| File name: | invalidkey.exe |
| Full analysis: | https://app.any.run/tasks/989eeabf-b26b-4447-b695-a995c2fa3e34 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | May 26, 2025, 18:54:05 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32+ executable (console) x86-64, for MS Windows, 7 sections |
| MD5: | 9BC5C0638D9BB1CAE646F1D8937A3187 |
| SHA1: | 61926CAA575A03CC14407839E2D35F4808DA6736 |
| SHA256: | E744C04BA8A24EE1351F668172A5600EA0517190D76B7A3930FF5F7805A46644 |
| SSDEEP: | 98304:EfBT3zY9SeSlGn64tm6RaOsFvX9LDy/oVPsUlM5vRhz8luUvAphjeDBa8zreE4+K:F |
| .exe | | | Clipper DOS Executable (33.5) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (33.2) |
| .exe | | | DOS Executable Generic (33.2) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2025:05:14 11:29:58+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 14 |
| CodeSize: | 2479104 |
| InitializedDataSize: | 1528320 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x25ce6c |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows command line |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1012 | C:\WINDOWS\system32\AppVClient.exe | C:\Windows\System32\AppVClient.exe | services.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft Application Virtualization Client Service Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1020 | "C:\Program Files (x86)\Google\GoogleUpdater\138.0.7194.0\updater.exe" --crash-handler --system "--database=C:\Program Files (x86)\Google\GoogleUpdater\138.0.7194.0\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Update4 --annotation=ver=138.0.7194.0 "--attachment=C:\Program Files (x86)\Google\GoogleUpdater\updater.log" --initial-client-data=0x2b4,0x2b8,0x2bc,0x2b0,0x2c0,0x140609ff8,0x14060a004,0x14060a010 | C:\Program Files (x86)\Google\GoogleUpdater\138.0.7194.0\updater.exe | — | updater.exe | |||||||||||
User: SYSTEM Company: Google LLC Integrity Level: SYSTEM Description: Google Updater (x64) Version: 138.0.7194.0 Modules
| |||||||||||||||
| 1052 | "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver | C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe | MicrosoftEdgeUpdate.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft Edge Update Exit code: 0 Version: 1.3.147.37 Modules
| |||||||||||||||
| 1128 | "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4zNi4zNzIiIHNoZWxsX3ZlcnNpb249IjEuMy4zNi41MSIgaXNtYWNoaW5lPSIxIiBzZXNzaW9uaWQ9Ins5QkEyRkMwRS0yMUVDLTRFNjAtODQwRi1FQzVFNTM2NTM0NTJ9IiBpbnN0YWxsc291cmNlPSJjb3JlIiByZXF1ZXN0aWQ9InsyNzhGRUNDQi0yMThFLTQwRTItOEM5Ni05NjZEQzNDMjZCM0J9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IHBoeXNtZW1vcnk9IjQiIHNzZT0iMSIgc3NlMj0iMSIgc3NlMz0iMSIgc3NzZTM9IjEiIHNzZTQxPSIxIiBzc2U0Mj0iMSIgYXZ4PSIxIi8-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTkwNDUuNDA0NiIgc3A9IiIgYXJjaD0ieDY0Ii8-PGFwcCBhcHBpZD0iezQzMEZENEQwLUI3MjktNEY2MS1BQTM0LTkxNTI2NDgxNzk5RH0iIHZlcnNpb249IjEuMy4zNi4zNzIiIG5leHR2ZXJzaW9uPSIxMzguMC43MTk0LjAiIGxhbmc9IiIgYnJhbmQ9IkdDRUIiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxNDEwIiBpbnN0YWxsZGF0ZT0iNjI2NSIgY29ob3J0PSIxOjJkM2Y6IiBjb2hvcnRuYW1lPSJPbWFoYSAzLCBLZXlzdG9uZSwgYW5kIFJlY292ZXJ5Ij48ZXZlbnQgZXZlbnR0eXBlPSIxMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIvPjxldmVudCBldmVudHR5cGU9IjEzIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMTQiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIGRvd25sb2FkZXI9ImJpdHMiIHVybD0iaHR0cDovL2VkZ2VkbC5tZS5ndnQxLmNvbS9lZGdlZGwvcmVsZWFzZTIvdXBkYXRlMi9hY3N6dWF4Y3RueW1vb3loZDZjcnFsaHEyNWRhXzEzOC4wLjcxOTQuMC9VcGRhdGVyU2V0dXAuZXhlIiBkb3dubG9hZGVkPSIxMzE4ODk5MiIgdG90YWw9IjEzMTg4OTkyIiBkb3dubG9hZF90aW1lX21zPSI3MDM0MyIvPjxldmVudCBldmVudHR5cGU9IjE0IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIi8-PGV2ZW50IGV2ZW50dHlwZT0iMTUiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiLz48L2FwcD48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNDLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTIyLjAuNjI2MS43MCIgbmV4dHZlcnNpb249IiIgYXA9Ing2NC1zdGFibGUtc3RhdHNkZWZfMCIgbGFuZz0iIiBicmFuZD0iR0NFQiIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjE0MTAiIGluc3RhbGxkYXRlPSI2MjY1IiBjb2hvcnQ9IjE6Z3U6IiBjb2hvcnRuYW1lPSJTdGFibGUiPjxldmVudCBldmVudHR5cGU9IjMiIGV2ZW50cmVzdWx0PSI5IiBlcnJvcmNvZGU9Ii0xNjA2MjE5NzQ4IiBleHRyYWNvZGUxPSIwIi8-PC9hcHA-PC9yZXF1ZXN0Pg | C:\Program Files (x86)\Google\Update\GoogleUpdate.exe | GoogleUpdate.exe | ||||||||||||
User: SYSTEM Company: Google LLC Integrity Level: SYSTEM Description: Google Installer Exit code: 0 Version: 1.3.36.51 Modules
| |||||||||||||||
| 2088 | C:\WINDOWS\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe | C:\Windows\SysWOW64\Macromed\Flash\FlashPlayerUpdateService.exe | services.exe | ||||||||||||
User: SYSTEM Company: Adobe Integrity Level: SYSTEM Description: Adobe® Flash® Player Update Service 32.0 r0 Exit code: 0 Version: 32,0,0,465 Modules
| |||||||||||||||
| 2092 | C:\WINDOWS\System32\alg.exe | C:\Windows\System32\alg.exe | services.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Application Layer Gateway Service Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2196 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2420 | "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /c | C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe | MicrosoftEdgeUpdate.exe | ||||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Microsoft Edge Update Version: 1.3.147.37 Modules
| |||||||||||||||
| 3784 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | invalidkey.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4380 | "C:\Program Files (x86)\Google\GoogleUpdater\138.0.7194.0\updater.exe" --wake --system | C:\Program Files (x86)\Google\GoogleUpdater\138.0.7194.0\updater.exe | — | updater.exe | |||||||||||
User: SYSTEM Company: Google LLC Integrity Level: SYSTEM Description: Google Updater (x64) Version: 138.0.7194.0 Modules
| |||||||||||||||
| (PID) Process: | (5512) invalidkey.exe | Key: | HKEY_LOCAL_MACHINE\AmCacheTmp\Root\InventoryApplicationFile\invalidkey.exe|ee3cb1536a3988af |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (5008) armsvc.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Adobe\Adobe ARM\1.0\ARM |
| Operation: | write | Name: | iLastSvcSuccess |
Value: 1097437 | |||
| (PID) Process: | (6540) FXSSVC.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fax |
| Operation: | write | Name: | RedirectionGuard |
Value: 1 | |||
| (PID) Process: | (6540) FXSSVC.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fax\Receipts |
| Operation: | write | Name: | Password |
Value: 00 | |||
| (PID) Process: | (6540) FXSSVC.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fax\Receipts |
| Operation: | delete value | Name: | Password |
Value: | |||
| (PID) Process: | (6540) FXSSVC.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fax\Receipts |
| Operation: | write | Name: | Server |
Value: | |||
| (PID) Process: | (6540) FXSSVC.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fax\Receipts |
| Operation: | write | Name: | From |
Value: | |||
| (PID) Process: | (6540) FXSSVC.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Fax\Receipts |
| Operation: | write | Name: | User |
Value: | |||
| (PID) Process: | (5048) MicrosoftEdgeUpdateComRegisterShell64.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{9E8F1B36-249F-4FC3-9994-974AFAA07B26}\InprocServer32 |
| Operation: | write | Name: | ThreadingModel |
Value: Both | |||
| (PID) Process: | (5048) MicrosoftEdgeUpdateComRegisterShell64.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{A2F5CB38-265F-4A02-9D1E-F25B664968AB}\InprocServer32 |
| Operation: | write | Name: | ThreadingModel |
Value: Both | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 5512 | invalidkey.exe | C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe | executable | |
MD5:9253B48958260B85C61C97699036C7E4 | SHA256:FC9EC480DC1A192372B0C242F3E1F472D908B5A80D9A43BCD41E0AE3C254C0CA | |||
| 5512 | invalidkey.exe | C:\Program Files (x86)\Google\Update\GoogleUpdate.exe | executable | |
MD5:60A5B6A5A25BC674EBB64587032EED94 | SHA256:5B81DA812C379E8562C1EBF5CB0CEA695E80CD0B30762A620B9D1C5BB6FB9EE6 | |||
| 5512 | invalidkey.exe | C:\Windows\System32\msdtc.exe | executable | |
MD5:5A0195F2D4DF8CC13ABDAE47B4ED0A64 | SHA256:DC957C3C93C18F25C87AC7C92DD8CFF6E50F3F75799CCC0E070DE073A8E9A06E | |||
| 7732 | svchost.exe | C:\ProgramData\Microsoft\Network\Downloader\qmgr.db | binary | |
MD5:EC9918FA0CCD0007ED6D383D793C5512 | SHA256:2180260D7F92317E51FE47D8DF9071642ABB8B8A9780ED94130A274504C56854 | |||
| 7620 | maintenanceservice.exe | C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice.log | text | |
MD5:9954C0658A54950173A4F4238EEDB0F8 | SHA256:DB3DB01FC1231F44E4DBF6E985A6C6138289C992A56AD81FAABB867B17C6A988 | |||
| 5512 | invalidkey.exe | C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe | executable | |
MD5:1913D0D5BD7B7FA4CEB63DFF742341CE | SHA256:F413FBD4756D672921307C7B3C4B8FF12E23C8DB94376B6EAD821D3F0E1136D3 | |||
| 5512 | invalidkey.exe | C:\Windows\System32\msiexec.exe | executable | |
MD5:5DDB9F02651C4699AF39408F08AE4439 | SHA256:2AE24C72166B71F733E557418DEDDE77BC2F31C8137F9CDD7D17A1A63032D6E9 | |||
| 5008 | armsvc.exe | C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\26b799fa89ba8c8f.bin | binary | |
MD5:7EF579791DBC783BA085D52ECE4BAFB2 | SHA256:CF5A0E887C434A31254BE97B639DBDC2377860BB9B6E9365BDC6B01CCA69196B | |||
| 5512 | invalidkey.exe | C:\Users\admin\AppData\Roaming\26b799fa89ba8c8f.bin | binary | |
MD5:50F7861234C0F5BD313810B3B8DD97C6 | SHA256:0932CF663B43667E47D751CA12C717DF432784E7E61A0A49A2073FF9DE70B0C4 | |||
| 5512 | invalidkey.exe | C:\Windows\System32\alg.exe | executable | |
MD5:C6B66ABD4492BE76AAC5E6A5BD416206 | SHA256:CD005611408EA2BA22A639C7AF956765ABCC4C6618E61161C02837B22B25809B | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5512 | invalidkey.exe | POST | 200 | 172.233.219.123:80 | http://przvgke.biz/phrgdqqcu | unknown | — | — | unknown |
5008 | armsvc.exe | POST | 200 | 172.233.219.123:80 | http://przvgke.biz/mtxbq | unknown | — | — | unknown |
5008 | armsvc.exe | POST | 200 | 3.229.117.57:80 | http://npukfztj.biz/ogofgppnuk | unknown | — | — | malicious |
5512 | invalidkey.exe | POST | 200 | 172.233.219.123:80 | http://przvgke.biz/bmprxjucnyhrxw | unknown | — | — | unknown |
5008 | armsvc.exe | POST | — | 172.233.219.123:80 | http://przvgke.biz/ahtcrnrxwciqalao | unknown | — | — | unknown |
5512 | invalidkey.exe | POST | 302 | 192.64.119.165:80 | http://anpmnmxo.biz/bufmnimcsv | unknown | — | — | unknown |
5512 | invalidkey.exe | POST | 200 | 18.234.103.197:80 | http://knjghuig.biz/olpjlxe | unknown | — | — | malicious |
5008 | armsvc.exe | POST | 200 | 18.234.103.197:80 | http://knjghuig.biz/gayhihjper | unknown | — | — | malicious |
5048 | RUXIMICS.exe | GET | 200 | 2.23.246.101:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5048 | RUXIMICS.exe | GET | 200 | 23.48.23.173:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
5048 | RUXIMICS.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
5048 | RUXIMICS.exe | 23.48.23.173:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5048 | RUXIMICS.exe | 2.23.246.101:80 | www.microsoft.com | Ooredoo Q.S.C. | QA | whitelisted |
5512 | invalidkey.exe | 52.11.240.239:80 | pywolwnvd.biz | AMAZON-02 | US | malicious |
5008 | armsvc.exe | 52.11.240.239:80 | pywolwnvd.biz | AMAZON-02 | US | malicious |
5512 | invalidkey.exe | 18.234.103.197:80 | ssbzmoy.biz | AMAZON-AES | US | malicious |
5008 | armsvc.exe | 18.234.103.197:80 | ssbzmoy.biz | AMAZON-AES | US | malicious |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
pywolwnvd.biz |
| malicious |
ssbzmoy.biz |
| unknown |
cvgrf.biz |
| malicious |
login.live.com |
| whitelisted |
npukfztj.biz |
| malicious |
clients2.google.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2196 | svchost.exe | A Network Trojan was detected | ET MALWARE DNS Query to Expiro Related Domain (knjghuig .biz) |
2196 | svchost.exe | A Network Trojan was detected | ET MALWARE DNS Query to Expiro Related Domain (knjghuig .biz) |
7732 | svchost.exe | Potential Corporate Privacy Violation | ET INFO PE EXE or DLL Windows file download HTTP |
7732 | svchost.exe | Misc activity | ET INFO EXE - Served Attached HTTP |
5512 | invalidkey.exe | Misc activity | ET INFO Namecheap URL Forward |
5008 | armsvc.exe | Misc activity | ET INFO Namecheap URL Forward |