A81849C3D4440EB83F035B4B1F4CEFD05D9EB72EBBB4C6FE2BEBE54C
7972WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\d6cb6875d5f777dea91f695019b44aad3ae4e841afb9a1dd14d8118983003b64.exe.7656.dmpbinary
MD5:C9B692EEB7A9290E2FABF26607DE4DF1
SHA256:96445BA1D0DC5370560D49BA324B6038F87CF49C70A35123AEC17F3B4CA6AAF8
7972WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERDE0E.tmp.WERInternalMetadata.xmlbinary
MD5:32CDA713B2055B57A44369C23F60A6CE
SHA256:4769D3D775A297191AFB8CC4105E5961DE861CCC070FBC065DD03A238A85B689
5492explorer.exeC:\Users\admin\AppData\Roaming\hdcgshjexecutable
MD5:B0CF1936A3951483240C97759103F13D
SHA256:D6CB6875D5F777DEA91F695019B44AAD3AE4E841AFB9A1DD14D8118983003B64
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
21
DNS requests
14
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.168.124:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5492
explorer.exe
POST
404
188.40.141.211:80
http://host-file-file0.com/
unknown
malicious
5492
explorer.exe
POST
404
188.40.141.211:80
http://host-file-file0.com/
unknown
malicious
8188
SIHClient.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
8188
SIHClient.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.16.168.124:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
5496
MoUsoCoreWorker.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
2112
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.129:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 2.16.168.124
  • 2.16.168.114
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 69.192.161.161
whitelisted
google.com
  • 142.250.185.110
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.159.129
  • 20.190.159.73
  • 20.190.159.130
  • 20.190.159.4
  • 20.190.159.23
  • 40.126.31.128
  • 40.126.31.73
  • 20.190.159.68
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
host-file-file0.com
  • 188.40.141.211
malicious
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted

Threats

PID
Process
Class
Message
5492
explorer.exe
A Network Trojan was detected
LOADER [ANY.RUN] Smokeloader HTTP Header
5492
explorer.exe
A Network Trojan was detected
LOADER [ANY.RUN] Smokeloader HTTP Header
No debug info