File name:

4d81be09c23e02fab7364e508c21c111.fpx

Full analysis: https://app.any.run/tasks/5c4b4b70-4d08-4267-b6c1-e0fe8baadca9
Verdict: Malicious activity
Threats:

A backdoor is a type of cybersecurity threat that allows attackers to secretly compromise a system and conduct malicious activities, such as stealing data and modifying files. Backdoors can be difficult to detect, as they often use legitimate system applications to evade defense mechanisms. Threat actors often utilize special malware, such as PlugX, to establish backdoors on target devices.

Analysis date: August 02, 2025, 12:31:29
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
advancedinstaller
evasion
ssload
loader
backdoor
rust
delphi
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 14:06:51 2020, Security: 0, Code page: 1252, Revision Number: {117CFEB2-6376-4FA5-ACE4-CD1494F2E3DD}, Number of Words: 10, Subject: GeoTdata, Author: Since Flawer, Name of Creating Application: GeoTdata, Template: ;1033, Comments: This installer database contains the logic and data required to install GeoTdata., Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
MD5:

4D81BE09C23E02FAB7364E508C21C111

SHA1:

52CAE521D7A808C8206F4B5AFD6B037BC573B50E

SHA256:

DCAE57EC4B69236146F744C143C42CC8BDAC9DA6E991904E6DBF67EC1179286A

SSDEEP:

49152:Hte9IjHnotTeor8trZeIlogiyDTP6q9jp8d38C4WaaIWbpc2VHrzujXFbO9yINbJ:o9IDotTeor2yZyvP/jpOpaaIWbpbVL6O

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • SSLOAD has been detected (YARA)

      • msiexec.exe (PID: 1800)
    • SSLOAD has been detected (SURICATA)

      • msiexec.exe (PID: 1800)
  • SUSPICIOUS

    • Executes as Windows Service

      • VSSVC.exe (PID: 1936)
    • Detects AdvancedInstaller (YARA)

      • msiexec.exe (PID: 4724)
      • msiexec.exe (PID: 2324)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 2324)
    • Potential Corporate Privacy Violation

      • msiexec.exe (PID: 1800)
    • Checks for external IP

      • msiexec.exe (PID: 1800)
    • Connects to the server without a host name

      • msiexec.exe (PID: 1800)
  • INFO

    • The sample compiled with english language support

      • msiexec.exe (PID: 4724)
      • msiexec.exe (PID: 2324)
    • Reads the computer name

      • msiexec.exe (PID: 2324)
      • msiexec.exe (PID: 4948)
      • msiexec.exe (PID: 1800)
    • Checks supported languages

      • msiexec.exe (PID: 4948)
      • msiexec.exe (PID: 2324)
      • msiexec.exe (PID: 1800)
    • Reads Environment values

      • msiexec.exe (PID: 4948)
      • msiexec.exe (PID: 1800)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 4724)
      • msiexec.exe (PID: 2324)
    • Manages system restore points

      • SrTasks.exe (PID: 6292)
    • Creates files or folders in the user directory

      • msiexec.exe (PID: 2324)
    • Reads the machine GUID from the registry

      • msiexec.exe (PID: 1800)
    • Reads the software policy settings

      • msiexec.exe (PID: 1800)
      • slui.exe (PID: 2120)
    • Compiled with Borland Delphi (YARA)

      • msiexec.exe (PID: 1800)
    • Application based on Rust

      • msiexec.exe (PID: 1800)
    • Checks proxy server information

      • slui.exe (PID: 2120)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msi | Microsoft Windows Installer (81.9)
.mst | Windows SDK Setup Transform Script (9.2)
.msp | Windows Installer Patch (7.6)
.msi | Microsoft Installer (100)

EXIF

FlashPix

LastPrinted: 2009:12:11 11:47:44
CreateDate: 2009:12:11 11:47:44
ModifyDate: 2020:09:18 14:06:51
Security: None
CodePage: Windows Latin 1 (Western European)
RevisionNumber: {117CFEB2-6376-4FA5-ACE4-CD1494F2E3DD}
Words: 10
Subject: GeoTdata
Author: Since Flawer
LastModifiedBy: -
Software: GeoTdata
Template: ;1033
Comments: This installer database contains the logic and data required to install GeoTdata.
Title: Installation Database
Keywords: Installer, MSI, Database
Pages: 200
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
141
Monitored processes
8
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start msiexec.exe msiexec.exe msiexec.exe no specs vssvc.exe no specs srtasks.exe no specs conhost.exe no specs #SSLOAD msiexec.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
1800C:\Windows\syswow64\MsiExec.exe -Embedding 485F8D901FF075DAB311B3A8B2DDE9D3C:\Windows\SysWOW64\msiexec.exe
msiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
1936C:\WINDOWS\system32\vssvc.exeC:\Windows\System32\VSSVC.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2120C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2324C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
2628\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeSrTasks.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4724"C:\Windows\System32\msiexec.exe" /i C:\Users\admin\Desktop\4d81be09c23e02fab7364e508c21c111.fpx.msiC:\Windows\System32\msiexec.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
4948C:\Windows\syswow64\MsiExec.exe -Embedding 5A2D07E510887ED76EFA7E35041B0E8F CC:\Windows\SysWOW64\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
6292C:\WINDOWS\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:11C:\Windows\System32\SrTasks.exemsiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Windows System Protection background tasks.
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\srtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
9 302
Read events
9 113
Write events
180
Delete events
9

Modification events

(PID) Process:(2324) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
48000000000000005242A465A903DC011409000060180000D50700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(2324) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Enter)
Value:
48000000000000005242A465A903DC011409000060180000D20700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(2324) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Leave)
Value:
48000000000000004C6CCA65A903DC011409000060180000D20700000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(2324) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Enter)
Value:
48000000000000004C6CCA65A903DC011409000060180000D10700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(2324) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Leave)
Value:
48000000000000004C6CCA65A903DC011409000060180000D10700000100000000000000010000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(2324) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
480000000000000014CFCC65A903DC011409000060180000D00700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1936) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4800000000000000B1C50A66A903DC0190070000640F0000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1936) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4800000000000000B1C50A66A903DC01900700008C190000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1936) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4800000000000000B1C50A66A903DC0190070000AC1B0000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(1936) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer
Operation:writeName:IDENTIFY (Enter)
Value:
4800000000000000B1C50A66A903DC0190070000CC060000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
Executable files
10
Suspicious files
6
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
2324msiexec.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
2324msiexec.exeC:\Windows\Installer\19093d.msiexecutable
MD5:4D81BE09C23E02FAB7364E508C21C111
SHA256:DCAE57EC4B69236146F744C143C42CC8BDAC9DA6E991904E6DBF67EC1179286A
4724msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIDEC7.tmpexecutable
MD5:475D20C0EA477A35660E3F67ECF0A1DF
SHA256:426E6CF199A8268E8A7763EC3A4DD7ADD982B28C51D89EBEA90CA792CBAE14DD
2324msiexec.exeC:\System Volume Information\SPP\snapshot-2binary
MD5:7EC438E1F0FA42DD1F28DD1CB109C52D
SHA256:47791B7D46C7DF7B0A6E2227BAC0C70DD624352E660AB4D7CED64BEB129E5B44
4724msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIDEA7.tmpexecutable
MD5:475D20C0EA477A35660E3F67ECF0A1DF
SHA256:426E6CF199A8268E8A7763EC3A4DD7ADD982B28C51D89EBEA90CA792CBAE14DD
4724msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIDE65.tmpexecutable
MD5:475D20C0EA477A35660E3F67ECF0A1DF
SHA256:426E6CF199A8268E8A7763EC3A4DD7ADD982B28C51D89EBEA90CA792CBAE14DD
2324msiexec.exeC:\Windows\Installer\MSI9D9.tmpexecutable
MD5:475D20C0EA477A35660E3F67ECF0A1DF
SHA256:426E6CF199A8268E8A7763EC3A4DD7ADD982B28C51D89EBEA90CA792CBAE14DD
2324msiexec.exeC:\System Volume Information\SPP\OnlineMetadataCache\{3fdf3fde-7d54-4ebd-8c57-12fdda06c44b}_OnDiskSnapshotPropbinary
MD5:7EC438E1F0FA42DD1F28DD1CB109C52D
SHA256:47791B7D46C7DF7B0A6E2227BAC0C70DD624352E660AB4D7CED64BEB129E5B44
4724msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIDE76.tmpexecutable
MD5:475D20C0EA477A35660E3F67ECF0A1DF
SHA256:426E6CF199A8268E8A7763EC3A4DD7ADD982B28C51D89EBEA90CA792CBAE14DD
4724msiexec.exeC:\Users\admin\AppData\Local\Temp\MSIDE07.tmpexecutable
MD5:475D20C0EA477A35660E3F67ECF0A1DF
SHA256:426E6CF199A8268E8A7763EC3A4DD7ADD982B28C51D89EBEA90CA792CBAE14DD
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
22
DNS requests
8
Threats
8

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7124
RUXIMICS.exe
GET
200
23.216.77.39:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
23.216.77.39:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.216.77.39:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
23.3.109.244:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.3.109.244:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
172.67.74.152:443
https://api.ipify.org/
unknown
text
13 b
malicious
7124
RUXIMICS.exe
GET
200
23.3.109.244:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1800
msiexec.exe
POST
85.239.53.219:80
http://85.239.53.219/api/gateway
unknown
malicious
POST
500
20.83.72.98:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
POST
500
20.83.72.98:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
20.44.239.154:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
SG
whitelisted
1268
svchost.exe
20.44.239.154:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
SG
whitelisted
7124
RUXIMICS.exe
20.44.239.154:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
SG
whitelisted
4
System
192.168.100.255:138
whitelisted
5944
MoUsoCoreWorker.exe
23.216.77.39:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
7124
RUXIMICS.exe
23.216.77.39:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
23.216.77.39:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5944
MoUsoCoreWorker.exe
23.3.109.244:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
7124
RUXIMICS.exe
23.3.109.244:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.44.239.154
  • 51.124.78.146
whitelisted
google.com
  • 172.217.16.206
whitelisted
crl.microsoft.com
  • 23.216.77.39
  • 23.216.77.42
  • 23.216.77.35
  • 23.216.77.38
  • 23.216.77.41
  • 23.216.77.15
  • 23.216.77.7
  • 23.216.77.5
  • 23.216.77.6
whitelisted
www.microsoft.com
  • 23.3.109.244
whitelisted
api.ipify.org
  • 104.26.13.205
  • 104.26.12.205
  • 172.67.74.152
shared
self.events.data.microsoft.com
  • 13.69.239.78
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted

Threats

PID
Process
Class
Message
1800
msiexec.exe
Potential Corporate Privacy Violation
ET INFO Possible IP Check api.ipify.org
2200
svchost.exe
Misc activity
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
1800
msiexec.exe
Misc activity
ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI
Device Retrieving External IP Address Detected
ET INFO External IP Lookup api.ipify.org
Device Retrieving External IP Address Detected
POLICY [ANY.RUN] External IP Lookup by HTTP (api .ipify .org)
1800
msiexec.exe
Misc activity
SUSPICIOUS [ANY.RUN] Sent Host Name in HTTP POST Body
1800
msiexec.exe
A Network Trojan was detected
ET MALWARE Win32/SSLoad Registration Activity (POST)
1800
msiexec.exe
A Network Trojan was detected
ET MALWARE Win32/SSLoad Registration Activity (POST)
No debug info