File name: | e70b57c6683b6d7b45e0a41938cdac0b81274ccda5fb715794d67cf3310ff01c |
Full analysis: | https://app.any.run/tasks/28bcfd96-a756-4b12-8ac9-302f5b931ac7 |
Verdict: | Malicious activity |
Analysis date: | May 10, 2025, 01:03:49 |
OS: | Windows 10 Professional (build: 19044, 64 bit) |
Indicators: | |
MIME: | application/vnd.microsoft.portable-executable |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections |
MD5: | 4EC43DFC536F9A869C60E0B3FA8DA87D |
SHA1: | C7C159773D38B97616EF640A6DDF46C5261EE1F7 |
SHA256: | E70B57C6683B6D7B45E0A41938CDAC0B81274CCDA5FB715794D67CF3310FF01C |
SSDEEP: | 49152:5bD5O4eMuTvxOoev4mKBiQM0qvp6jQL+zladHU+EEH7BM8YTWVtCPZaNYJKyWInG:5bw4eRxOoev1KBFMZgMHdeei8YTmCDM/ |
.exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
---|---|---|
.exe | | | Win64 Executable (generic) (37.3) |
.dll | | | Win32 Dynamic Link Library (generic) (8.8) |
.exe | | | Win32 Executable (generic) (6) |
.exe | | | Generic Win/DOS Executable (2.7) |
MachineType: | Intel 386 or later, and compatibles |
---|---|
TimeStamp: | 2014:10:07 04:40:26+00:00 |
ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit |
PEType: | PE32 |
LinkerVersion: | 6 |
CodeSize: | 25088 |
InitializedDataSize: | 186368 |
UninitializedDataSize: | 2048 |
EntryPoint: | 0x322e |
OSVersion: | 4 |
ImageVersion: | 6 |
SubsystemVersion: | 4 |
Subsystem: | Windows GUI |
FileVersionNumber: | 2.5.0.0 |
ProductVersionNumber: | 2.5.0.0 |
FileFlagsMask: | 0x0000 |
FileFlags: | (none) |
FileOS: | Win32 |
ObjectFileType: | Executable application |
FileSubtype: | - |
LanguageCode: | English (U.S.) |
CharacterSet: | Windows, Latin1 |
Comments: | assings |
FileDescription: | benzindunke nemheds evenblush |
FileVersion: | 2.5.0.0 |
LegalTrademarks: | skiftedagens semiprofessionals peden |
OriginalFileName: | fuldskab grandstander.exe |
ProductVersion: | 2.5.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
496 | "C:\Users\admin\AppData\Local\Temp\e70b57c6683b6d7b45e0a41938cdac0b81274ccda5fb715794d67cf3310ff01c.exe" | C:\Users\admin\AppData\Local\Temp\e70b57c6683b6d7b45e0a41938cdac0b81274ccda5fb715794d67cf3310ff01c.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: benzindunke nemheds evenblush Exit code: 0 Version: 2.5.0.0 Modules
| |||||||||||||||
1760 | "C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEvent | C:\Windows\System32\slui.exe | SppExtComObj.Exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
6068 | "C:\Users\admin\AppData\Local\Temp\e70b57c6683b6d7b45e0a41938cdac0b81274ccda5fb715794d67cf3310ff01c.exe" | C:\Users\admin\AppData\Local\Temp\e70b57c6683b6d7b45e0a41938cdac0b81274ccda5fb715794d67cf3310ff01c.exe | e70b57c6683b6d7b45e0a41938cdac0b81274ccda5fb715794d67cf3310ff01c.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: benzindunke nemheds evenblush Version: 2.5.0.0 Modules
| |||||||||||||||
6632 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
6876 | C:\WINDOWS\system32\SppExtComObj.exe -Embedding | C:\Windows\System32\SppExtComObj.Exe | — | svchost.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: KMS Connection Broker Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
|
(PID) Process: | (496) e70b57c6683b6d7b45e0a41938cdac0b81274ccda5fb715794d67cf3310ff01c.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\CLR\Start |
Operation: | write | Name: | CLR Start |
Value: 2 | |||
(PID) Process: | (496) e70b57c6683b6d7b45e0a41938cdac0b81274ccda5fb715794d67cf3310ff01c.exe | Key: | HKEY_CURRENT_USER\isolationsmaterialer\resumnms |
Operation: | write | Name: | overpopulously |
Value: 44F491 | |||
(PID) Process: | (496) e70b57c6683b6d7b45e0a41938cdac0b81274ccda5fb715794d67cf3310ff01c.exe | Key: | HKEY_CURRENT_USER\Hjertecenter\artilleristerne\orthopedists |
Operation: | write | Name: | prisreduktioner |
Value: %skridfasteste%\salvoes.gif | |||
(PID) Process: | (496) e70b57c6683b6d7b45e0a41938cdac0b81274ccda5fb715794d67cf3310ff01c.exe | Key: | HKEY_CURRENT_USER\soefolk\Uninstall\infinitude |
Operation: | write | Name: | kinders |
Value: 1 | |||
(PID) Process: | (496) e70b57c6683b6d7b45e0a41938cdac0b81274ccda5fb715794d67cf3310ff01c.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Service |
Operation: | write | Name: | System_Check |
Value: kernel32::CreateFileA(m r4 , i 0x80000000, i 0, p 0, i 4, i 0x80, i 0)i.r5 | |||
(PID) Process: | (496) e70b57c6683b6d7b45e0a41938cdac0b81274ccda5fb715794d67cf3310ff01c.exe | Key: | HKEY_CURRENT_USER\Yndighedens\Duodenums105\plebiscite |
Operation: | write | Name: | candela |
Value: FFE73BC5 | |||
(PID) Process: | (496) e70b57c6683b6d7b45e0a41938cdac0b81274ccda5fb715794d67cf3310ff01c.exe | Key: | HKEY_CURRENT_USER\befordringsmidlers\kirkehistorien\holdbare |
Operation: | write | Name: | bobbet |
Value: %blodmelsfabrikken%\Slagsang.htm | |||
(PID) Process: | (496) e70b57c6683b6d7b45e0a41938cdac0b81274ccda5fb715794d67cf3310ff01c.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Service |
Operation: | write | Name: | System_Check |
Value: kernel32::SetFilePointer(i r5, i 13101 , i 0,i 0) | |||
(PID) Process: | (496) e70b57c6683b6d7b45e0a41938cdac0b81274ccda5fb715794d67cf3310ff01c.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Service |
Operation: | write | Name: | System_Check |
Value: kernel32::VirtualAlloc(i 0,i 74833920, i 0x3000, i 0x40)p.r2 | |||
(PID) Process: | (496) e70b57c6683b6d7b45e0a41938cdac0b81274ccda5fb715794d67cf3310ff01c.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Service |
Operation: | write | Name: | System_Check |
Value: kernel32::ReadFile(i r5, i r2, i 74833920,*i 0, i 0) |
PID | Process | Filename | Type | |
---|---|---|---|---|
496 | e70b57c6683b6d7b45e0a41938cdac0b81274ccda5fb715794d67cf3310ff01c.exe | C:\Users\admin\AppData\Local\Phalerated\polygenouss\Claudias.epi | — | |
MD5:— | SHA256:— | |||
496 | e70b57c6683b6d7b45e0a41938cdac0b81274ccda5fb715794d67cf3310ff01c.exe | C:\Users\admin\AppData\Local\Phalerated\polygenouss\Blinkfyret\Forpligtelsers\spidsningens.sim | — | |
MD5:— | SHA256:— | |||
496 | e70b57c6683b6d7b45e0a41938cdac0b81274ccda5fb715794d67cf3310ff01c.exe | C:\Users\admin\AppData\Local\Phalerated\polygenouss\Blinkfyret\Manacle.ini | text | |
MD5:56681246AE6EB5089B8753F8C50CEB8F | SHA256:5D06A547B587B502338768CFC2F76B5C322FA4E3A42F40A39A9E75884FE741F5 | |||
496 | e70b57c6683b6d7b45e0a41938cdac0b81274ccda5fb715794d67cf3310ff01c.exe | C:\Users\admin\AppData\Local\Phalerated\polygenouss\Blinkfyret\Forpligtelsers\goldweed.flu | binary | |
MD5:78D1783115077754DFCBD8624CD5BA7D | SHA256:41CDC8E99FBC5E6054DAC19FC9B57FF4DDF15228FA638181BEEBE35E0668623E | |||
496 | e70b57c6683b6d7b45e0a41938cdac0b81274ccda5fb715794d67cf3310ff01c.exe | C:\Users\admin\AppData\Local\Phalerated\polygenouss\Prefounder.Hyl | binary | |
MD5:C891B0BBF731C3A698142AB2F6385E73 | SHA256:3EE49D64CC97140BE15AF8FBF04545F0EED7C07E367DE8AA01D7D5B233D05EC2 | |||
6068 | e70b57c6683b6d7b45e0a41938cdac0b81274ccda5fb715794d67cf3310ff01c.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B2B9A00839EED1DFDCCC3BFC2F5DF12 | binary | |
MD5:4A90329071AE30B759D279CCA342B0A6 | SHA256:FB6A7C3EDCD7B97FABC18855102A39FC4D6D3F82C0FDD39B1667807B71B9C49B | |||
496 | e70b57c6683b6d7b45e0a41938cdac0b81274ccda5fb715794d67cf3310ff01c.exe | C:\Users\admin\AppData\Local\Temp\nstBEA0.tmp\System.dll | executable | |
MD5:3E6BF00B3AC976122F982AE2AADB1C51 | SHA256:4FF9B2678D698677C5D9732678F9CF53F17290E09D053691AAC4CC6E6F595CBE | |||
6068 | e70b57c6683b6d7b45e0a41938cdac0b81274ccda5fb715794d67cf3310ff01c.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B46811C17859FFB409CF0E904A4AA8F8 | binary | |
MD5:4726C28BAC2E42F5C684E5B0C7F24F4A | SHA256:EAEEB9764AE76FB779B3146C821640D8D33F555AE6146525C64B34C8E49FA696 | |||
6068 | e70b57c6683b6d7b45e0a41938cdac0b81274ccda5fb715794d67cf3310ff01c.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7B5FC60CCA5D8CF767A7572C65728CD6_80AA51F10C2F500DEBC45F3B2A97930C | binary | |
MD5:184A0946FB17FC1927361E4173627C17 | SHA256:7C0810358895206C4093D72A8FCD3C613C550135B7FB46F2AC39898D1B7C810F | |||
6068 | e70b57c6683b6d7b45e0a41938cdac0b81274ccda5fb715794d67cf3310ff01c.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B46811C17859FFB409CF0E904A4AA8F8 | binary | |
MD5:1FBB37F79B317A9A248E7C4CE4F5BAC5 | SHA256:6FB1B8E593CB0388F67EAD35313A230F524657317EA86271B3A97362E5EC6AD9 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
— | — | GET | 200 | 2.23.246.101:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 2.16.164.120:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
6544 | svchost.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
6068 | e70b57c6683b6d7b45e0a41938cdac0b81274ccda5fb715794d67cf3310ff01c.exe | GET | 200 | 142.250.186.35:80 | http://c.pki.goog/r/gsr1.crl | unknown | — | — | whitelisted |
6068 | e70b57c6683b6d7b45e0a41938cdac0b81274ccda5fb715794d67cf3310ff01c.exe | GET | 200 | 142.250.186.35:80 | http://c.pki.goog/r/r4.crl | unknown | — | — | whitelisted |
6068 | e70b57c6683b6d7b45e0a41938cdac0b81274ccda5fb715794d67cf3310ff01c.exe | GET | 200 | 142.250.186.35:80 | http://o.pki.goog/we2/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTuMJxAT2trYla0jia%2F5EUSmLrk3QQUdb7Ed66J9kQ3fc%2BxaB8dGuvcNFkCEA85wFTvuwmlCdtY0UxEIqg%3D | unknown | — | — | whitelisted |
6068 | e70b57c6683b6d7b45e0a41938cdac0b81274ccda5fb715794d67cf3310ff01c.exe | GET | 200 | 142.250.186.35:80 | http://o.pki.goog/we2/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTuMJxAT2trYla0jia%2F5EUSmLrk3QQUdb7Ed66J9kQ3fc%2BxaB8dGuvcNFkCEH0th7t%2BrhK7Cmbia6iF80g%3D | unknown | — | — | whitelisted |
6480 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
6480 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 2.16.164.120:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
— | — | 2.23.246.101:80 | www.microsoft.com | Ooredoo Q.S.C. | QA | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
3216 | svchost.exe | 172.211.123.250:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
6544 | svchost.exe | 40.126.32.134:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6544 | svchost.exe | 2.17.190.73:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
2104 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6068 | e70b57c6683b6d7b45e0a41938cdac0b81274ccda5fb715794d67cf3310ff01c.exe | 142.250.185.78:443 | drive.google.com | GOOGLE | US | whitelisted |
Domain | IP | Reputation |
---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
drive.google.com |
| whitelisted |
c.pki.goog |
| whitelisted |
o.pki.goog |
| whitelisted |