File name:

swiss_raclette_recipe.exe

Full analysis: https://app.any.run/tasks/ddf9ed0c-231b-4bed-9191-29343907d115
Verdict: Malicious activity
Analysis date: June 21, 2025, 13:46:00
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
python
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

CD4E3C00CA5A2692C7CE952228765FA5

SHA1:

FE28B2BF0B4373B37AFC063C2B2E586364A7DE2B

SHA256:

009B68A6284D05009511064412C8B493EDF894F798B38FD02124172A8FBE2AB1

SSDEEP:

98304:XC3CpACJZ3suDacbtq9IRQJ+FgLHIccAbVZZLgPyuYg+9ThIND3aSdDlb6bXOUgQ:arlbX8fzWty

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • The process drops C-runtime libraries

      • swiss_raclette_recipe.exe (PID: 1044)
      • swiss_raclette_recipe.exe (PID: 3732)
    • Process drops python dynamic module

      • swiss_raclette_recipe.exe (PID: 1044)
      • swiss_raclette_recipe.exe (PID: 3732)
    • Application launched itself

      • swiss_raclette_recipe.exe (PID: 1044)
      • swiss_raclette_recipe.exe (PID: 3732)
    • Process drops legitimate windows executable

      • swiss_raclette_recipe.exe (PID: 1044)
      • swiss_raclette_recipe.exe (PID: 3732)
    • Executable content was dropped or overwritten

      • swiss_raclette_recipe.exe (PID: 1044)
      • swiss_raclette_recipe.exe (PID: 3732)
    • Loads Python modules

      • swiss_raclette_recipe.exe (PID: 2732)
      • swiss_raclette_recipe.exe (PID: 1948)
  • INFO

    • Checks supported languages

      • swiss_raclette_recipe.exe (PID: 1044)
      • swiss_raclette_recipe.exe (PID: 2732)
      • swiss_raclette_recipe.exe (PID: 1948)
      • swiss_raclette_recipe.exe (PID: 3732)
    • Reads the computer name

      • swiss_raclette_recipe.exe (PID: 1044)
      • swiss_raclette_recipe.exe (PID: 3732)
    • The sample compiled with english language support

      • swiss_raclette_recipe.exe (PID: 1044)
      • swiss_raclette_recipe.exe (PID: 3732)
    • Create files in a temporary directory

      • swiss_raclette_recipe.exe (PID: 1044)
      • swiss_raclette_recipe.exe (PID: 3732)
    • Checks proxy server information

      • slui.exe (PID: 2512)
    • Manual execution by a user

      • swiss_raclette_recipe.exe (PID: 3732)
    • Reads the software policy settings

      • slui.exe (PID: 2512)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | InstallShield setup (57.6)
.exe | Win64 Executable (generic) (36.9)
.exe | Generic Win/DOS Executable (2.6)
.exe | DOS Executable Generic (2.6)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:06:20 17:57:24+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.43
CodeSize: 174592
InitializedDataSize: 157184
UninitializedDataSize: -
EntryPoint: 0xd0d0
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
144
Monitored processes
6
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start swiss_raclette_recipe.exe swiss_raclette_recipe.exe no specs slui.exe rundll32.exe no specs swiss_raclette_recipe.exe swiss_raclette_recipe.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1044"C:\Users\admin\AppData\Local\Temp\swiss_raclette_recipe.exe" C:\Users\admin\AppData\Local\Temp\swiss_raclette_recipe.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\swiss_raclette_recipe.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
1948"C:\Users\admin\AppData\Local\Temp\swiss_raclette_recipe.exe" C:\Users\admin\AppData\Local\Temp\swiss_raclette_recipe.exeswiss_raclette_recipe.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\swiss_raclette_recipe.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
2512C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2732"C:\Users\admin\AppData\Local\Temp\swiss_raclette_recipe.exe" C:\Users\admin\AppData\Local\Temp\swiss_raclette_recipe.exeswiss_raclette_recipe.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\swiss_raclette_recipe.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
3652C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
3732"C:\Users\admin\AppData\Local\Temp\swiss_raclette_recipe.exe" C:\Users\admin\AppData\Local\Temp\swiss_raclette_recipe.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\swiss_raclette_recipe.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
680
Read events
680
Write events
0
Delete events
0

Modification events

No data
Executable files
100
Suspicious files
2
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
1044swiss_raclette_recipe.exeC:\Users\admin\AppData\Local\Temp\_MEI10442\_bz2.pydexecutable
MD5:3859239CED9A45399B967EBCE5A6BA23
SHA256:A4DD883257A7ACE84F96BCC6CD59E22D843D0DB080606DEFAE32923FC712C75A
1044swiss_raclette_recipe.exeC:\Users\admin\AppData\Local\Temp\_MEI10442\api-ms-win-core-console-l1-1-0.dllexecutable
MD5:F1FF052D059E2DB23AA6E740973BF359
SHA256:558A0EF7365C8F3C6EA58BEECD9042B31A1A74EB29101F9A270416A79898F15C
1044swiss_raclette_recipe.exeC:\Users\admin\AppData\Local\Temp\_MEI10442\api-ms-win-core-debug-l1-1-0.dllexecutable
MD5:543FE5B7AD7805696B2F36BD8128B177
SHA256:1046E16DD44A75796E91DE9D755BB035B5B45154683615468E6DE5BA2CEE10AF
1044swiss_raclette_recipe.exeC:\Users\admin\AppData\Local\Temp\_MEI10442\api-ms-win-core-errorhandling-l1-1-0.dllexecutable
MD5:173FE73E63C661BB3A4B274CA9F8AB0A
SHA256:A6E2BB44A850A311729276F41FC1C3109DC59BFE4220388F2F308F25F3CCD9CE
1044swiss_raclette_recipe.exeC:\Users\admin\AppData\Local\Temp\_MEI10442\api-ms-win-core-file-l1-1-0.dllexecutable
MD5:64D302C3EAB8CFE82EE17DBD3C6F49AA
SHA256:04727C7B55B4000F59C33DE22E62FA363D4830698BF1BEE2859F698FDE9A9BF8
1044swiss_raclette_recipe.exeC:\Users\admin\AppData\Local\Temp\_MEI10442\api-ms-win-core-localization-l1-2-0.dllexecutable
MD5:FB4AD461437674AA4363C3B8D8295EEB
SHA256:F1CB85A9FBF109BA351DA056F53D26D639B77C83BC5AF34A7DC12AE58A17987A
1044swiss_raclette_recipe.exeC:\Users\admin\AppData\Local\Temp\_MEI10442\_lzma.pydexecutable
MD5:E5ABC3A72996F8FDE0BCF709E6577D9D
SHA256:1796038480754A680F33A4E37C8B5673CC86C49281A287DC0C5CAE984D0CB4BB
1044swiss_raclette_recipe.exeC:\Users\admin\AppData\Local\Temp\_MEI10442\api-ms-win-core-handle-l1-1-0.dllexecutable
MD5:E0A3E511B92476B706D87813485F090E
SHA256:BC7C98A9D74D090DDB212C2B485485B7B6F365DA4DE2C8D8B727E635334A0B70
1044swiss_raclette_recipe.exeC:\Users\admin\AppData\Local\Temp\_MEI10442\api-ms-win-core-file-l2-1-0.dllexecutable
MD5:C1C9D7EE4299F6C6A26B450779D916DC
SHA256:5649D38DDAEBF059A89E1A1C1AF12553C6D010727309502882C74BE8F8F592DF
1044swiss_raclette_recipe.exeC:\Users\admin\AppData\Local\Temp\_MEI10442\api-ms-win-core-heap-l1-1-0.dllexecutable
MD5:07E1F12BBC447B06F1A7B1F08EAA5F0C
SHA256:C143697091C273D977D5EA2F8FA4F3FD92BAAD1027E8D6707103D20A0D119F2D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
40
DNS requests
22
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4944
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1268
svchost.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.55.104.172:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
432
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
432
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5328
SearchApp.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
2940
svchost.exe
GET
200
2.23.197.184:80
http://x1.c.lencr.org/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1268
svchost.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1512
RUXIMICS.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
2336
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
4944
svchost.exe
40.126.31.131:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4944
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1268
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
23.55.104.172:80
crl.microsoft.com
Akamai International B.V.
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.184.206
whitelisted
client.wns.windows.com
  • 172.211.123.248
  • 172.211.123.250
whitelisted
login.live.com
  • 40.126.31.131
  • 20.190.159.71
  • 40.126.31.130
  • 20.190.159.4
  • 20.190.159.2
  • 20.190.159.131
  • 20.190.159.0
  • 20.190.159.23
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
nexusrules.officeapps.live.com
  • 52.111.227.13
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 23.55.104.172
  • 23.55.104.190
whitelisted
www.microsoft.com
  • 2.23.246.101
  • 95.101.149.131
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted

Threats

No threats detected
No debug info