File name:

swiss_raclette_recipe.exe

Full analysis: https://app.any.run/tasks/ddf9ed0c-231b-4bed-9191-29343907d115
Verdict: Malicious activity
Analysis date: June 21, 2025, 13:46:00
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
python
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

CD4E3C00CA5A2692C7CE952228765FA5

SHA1:

FE28B2BF0B4373B37AFC063C2B2E586364A7DE2B

SHA256:

009B68A6284D05009511064412C8B493EDF894F798B38FD02124172A8FBE2AB1

SSDEEP:

98304:XC3CpACJZ3suDacbtq9IRQJ+FgLHIccAbVZZLgPyuYg+9ThIND3aSdDlb6bXOUgQ:arlbX8fzWty

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • swiss_raclette_recipe.exe (PID: 1044)
      • swiss_raclette_recipe.exe (PID: 3732)
    • Application launched itself

      • swiss_raclette_recipe.exe (PID: 1044)
      • swiss_raclette_recipe.exe (PID: 3732)
    • The process drops C-runtime libraries

      • swiss_raclette_recipe.exe (PID: 1044)
      • swiss_raclette_recipe.exe (PID: 3732)
    • Process drops python dynamic module

      • swiss_raclette_recipe.exe (PID: 1044)
      • swiss_raclette_recipe.exe (PID: 3732)
    • Loads Python modules

      • swiss_raclette_recipe.exe (PID: 2732)
      • swiss_raclette_recipe.exe (PID: 1948)
    • Executable content was dropped or overwritten

      • swiss_raclette_recipe.exe (PID: 1044)
      • swiss_raclette_recipe.exe (PID: 3732)
  • INFO

    • Reads the computer name

      • swiss_raclette_recipe.exe (PID: 1044)
      • swiss_raclette_recipe.exe (PID: 3732)
    • Checks supported languages

      • swiss_raclette_recipe.exe (PID: 2732)
      • swiss_raclette_recipe.exe (PID: 1044)
      • swiss_raclette_recipe.exe (PID: 3732)
      • swiss_raclette_recipe.exe (PID: 1948)
    • The sample compiled with english language support

      • swiss_raclette_recipe.exe (PID: 1044)
      • swiss_raclette_recipe.exe (PID: 3732)
    • Manual execution by a user

      • swiss_raclette_recipe.exe (PID: 3732)
    • Create files in a temporary directory

      • swiss_raclette_recipe.exe (PID: 3732)
      • swiss_raclette_recipe.exe (PID: 1044)
    • Checks proxy server information

      • slui.exe (PID: 2512)
    • Reads the software policy settings

      • slui.exe (PID: 2512)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | InstallShield setup (57.6)
.exe | Win64 Executable (generic) (36.9)
.exe | Generic Win/DOS Executable (2.6)
.exe | DOS Executable Generic (2.6)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:06:20 17:57:24+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.43
CodeSize: 174592
InitializedDataSize: 157184
UninitializedDataSize: -
EntryPoint: 0xd0d0
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
144
Monitored processes
6
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start swiss_raclette_recipe.exe swiss_raclette_recipe.exe no specs slui.exe rundll32.exe no specs swiss_raclette_recipe.exe swiss_raclette_recipe.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1044"C:\Users\admin\AppData\Local\Temp\swiss_raclette_recipe.exe" C:\Users\admin\AppData\Local\Temp\swiss_raclette_recipe.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\swiss_raclette_recipe.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
1948"C:\Users\admin\AppData\Local\Temp\swiss_raclette_recipe.exe" C:\Users\admin\AppData\Local\Temp\swiss_raclette_recipe.exeswiss_raclette_recipe.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\swiss_raclette_recipe.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
2512C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2732"C:\Users\admin\AppData\Local\Temp\swiss_raclette_recipe.exe" C:\Users\admin\AppData\Local\Temp\swiss_raclette_recipe.exeswiss_raclette_recipe.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\swiss_raclette_recipe.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
3652C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
3732"C:\Users\admin\AppData\Local\Temp\swiss_raclette_recipe.exe" C:\Users\admin\AppData\Local\Temp\swiss_raclette_recipe.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\swiss_raclette_recipe.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
Total events
680
Read events
680
Write events
0
Delete events
0

Modification events

No data
Executable files
100
Suspicious files
2
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
1044swiss_raclette_recipe.exeC:\Users\admin\AppData\Local\Temp\_MEI10442\api-ms-win-core-datetime-l1-1-0.dllexecutable
MD5:54AC90B12890C228898130FD1FDFA8A7
SHA256:CCB070613427A05F2B1C835F206F06764E8526C82A1EFF8A7F2DEDB7FECFE590
1044swiss_raclette_recipe.exeC:\Users\admin\AppData\Local\Temp\_MEI10442\_lzma.pydexecutable
MD5:E5ABC3A72996F8FDE0BCF709E6577D9D
SHA256:1796038480754A680F33A4E37C8B5673CC86C49281A287DC0C5CAE984D0CB4BB
1044swiss_raclette_recipe.exeC:\Users\admin\AppData\Local\Temp\_MEI10442\_hashlib.pydexecutable
MD5:4255C44DC64F11F32C961BF275AAB3A2
SHA256:E557873D5AD59FD6BD29D0F801AD0651DBB8D9AC21545DEFE508089E92A15E29
1044swiss_raclette_recipe.exeC:\Users\admin\AppData\Local\Temp\_MEI10442\_socket.pydexecutable
MD5:1EEA9568D6FDEF29B9963783827F5867
SHA256:74181072392A3727049EA3681FE9E59516373809CED53E08F6DA7C496B76E117
1044swiss_raclette_recipe.exeC:\Users\admin\AppData\Local\Temp\_MEI10442\api-ms-win-core-errorhandling-l1-1-0.dllexecutable
MD5:173FE73E63C661BB3A4B274CA9F8AB0A
SHA256:A6E2BB44A850A311729276F41FC1C3109DC59BFE4220388F2F308F25F3CCD9CE
1044swiss_raclette_recipe.exeC:\Users\admin\AppData\Local\Temp\_MEI10442\api-ms-win-core-fibers-l1-1-0.dllexecutable
MD5:014781CF88BC83CE6A0E3D04E7657653
SHA256:413BD7DE90BA5204B6A33453A361FE4610D4A772BDCF4917F0D2702E4CA46B55
1044swiss_raclette_recipe.exeC:\Users\admin\AppData\Local\Temp\_MEI10442\_bz2.pydexecutable
MD5:3859239CED9A45399B967EBCE5A6BA23
SHA256:A4DD883257A7ACE84F96BCC6CD59E22D843D0DB080606DEFAE32923FC712C75A
1044swiss_raclette_recipe.exeC:\Users\admin\AppData\Local\Temp\_MEI10442\api-ms-win-core-handle-l1-1-0.dllexecutable
MD5:E0A3E511B92476B706D87813485F090E
SHA256:BC7C98A9D74D090DDB212C2B485485B7B6F365DA4DE2C8D8B727E635334A0B70
1044swiss_raclette_recipe.exeC:\Users\admin\AppData\Local\Temp\_MEI10442\api-ms-win-core-file-l1-2-0.dllexecutable
MD5:579B42D2AE548EDA43212397BB41072A
SHA256:ED1A076486E394E79B433D7C720D59A9EEB44F7C5E99D7F3E5AFF5307C6AA549
1044swiss_raclette_recipe.exeC:\Users\admin\AppData\Local\Temp\_MEI10442\api-ms-win-core-file-l2-1-0.dllexecutable
MD5:C1C9D7EE4299F6C6A26B450779D916DC
SHA256:5649D38DDAEBF059A89E1A1C1AF12553C6D010727309502882C74BE8F8F592DF
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
40
DNS requests
22
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4944
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1268
svchost.exe
GET
200
23.55.104.172:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
432
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
432
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5328
SearchApp.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
2940
svchost.exe
GET
200
2.23.197.184:80
http://x1.c.lencr.org/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1268
svchost.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1512
RUXIMICS.exe
51.104.136.2:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
2336
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
4944
svchost.exe
40.126.31.131:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4944
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1268
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
23.55.104.172:80
crl.microsoft.com
Akamai International B.V.
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.184.206
whitelisted
client.wns.windows.com
  • 172.211.123.248
  • 172.211.123.250
whitelisted
login.live.com
  • 40.126.31.131
  • 20.190.159.71
  • 40.126.31.130
  • 20.190.159.4
  • 20.190.159.2
  • 20.190.159.131
  • 20.190.159.0
  • 20.190.159.23
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
nexusrules.officeapps.live.com
  • 52.111.227.13
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 23.55.104.172
  • 23.55.104.190
whitelisted
www.microsoft.com
  • 2.23.246.101
  • 95.101.149.131
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted

Threats

No threats detected
No debug info